0x0, 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:19 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x1}], 0x30) 14:45:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:19 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x86101, 0x0) 14:45:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:19 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffff}]) io_destroy(r1) 14:45:19 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x1}], 0x30) 14:45:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:19 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x2000) 14:45:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:19 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000240)={0x0, 0x6, 0x8, [], &(0x7f0000000100)=0xfff}) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40010080}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000011e800006e8855663de8db12908a6a4b9c024eb710339e8e5fb903b7e87ce17f5391a53511faa2", @ANYRES16=r1, @ANYBLOB="000427bd7000fcdbdf2502000000080001004e22000004000500080004000100000008000300ff000000040005000800040003000000"], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20008000) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/38, &(0x7f0000000040)=0x26) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) 14:45:19 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x1}], 0x30) 14:45:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:20 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x1000000}]) io_destroy(r1) 14:45:20 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x1}], 0x30) 14:45:20 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x50, 0x4) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x2c, 0x11, 0xe, 0x13, 0x7, 0x7fff, 0x4, 0xd0, 0x1}) 14:45:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:20 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0xfffffffbfffffffe, &(0x7f0000000240)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000100)=[{0x100, 0x1, 0xfffffffeffffffff, 0x6e1c, @tick=0x9, {0x5, 0x7}, {0x81, 0x3854c0}, @quote={{0x20, 0x8}, 0x0, &(0x7f00000000c0)={0x2, 0x4cc, 0x8, 0x7, @time={r1, r2+30000000}, {0x9, 0x4000000000000}, {0x9b1d, 0x8000}, @quote={{0x8ce, 0x4}, 0x10000, &(0x7f0000000080)={0x100, 0x99, 0xe1a, 0xb783, @time={r3, r4+10000000}, {0x1, 0xfffffffffffffffc}, {0x5, 0x7}, @result={0x40, 0x800}}}}}}, {0xfffffffffffffffa, 0xfffffffffffffeff, 0x10001, 0x2, @tick=0x555e15e7, {0x4, 0x3}, {0xc000000000000000, 0xfff}, @raw32={[0xe8, 0x80000000, 0x6]}}, {0x6, 0x6, 0x1, 0x1, @tick=0x5, {0x800000006, 0x3}, {0x8dd, 0x1}, @raw8={"6c835ddcae9f272c918c38e0"}}, {0x37, 0x3a, 0x80000000, 0x4, @time={0x0, 0x989680}, {0x1, 0x3}, {0xcd2, 0x9}, @queue={0x2, {0xffffffffffffffbd, 0x8}}}, {0x3, 0x7ff, 0x100, 0x30a8b59d, @time={0x0, 0x1c9c380}, {0x4, 0x9}, {0x8001}, @ext={0x1000, &(0x7f00000002c0)="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"}}], 0xf0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000012c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000200), &(0x7f00000023c0)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000002300)={r5, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x6, 0x8001, 0x1f, 0x80}, 0x98) 14:45:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) 14:45:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:20 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) 14:45:21 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2000000}]) io_destroy(r1) 14:45:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x60000, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000000200000002000000fd9175f59ec80fd1b0cc81e706b40168adfda250a8a221f06a85e1c3f917bc32c0b071266c1436e930d224f0904b20e385aa2ee5a4717458efa5aeada9b39096a7f0aacb6e7c638030ec6a1324b02e6092cb62e019cdb0d0f856312aae3284a1503e2dfb59b95ec692e8cdd53321b77b174662873c244d2d364974de6b7737c2a4d5cb11f090224536564c469339f2d8a19a7efa1034f04b3ee2e488c0dcfc7b05fe53e439335c5b61a606462ca5b9bac4557b57667aef9767880ce2b057555d90da7a0ed002"], 0xd6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x81, 0xff, 0x401, 0x2, 0xffff, {0x0, @in6={{0xa, 0x4e23, 0x6, @remote, 0xf3}}, 0x3, 0x7f4b, 0x0, 0x100, 0x3}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x7}, 0x8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={r1, @multicast1, @empty}, 0xc) 14:45:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:21 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) 14:45:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) close(r0) 14:45:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/137, 0x89}, {&(0x7f00000000c0)=""/242, 0xf2}], 0x2, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000200)=0x3f) 14:45:21 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) 14:45:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fstat(r0, 0x0) 14:45:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) close(r0) 14:45:21 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x4000000}]) io_destroy(r1) 14:45:21 executing program 1: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x2000000, r0, 0x0}]) io_destroy(r1) 14:45:21 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) 14:45:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fstat(r0, 0x0) 14:45:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, 0x0, 0x0) close(r0) 14:45:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) fstat(r0, 0x0) 14:45:21 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) 14:45:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) close(r0) 14:45:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) close(r0) 14:45:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) fstat(r0, 0x0) 14:45:22 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x40000000}]) io_destroy(r1) 14:45:22 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x1}], 0x30) 14:45:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0), 0x0) close(r0) 14:45:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) fstat(r0, 0x0) 14:45:22 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 471.205042][T23733] hfs: unable to parse mount options 14:45:22 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x1}], 0x30) 14:45:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) fstat(r0, 0x0) 14:45:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x4}], 0x30) close(r0) 14:45:22 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 471.517572][T23761] hfs: unable to parse mount options 14:45:23 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xeffdffff}]) io_destroy(r1) 14:45:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x4}], 0x30) close(r0) 14:45:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") fstat(r0, 0x0) 14:45:23 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x1}], 0x30) 14:45:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:23 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 471.908932][T23777] hfs: unable to parse mount options 14:45:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x0, 0x4}], 0x30) close(r0) 14:45:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") fstat(r0, 0x0) 14:45:23 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) 14:45:23 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) 14:45:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 472.155653][T23800] hfs: unable to parse mount options 14:45:24 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfcfdffff}]) io_destroy(r1) 14:45:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) close(r0) 14:45:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") fstat(r0, 0x0) 14:45:24 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) 14:45:24 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) 14:45:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x0) 14:45:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") fstat(r0, 0x0) 14:45:24 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) [ 472.702722][T23824] hfs: unable to parse mount options 14:45:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) close(r0) 14:45:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x0) 14:45:24 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) 14:45:24 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000040)=0x5) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x5, &(0x7f00000000c0)=0x0) write$ppp(r5, &(0x7f0000000240)='8', 0x1) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x7) io_submit(r6, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r5, &(0x7f000096f000)="0000bc4ffe7f00009d", 0x9}]) r7 = gettid() syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') getgid() writev(r1, &(0x7f0000000080), 0x0) getpeername$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @null, @bcast, @netrom, @bcast, @remote, @rose]}, &(0x7f0000000100)=0x48) setsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000140)=0x9, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioprio_get$pid(0x2, r7) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r7, 0x1004000000016) fgetxattr(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7379fc3c7374066d2e3a2d6b0f7972695bb3a595c09c34274306b6415f576ae4fa45291c23549343c3a50600225311c8b5f99b8ea8c75786757e24b6e97f15ecd8bd7915a1b7d3ff030000b36d8ec53d2b28"], 0x0, 0x0) close(r4) dup2(0xffffffffffffffff, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x3, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x0, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x0, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x0, 0x2}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) [ 472.969533][T23849] hfs: unable to parse mount options 14:45:24 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfefdffff}]) io_destroy(r1) 14:45:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081}], 0x30) close(r0) 14:45:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") fstat(r0, 0x0) 14:45:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, 0x0, 0x0) 14:45:24 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") fstat(r0, 0x0) 14:45:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 473.506010][T23871] hfs: unable to parse mount options 14:45:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(0xffffffffffffffff) 14:45:25 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") fstat(r0, 0x0) 14:45:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 473.757914][T23891] hfs: unable to parse mount options 14:45:25 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x3}) 14:45:25 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffdef}]) io_destroy(r1) 14:45:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(0xffffffffffffffff) 14:45:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 14:45:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") fstat(r0, 0x0) 14:45:25 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:25 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) [ 474.324653][T23918] hfs: invalid gid -1 14:45:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(0xffffffffffffffff) [ 474.345183][T23918] hfs: unable to parse mount options 14:45:25 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x1, @sliced={0x0, [0x81, 0x1f, 0x3, 0x7, 0x1, 0x7, 0x1, 0xdc0, 0x3f, 0x0, 0x9, 0x7, 0x9, 0x7ff, 0x6, 0x67, 0x6, 0x7f, 0xa763, 0x4, 0x1, 0x7ff, 0x1000, 0x3, 0x4, 0x100000001, 0xffff, 0x800, 0x9, 0x100000001, 0x0, 0x3, 0x6, 0x6, 0x1], 0x8001}}) 14:45:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") fstat(r0, 0x0) [ 474.426391][T23922] hfs: unable to parse mount options 14:45:26 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) 14:45:26 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) io_destroy(r1) [ 474.641099][T23946] hfs: invalid gid -1 [ 474.668088][T23946] hfs: unable to parse mount options 14:45:26 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffdfc}]) io_destroy(r1) 14:45:26 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:26 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(0xffffffffffffffff, 0x0) 14:45:26 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) 14:45:26 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) io_destroy(r1) [ 475.301213][T23969] hfs: invalid gid -1 [ 475.309724][T23971] FAULT_INJECTION: forcing a failure. [ 475.309724][T23971] name failslab, interval 1, probability 0, space 0, times 0 [ 475.338474][T23969] hfs: unable to parse mount options [ 475.381350][T23971] CPU: 1 PID: 23971 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 475.389378][T23971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.399491][T23971] Call Trace: [ 475.402822][T23971] dump_stack+0x172/0x1f0 [ 475.407169][T23971] should_fail.cold+0xa/0x15 [ 475.411781][T23971] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.417607][T23971] ? ___might_sleep+0x163/0x280 [ 475.422475][T23971] __should_failslab+0x121/0x190 14:45:26 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(0xffffffffffffffff, 0x0) [ 475.427436][T23971] should_failslab+0x9/0x14 [ 475.431948][T23971] kmem_cache_alloc_trace+0x2d1/0x760 [ 475.437328][T23971] ? lock_downgrade+0x880/0x880 [ 475.442205][T23971] snd_seq_port_connect+0x60/0x510 [ 475.447326][T23971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.453581][T23971] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 475.459492][T23971] snd_seq_kernel_client_ctl+0x101/0x150 [ 475.465139][T23971] snd_seq_oss_midi_open+0x542/0x6a0 [ 475.470445][T23971] ? snd_seq_oss_midi_setup+0x50/0x50 [ 475.475809][T23971] ? __mutex_lock+0x3cd/0x1310 [ 475.480587][T23971] ? find_held_lock+0x35/0x130 [ 475.485337][T23971] snd_seq_oss_synth_reset+0x486/0x8f0 [ 475.490796][T23971] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 475.496592][T23971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.502832][T23971] ? fsnotify+0x811/0xbc0 [ 475.507165][T23971] snd_seq_oss_reset+0x79/0x2b0 [ 475.512000][T23971] ? fcntl_setlk+0xcd0/0xcd0 [ 475.516595][T23971] ? snd_seq_info_done+0x30/0x30 [ 475.521515][T23971] snd_seq_oss_release+0x74/0x150 [ 475.526523][T23971] odev_release+0x54/0x80 [ 475.530844][T23971] __fput+0x2e5/0x8d0 [ 475.534909][T23971] ____fput+0x16/0x20 [ 475.538903][T23971] task_work_run+0x14a/0x1c0 [ 475.543485][T23971] exit_to_usermode_loop+0x273/0x2c0 [ 475.548786][T23971] do_syscall_64+0x52d/0x610 [ 475.553394][T23971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.559302][T23971] RIP: 0033:0x4582b9 14:45:27 executing program 2 (fault-call:2 fault-nth:1): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 475.563190][T23971] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.582974][T23971] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 475.591382][T23971] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 475.599366][T23971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 475.607356][T23971] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 475.615335][T23971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 475.623315][T23971] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:27 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:27 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:27 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffdfe}]) io_destroy(r1) 14:45:27 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(0xffffffffffffffff, 0x0) [ 475.806332][T23993] FAULT_INJECTION: forcing a failure. [ 475.806332][T23993] name failslab, interval 1, probability 0, space 0, times 0 [ 475.923934][T23993] CPU: 0 PID: 23993 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 475.931968][T23993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.942053][T23993] Call Trace: [ 475.945362][T23993] dump_stack+0x172/0x1f0 [ 475.949712][T23993] should_fail.cold+0xa/0x15 [ 475.954327][T23993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.960151][T23993] ? ___might_sleep+0x163/0x280 [ 475.965015][T23993] __should_failslab+0x121/0x190 [ 475.969964][T23993] should_failslab+0x9/0x14 [ 475.974475][T23993] kmem_cache_alloc_trace+0x2d1/0x760 [ 475.979881][T23993] ? lock_downgrade+0x880/0x880 [ 475.984771][T23993] snd_seq_port_connect+0x60/0x510 [ 475.989903][T23993] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 475.995646][T23993] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 476.001576][T23993] snd_seq_kernel_client_ctl+0x101/0x150 [ 476.007219][T23993] snd_seq_oss_midi_open+0x41d/0x6a0 [ 476.012520][T23993] ? snd_seq_oss_midi_setup+0x50/0x50 [ 476.017912][T23993] ? __mutex_lock+0x3cd/0x1310 [ 476.022686][T23993] ? find_held_lock+0x35/0x130 [ 476.027461][T23993] snd_seq_oss_synth_reset+0x486/0x8f0 [ 476.032939][T23993] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 476.038772][T23993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.045052][T23993] ? fsnotify+0x811/0xbc0 [ 476.049401][T23993] snd_seq_oss_reset+0x79/0x2b0 [ 476.054261][T23993] ? fcntl_setlk+0xcd0/0xcd0 [ 476.058863][T23993] ? snd_seq_info_done+0x30/0x30 [ 476.063839][T23993] snd_seq_oss_release+0x74/0x150 [ 476.068014][T24002] hfs: invalid gid -1 [ 476.068892][T23993] odev_release+0x54/0x80 [ 476.072866][T24002] hfs: unable to parse mount options [ 476.077212][T23993] __fput+0x2e5/0x8d0 [ 476.077230][T23993] ____fput+0x16/0x20 [ 476.077243][T23993] task_work_run+0x14a/0x1c0 [ 476.077263][T23993] exit_to_usermode_loop+0x273/0x2c0 [ 476.077280][T23993] do_syscall_64+0x52d/0x610 [ 476.077298][T23993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.077309][T23993] RIP: 0033:0x4582b9 [ 476.077324][T23993] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.077331][T23993] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 476.077344][T23993] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 476.077351][T23993] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 476.077358][T23993] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:45:27 executing program 2 (fault-call:2 fault-nth:2): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:27 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:27 executing program 4 (fault-call:3 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 476.077366][T23993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 476.077374][T23993] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:27 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 476.324999][T24025] FAULT_INJECTION: forcing a failure. [ 476.324999][T24025] name failslab, interval 1, probability 0, space 0, times 0 [ 476.363802][T24018] FAULT_INJECTION: forcing a failure. [ 476.363802][T24018] name failslab, interval 1, probability 0, space 0, times 0 [ 476.400676][T24025] CPU: 1 PID: 24025 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 476.409411][T24025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.419495][T24025] Call Trace: [ 476.422805][T24025] dump_stack+0x172/0x1f0 [ 476.427156][T24025] should_fail.cold+0xa/0x15 [ 476.431779][T24025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.437616][T24025] ? ___might_sleep+0x163/0x280 [ 476.442488][T24025] __should_failslab+0x121/0x190 [ 476.447454][T24025] should_failslab+0x9/0x14 [ 476.451966][T24025] kmem_cache_alloc_trace+0x2d1/0x760 [ 476.457345][T24025] ? lock_downgrade+0x880/0x880 [ 476.462236][T24025] snd_seq_port_connect+0x60/0x510 [ 476.467362][T24025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.473617][T24025] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 476.479524][T24025] snd_seq_kernel_client_ctl+0x101/0x150 [ 476.485164][T24025] snd_seq_oss_midi_open+0x542/0x6a0 [ 476.490466][T24025] ? snd_seq_oss_midi_setup+0x50/0x50 [ 476.495855][T24025] ? __mutex_lock+0x3cd/0x1310 [ 476.500629][T24025] ? find_held_lock+0x35/0x130 [ 476.505405][T24025] snd_seq_oss_synth_reset+0x486/0x8f0 [ 476.511068][T24025] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 476.516880][T24025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.523214][T24025] ? fsnotify+0x811/0xbc0 [ 476.527554][T24025] snd_seq_oss_reset+0x79/0x2b0 [ 476.532417][T24025] ? fcntl_setlk+0xcd0/0xcd0 [ 476.537051][T24025] ? snd_seq_info_done+0x30/0x30 [ 476.542019][T24025] snd_seq_oss_release+0x74/0x150 [ 476.547062][T24025] odev_release+0x54/0x80 [ 476.551410][T24025] __fput+0x2e5/0x8d0 [ 476.555405][T24025] ____fput+0x16/0x20 [ 476.559421][T24025] task_work_run+0x14a/0x1c0 [ 476.564027][T24025] exit_to_usermode_loop+0x273/0x2c0 [ 476.569330][T24025] do_syscall_64+0x52d/0x610 [ 476.573934][T24025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.579858][T24025] RIP: 0033:0x4582b9 [ 476.583768][T24025] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.603555][T24025] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 476.611980][T24025] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 476.619991][T24025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 476.628010][T24025] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.635995][T24025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 476.643974][T24025] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 [ 476.651994][T24018] CPU: 0 PID: 24018 Comm: syz-executor.5 Not tainted 5.1.0-rc3+ #50 [ 476.659992][T24018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.670053][T24018] Call Trace: [ 476.670103][T24018] dump_stack+0x172/0x1f0 [ 476.670131][T24018] should_fail.cold+0xa/0x15 [ 476.682341][T24018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.682363][T24018] ? ___might_sleep+0x163/0x280 [ 476.682383][T24018] __should_failslab+0x121/0x190 [ 476.682399][T24018] should_failslab+0x9/0x14 [ 476.682415][T24018] __kmalloc+0x2dc/0x740 [ 476.682435][T24018] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 476.682455][T24018] ? sock_kmalloc+0xc6/0x120 [ 476.717862][T24018] sock_kmalloc+0xc6/0x120 [ 476.717886][T24018] hash_alloc_result.part.0+0x95/0x110 [ 476.717902][T24018] hash_sendmsg+0x8ff/0xad0 [ 476.717916][T24018] ? _raw_spin_unlock_bh+0x31/0x40 [ 476.717938][T24018] hash_sendmsg_nokey+0x62/0x80 [ 476.727815][T24018] ? hash_recvmsg_nokey+0x90/0x90 [ 476.727835][T24018] sock_sendmsg+0xdd/0x130 14:45:28 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) getpid() r1 = syz_open_procfs(r0, &(0x7f0000000400)='ta\x92\x94\x00\x19P\'D\xb6\xd0\xaa\xa5{g\xa1\xf6b(\xf8\x85\xd7\xe9\xdf\xc7i\xee\xee\x8c\x86\xabTh\x94aM.\xc5DyR\x12\x04\xddC{\x967\\l\xb2\xba\xc6\xd4la\x9c\b\xb2\xfb=\xaa`\xc4\xe5\xc0\xb7\xdc\xeea \x1e\\\xd7`\xbc\r\xdb|\xebja\xf5\xa2!\xcaIRs\xcd\xaa\xc0\xee|\xd1\xd7\xdaG\xd3\xf1\"\x93At\x95\x17TE\xb8\xfd)q\xb8+\xe12yF\xac\x89-\xc9\xbd.\t\n~h\xef\x8d\xc5\x95P\x15\x1b\xf8[\x96\x0e\x11T;\x80\vJ\xce\n]3\x00\xba2;\x83\xd4*\x15\rf\xa6\xc4\x17\x03J\xae\x12<\xc9%\xf4\xaf\x8e#\xdf\x10\x06<\x18\xdf\xac\x01\xf4c\xff\xe0}8\x18)\r\xe8\x80\xa2\xcc*\xfe(\xad\xb2yU\xe5\xc9[Y\xc5\xac\"\x1c0\xad\x87\xe3\x15\x9a\x9e\b\x15c\xde\x00\xa3obj\xa9\"\x16\x97/T\b\xeb\x9dD\xfb\xfa\xa0\xfd\x8f e#|\xb8\xbe\xe1`\x97\xdd\xa4\x9c\xcf\x97*%\"\xc7\xdb\xcaO[\xbcd\xb4\xc0\xc7\x11\x99\xd3:k\x9f\xfd\x13\xb5\x93\xcea\xef\xc7\x04[\x98\xc9$\x1aWk\xb2\xcf\xcf\xfb\x8e\xc05\xd7X~q\xe2\xab\x8f\x02\x19lg\xa8P\xf9\x10\xc4\xcf\x0f\xd6B?\xb8\xbb\xcc\n\xfb\xc6s41\xec\xb4v\xa0\xbep\x10hb\xe2\xf2\xea\xd8\xdfR6\x9e)\x8a\x91N\x96\b_\xe7\xd6\x9e\xfai/y\x8f>iAZ@\xa2\x1d\xebr\xf8x\xc4\xa7\xa7\xb0\xaa\xff\x9d\x98\xc1;\x00\x00\x00j\x8b\x03\xf2\xd1\xa86\xe4\xc1\x1a\xca\x1d.f\xfe\x82f\x19\x8c\xc1\x88s\x18y\xe1\x87\xf8\x91\xc4\x17Q(\\\xaa\x82\xdd\x90_\xa3\xbc\f\xe6\xe5Q\xb8\x9b\xde\x8b\xca\"\xc1ww\xc3\'\xb8\x1c\xe0\xa1\v\x83BY\x1b') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:45:28 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 476.727853][T24018] ___sys_sendmsg+0x806/0x930 [ 476.727872][T24018] ? copy_msghdr_from_user+0x430/0x430 [ 476.727900][T24018] ? kasan_check_read+0x11/0x20 [ 476.767165][T24018] ? __fget+0x381/0x550 [ 476.771335][T24018] ? ksys_dup3+0x3e0/0x3e0 [ 476.775784][T24018] ? lock_downgrade+0x880/0x880 [ 476.780660][T24018] ? __fget_light+0x1a9/0x230 [ 476.785351][T24018] ? __fdget+0x1b/0x20 [ 476.789428][T24018] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.795682][T24018] __sys_sendmsg+0x105/0x1d0 [ 476.800283][T24018] ? __ia32_sys_shutdown+0x80/0x80 [ 476.805940][T24018] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.811408][T24018] ? do_syscall_64+0x26/0x610 [ 476.816097][T24018] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.822173][T24018] ? do_syscall_64+0x26/0x610 [ 476.826870][T24018] __x64_sys_sendmsg+0x78/0xb0 [ 476.831649][T24018] do_syscall_64+0x103/0x610 [ 476.836342][T24018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.842266][T24018] RIP: 0033:0x4582b9 14:45:28 executing program 2 (fault-call:2 fault-nth:3): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 476.846169][T24018] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.865792][T24018] RSP: 002b:00007fea9edf7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 476.874209][T24018] RAX: ffffffffffffffda RBX: 00007fea9edf7c90 RCX: 00000000004582b9 [ 476.874218][T24018] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 476.874225][T24018] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.874232][T24018] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea9edf86d4 [ 476.874239][T24018] R13: 00000000004c580a R14: 00000000004d9a88 R15: 0000000000000005 [ 476.990942][T24050] FAULT_INJECTION: forcing a failure. [ 476.990942][T24050] name failslab, interval 1, probability 0, space 0, times 0 [ 477.011175][T24050] CPU: 1 PID: 24050 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 477.019212][T24050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.029276][T24050] Call Trace: [ 477.032585][T24050] dump_stack+0x172/0x1f0 [ 477.036934][T24050] should_fail.cold+0xa/0x15 [ 477.041544][T24050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.047374][T24050] ? ___might_sleep+0x163/0x280 [ 477.052241][T24050] __should_failslab+0x121/0x190 [ 477.057818][T24050] should_failslab+0x9/0x14 [ 477.074174][T24050] kmem_cache_alloc_trace+0x2d1/0x760 [ 477.079566][T24050] ? lock_downgrade+0x880/0x880 [ 477.084452][T24050] snd_seq_port_connect+0x60/0x510 [ 477.089585][T24050] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 477.095355][T24050] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 477.101274][T24050] snd_seq_kernel_client_ctl+0x101/0x150 [ 477.106933][T24050] snd_seq_oss_midi_open+0x41d/0x6a0 [ 477.112236][T24050] ? snd_seq_oss_midi_setup+0x50/0x50 [ 477.117641][T24050] ? __mutex_lock+0x3cd/0x1310 [ 477.122419][T24050] ? find_held_lock+0x35/0x130 [ 477.127297][T24050] snd_seq_oss_synth_reset+0x486/0x8f0 [ 477.132780][T24050] ? snd_seq_oss_synth_cleanup+0x480/0x480 14:45:28 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffe00}]) io_destroy(r1) 14:45:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)={0xe, 0x5, 0x8, 0xa35, 0xf3, "d892e06f97be24486374567a8be2e83db45808e311c0cc7019af998daad8c9b7f5e75241a95dd8c76bd9e1f3921ff29bc5cea46129b1fe4773f42676c6ae0dfa69f158d4948076a2e55a0bc31498a8b5cc164c3b2c14b07f0e788d57780b9576b9a7edef4264d4e51143ada22acd7511c7c5e09a79bee960c892bbcdb1063de4a7630feaac95f4572d91e1c1549e7a0a60c4ff73ddd714e17541f9048732df5248165e08c0ef9a73dad2f4d2cf470a9b743ff6bad1e4745d2eecf773a7b4e8a97e9eb8aeeb9b99bd05a596a18dd18d5ee1f8a555325495e51790d942a29d7fae018aff9d66173c98e2bb0900a04453a9317108"}, 0xff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 477.138601][T24050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.144854][T24050] ? fsnotify+0x811/0xbc0 [ 477.149192][T24050] snd_seq_oss_reset+0x79/0x2b0 [ 477.154041][T24050] ? fcntl_setlk+0xcd0/0xcd0 [ 477.158644][T24050] ? snd_seq_info_done+0x30/0x30 [ 477.163591][T24050] snd_seq_oss_release+0x74/0x150 [ 477.163607][T24050] odev_release+0x54/0x80 [ 477.163619][T24050] __fput+0x2e5/0x8d0 [ 477.163637][T24050] ____fput+0x16/0x20 [ 477.163650][T24050] task_work_run+0x14a/0x1c0 [ 477.163673][T24050] exit_to_usermode_loop+0x273/0x2c0 14:45:28 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 477.191295][T24050] do_syscall_64+0x52d/0x610 [ 477.195904][T24050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.201831][T24050] RIP: 0033:0x4582b9 [ 477.205727][T24050] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.225715][T24050] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 477.234152][T24050] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 477.242113][T24050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 477.250098][T24050] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.258088][T24050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 477.266070][T24050] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:28 executing program 2 (fault-call:2 fault-nth:4): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:28 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:28 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) r2 = getpgid(0xffffffffffffffff) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000540)={0x8000}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r1, 0x0, 0x1, &(0x7f0000000340)='\x00'}, 0x30) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000500)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000640)=0x434) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)="9648f44a19bad5bb78b77d4217cfdde2deb1e72948353d842ffa1048ca46e9638a3052f13fbc136c96ccc9a8f7edb7bcc0e0260f13f981", 0x37}], 0x1, &(0x7f0000000740)=[@rights={0x28, 0x1, 0x1, [r0, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x28, 0x1, 0x1, [r1, r0, r0, r1, r0]}, @rights={0x30, 0x1, 0x1, [r1, r0, r1, r1, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1]}], 0x140, 0x40}, 0x4000000) 14:45:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 477.531258][T24070] FAULT_INJECTION: forcing a failure. [ 477.531258][T24070] name failslab, interval 1, probability 0, space 0, times 0 [ 477.568011][T24070] CPU: 1 PID: 24070 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 477.576047][T24070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.586121][T24070] Call Trace: [ 477.589431][T24070] dump_stack+0x172/0x1f0 [ 477.593796][T24070] should_fail.cold+0xa/0x15 [ 477.598408][T24070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.604248][T24070] ? ___might_sleep+0x163/0x280 [ 477.609120][T24070] __should_failslab+0x121/0x190 [ 477.614063][T24070] should_failslab+0x9/0x14 [ 477.618600][T24070] kmem_cache_alloc_trace+0x2d1/0x760 [ 477.624003][T24070] ? lock_downgrade+0x880/0x880 [ 477.628883][T24070] snd_seq_port_connect+0x60/0x510 [ 477.634027][T24070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.640318][T24070] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 477.646224][T24070] snd_seq_kernel_client_ctl+0x101/0x150 [ 477.651882][T24070] snd_seq_oss_midi_open+0x542/0x6a0 [ 477.657190][T24070] ? snd_seq_oss_midi_setup+0x50/0x50 [ 477.662590][T24070] ? __mutex_lock+0x3cd/0x1310 [ 477.667366][T24070] ? find_held_lock+0x35/0x130 [ 477.672145][T24070] snd_seq_oss_synth_reset+0x486/0x8f0 [ 477.677624][T24070] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 477.683437][T24070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.689688][T24070] ? fsnotify+0x811/0xbc0 [ 477.694043][T24070] snd_seq_oss_reset+0x79/0x2b0 [ 477.698906][T24070] ? fcntl_setlk+0xcd0/0xcd0 [ 477.703512][T24070] ? snd_seq_info_done+0x30/0x30 [ 477.708491][T24070] snd_seq_oss_release+0x74/0x150 [ 477.713960][T24070] odev_release+0x54/0x80 [ 477.718301][T24070] __fput+0x2e5/0x8d0 [ 477.722300][T24070] ____fput+0x16/0x20 [ 477.726324][T24070] task_work_run+0x14a/0x1c0 [ 477.730944][T24070] exit_to_usermode_loop+0x273/0x2c0 [ 477.736275][T24070] do_syscall_64+0x52d/0x610 [ 477.740881][T24070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.746783][T24070] RIP: 0033:0x4582b9 [ 477.750687][T24070] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.770300][T24070] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 477.778726][T24070] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 477.786715][T24070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 477.794732][T24070] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.802727][T24070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 477.810713][T24070] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:29 executing program 2 (fault-call:2 fault-nth:5): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:29 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0xd20f) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000001080)={'irlan0\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) fstat(r0, 0x0) fcntl$getown(r0, 0x9) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/4096) 14:45:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x3e8, &(0x7f00000000c0)={0x0}}, 0x0) [ 478.270881][T24112] FAULT_INJECTION: forcing a failure. [ 478.270881][T24112] name failslab, interval 1, probability 0, space 0, times 0 [ 478.293670][T24112] CPU: 0 PID: 24112 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 478.301697][T24112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.311786][T24112] Call Trace: [ 478.315118][T24112] dump_stack+0x172/0x1f0 [ 478.319462][T24112] should_fail.cold+0xa/0x15 [ 478.324062][T24112] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.329879][T24112] ? ___might_sleep+0x163/0x280 [ 478.334740][T24112] __should_failslab+0x121/0x190 [ 478.339723][T24112] should_failslab+0x9/0x14 [ 478.344276][T24112] kmem_cache_alloc_trace+0x2d1/0x760 [ 478.349654][T24112] ? lock_downgrade+0x880/0x880 [ 478.354523][T24112] snd_seq_port_connect+0x60/0x510 [ 478.359641][T24112] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 478.365501][T24112] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 478.371443][T24112] snd_seq_kernel_client_ctl+0x101/0x150 [ 478.377130][T24112] snd_seq_oss_midi_open+0x41d/0x6a0 [ 478.382433][T24112] ? snd_seq_oss_midi_setup+0x50/0x50 [ 478.387834][T24112] ? __mutex_lock+0x3cd/0x1310 [ 478.392605][T24112] ? find_held_lock+0x35/0x130 [ 478.397384][T24112] snd_seq_oss_synth_reset+0x486/0x8f0 [ 478.402862][T24112] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 478.408679][T24112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.414954][T24112] ? fsnotify+0x811/0xbc0 14:45:29 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x7ffffffff000}]) io_destroy(r1) 14:45:29 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:29 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$VT_DISALLOCATE(r0, 0x5608) fstat(r0, 0x0) 14:45:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xe803, &(0x7f00000000c0)={0x0}}, 0x0) [ 478.419319][T24112] snd_seq_oss_reset+0x79/0x2b0 [ 478.424177][T24112] ? fcntl_setlk+0xcd0/0xcd0 [ 478.428792][T24112] ? snd_seq_info_done+0x30/0x30 [ 478.433735][T24112] snd_seq_oss_release+0x74/0x150 [ 478.438794][T24112] odev_release+0x54/0x80 [ 478.443131][T24112] __fput+0x2e5/0x8d0 [ 478.447124][T24112] ____fput+0x16/0x20 [ 478.447144][T24112] task_work_run+0x14a/0x1c0 [ 478.455707][T24112] exit_to_usermode_loop+0x273/0x2c0 [ 478.455725][T24112] do_syscall_64+0x52d/0x610 [ 478.455754][T24112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.455772][T24112] RIP: 0033:0x4582b9 [ 478.455788][T24112] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.455796][T24112] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 478.455809][T24112] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 478.455817][T24112] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 14:45:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xf0ff7f, &(0x7f00000000c0)={0x0}}, 0x0) [ 478.455825][T24112] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.455833][T24112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 478.455841][T24112] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:30 executing program 2 (fault-call:2 fault-nth:6): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:30 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x400100) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x800) recvfrom(r1, &(0x7f0000000400)=""/100, 0xfffffffffffffebe, 0xfffffffffffffffe, &(0x7f0000000480)=@ll={0x11, 0x1c, r2, 0x1, 0x7, 0x6, @remote}, 0xfffffffffffffd52) r3 = fcntl$getown(0xffffffffffffffff, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000080)='net/ip_mr_vif\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000280)={'erspan0\x00', @ifru_data=&(0x7f0000000240)="0e153463e20ee8b558daa6b1d7277954375c5728197614c423b69a19987d0704"}) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r4, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x53b) [ 478.630932][T24119] hfs: can't find a HFS filesystem on dev loop1 14:45:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x1000000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:30 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 478.773720][T24141] FAULT_INJECTION: forcing a failure. [ 478.773720][T24141] name failslab, interval 1, probability 0, space 0, times 0 [ 478.858092][T24141] CPU: 1 PID: 24141 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 478.866129][T24141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.876194][T24141] Call Trace: [ 478.879514][T24141] dump_stack+0x172/0x1f0 [ 478.883868][T24141] should_fail.cold+0xa/0x15 [ 478.888475][T24141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.894308][T24141] ? ___might_sleep+0x163/0x280 [ 478.899278][T24141] __should_failslab+0x121/0x190 [ 478.904230][T24141] should_failslab+0x9/0x14 [ 478.908770][T24141] kmem_cache_alloc_trace+0x2d1/0x760 [ 478.914256][T24141] ? lock_downgrade+0x880/0x880 [ 478.919139][T24141] snd_seq_port_connect+0x60/0x510 [ 478.924280][T24141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.930571][T24141] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 478.936511][T24141] snd_seq_kernel_client_ctl+0x101/0x150 [ 478.942170][T24141] snd_seq_oss_midi_open+0x542/0x6a0 [ 478.947479][T24141] ? snd_seq_oss_midi_setup+0x50/0x50 [ 478.952888][T24141] ? __mutex_lock+0x3cd/0x1310 [ 478.957668][T24141] ? find_held_lock+0x35/0x130 [ 478.962458][T24141] snd_seq_oss_synth_reset+0x486/0x8f0 [ 478.967942][T24141] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 478.973772][T24141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.980034][T24141] ? fsnotify+0x811/0xbc0 [ 478.984391][T24141] snd_seq_oss_reset+0x79/0x2b0 [ 478.989250][T24141] ? fcntl_setlk+0xcd0/0xcd0 [ 478.993950][T24141] ? snd_seq_info_done+0x30/0x30 [ 478.998901][T24141] snd_seq_oss_release+0x74/0x150 [ 479.003940][T24141] odev_release+0x54/0x80 [ 479.008290][T24141] __fput+0x2e5/0x8d0 [ 479.012326][T24141] ____fput+0x16/0x20 [ 479.016320][T24141] task_work_run+0x14a/0x1c0 [ 479.020937][T24141] exit_to_usermode_loop+0x273/0x2c0 [ 479.026279][T24141] do_syscall_64+0x52d/0x610 [ 479.030889][T24141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.036794][T24141] RIP: 0033:0x4582b9 [ 479.040701][T24141] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.066230][T24141] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 479.074691][T24141] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 479.082703][T24141] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 479.090730][T24141] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 479.098770][T24141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 14:45:30 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000808912, &(0x7f0000000040)="0adc1f123c3188b0700000") ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'dummy0\x00', 0x600}) fstat(r0, 0x0) [ 479.106846][T24141] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 [ 479.132566][T24156] hfs: can't find a HFS filesystem on dev loop1 14:45:31 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xf0ffffff7f0000}]) io_destroy(r1) 14:45:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) fstat(r0, 0x0) 14:45:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x7ffff000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:31 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:31 executing program 2 (fault-call:2 fault-nth:7): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:31 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xe8030000, &(0x7f00000000c0)={0x0}}, 0x0) [ 479.624153][T24184] FAULT_INJECTION: forcing a failure. [ 479.624153][T24184] name failslab, interval 1, probability 0, space 0, times 0 [ 479.696075][T24184] CPU: 0 PID: 24184 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 479.704112][T24184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.714178][T24184] Call Trace: [ 479.717488][T24184] dump_stack+0x172/0x1f0 [ 479.721853][T24184] should_fail.cold+0xa/0x15 [ 479.726461][T24184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.732283][T24184] ? ___might_sleep+0x163/0x280 [ 479.737147][T24184] __should_failslab+0x121/0x190 14:45:31 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f0000124135adf69ce9c4a849db58d0e1558432ff2adfaf9fedc5ae439e2fe6d212347bc5828137a4ff61f667d7c4b8bf65c7e6c24559b45977ffeb2f28e005156ce4fef9437b09062d52716c7ebf0816b285b2437e15d18b97cd595f6698acfc4b6a04c9f1c0b86225c3f36ff4ac6441cfd059ecb0e5b76213ca287016b23eaa12021bd3cae43361144df1304a5a02cf6343e66137cae8b494660a679f94a0bd7adc2f2cb0e03fc93569089a50") fstat(r0, 0x0) [ 479.742100][T24184] should_failslab+0x9/0x14 [ 479.746614][T24184] kmem_cache_alloc_trace+0x2d1/0x760 [ 479.752007][T24184] ? lock_downgrade+0x880/0x880 [ 479.756884][T24184] snd_seq_port_connect+0x60/0x510 [ 479.762010][T24184] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 479.767768][T24184] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 479.773688][T24184] snd_seq_kernel_client_ctl+0x101/0x150 [ 479.779340][T24184] snd_seq_oss_midi_open+0x41d/0x6a0 [ 479.779361][T24184] ? snd_seq_oss_midi_setup+0x50/0x50 [ 479.779387][T24184] ? __mutex_lock+0x3cd/0x1310 [ 479.794802][T24184] ? find_held_lock+0x35/0x130 [ 479.799593][T24184] snd_seq_oss_synth_reset+0x486/0x8f0 [ 479.805068][T24184] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 479.805085][T24184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.805098][T24184] ? fsnotify+0x811/0xbc0 [ 479.805123][T24184] snd_seq_oss_reset+0x79/0x2b0 [ 479.805137][T24184] ? fcntl_setlk+0xcd0/0xcd0 [ 479.805153][T24184] ? snd_seq_info_done+0x30/0x30 [ 479.805168][T24184] snd_seq_oss_release+0x74/0x150 [ 479.805183][T24184] odev_release+0x54/0x80 [ 479.805196][T24184] __fput+0x2e5/0x8d0 [ 479.805212][T24184] ____fput+0x16/0x20 [ 479.805225][T24184] task_work_run+0x14a/0x1c0 [ 479.805244][T24184] exit_to_usermode_loop+0x273/0x2c0 [ 479.805261][T24184] do_syscall_64+0x52d/0x610 [ 479.805279][T24184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.805290][T24184] RIP: 0033:0x4582b9 14:45:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xeffdffff, &(0x7f00000000c0)={0x0}}, 0x0) [ 479.805303][T24184] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.805310][T24184] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 479.805323][T24184] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 479.805331][T24184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 479.805338][T24184] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 479.805346][T24184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 479.805354][T24184] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:31 executing program 2 (fault-call:2 fault-nth:8): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xfffffdef, &(0x7f00000000c0)={0x0}}, 0x0) [ 479.899959][T24181] hfs: can't find a HFS filesystem on dev loop1 [ 480.118160][T24214] FAULT_INJECTION: forcing a failure. [ 480.118160][T24214] name failslab, interval 1, probability 0, space 0, times 0 [ 480.131485][T24214] CPU: 1 PID: 24214 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 480.139490][T24214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.149581][T24214] Call Trace: [ 480.149614][T24214] dump_stack+0x172/0x1f0 [ 480.149637][T24214] should_fail.cold+0xa/0x15 [ 480.149657][T24214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.149676][T24214] ? ___might_sleep+0x163/0x280 [ 480.149696][T24214] __should_failslab+0x121/0x190 [ 480.149718][T24214] should_failslab+0x9/0x14 [ 480.182158][T24214] kmem_cache_alloc_trace+0x2d1/0x760 [ 480.187547][T24214] ? lock_downgrade+0x880/0x880 [ 480.192434][T24214] snd_seq_port_connect+0x60/0x510 [ 480.197574][T24214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.203860][T24214] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 480.209804][T24214] snd_seq_kernel_client_ctl+0x101/0x150 [ 480.215466][T24214] snd_seq_oss_midi_open+0x542/0x6a0 [ 480.220784][T24214] ? snd_seq_oss_midi_setup+0x50/0x50 [ 480.226279][T24214] ? __mutex_lock+0x3cd/0x1310 [ 480.231054][T24214] ? find_held_lock+0x35/0x130 [ 480.235858][T24214] snd_seq_oss_synth_reset+0x486/0x8f0 [ 480.241337][T24214] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 480.247154][T24214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.253448][T24214] ? fsnotify+0x811/0xbc0 [ 480.257814][T24214] snd_seq_oss_reset+0x79/0x2b0 [ 480.262682][T24214] ? fcntl_setlk+0xcd0/0xcd0 [ 480.267297][T24214] ? snd_seq_info_done+0x30/0x30 [ 480.272258][T24214] snd_seq_oss_release+0x74/0x150 [ 480.277312][T24214] odev_release+0x54/0x80 [ 480.281650][T24214] __fput+0x2e5/0x8d0 [ 480.286103][T24214] ____fput+0x16/0x20 [ 480.290096][T24214] task_work_run+0x14a/0x1c0 [ 480.294704][T24214] exit_to_usermode_loop+0x273/0x2c0 [ 480.300010][T24214] do_syscall_64+0x52d/0x610 [ 480.304612][T24214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.310516][T24214] RIP: 0033:0x4582b9 [ 480.314456][T24214] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.334084][T24214] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 480.334099][T24214] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 480.334107][T24214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 480.334113][T24214] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 480.334121][T24214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 480.334129][T24214] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:32 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfeffffffffffff}]) io_destroy(r1) 14:45:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x13, 0x1, 0x70bd2c, 0x25dfdbff, {0xb}, [@typed={0x4, 0x8d}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:32 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:45:32 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:32 executing program 2 (fault-call:2 fault-nth:9): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xffffff7f, &(0x7f00000000c0)={0x0}}, 0x0) [ 480.674993][T24236] FAULT_INJECTION: forcing a failure. [ 480.674993][T24236] name failslab, interval 1, probability 0, space 0, times 0 [ 480.680553][T24231] hfs: can't find a HFS filesystem on dev loop3 14:45:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x7ffffffff000, &(0x7f00000000c0)={0x0}}, 0x0) [ 480.716826][T24234] hfs: can't find a HFS filesystem on dev loop1 [ 480.735193][T24236] CPU: 0 PID: 24236 Comm: syz-executor.2 Not tainted 5.1.0-rc3+ #50 [ 480.743218][T24236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.753287][T24236] Call Trace: [ 480.756601][T24236] dump_stack+0x172/0x1f0 [ 480.760946][T24236] should_fail.cold+0xa/0x15 [ 480.765556][T24236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.771378][T24236] ? ___might_sleep+0x163/0x280 [ 480.776248][T24236] __should_failslab+0x121/0x190 [ 480.781196][T24236] should_failslab+0x9/0x14 [ 480.785717][T24236] kmem_cache_alloc_trace+0x2d1/0x760 [ 480.791113][T24236] ? lock_downgrade+0x880/0x880 [ 480.795999][T24236] snd_seq_port_connect+0x60/0x510 [ 480.801136][T24236] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 480.806884][T24236] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 480.812811][T24236] snd_seq_kernel_client_ctl+0x101/0x150 [ 480.818472][T24236] snd_seq_oss_midi_open+0x41d/0x6a0 [ 480.823795][T24236] ? snd_seq_oss_midi_setup+0x50/0x50 [ 480.829188][T24236] ? __mutex_lock+0x3cd/0x1310 [ 480.833965][T24236] ? find_held_lock+0x35/0x130 [ 480.838758][T24236] snd_seq_oss_synth_reset+0x486/0x8f0 [ 480.844239][T24236] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 480.850054][T24236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.856330][T24236] ? fsnotify+0x811/0xbc0 [ 480.860683][T24236] snd_seq_oss_reset+0x79/0x2b0 [ 480.865547][T24236] ? fcntl_setlk+0xcd0/0xcd0 [ 480.870148][T24236] ? snd_seq_info_done+0x30/0x30 [ 480.875094][T24236] snd_seq_oss_release+0x74/0x150 [ 480.880130][T24236] odev_release+0x54/0x80 [ 480.884476][T24236] __fput+0x2e5/0x8d0 [ 480.888477][T24236] ____fput+0x16/0x20 [ 480.892467][T24236] task_work_run+0x14a/0x1c0 [ 480.897115][T24236] exit_to_usermode_loop+0x273/0x2c0 [ 480.902414][T24236] do_syscall_64+0x52d/0x610 [ 480.907043][T24236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.912947][T24236] RIP: 0033:0x4582b9 [ 480.916853][T24236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.936497][T24236] RSP: 002b:00007fb7a7a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 480.944922][T24236] RAX: 0000000000000000 RBX: 00007fb7a7a98c90 RCX: 00000000004582b9 [ 480.952923][T24236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 14:45:32 executing program 2 (fault-call:2 fault-nth:10): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 480.960944][T24236] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 480.969103][T24236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a7a996d4 [ 480.977113][T24236] R13: 00000000004f5a52 R14: 00000000004cf0d8 R15: 0000000000000004 14:45:32 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:45:32 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xf0ff7f00000000, &(0x7f00000000c0)={0x0}}, 0x0) [ 481.230454][T24262] hfs: can't find a HFS filesystem on dev loop3 [ 481.359691][T24268] hfs: can't find a HFS filesystem on dev loop1 14:45:33 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x100000000000000}]) io_destroy(r1) 14:45:33 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xf0ffffff7f0000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:33 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:45:33 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x100000000000000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000040), 0x4) 14:45:33 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) fcntl$setlease(r0, 0x400, 0x2) close(r0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) [ 481.698481][T24291] hfs: can't find a HFS filesystem on dev loop1 [ 481.700497][T24294] hfs: can't find a HFS filesystem on dev loop3 14:45:33 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) 14:45:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xe803000000000000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:33 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 481.984004][T24320] hfs: unable to parse mount options [ 482.113590][T24327] hfs: can't find a HFS filesystem on dev loop1 14:45:34 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x200000000000000}]) io_destroy(r1) 14:45:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x3, 0x86, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/134}, &(0x7f00000001c0)=0x78) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) 14:45:34 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x28000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080), 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:45:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xeffdffff00000000, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:34 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) 14:45:34 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xffffff7f00000000, &(0x7f00000000c0)={0x0}}, 0x0) [ 482.599304][T24352] hfs: unable to parse mount options [ 482.599423][T24347] hfs: can't find a HFS filesystem on dev loop1 14:45:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 14:45:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:34 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:34 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=']) 14:45:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 482.983011][T24384] hfs: unable to parse mount options [ 482.990602][T24383] hfs: can't find a HFS filesystem on dev loop1 14:45:34 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x400000000000000}]) io_destroy(r1) 14:45:34 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip6_tables_matches\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:45:34 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000200)={0x7f, 0x32314247, 0x1, 0x2, 0x2, @discrete={0x0, 0x7daafd1e}}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x70a7) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x7ab}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x61ce, 0x4}, &(0x7f0000000180)=0x90) close(r0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000240)={0x5, 0x101, 0x1, {0x2, 0x127, 0x6, 0x58}}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000001c0)={0x10000, 0x55cb}) 14:45:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:34 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYRESHEX]) 14:45:34 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gi']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:35 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='fdinfo\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) acct(&(0x7f0000000040)='./file0\x00') read$alg(r1, &(0x7f0000000080)=""/165, 0xa5) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) fstat(r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) connect$packet(r1, &(0x7f00000001c0)={0x11, 0x1a, r4, 0x1, 0x8000, 0x6, @broadcast}, 0x14) dup(r1) 14:45:35 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x7, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x5, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) write$sndseq(r0, &(0x7f0000000140)=[{0x10081, 0x7, 0x0, 0xfffffffffffffffc, @tick, {}, {0x7}}], 0x30) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) close(r0) [ 483.526762][T24412] hfs: unable to parse mount options [ 483.540316][T24409] hfs: unable to parse mount options 14:45:35 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYRESHEX]) 14:45:35 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 483.881306][T24439] hfs: can't find a HFS filesystem on dev loop1 [ 483.881331][T24445] hfs: unable to parse mount options 14:45:35 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x4000000000000000}]) io_destroy(r1) 14:45:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890e, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r2, &(0x7f00000000c0)='net/sockstat\x00') 14:45:35 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x5, 0x8) 14:45:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:35 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYRESHEX]) 14:45:35 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 484.368236][T24464] hfs: can't find a HFS filesystem on dev loop1 [ 484.382686][T24470] hfs: unable to parse mount options 14:45:35 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8100000ac006, 0x0) ioctl$KVM_NMI(r0, 0xae9a) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x204000) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x100000000000}], 0x30) close(r0) 14:45:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:36 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:36 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB, @ANYRESHEX]) 14:45:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 484.701220][T24499] hfs: unable to parse mount options [ 484.732644][T24502] hfs: can't find a HFS filesystem on dev loop1 14:45:36 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x8000000000000000}]) io_destroy(r1) 14:45:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000200)={0x6, 0x5}) fstat(r0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x6000000000}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r2}, 0x8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000300)={r2, 0x1, 0xbe, "852dd7a6b90ef2f05d0d2c2ee79624159b122af143ea37cd3237d011722e4558b6c3bdb54825cdafd7bc87ca98b5706e805f0e969d6c76040248d2cc14c272fd0bfbfb04e064db1bc357864e93255facb9266db59491ce3584a93c97d4eec9dbbb7fe25f05e8e66c9784176bcf5c358ad3a431d2a643566e3edd09337399fe8d2188e40de7e5e1f58e9eca398aa2351de7e46865fa48681b363ed8d77a26a80568f7f900b8cbae045a312ddecba7d57a1e79cbbdb4150e134c5140051578"}, 0xc6) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0x100000001, 0x2}) sync_file_range(r0, 0x2, 0x3, 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000280)={{0x2, 0x1, 0x9, 0x3, 0x5}, 0x6, 0xd7c, 0x81}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f00000000c0)=0x1fa) 14:45:36 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0004, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) fcntl$dupfd(r0, 0x406, r0) close(r0) 14:45:36 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB, @ANYRESHEX]) 14:45:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:36 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:36 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xb6a43f7d01d579a6}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x9c, r1, 0x908, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x8}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x101}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x1}, 0x80) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x6, 0x8006, 0x100, 0x7f, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7, 0xfc05}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x2d7, &(0x7f0000000380)}, &(0x7f0000000080)=0xffffffffffffff9f) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000001c0)=r3, 0x4) r4 = dup(r0) connect$pptp(r4, &(0x7f00000000c0)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) [ 485.215522][T24526] hfs: unable to parse mount options 14:45:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) [ 485.271019][T24517] hfs: unable to parse mount options 14:45:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:36 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:36 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB, @ANYRESHEX]) 14:45:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ftruncate(r0, 0x81) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x280000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0xffc0000000000, 0x4) [ 485.495112][T24555] hfs: can't find a HFS filesystem on dev loop1 [ 485.507968][T24558] hfs: unable to parse mount options 14:45:37 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xeffdffffffffffff}]) io_destroy(r1) 14:45:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 14:45:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:37 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:37 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gi', @ANYRESHEX]) [ 485.970724][T24578] hfs: unable to parse mount options 14:45:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:37 executing program 4: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='task\x00^3v\xf8\x10y\xfc\x95\xb2\x88\xd2\x12\xcd\xa7\x81\xd6Z\xae\b\x00\x00\x9d\xb75\x1cr\xf3\x0e\x12H\xea\x1b*\xfeF_2\xbc|\vK;\xfcK\xc8\xd5\x87\x11s\xc4\xc3\xafk\xeb\xfb\xe2\t\r=\xa7)\xb4I\xf4!\x16\xb9m\xfa=y\x18\xcb\xad\xccRR\xde\xcc\xf3\x80\r\xbc\xbd\xbeH\x01\x8e\xe7\x9d\xd7\xcaa[\xc1x$\xc2DB\xbe9\xff\x88\xdc\x95#\xc3\xe2\xfc\n\xaf1\x9c\xc2D\xe1}\xb8,\xdb\f\xb3\xc3\x93\xe9\x85\x8e\xf8\f\x80\xb2)\xee&!\xc2\xa3\x80#\xbfu]\x00'/161) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:45:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x6, 0x1, 0xffff, 0x49, 0x81, 0x9}) close(r0) [ 485.991123][T24586] hfs: can't find a HFS filesystem on dev loop1 14:45:37 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gi', @ANYRESHEX]) 14:45:37 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:37 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x3}], 0x30) close(r0) [ 486.195218][T24610] hfs: unable to parse mount options [ 486.268160][T24615] hfs: can't find a HFS filesystem on dev loop1 14:45:38 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfcfdffffffffffff}]) io_destroy(r1) 14:45:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000340)=[0xee01, 0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0xee00]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x22000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x72e}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, 'GPL\'):*!selinux#'}}, {@seclabel='seclabel'}]}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$LOOP_SET_FD(r0, 0x4c00, r0) fstat(r0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000100)=0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast2, @in6=@remote, 0x4e21, 0xedaf, 0x4e22, 0x6, 0x2, 0x20, 0x20, 0x2c, r5, r2}, {0x7, 0x8, 0x7, 0x7dd52f4a, 0x328, 0xffffffffffffff8b, 0x5}, {0x0, 0x1, 0x6, 0xffffffff80000000}, 0x1000, 0x6e6bb7, 0x2, 0x1, 0x0, 0x1}, {{@in6=@mcast2, 0x4d6, 0x2b}, 0xa, @in6=@mcast2, 0x3503, 0x3, 0x1, 0x9, 0x6, 0x7, 0x6}}, 0xe8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e24, @empty}}, 0x6, 0x7, 0x6, 0x3, 0x8}, 0x98) 14:45:38 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gi', @ANYRESHEX]) 14:45:38 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x8000000a000b, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @frame_sync}) close(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) process_vm_writev(r1, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/169, 0xa9}, {&(0x7f0000001340)=""/132, 0x84}, {&(0x7f0000000200)=""/18, 0x12}, {&(0x7f0000001400)=""/51, 0x33}, {&(0x7f0000001440)=""/6, 0x6}, {&(0x7f0000001480)=""/9, 0x9}, {&(0x7f00000014c0)=""/244, 0xf4}, {&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/200, 0xc8}], 0xa, &(0x7f00000019c0)=[{&(0x7f0000001880)=""/13, 0xd}, {&(0x7f00000018c0)=""/209, 0xd1}], 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000001a40)={0x0, 0x9, 0x80, [], &(0x7f0000001a00)=0x4}) socket$netlink(0x10, 0x3, 0x9) 14:45:38 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 486.680816][T24639] hfs: unable to parse mount options [ 486.710642][T24644] hfs: unable to parse mount options 14:45:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='\xac\x85r\xaa\xc5\x9b\xa5[\'\xee\x17\v\xeb\xdb\x87\xdcg\xd7\x91_WN\xf5M1\xd1\xcf\xdeE\x04\xc06\xee\xd6D\x8a\xc5\xeaUm\xe9\x13\xb1\x83\xdb(\x8d\xae5A\x91\x05k\xdca\xde\xdc\xf8\b\xd6\x1b\x02.\x1b\x16\x9fq9^\xad\xa1\xe9\xbe\xdb\x05\xbf\x98\xfa\xa0:Q}\xba&\a\xf3D\x80\xba\x80\xb9\x90\n\xd3\x14\x06\x99W\xe6\x0e\xb7\x8fF\xf36\x88\xf2\x9eT\x14\xfb\x81\x1bWV\xe3\x01\xe3\xb0\xf7\x05\xb0dsS\x1dx\xde#\xe4\x92\xe9jw\xbe\xe9\x81\xd6HE9\xcb\xb5\xe4\xfd-\xbd0h\xce\xa5\x0f^\xae') r1 = socket$inet_udplite(0x2, 0x2, 0x88) signalfd(r0, &(0x7f0000000040)={0xffffffffffffffff}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000080)={0x4, 0x8, 0x400008}) 14:45:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:38 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x1000}], 0x30) close(r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x200, 'syz1\x00', @null, 0x4, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 14:45:38 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:38 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid', @ANYRESHEX]) 14:45:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x12, 0x9, 0x7, 0x7, 0xfffffffffffffffa, 0x3, 0x3f, 0x80000001, 0x2b8, 0x40, 0xb1, 0x3f, 0x1, 0x38, 0x1, 0xc4df, 0x1, 0x8001}, [{0x60000007, 0x5, 0x5, 0x5, 0x2, 0x8, 0x3}, {0x1, 0xfff, 0x100000001, 0x4, 0x20, 0xfffffffffffffc00, 0x8001, 0x4}], "03703d6c6e4607233023a39efe1627deb2f8e113e7a1c1f7c925b5ed7d68cd39e53f8e03ade479b737c1e3ac68024d8ae1ccad4ca199c6d87b34b2100b7253492adc1bf0881c7ca2a955d47927396b1a67675ae3a135ae0cc356b1d41e9b90340854244f2232b11aa647b51e", [[]]}, 0x21c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 486.960092][T24669] hfs: unable to parse mount options [ 487.056374][T24675] hfs: unable to parse mount options 14:45:38 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x301000, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getpeername$tipc(r0, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x1, 0x4) fstat(r0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x9) sendfile(r0, r0, &(0x7f0000000040), 0x2) 14:45:38 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid', @ANYRESHEX]) 14:45:38 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfefdffffffffffff}]) io_destroy(r1) 14:45:38 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 487.427437][T24698] hfs: unable to parse mount options 14:45:39 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2200) r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 487.454672][T24700] hfs: unable to parse mount options 14:45:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0008, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:39 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid', @ANYRESHEX]) 14:45:39 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:45:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x5, 0x100, 0x2000000000, 0x1, 0x0, 0x5, 0x21000, 0x8, 0x700000000000, 0x200, 0xffffffffffff7fff, 0x5, 0x7, 0x0, 0x7, 0x5, 0xffffffffffffffff, 0x6, 0xfffffffffffffffc, 0x5, 0x401, 0xa77a, 0x5bd7c20c, 0x1bef, 0x7, 0x0, 0x20, 0x9, 0x4, 0x2, 0x0, 0x9, 0x9, 0x1b, 0x6, 0x2, 0x0, 0x285, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x802, 0xe3, 0xffffffff, 0x9, 0x7, 0x8, 0x7}) close(r0) [ 487.703137][T24730] hfs: unable to parse mount options [ 487.746235][T24737] hfs: unable to parse mount options 14:45:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="13dc1f123c123f3188b070") fstat(r0, 0x0) 14:45:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3e8}}, 0x0) 14:45:39 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 487.970668][T24757] hfs: unable to parse mount options 14:45:39 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffffffffffdef}]) io_destroy(r1) 14:45:39 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:45:39 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) fstat(r0, 0x0) 14:45:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1ffc, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) 14:45:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xe803}}, 0x0) 14:45:39 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xf0ff7f}}, 0x0) 14:45:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "4b19906dce62f587e9"}, 0xa, 0x2) [ 488.361999][T24777] hfs: unable to parse mount options 14:45:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x329200, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) close(r0) 14:45:40 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 488.452177][T24781] hfs: can't find a HFS filesystem on dev loop3 14:45:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1000000}}, 0x0) 14:45:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x3, 0x2, 'client0\x00', 0x2, "d99937c8b14818fa", "aa713a6eea3b8c941b7be6f7c8552383d25d681fd13d8907fea72a6615584f32", 0x93ea, 0x4}) fstat(r0, 0x0) [ 488.608722][T24804] hfs: unable to parse mount options 14:45:40 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffffffffffdfc}]) io_destroy(r1) 14:45:40 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r5, r4, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r5, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) close(r0) 14:45:40 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:40 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x7ffff000}}, 0x0) 14:45:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) [ 489.055491][T24832] FAULT_INJECTION: forcing a failure. [ 489.055491][T24832] name failslab, interval 1, probability 0, space 0, times 0 [ 489.100090][T24837] hfs: unable to parse mount options [ 489.123020][T24832] CPU: 0 PID: 24832 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 489.131043][T24832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.141106][T24832] Call Trace: [ 489.144412][T24832] dump_stack+0x172/0x1f0 [ 489.148763][T24832] should_fail.cold+0xa/0x15 [ 489.153393][T24832] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.159229][T24832] ? ___might_sleep+0x163/0x280 [ 489.164096][T24832] __should_failslab+0x121/0x190 [ 489.169054][T24832] should_failslab+0x9/0x14 [ 489.173561][T24832] __kmalloc+0x2dc/0x740 [ 489.177815][T24832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 489.184056][T24832] ? fput_many+0x12c/0x1a0 [ 489.188475][T24832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.194722][T24832] ? strnlen_user+0x1f0/0x280 [ 489.199433][T24832] ? __x64_sys_memfd_create+0x13c/0x470 [ 489.204983][T24832] __x64_sys_memfd_create+0x13c/0x470 [ 489.210376][T24832] ? memfd_fcntl+0x1550/0x1550 [ 489.215143][T24832] ? do_syscall_64+0x26/0x610 [ 489.219882][T24832] ? lockdep_hardirqs_on+0x418/0x5d0 [ 489.225169][T24832] ? trace_hardirqs_on+0x67/0x230 [ 489.230219][T24832] do_syscall_64+0x103/0x610 [ 489.234842][T24832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.241483][T24832] RIP: 0033:0x4582b9 [ 489.245384][T24832] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.265519][T24832] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 489.273942][T24832] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 489.281920][T24832] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 489.289896][T24832] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 489.297871][T24832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04d3736d4 [ 489.305843][T24832] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xe8030000}}, 0x0) 14:45:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ftruncate(r0, 0x1000) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000140)=0x8000, 0x4) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={r1, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x100, 0x50000000000000, 0x2, 0x5, 0x0, 0x1, 0x5ef, 0xfffffffffffffffb, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r4, 0xffff}, &(0x7f0000000240)=0x8) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x80000001) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'bcsf0\x00'}) fstat(r0, 0x0) 14:45:40 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:45:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f0000000000)="0adc1f123d123f3188b070") fdatasync(r1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x95) fstat(r0, 0x0) [ 489.502917][T24854] hfs: unable to parse mount options 14:45:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xeffdffff}}, 0x0) 14:45:41 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 489.757093][T24875] hfs: unable to parse mount options 14:45:41 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffffffffffdfe}]) io_destroy(r1) 14:45:42 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x20, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x7, 0x9}, &(0x7f0000000100)=0xc) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x1ff, 0x2, 0x9, 0x3ff], 0x4, 0x3, 0x4, 0x1000, 0x9, 0x80000001, {0x80, 0x80000001, 0x8, 0xc9, 0x6, 0x6, 0x4, 0x5, 0x229d4f67, 0x100000001, 0x1, 0xffffffff00000001, 0xe6c9, 0x5, "75814a9b4cefbb2e5720d216246dbb03c986ed114ec5a2b3295abc58d06f37f9"}}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4, 0x80000, 0x0, @tick, {}, {}, @control={0xffffffff, 0x4, 0x6}}], 0x30) close(r2) 14:45:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000100)=0xffffffff, 0x2) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x10, 0x15, "a985274d4afd27917dd866efd69c0b40b64a0df3fb26e5689f27cfe1104a4ad7f82969f1461370d5710ed3788e0fdcfd25b873b828f0bad5b373de80cf8ac924", "3af21eefdc449ac706ce7c5341eba283c188fd0b516dc44bafded35a7f66cccd", [0x1ff, 0x80000001]}) fstat(r0, 0x0) 14:45:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffdef}}, 0x0) 14:45:42 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:42 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 490.620044][T24900] FAULT_INJECTION: forcing a failure. [ 490.620044][T24900] name failslab, interval 1, probability 0, space 0, times 0 [ 490.653782][T24902] hfs: unable to parse mount options [ 490.682928][T24900] CPU: 0 PID: 24900 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 490.691073][T24900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.701152][T24900] Call Trace: [ 490.704454][T24900] dump_stack+0x172/0x1f0 [ 490.708804][T24900] should_fail.cold+0xa/0x15 [ 490.713410][T24900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.719226][T24900] ? ___might_sleep+0x163/0x280 [ 490.724092][T24900] __should_failslab+0x121/0x190 14:45:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffff7f}}, 0x0) [ 490.729128][T24900] ? shmem_destroy_callback+0xc0/0xc0 [ 490.734504][T24900] should_failslab+0x9/0x14 [ 490.739011][T24900] kmem_cache_alloc+0x2b2/0x6f0 [ 490.743866][T24900] ? __alloc_fd+0x430/0x530 [ 490.748380][T24900] ? shmem_destroy_callback+0xc0/0xc0 [ 490.753775][T24900] shmem_alloc_inode+0x1c/0x50 [ 490.758547][T24900] alloc_inode+0x66/0x190 [ 490.762884][T24900] new_inode_pseudo+0x19/0xf0 [ 490.767564][T24900] new_inode+0x1f/0x40 [ 490.771637][T24900] shmem_get_inode+0x84/0x780 [ 490.776332][T24900] __shmem_file_setup.part.0+0x7e/0x2b0 14:45:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x0, 0x2000000}], 0x30) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") close(r0) [ 490.781886][T24900] shmem_file_setup+0x66/0x90 [ 490.786570][T24900] __x64_sys_memfd_create+0x2a2/0x470 [ 490.791951][T24900] ? memfd_fcntl+0x1550/0x1550 [ 490.796718][T24900] ? do_syscall_64+0x26/0x610 [ 490.801520][T24900] ? lockdep_hardirqs_on+0x418/0x5d0 [ 490.806807][T24900] ? trace_hardirqs_on+0x67/0x230 [ 490.811837][T24900] do_syscall_64+0x103/0x610 [ 490.816435][T24900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.822383][T24900] RIP: 0033:0x4582b9 [ 490.826262][T24900] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.845851][T24900] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 490.854254][T24900] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 490.862246][T24900] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 490.870225][T24900] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:45:42 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:42 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffffffffffe00}]) io_destroy(r1) 14:45:42 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 490.878288][T24900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04d3736d4 [ 490.886255][T24900] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:42 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='g']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) [ 491.006414][T24929] FAULT_INJECTION: forcing a failure. [ 491.006414][T24929] name failslab, interval 1, probability 0, space 0, times 0 14:45:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)={r1, r0, 0x0, 0xde, &(0x7f0000000040)="2c8c67a8097df47f28f3b0cf256350bf6bb86e9be72e087a24d50592d5bc85c63ba715148aa802d92253ce2e78f9d2dec578d48a766f03bd2e62b56c81c2d2bc580ec0bce4de64ca816a022ba2d4a5d7f5663851cf48ef83f2178dd261f92a7a3000e7d7c12f366349a39f9ff67476a72d52b3605577c4dcbe76e2057fe94e4a5b3846862d47dcc9360f0102b6e5a043062f46a4d38949361358af7561cdc164f4c1294b4d9dbc10f275398c19a804a56d4dc2b6ae3451b920a3199488f79b4afc241bc5b85dace5c7278daab00ef0a9c47f254be6c1b0fddaef6c03b877", 0x0, 0x3, 0x5, 0x8, 0x19, 0x1, 0x3, 'syz1\x00'}) 14:45:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x7ffffffff000}}, 0x0) [ 491.103501][T24929] CPU: 1 PID: 24929 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 491.111537][T24929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.121598][T24929] Call Trace: [ 491.124912][T24929] dump_stack+0x172/0x1f0 [ 491.129262][T24929] should_fail.cold+0xa/0x15 [ 491.133871][T24929] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.139715][T24929] ? ___might_sleep+0x163/0x280 [ 491.144588][T24929] __should_failslab+0x121/0x190 [ 491.149530][T24929] should_failslab+0x9/0x14 [ 491.149546][T24929] kmem_cache_alloc+0x2b2/0x6f0 [ 491.149566][T24929] ? current_time+0x6b/0x140 [ 491.163510][T24929] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 491.163526][T24929] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.163542][T24929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.163555][T24929] ? timespec64_trunc+0xf0/0x180 [ 491.163576][T24929] __d_alloc+0x2e/0x8c0 [ 491.190025][T24929] d_alloc_pseudo+0x1e/0x30 [ 491.194540][T24929] alloc_file_pseudo+0xe2/0x280 [ 491.199493][T24929] ? alloc_file+0x4d0/0x4d0 [ 491.204332][T24929] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 491.210593][T24929] __shmem_file_setup.part.0+0x108/0x2b0 [ 491.216238][T24929] shmem_file_setup+0x66/0x90 [ 491.220933][T24929] __x64_sys_memfd_create+0x2a2/0x470 [ 491.220950][T24929] ? memfd_fcntl+0x1550/0x1550 [ 491.220973][T24929] ? do_syscall_64+0x26/0x610 [ 491.231095][T24929] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.231112][T24929] ? trace_hardirqs_on+0x67/0x230 [ 491.231132][T24929] do_syscall_64+0x103/0x610 14:45:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000100)={{0x8, 0x7}, 'port0\x00', 0x80, 0x800, 0x17a, 0x7, 0xfffffffffffff326, 0x400, 0x4, 0x0, 0x2, 0x7ca5}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="08000000f1276efbd9cfa6d84a44593177399d7e944b9864476da3e9eb353f"], &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x100, 0x8, 0x1}) fstat(r0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000340)={@caif=@util={0x25, "2057cf837568ff4800dd2f2bb8f7f9ca"}, {&(0x7f0000000240)=""/131, 0x83}, &(0x7f0000000300), 0x4}, 0xa0) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x8, 0x100) 14:45:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") fstat(r1, 0x0) [ 491.247655][T24929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.247668][T24929] RIP: 0033:0x4582b9 [ 491.247688][T24929] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.258138][T24929] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 491.258152][T24929] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 14:45:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xf0ff7f00000000}}, 0x0) 14:45:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) close(r0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') [ 491.258160][T24929] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 491.258169][T24929] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 491.258177][T24929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04d3736d4 [ 491.258185][T24929] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 491.346564][T24943] hfs: unable to parse mount options 14:45:42 executing program 4: getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:45:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x14108, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'lapb0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @remote}, 0x40, r1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) flock(r2, 0x3) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r2) 14:45:42 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xfed8) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) 14:45:43 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2}]) io_destroy(r1) 14:45:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xf0ffffff7f0000}}, 0x0) 14:45:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') fcntl$setpipe(r0, 0x407, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:43 executing program 1: 14:45:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0xfffffffffffffff1, 0x0, 0x100000001, 0x4]}) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000000c0)={0x4, 0x0, [{0x4, 0x7, 0x0, 0x0, @sint={0xc75}}, {0x80, 0x7, 0x0, 0x0, @sint={0xfffffffffffffffa, 0xfe000}}, {0x90, 0x7, 0x0, 0x0, @adapter={0x7, 0xe5a, 0x9, 0x6, 0x100}}, {0x0, 0x4, 0x0, 0x0, @msi={0x80000001, 0xfffffffffffffffe, 0xff}}]}) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x840, 0x0) 14:45:43 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 491.874510][T24982] FAULT_INJECTION: forcing a failure. [ 491.874510][T24982] name failslab, interval 1, probability 0, space 0, times 0 [ 491.913269][T24982] CPU: 0 PID: 24982 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 14:45:43 executing program 1: [ 491.921289][T24982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.931373][T24982] Call Trace: [ 491.934683][T24982] dump_stack+0x172/0x1f0 [ 491.939035][T24982] should_fail.cold+0xa/0x15 [ 491.943650][T24982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.949475][T24982] ? ___might_sleep+0x163/0x280 [ 491.954337][T24982] __should_failslab+0x121/0x190 [ 491.954354][T24982] should_failslab+0x9/0x14 [ 491.954370][T24982] kmem_cache_alloc+0x2b2/0x6f0 [ 491.954383][T24982] ? current_time+0x6b/0x140 [ 491.954398][T24982] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 491.954412][T24982] ? lockdep_hardirqs_on+0x418/0x5d0 [ 491.954427][T24982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.954439][T24982] ? timespec64_trunc+0xf0/0x180 [ 491.954460][T24982] __d_alloc+0x2e/0x8c0 [ 491.963894][T24982] d_alloc_pseudo+0x1e/0x30 [ 491.963910][T24982] alloc_file_pseudo+0xe2/0x280 [ 491.963925][T24982] ? alloc_file+0x4d0/0x4d0 [ 491.963941][T24982] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 14:45:43 executing program 1: [ 491.963966][T24982] __shmem_file_setup.part.0+0x108/0x2b0 [ 491.963986][T24982] shmem_file_setup+0x66/0x90 [ 491.964001][T24982] __x64_sys_memfd_create+0x2a2/0x470 [ 491.964016][T24982] ? memfd_fcntl+0x1550/0x1550 [ 491.964031][T24982] ? do_syscall_64+0x26/0x610 [ 491.964051][T24982] ? lockdep_hardirqs_on+0x418/0x5d0 [ 492.035512][T24982] ? trace_hardirqs_on+0x67/0x230 [ 492.035535][T24982] do_syscall_64+0x103/0x610 [ 492.035556][T24982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.035567][T24982] RIP: 0033:0x4582b9 14:45:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) restart_syscall() write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 492.035581][T24982] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.035589][T24982] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 492.035602][T24982] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 492.035610][T24982] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 492.035619][T24982] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:45:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100000000000000}}, 0x0) 14:45:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000080)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x3d, 0xfffffffffffffffd, 0x8000, 0x0, 0x3f, 0x2, 0x3, 0x9b43, 0x7, 0x8000, 0x2, 0x1, 0x0, 0x6, 0x8, 0x2, 0x899, 0x1, 0xac}) 14:45:43 executing program 1: [ 492.035635][T24982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04d3736d4 [ 492.059913][T24982] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r2, 0xe}}, 0x10) 14:45:44 executing program 1: 14:45:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xe803000000000000}}, 0x0) 14:45:44 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x5) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="33000000c90f0000206a8b0a7a35a18d75336923dc3fc55644ccf596ce1833ff1795000b66b18ed6b611559a4cd6"], &(0x7f0000000140), 0x400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r1) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:45:44 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4}]) io_destroy(r1) 14:45:44 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 492.664682][T25026] FAULT_INJECTION: forcing a failure. [ 492.664682][T25026] name failslab, interval 1, probability 0, space 0, times 0 [ 492.703587][T25026] CPU: 0 PID: 25026 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 492.711609][T25026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.721664][T25026] Call Trace: [ 492.724970][T25026] dump_stack+0x172/0x1f0 [ 492.729314][T25026] should_fail.cold+0xa/0x15 [ 492.733920][T25026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.739738][T25026] ? ___might_sleep+0x163/0x280 [ 492.744616][T25026] __should_failslab+0x121/0x190 [ 492.749561][T25026] should_failslab+0x9/0x14 [ 492.754072][T25026] kmem_cache_alloc+0x2b2/0x6f0 [ 492.758936][T25026] __alloc_file+0x27/0x300 [ 492.763358][T25026] alloc_empty_file+0x72/0x170 [ 492.768136][T25026] alloc_file+0x5e/0x4d0 [ 492.772389][T25026] alloc_file_pseudo+0x189/0x280 [ 492.777332][T25026] ? alloc_file+0x4d0/0x4d0 [ 492.781843][T25026] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 492.788098][T25026] __shmem_file_setup.part.0+0x108/0x2b0 [ 492.793741][T25026] shmem_file_setup+0x66/0x90 [ 492.798445][T25026] __x64_sys_memfd_create+0x2a2/0x470 [ 492.803822][T25026] ? memfd_fcntl+0x1550/0x1550 [ 492.808592][T25026] ? do_syscall_64+0x26/0x610 [ 492.813272][T25026] ? lockdep_hardirqs_on+0x418/0x5d0 [ 492.818563][T25026] ? trace_hardirqs_on+0x67/0x230 [ 492.823604][T25026] do_syscall_64+0x103/0x610 [ 492.828205][T25026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.834100][T25026] RIP: 0033:0x4582b9 [ 492.838033][T25026] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:45:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) fstat(r1, &(0x7f00000000c0)) 14:45:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000640)="2ad4d425", 0x4) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) 14:45:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xeffdffff00000000}}, 0x0) [ 492.857670][T25026] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 492.866088][T25026] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 492.874064][T25026] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 492.882062][T25026] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 492.890039][T25026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff04d3736d4 [ 492.898040][T25026] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:44 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xffffff7f00000000}}, 0x0) 14:45:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000000a000a, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0x3, 0x0, {0x53, 0x8, 0xfffffffffffffe01, {0x3}, {0x80, 0xfffffffffffffff9}, @cond=[{0x0, 0xfffffffffffffff7, 0x3f, 0x2, 0x6, 0x9}, {0x3a, 0x1, 0x6, 0x5, 0x0, 0x3}]}, {0x54, 0x3f, 0x5, {0x1}, {0xfff, 0x3}, @period={0x0, 0x1, 0xffffffffffffcf6b, 0x400, 0x5, {0x8, 0x95a, 0x400, 0x101}, 0xa, &(0x7f0000000040)=[0x0, 0x800, 0x5, 0x3d1e67b4, 0x7fff, 0xfffffffffffffff7, 0x4f, 0xfff, 0x400, 0x7fff]}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r1, 0x1000008914, &(0x7f0000000400)="0adc1f123c123f0188b070d5e41b657095c9d1cdf726411d3047f7867cdf2c80b16cebb58324d65d66f3ec6d559add08646a733a160b854022202f7c4e6f261e29753274a8c726e1cd88301301f99f2a22080b6df1385dde56e8350f6e1022e3ccb59340fc1ca1796b66dcee6de52c11cdc3d397e8577ec3a9e6b13cb996052b3a78e9a349c4349cc52e94201a48f270b254661f2792c0f7beaea108b356f516fd2a4008d321c6c45dafe6d2ed3705daf1d42eb369f97a27750a9259c2801447f8b4bc3de597b8554d4a1aa56e40f01ede8ef0a2bd8474e0a9228ad2cb807463a9cf35ce818ce759b4c4135e720f924c427462c2") r2 = getpid() ptrace$pokeuser(0x6, r2, 0x100000001, 0x2c4) fstat(r0, 0x0) 14:45:44 executing program 1: [ 493.118501][T25057] FAULT_INJECTION: forcing a failure. [ 493.118501][T25057] name failslab, interval 1, probability 0, space 0, times 0 [ 493.162852][T25057] CPU: 1 PID: 25057 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 493.170877][T25057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.180957][T25057] Call Trace: [ 493.184274][T25057] dump_stack+0x172/0x1f0 [ 493.188621][T25057] should_fail.cold+0xa/0x15 [ 493.193232][T25057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.199053][T25057] ? ___might_sleep+0x163/0x280 [ 493.204289][T25057] __should_failslab+0x121/0x190 [ 493.209246][T25057] should_failslab+0x9/0x14 [ 493.213773][T25057] kmem_cache_alloc+0x2b2/0x6f0 [ 493.218633][T25057] ? notify_change+0x6d5/0xfb0 [ 493.223406][T25057] ? do_sys_ftruncate+0x41e/0x550 [ 493.228443][T25057] getname_flags+0xd6/0x5b0 [ 493.232958][T25057] getname+0x1a/0x20 [ 493.237812][T25057] do_sys_open+0x2c9/0x5d0 [ 493.242244][T25057] ? filp_open+0x80/0x80 [ 493.246498][T25057] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.252758][T25057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 493.258254][T25057] ? do_syscall_64+0x26/0x610 [ 493.262968][T25057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.269043][T25057] ? do_syscall_64+0x26/0x610 [ 493.273730][T25057] __x64_sys_open+0x7e/0xc0 [ 493.278258][T25057] do_syscall_64+0x103/0x610 [ 493.282869][T25057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.288770][T25057] RIP: 0033:0x412251 [ 493.292765][T25057] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:45:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x2}, 0x0) 14:45:44 executing program 1: [ 493.312394][T25057] RSP: 002b:00007ff04d372a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 493.320810][T25057] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 493.328782][T25057] RDX: 00007ff04d372b0a RSI: 0000000000000002 RDI: 00007ff04d372b00 [ 493.336766][T25057] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 493.344740][T25057] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 493.352732][T25057] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:45 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfe}]) io_destroy(r1) 14:45:45 executing program 1: 14:45:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x8}, 0x0) 14:45:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$RTC_UIE_ON(r0, 0x7003) close(r0) 14:45:45 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x4) fstat(r0, 0x0) [ 493.600023][T25089] FAULT_INJECTION: forcing a failure. [ 493.600023][T25089] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 493.613266][T25089] CPU: 0 PID: 25089 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 493.621266][T25089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.631422][T25089] Call Trace: [ 493.634721][T25089] dump_stack+0x172/0x1f0 [ 493.639085][T25089] should_fail.cold+0xa/0x15 [ 493.643684][T25089] ? __lock_acquire+0x548/0x3fb0 [ 493.648628][T25089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.648643][T25089] ? __lock_acquire+0x548/0x3fb0 [ 493.648668][T25089] should_fail_alloc_page+0x50/0x60 [ 493.664576][T25089] __alloc_pages_nodemask+0x1a1/0x7e0 [ 493.664596][T25089] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 493.664609][T25089] ? find_held_lock+0x35/0x130 [ 493.664633][T25089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.664661][T25089] cache_grow_begin+0x9c/0x860 [ 493.691029][T25089] ? getname_flags+0xd6/0x5b0 [ 493.695713][T25089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 493.701993][T25089] kmem_cache_alloc+0x62d/0x6f0 [ 493.706861][T25089] ? notify_change+0x6d5/0xfb0 [ 493.711635][T25089] ? do_sys_ftruncate+0x41e/0x550 [ 493.716670][T25089] getname_flags+0xd6/0x5b0 [ 493.721205][T25089] getname+0x1a/0x20 [ 493.725106][T25089] do_sys_open+0x2c9/0x5d0 [ 493.729533][T25089] ? filp_open+0x80/0x80 [ 493.734393][T25089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.740648][T25089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 493.746120][T25089] ? do_syscall_64+0x26/0x610 [ 493.750817][T25089] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.757001][T25089] ? do_syscall_64+0x26/0x610 [ 493.761700][T25089] __x64_sys_open+0x7e/0xc0 [ 493.766234][T25089] do_syscall_64+0x103/0x610 [ 493.770836][T25089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.776730][T25089] RIP: 0033:0x412251 [ 493.780645][T25089] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:45:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:45 executing program 1: [ 493.800251][T25089] RSP: 002b:00007ff04d372a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 493.808665][T25089] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 493.816759][T25089] RDX: 00007ff04d372b0a RSI: 0000000000000002 RDI: 00007ff04d372b00 [ 493.824913][T25089] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 493.832891][T25089] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 493.840863][T25089] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x3e8}, 0x0) 14:45:45 executing program 1: 14:45:45 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/udp6\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4019012}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x200, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x1) 14:45:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) r1 = getuid() ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000040)={0x3, @null, r1}) close(r0) [ 493.963798][T25089] hfs: invalid gid -1 [ 493.968181][T25089] hfs: unable to parse mount options 14:45:45 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000}]) io_destroy(r1) 14:45:45 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x10000, {{0xa, 0x4e23, 0x9c0, @mcast2, 0xe67}}}, 0x88) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x44) 14:45:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xe803}, 0x0) 14:45:45 executing program 1: 14:45:45 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x3, 0x4, 0x40, 0x48000000000}, 'syz1\x00', 0x25}) fadvise64(0xffffffffffffffff, 0x3f, 0x401, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x4, 0x0, 0x0, @tick, {0x0, 0xfffffffffffffbff}}], 0x30) close(0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82400, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f00000000c0)) close(0xffffffffffffffff) 14:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x1002020201) ioctl$TCXONC(r1, 0x540a, 0x2) write(r2, &(0x7f0000000280)='E', 0x1) ioctl$TCXONC(r2, 0x540a, 0x3) dup3(r0, r2, 0x0) close(r1) [ 494.438553][T25136] FAULT_INJECTION: forcing a failure. [ 494.438553][T25136] name failslab, interval 1, probability 0, space 0, times 0 14:45:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000040)={0x8, 0x8d, "d36103842eb5636e62a3ff67ca6768ecf6880ed1827feb279769e7d701d581c170bff1200a9be1e12eb14a1353ef2208f7e9f59f5b74e13a2a3a5e6cbe4197ca2f69444c5ff627e5353c96e3e1f293f5223cfc362710ecdae1387d53ec6c0e3f8983d3e3fe75c27caede91c4911f1bac161ec341f26943f2d5d6c59241d9479c08abde7edb399ade568cf818d9"}) fstat(0xffffffffffffffff, 0x0) 14:45:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) creat(&(0x7f0000000040)='./file0\x00', 0x8) close(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) 14:45:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xf0ff7f}, 0x0) 14:45:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x230000, 0x0) recvfrom$unix(r2, &(0x7f0000000140)=""/252, 0xfc, 0x10000, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000002c0)=0x1) lsetxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x1) ioctl(r1, 0x80000000, &(0x7f0000000000)="1a6b090000123f3188b070") accept4$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x800) fstat(r0, 0x0) [ 494.599464][T25136] CPU: 0 PID: 25136 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 494.607490][T25136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.617550][T25136] Call Trace: [ 494.620874][T25136] dump_stack+0x172/0x1f0 [ 494.625220][T25136] should_fail.cold+0xa/0x15 [ 494.629819][T25136] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.635633][T25136] ? ___might_sleep+0x163/0x280 [ 494.640495][T25136] __should_failslab+0x121/0x190 [ 494.645435][T25136] should_failslab+0x9/0x14 14:45:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x1000000}, 0x0) [ 494.649952][T25136] kmem_cache_alloc+0x2b2/0x6f0 [ 494.654811][T25136] ? __save_stack_trace+0x99/0x100 [ 494.659929][T25136] __alloc_file+0x27/0x300 [ 494.659946][T25136] alloc_empty_file+0x72/0x170 [ 494.659963][T25136] path_openat+0xef/0x46e0 [ 494.659985][T25136] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 494.673544][T25136] ? kasan_slab_alloc+0xf/0x20 [ 494.673559][T25136] ? kmem_cache_alloc+0x11a/0x6f0 [ 494.673573][T25136] ? getname_flags+0xd6/0x5b0 [ 494.673584][T25136] ? getname+0x1a/0x20 [ 494.673597][T25136] ? do_sys_open+0x2c9/0x5d0 [ 494.673609][T25136] ? __x64_sys_open+0x7e/0xc0 [ 494.673625][T25136] ? do_syscall_64+0x103/0x610 [ 494.673646][T25136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.729947][T25136] ? __lock_acquire+0x548/0x3fb0 [ 494.734890][T25136] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 494.740276][T25136] ? cnl_ddi_vswing_program.isra.0+0x60/0xcf0 [ 494.746353][T25136] ? __alloc_fd+0x430/0x530 [ 494.750865][T25136] do_filp_open+0x1a1/0x280 [ 494.755399][T25136] ? may_open_dev+0x100/0x100 [ 494.755419][T25136] ? lock_downgrade+0x880/0x880 [ 494.755440][T25136] ? kasan_check_read+0x11/0x20 [ 494.755461][T25136] ? do_raw_spin_unlock+0x57/0x270 [ 494.774913][T25136] ? _raw_spin_unlock+0x2d/0x50 [ 494.779789][T25136] ? __alloc_fd+0x430/0x530 [ 494.784313][T25136] do_sys_open+0x3fe/0x5d0 [ 494.788755][T25136] ? filp_open+0x80/0x80 [ 494.793022][T25136] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 494.799281][T25136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.804757][T25136] ? do_syscall_64+0x26/0x610 [ 494.809445][T25136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.815521][T25136] ? do_syscall_64+0x26/0x610 [ 494.820207][T25136] __x64_sys_open+0x7e/0xc0 [ 494.820226][T25136] do_syscall_64+0x103/0x610 [ 494.820246][T25136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.829343][T25136] RIP: 0033:0x412251 [ 494.829359][T25136] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 494.829367][T25136] RSP: 002b:00007ff04d372a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 494.829388][T25136] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 494.875127][T25136] RDX: 00007ff04d372b0a RSI: 0000000000000002 RDI: 00007ff04d372b00 [ 494.883115][T25136] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 494.891109][T25136] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 494.899087][T25136] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:46 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xeffd}]) io_destroy(r1) 14:45:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet_udplite(0x2, 0x2, 0x88) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x22000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r0, 0x0) 14:45:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x7ffff000}, 0x0) 14:45:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000000)={0x0, r0}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 14:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x1002020201) ioctl$TCXONC(r1, 0x540a, 0x2) write(r2, &(0x7f0000000280)='E', 0x1) ioctl$TCXONC(r2, 0x540a, 0x3) dup3(r0, r2, 0x0) close(r1) 14:45:46 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 495.277641][T25182] FAULT_INJECTION: forcing a failure. [ 495.277641][T25182] name failslab, interval 1, probability 0, space 0, times 0 [ 495.299778][T25182] CPU: 1 PID: 25182 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 495.307782][T25182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.318101][T25182] Call Trace: [ 495.321405][T25182] dump_stack+0x172/0x1f0 14:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x1002020201) ioctl$TCXONC(r1, 0x540a, 0x2) write(r2, &(0x7f0000000280)='E', 0x1) ioctl$TCXONC(r2, 0x540a, 0x3) dup3(r0, r2, 0x0) close(r1) [ 495.325763][T25182] should_fail.cold+0xa/0x15 [ 495.330362][T25182] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.336173][T25182] ? ___might_sleep+0x163/0x280 [ 495.341038][T25182] __should_failslab+0x121/0x190 [ 495.345982][T25182] ? loop_info64_to_compat+0x6d0/0x6d0 [ 495.351443][T25182] should_failslab+0x9/0x14 [ 495.355958][T25182] kmem_cache_alloc_trace+0x2d1/0x760 [ 495.361316][T25182] ? lockdep_init_map+0x1be/0x6d0 [ 495.366324][T25182] ? loop_info64_to_compat+0x6d0/0x6d0 [ 495.371807][T25182] __kthread_create_on_node+0xf2/0x460 [ 495.377290][T25182] ? lock_acquire+0x16f/0x3f0 [ 495.381953][T25182] ? kthread_parkme+0xb0/0xb0 [ 495.387139][T25182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.393372][T25182] ? kasan_check_read+0x11/0x20 [ 495.398206][T25182] ? mutex_trylock+0x1e0/0x1e0 [ 495.402964][T25182] ? loop_info64_to_compat+0x6d0/0x6d0 [ 495.408405][T25182] kthread_create_on_node+0xbb/0xf0 [ 495.413586][T25182] ? __kthread_create_on_node+0x460/0x460 [ 495.419291][T25182] ? lockdep_init_map+0x1be/0x6d0 [ 495.424315][T25182] ? lockdep_init_map+0x1be/0x6d0 [ 495.429326][T25182] lo_ioctl+0xc1b/0x2150 [ 495.433563][T25182] ? lo_rw_aio+0x1120/0x1120 [ 495.438320][T25182] blkdev_ioctl+0x6f2/0x1d10 [ 495.442890][T25182] ? blkpg_ioctl+0xa90/0xa90 [ 495.447465][T25182] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 495.453254][T25182] ? __fget+0x35a/0x550 [ 495.457418][T25182] block_ioctl+0xee/0x130 [ 495.461729][T25182] ? blkdev_fallocate+0x410/0x410 [ 495.466762][T25182] do_vfs_ioctl+0xd6e/0x1390 [ 495.471343][T25182] ? ioctl_preallocate+0x210/0x210 [ 495.476434][T25182] ? __fget+0x381/0x550 [ 495.480583][T25182] ? ksys_dup3+0x3e0/0x3e0 [ 495.485004][T25182] ? do_sys_open+0x31d/0x5d0 [ 495.489621][T25182] ? tomoyo_file_ioctl+0x23/0x30 [ 495.494630][T25182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.500852][T25182] ? security_file_ioctl+0x93/0xc0 [ 495.505946][T25182] ksys_ioctl+0xab/0xd0 [ 495.510085][T25182] __x64_sys_ioctl+0x73/0xb0 [ 495.514677][T25182] do_syscall_64+0x103/0x610 [ 495.519261][T25182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.525153][T25182] RIP: 0033:0x458127 [ 495.529028][T25182] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.548610][T25182] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.556998][T25182] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 495.564958][T25182] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:45:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) times(&(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0x47e, 0xd116, 0x8000}, 0x10, 0x0, 0x0, 0x0, "002709ca1360694e7b631e1bffee68269ca89adf9229d1c2ed4af03d687769758d6790a2f88953f3338d2d206618de9ad0778b4d9a7d0ebe87ebf8d2ab676977"}, 0x48}, 0x1, 0x0, 0x0, 0xc1}, 0xc040) 14:45:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xe8030000}, 0x0) 14:45:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="ea2416ccd05a900e0920fb12a2bad79cf21f93dc8216bbdf06418d495c953e216617c3d92cc35953574be3c223153fb786d81c5d15ee", 0x36, 0x1}, {&(0x7f00000000c0)="3ccdd420dc78b357213442803828465b0088e15fcf8837a4aca5b8de5dc5587e5c1a7c5c64507cf19cdf87a749965de1d0a6a41ee9b5c92bd9ca973b0dd12f0273fccc31b124d34b8502433af47c7f6e5875cfbd7664bb3dcb4b6c2d91201a4775e5e7067acda7dee0a1cd67c4969340e2c03ac76c81e6fec46a8355a5c677e6abdff7503d69494437656a8af3b25c8e8146fb82bec8ba9612c1a04a86dc", 0x9e, 0x80}], 0x8000, &(0x7f00000001c0)='vmnet0selinux%vboxnet0self0#]em1*/procposix_acl_access{security-ppp0selfcpuset&+\x00') write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 495.572927][T25182] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 495.580883][T25182] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 495.588836][T25182] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xeffdffff}, 0x0) 14:45:47 executing program 4: gettid() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xb5, "428464ece2764052c0ff423be81d68a2a8cf7e5c7495bf8fc2f7a767c0e4c96f0f40714f15913dce4f7bc8789dfbd782ecb565ca35555581fa04aff6c676204d90938c4db8c04342a9b397d610ca29c23c2dbdb70a7968459bc3a481148589e6f6c3981514d2799e39fd4c1463dd6209b234e4020b6ef49fe2f86452ac8718c8875a86c785b238d2134689f1b5874fe3b8a2e29ef4817d34c5cf2ac4cd70cf3e25a89a610a3cfd44153d4419b47d81206f5c7d1b66"}, &(0x7f0000000140)=0xbd) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x48, &(0x7f0000000280)=[@in6={0xa, 0x5, 0x6, @rand_addr="2b35641b3b9783bd9ade2bc8417ac031", 0x2}, @in6={0xa, 0x4e24, 0x3f, @mcast1, 0x2}, @in={0x2, 0x4e21, @rand_addr=0x4}]}, &(0x7f0000000300)=0x10) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/xfrm_sS0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfcfd}]) io_destroy(r1) 14:45:47 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xfffffdef}, 0x0) 14:45:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl(r0, 0x5, &(0x7f0000000000)="8341d669883a416e52689b6071e1c6a8fd1f61b88e3baf25e23b41e55530989924cdee7506e08be8e63ee95f8a5db207610966ba77e3640c161f32e062f3ad2226499a583bcfa5a7ea0e590f7290fd5eb0a553add643862e7646e6adb5b2fa32fc3dd297da7854b67c5fae2e26074468a52a09f843651d74b24a69d25abb53c8a56483c72ef85a1392017f4b40660202a95dd8ffb55e1b") write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) close(r0) 14:45:47 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000200), 0x4) 14:45:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80010400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x400, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x9, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20004000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 496.272866][T25237] FAULT_INJECTION: forcing a failure. [ 496.272866][T25237] name failslab, interval 1, probability 0, space 0, times 0 [ 496.320455][T25237] CPU: 1 PID: 25237 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 496.328468][T25237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.338523][T25237] Call Trace: [ 496.341828][T25237] dump_stack+0x172/0x1f0 [ 496.346168][T25237] should_fail.cold+0xa/0x15 [ 496.350799][T25237] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.356622][T25237] ? ___might_sleep+0x163/0x280 [ 496.361484][T25237] __should_failslab+0x121/0x190 [ 496.366431][T25237] should_failslab+0x9/0x14 [ 496.370942][T25237] kmem_cache_alloc+0x2b2/0x6f0 [ 496.375801][T25237] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.381670][T25237] ? kmem_cache_alloc+0x32e/0x6f0 [ 496.386710][T25237] security_file_alloc+0x39/0x170 [ 496.391757][T25237] __alloc_file+0xac/0x300 [ 496.396179][T25237] alloc_empty_file+0x72/0x170 [ 496.400953][T25237] path_openat+0xef/0x46e0 [ 496.405376][T25237] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 496.411188][T25237] ? kasan_slab_alloc+0xf/0x20 [ 496.415957][T25237] ? kmem_cache_alloc+0x11a/0x6f0 [ 496.420983][T25237] ? getname_flags+0xd6/0x5b0 [ 496.425663][T25237] ? getname+0x1a/0x20 [ 496.429732][T25237] ? do_sys_open+0x2c9/0x5d0 [ 496.434338][T25237] ? __x64_sys_open+0x7e/0xc0 [ 496.439020][T25237] ? do_syscall_64+0x103/0x610 [ 496.443789][T25237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.449866][T25237] ? __lock_acquire+0x548/0x3fb0 [ 496.454810][T25237] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 496.460196][T25237] ? __alloc_fd+0x430/0x530 [ 496.464710][T25237] do_filp_open+0x1a1/0x280 [ 496.469228][T25237] ? may_open_dev+0x100/0x100 [ 496.473920][T25237] ? lock_downgrade+0x880/0x880 [ 496.478788][T25237] ? kasan_check_read+0x11/0x20 [ 496.483643][T25237] ? do_raw_spin_unlock+0x57/0x270 [ 496.488770][T25237] ? _raw_spin_unlock+0x2d/0x50 [ 496.493629][T25237] ? __alloc_fd+0x430/0x530 [ 496.498177][T25237] do_sys_open+0x3fe/0x5d0 [ 496.502605][T25237] ? filp_open+0x80/0x80 [ 496.506853][T25237] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.513101][T25237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.518562][T25237] ? do_syscall_64+0x26/0x610 [ 496.523240][T25237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.529319][T25237] ? do_syscall_64+0x26/0x610 [ 496.534006][T25237] __x64_sys_open+0x7e/0xc0 [ 496.538519][T25237] do_syscall_64+0x103/0x610 [ 496.543116][T25237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.549010][T25237] RIP: 0033:0x412251 14:45:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x11, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x3, 0x100000000, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) unshare(0x3fc) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400), 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r3, 0xc04, 0x101, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4838}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 14:45:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xffffff7f}, 0x0) 14:45:48 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:48 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x509000, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 496.552910][T25237] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 496.572513][T25237] RSP: 002b:00007ff04d372a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 496.580927][T25237] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 496.588904][T25237] RDX: 00007ff04d372b0a RSI: 0000000000000002 RDI: 00007ff04d372b00 [ 496.596878][T25237] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 496.604850][T25237] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 496.612826][T25237] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) r2 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20) inotify_rm_watch(r0, r2) ioctl$int_in(r1, 0xdff3b97f8e712bd3, &(0x7f0000000080)=0xfffffffffffffffa) 14:45:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x7ffffffff000}, 0x0) 14:45:48 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfdef}]) io_destroy(r1) 14:45:48 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:48 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="c00000008320259738f79cb039d97f147ef2ccfc74a6c079b1bab07a9ac5f980a84fde9528e85aa163d201360e3997b3267ca95d01f93831a974bfaf33d1393228fa2128c3d4e23e679c0fc3ad92a8cceabecaf0bc499c45cf21f5ddfcbcf223b72d01500531e5e6cd752f9a7e9eabc4c9ca3a362a14ca3bb0efd942471f1979853f845f887ce9a32fb3e70096dd46b1d9d664fd75e119c3be57bca2e7369611c9bae17b3d9357b27bd5de0a48a363a8b8211ba5d7ca0c6700"], &(0x7f0000000100)=0xc8) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x7, 0x1, 0x53, 0x5}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0xfffffffffffffffa}, 0x8) 14:45:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f0000000040)="0a101a7900000100ada1d0445cad1ebb9746cb8cd0e672763fd0b5b32076b52cfa") fstat(r0, 0x0) 14:45:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xf0ff7f00000000}, 0x0) [ 496.988362][T25285] FAULT_INJECTION: forcing a failure. [ 496.988362][T25285] name failslab, interval 1, probability 0, space 0, times 0 [ 497.005951][T25285] CPU: 0 PID: 25285 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 497.013941][T25285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.023996][T25285] Call Trace: [ 497.027302][T25285] dump_stack+0x172/0x1f0 [ 497.031645][T25285] should_fail.cold+0xa/0x15 14:45:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xf0ffffff7f0000}, 0x0) [ 497.036246][T25285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.042058][T25285] ? ___might_sleep+0x163/0x280 [ 497.046920][T25285] __should_failslab+0x121/0x190 [ 497.051864][T25285] should_failslab+0x9/0x14 [ 497.056372][T25285] kmem_cache_alloc+0x2b2/0x6f0 [ 497.061229][T25285] ? __schedule+0x1387/0x1cc0 [ 497.065924][T25285] __kernfs_new_node+0xef/0x690 [ 497.070791][T25285] ? _raw_spin_unlock_irq+0x28/0x90 [ 497.076004][T25285] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 497.081461][T25285] ? kasan_check_read+0x11/0x20 [ 497.086309][T25285] ? _raw_spin_unlock_irq+0x5e/0x90 [ 497.091498][T25285] ? __schedule+0x1387/0x1cc0 [ 497.096188][T25285] ? __lock_acquire+0x548/0x3fb0 [ 497.101152][T25285] kernfs_new_node+0x99/0x130 [ 497.110940][T25285] kernfs_create_dir_ns+0x52/0x160 [ 497.118649][T25285] internal_create_group+0x7f8/0xc40 [ 497.123923][T25285] ? bd_set_size+0x89/0xb0 [ 497.128392][T25285] ? remove_files.isra.0+0x190/0x190 [ 497.133682][T25285] sysfs_create_group+0x20/0x30 [ 497.138524][T25285] lo_ioctl+0x10af/0x2150 [ 497.142848][T25285] ? lo_rw_aio+0x1120/0x1120 [ 497.147440][T25285] blkdev_ioctl+0x6f2/0x1d10 [ 497.152011][T25285] ? blkpg_ioctl+0xa90/0xa90 [ 497.156585][T25285] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 497.162380][T25285] ? __fget+0x35a/0x550 [ 497.166531][T25285] block_ioctl+0xee/0x130 [ 497.170862][T25285] ? blkdev_fallocate+0x410/0x410 [ 497.175881][T25285] do_vfs_ioctl+0xd6e/0x1390 [ 497.180476][T25285] ? ioctl_preallocate+0x210/0x210 [ 497.185581][T25285] ? __fget+0x381/0x550 [ 497.189732][T25285] ? ksys_dup3+0x3e0/0x3e0 [ 497.194157][T25285] ? do_sys_open+0x31d/0x5d0 [ 497.198760][T25285] ? tomoyo_file_ioctl+0x23/0x30 [ 497.203712][T25285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.209976][T25285] ? security_file_ioctl+0x93/0xc0 [ 497.215087][T25285] ksys_ioctl+0xab/0xd0 [ 497.219240][T25285] __x64_sys_ioctl+0x73/0xb0 [ 497.223828][T25285] do_syscall_64+0x103/0x610 [ 497.228411][T25285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.234291][T25285] RIP: 0033:0x458127 [ 497.239003][T25285] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.258603][T25285] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.267017][T25285] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 497.275011][T25285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 497.282975][T25285] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 497.290924][T25285] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 497.298889][T25285] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 497.315499][T25285] hfs: invalid gid -1 [ 497.356621][T25285] hfs: unable to parse mount options 14:45:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000000)) 14:45:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) timer_create(0x4, &(0x7f0000000000)={0x0, 0x23, 0x1}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) close(r0) 14:45:49 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r0, &(0x7f00000000c0)='net/sockstat\x00') r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000080)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000180)=0x4) fstat(r1, 0x0) 14:45:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x100000000000000}, 0x0) 14:45:49 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:49 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfdfc}]) io_destroy(r1) 14:45:49 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/4096) r2 = syz_open_procfs(r0, &(0x7f00000026c0)='task\x00') read(r2, &(0x7f0000000140)=""/20, 0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f00000000c0)) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000100)=r0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x4) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000080)) fstat(r2, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000240)=0xabf) write$P9_RREADDIR(r2, &(0x7f0000001300)={0x68, 0x29, 0x1, {0x1ff, [{{0x44, 0x4, 0x3}, 0x10001, 0x4, 0x7, './file0'}, {{0x4, 0x0, 0x4}, 0x2, 0x8, 0x7, './file0'}, {{0x11, 0x0, 0x2}, 0x7fffffff, 0x8001, 0x7, './file0'}]}}, 0x68) write$P9_RFSYNC(r1, &(0x7f00000012c0)={0x7, 0x33, 0x1}, 0x7) [ 497.578739][T25314] FAULT_INJECTION: forcing a failure. [ 497.578739][T25314] name failslab, interval 1, probability 0, space 0, times 0 [ 497.612160][T25314] CPU: 1 PID: 25314 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 497.620168][T25314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.630224][T25314] Call Trace: [ 497.633535][T25314] dump_stack+0x172/0x1f0 [ 497.637880][T25314] should_fail.cold+0xa/0x15 [ 497.642488][T25314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.648340][T25314] ? ___might_sleep+0x163/0x280 [ 497.653203][T25314] __should_failslab+0x121/0x190 [ 497.658171][T25314] should_failslab+0x9/0x14 [ 497.662681][T25314] kmem_cache_alloc+0x2b2/0x6f0 [ 497.667538][T25314] ? find_held_lock+0x35/0x130 [ 497.672313][T25314] ? kernfs_activate+0x192/0x1f0 [ 497.677263][T25314] __kernfs_new_node+0xef/0x690 [ 497.682133][T25314] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 497.687595][T25314] ? lock_downgrade+0x880/0x880 [ 497.692457][T25314] ? kasan_check_write+0x14/0x20 [ 497.697400][T25314] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 497.702957][T25314] ? wait_for_completion+0x440/0x440 [ 497.708256][T25314] kernfs_new_node+0x99/0x130 [ 497.712951][T25314] __kernfs_create_file+0x51/0x340 [ 497.718072][T25314] sysfs_add_file_mode_ns+0x222/0x560 [ 497.723459][T25314] internal_create_group+0x35b/0xc40 [ 497.728757][T25314] ? bd_set_size+0x89/0xb0 [ 497.733183][T25314] ? remove_files.isra.0+0x190/0x190 [ 497.738483][T25314] sysfs_create_group+0x20/0x30 [ 497.743341][T25314] lo_ioctl+0x10af/0x2150 [ 497.747679][T25314] ? lo_rw_aio+0x1120/0x1120 [ 497.752288][T25314] blkdev_ioctl+0x6f2/0x1d10 [ 497.756885][T25314] ? blkpg_ioctl+0xa90/0xa90 [ 497.761484][T25314] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 497.767310][T25314] ? __fget+0x35a/0x550 [ 497.771479][T25314] block_ioctl+0xee/0x130 [ 497.775813][T25314] ? blkdev_fallocate+0x410/0x410 [ 497.780842][T25314] do_vfs_ioctl+0xd6e/0x1390 [ 497.785444][T25314] ? ioctl_preallocate+0x210/0x210 [ 497.790562][T25314] ? __fget+0x381/0x550 [ 497.794726][T25314] ? ksys_dup3+0x3e0/0x3e0 [ 497.799161][T25314] ? do_sys_open+0x31d/0x5d0 [ 497.803768][T25314] ? tomoyo_file_ioctl+0x23/0x30 [ 497.808711][T25314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.814966][T25314] ? security_file_ioctl+0x93/0xc0 [ 497.820085][T25314] ksys_ioctl+0xab/0xd0 [ 497.824255][T25314] __x64_sys_ioctl+0x73/0xb0 [ 497.828859][T25314] do_syscall_64+0x103/0x610 [ 497.833462][T25314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.839354][T25314] RIP: 0033:0x458127 [ 497.843259][T25314] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.862871][T25314] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.871292][T25314] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 14:45:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xe803000000000000}, 0x0) 14:45:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="31000000030000000000000003000000000000000000000010000000000000002f6465762f73657175656e636572320000"], 0x31) [ 497.879272][T25314] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 497.887248][T25314] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 497.895223][T25314] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 497.903207][T25314] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 497.924426][T25314] hfs: invalid gid -1 [ 497.957423][T25314] hfs: unable to parse mount options 14:45:49 executing program 1: 14:45:49 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xeffdffff00000000}, 0x0) 14:45:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ftruncate(r0, 0xdb30) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:45:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00?(p\xd7\xab\xfaD\xb2\xd9.\xa4#\x053\xcaiY\xb3B\xf5\xbb\xa8\x9d\xe7k\xdd*\x87\x9a\xa8j\x19er\x91\x03\xab\x8e(\x1e\x991N\xe1\xfekA\xc8\xc0\xa1\xcb\xd8\xdfr\xef\xfb\x80?)f^\xd8\xff\xb4\xe3i\xc2h\'3.\xa8\x90d$z\x99\x00\xe7\xcc\xa3\xad\xafj7\xfb\x14HZ:U\xc1\x84\xb8\xbb\x8c.\x00Ey_\xcdS\f\xdd]0\x06\x9d\x9dh\x1a\x14H\xafP\x0ef\"\xe7_\xe2\xf9\b-\'\"aer\xe8\x03\xd5\xd0\xba\x8ar\x1e\xb4\x9cw\x83\x00\xec\xe9\xd1\xb9\x82\xfb\xc5\x9d=\x10x\x04)\xc3\xb1\x13bVh,t\xf2>\xed\xff\xe8\xb9\f\xc5\xd2\xc8\xe9e\xe1\xd1\xfc\xcb\xbcO\xdd\xbe\xd0\x9dcc#d\xdc\xd4') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) syz_open_procfs(r2, &(0x7f00000000c0)='net/ip_vs_stats\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x801, 0x0) 14:45:49 executing program 1: 14:45:49 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 498.182601][T25354] FAULT_INJECTION: forcing a failure. [ 498.182601][T25354] name failslab, interval 1, probability 0, space 0, times 0 14:45:49 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x80, 0x80000) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000340)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000100)=0xe8) syz_mount_image$f2fs(&(0x7f0000000300)='f2fs\x00', &(0x7f0000000380)='./file0\x00', 0xffff, 0x2, &(0x7f00000014c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x6}, {&(0x7f00000013c0)="6e336a23f8310971ff5e81ae5050b66e9acce83b27a3de3ba2db811f429bea577f8be02a29506c117963bb212c2f48e1f363cd3eba189832aea39353466f10065c04ded33061057b467e8960d1014c05fe27794e97af6ebaf8c2a5c4494db52492fb85225cd84e98913689dc0d1c738ea92ad45d0163a204a2447d9c211eddd150cd411d4cd1fa4bfbf3bb40f0185c5c2e8aba6c110e260ae1b2994a5a3bcd6df7654482c5cf0a706435983a93902eba7f0c5fdad4d3b6572fe207bbb00e156495e3ab3b7e2d415ba09bfbd1e6a964713bf92088f8d5483405ccf9c21c002b5c66db58b62e7d1d7e33cd09", 0xeb, 0x3}], 0x8, &(0x7f0000001500)={[{@nodiscard='nodiscard'}, {@fsync_mode_strict='fsync_mode=strict'}, {@noflush_merge='noflush_merge'}, {@jqfmt_vfsold='jqfmt=vfsold'}], [{@subj_type={'subj_type', 0x3d, 'bdev%'}}, {@hash='hash'}]}) r3 = getegid() write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, 0x6, {{0x4, 0x2, 0x3, 0x31ac, 0x401, 0x4, {0x1, 0x2, 0x80, 0x9, 0x9, 0x8, 0x100000000, 0x5, 0x8, 0x3, 0x8, r2, r3, 0x1, 0x2}}, {0x0, 0x6}}}, 0xa0) close(r1) [ 498.241224][T25354] CPU: 0 PID: 25354 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 498.249240][T25354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.259296][T25354] Call Trace: [ 498.262601][T25354] dump_stack+0x172/0x1f0 [ 498.266950][T25354] should_fail.cold+0xa/0x15 [ 498.271550][T25354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.277366][T25354] ? ___might_sleep+0x163/0x280 [ 498.282227][T25354] __should_failslab+0x121/0x190 [ 498.287198][T25354] should_failslab+0x9/0x14 14:45:49 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfdfe}]) io_destroy(r1) [ 498.291719][T25354] kmem_cache_alloc+0x2b2/0x6f0 [ 498.296674][T25354] ? find_held_lock+0x35/0x130 [ 498.301456][T25354] ? kernfs_activate+0x192/0x1f0 [ 498.306491][T25354] __kernfs_new_node+0xef/0x690 [ 498.311357][T25354] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 498.316800][T25354] ? lock_downgrade+0x880/0x880 [ 498.321636][T25354] ? kasan_check_write+0x14/0x20 [ 498.326554][T25354] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 498.332096][T25354] ? wait_for_completion+0x440/0x440 [ 498.337365][T25354] kernfs_new_node+0x99/0x130 [ 498.342114][T25354] __kernfs_create_file+0x51/0x340 [ 498.347219][T25354] sysfs_add_file_mode_ns+0x222/0x560 [ 498.352597][T25354] internal_create_group+0x35b/0xc40 [ 498.357863][T25354] ? bd_set_size+0x89/0xb0 [ 498.362263][T25354] ? remove_files.isra.0+0x190/0x190 [ 498.367554][T25354] sysfs_create_group+0x20/0x30 [ 498.372392][T25354] lo_ioctl+0x10af/0x2150 [ 498.376703][T25354] ? lo_rw_aio+0x1120/0x1120 [ 498.381294][T25354] blkdev_ioctl+0x6f2/0x1d10 [ 498.385868][T25354] ? blkpg_ioctl+0xa90/0xa90 [ 498.390467][T25354] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 498.396272][T25354] ? __fget+0x35a/0x550 [ 498.400422][T25354] block_ioctl+0xee/0x130 [ 498.404728][T25354] ? blkdev_fallocate+0x410/0x410 [ 498.409739][T25354] do_vfs_ioctl+0xd6e/0x1390 [ 498.414328][T25354] ? ioctl_preallocate+0x210/0x210 [ 498.419422][T25354] ? __fget+0x381/0x550 [ 498.423573][T25354] ? ksys_dup3+0x3e0/0x3e0 [ 498.427968][T25354] ? do_sys_open+0x31d/0x5d0 [ 498.432554][T25354] ? tomoyo_file_ioctl+0x23/0x30 [ 498.437471][T25354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 498.443704][T25354] ? security_file_ioctl+0x93/0xc0 [ 498.448808][T25354] ksys_ioctl+0xab/0xd0 [ 498.452956][T25354] __x64_sys_ioctl+0x73/0xb0 [ 498.457538][T25354] do_syscall_64+0x103/0x610 [ 498.462111][T25354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.467982][T25354] RIP: 0033:0x458127 [ 498.471854][T25354] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.491433][T25354] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 498.499823][T25354] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 498.507775][T25354] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 498.515726][T25354] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 498.523686][T25354] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 498.531636][T25354] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0xffffff7f00000000}, 0x0) 14:45:50 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) [ 498.545311][T25354] hfs: invalid gid -1 [ 498.549527][T25354] hfs: unable to parse mount options 14:45:50 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 498.684191][T25363] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x224afa44) [ 498.707833][T25363] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 14:45:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="bf3448607f14f58085e5946742f8d2a2d03525997f76f72f9e72e7e641f29f6de97bb0d6e4b29f694192ea1509152e17fa97e43d1f6875a2fbd939d5957dcec254bcf70de170c98a4a62314af7666eb1ee38721a5b2c96c083a993247be49e936c7202e0a1c232894bbd6a5c105b83acd899f4537c8e2aee9db6e6ca1861e331e1eeac4c85237ff3f4078489c77e4e74bd1b325a7b25343a0e40047b6c2d7d2f5c3a8de36bc26f4c2c2526fdc989450678e72813d261dd8ae1b75416d41a357023d546088f14b0078aece119d00249237cfd1b5a1cb27d1511", 0xd9}], 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x400) 14:45:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x3e8}, 0x0) [ 498.727958][T25363] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 498.748354][T25363] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 14:45:50 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) 14:45:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xd5) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @broadcast, 'veth1\x00'}}) 14:45:50 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000000)="22b74743a17e83ba63eff571849f5ace8c347e8012af94f0fb34b1e184c00c46bf8c71f1c2ba90018f197189d6db300b61210ab8d0d6ff4939324bf63aecd9bfbfb2e932c191b80aeaa16a5d03ac47e1e080fd8837a0612106") setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080), 0x4) [ 498.830315][T25392] FAULT_INJECTION: forcing a failure. [ 498.830315][T25392] name failslab, interval 1, probability 0, space 0, times 0 [ 498.862155][T25392] CPU: 0 PID: 25392 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 498.870151][T25392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.880210][T25392] Call Trace: [ 498.883517][T25392] dump_stack+0x172/0x1f0 [ 498.887855][T25392] should_fail.cold+0xa/0x15 [ 498.892493][T25392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.898315][T25392] ? ___might_sleep+0x163/0x280 [ 498.903177][T25392] __should_failslab+0x121/0x190 [ 498.908122][T25392] should_failslab+0x9/0x14 [ 498.912625][T25392] kmem_cache_alloc+0x2b2/0x6f0 [ 498.917484][T25392] ? lock_downgrade+0x880/0x880 [ 498.922339][T25392] ? kasan_check_read+0x11/0x20 [ 498.927202][T25392] __kernfs_new_node+0xef/0x690 [ 498.932063][T25392] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 498.937530][T25392] ? wait_for_completion+0x440/0x440 [ 498.942828][T25392] ? mutex_unlock+0xd/0x10 [ 498.947251][T25392] ? kernfs_activate+0x192/0x1f0 [ 498.952192][T25392] kernfs_new_node+0x99/0x130 [ 498.956880][T25392] __kernfs_create_file+0x51/0x340 [ 498.962004][T25392] sysfs_add_file_mode_ns+0x222/0x560 [ 498.967394][T25392] internal_create_group+0x35b/0xc40 [ 498.972682][T25392] ? bd_set_size+0x89/0xb0 [ 498.977115][T25392] ? remove_files.isra.0+0x190/0x190 [ 498.982415][T25392] sysfs_create_group+0x20/0x30 [ 498.987274][T25392] lo_ioctl+0x10af/0x2150 [ 498.991609][T25392] ? lo_rw_aio+0x1120/0x1120 [ 498.996206][T25392] blkdev_ioctl+0x6f2/0x1d10 [ 499.000805][T25392] ? blkpg_ioctl+0xa90/0xa90 [ 499.005403][T25392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 499.011224][T25392] ? __fget+0x35a/0x550 [ 499.015390][T25392] block_ioctl+0xee/0x130 [ 499.019724][T25392] ? blkdev_fallocate+0x410/0x410 [ 499.024785][T25392] do_vfs_ioctl+0xd6e/0x1390 [ 499.029408][T25392] ? ioctl_preallocate+0x210/0x210 [ 499.034524][T25392] ? __fget+0x381/0x550 [ 499.038692][T25392] ? ksys_dup3+0x3e0/0x3e0 [ 499.043111][T25392] ? do_sys_open+0x31d/0x5d0 [ 499.047713][T25392] ? tomoyo_file_ioctl+0x23/0x30 [ 499.052675][T25392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.059196][T25392] ? security_file_ioctl+0x93/0xc0 [ 499.064320][T25392] ksys_ioctl+0xab/0xd0 [ 499.068485][T25392] __x64_sys_ioctl+0x73/0xb0 [ 499.073094][T25392] do_syscall_64+0x103/0x610 [ 499.077697][T25392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.083588][T25392] RIP: 0033:0x458127 [ 499.087484][T25392] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.107084][T25392] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 499.115603][T25392] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 499.123577][T25392] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 499.131570][T25392] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 499.139543][T25392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 499.147515][T25392] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 499.160013][T25392] hfs: invalid gid -1 14:45:50 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) [ 499.213596][T25392] hfs: unable to parse mount options 14:45:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="f9f0681708b00a8a658c9ad87172d5b8ecb16a528e04d07610983c954a3dbadc07d5080c083a0aa39bf14339e1af918a720234027a999de6c067ee6bfe620e6d56b5783ccf3ac82b2cc2c959a7eccbd34debbb4a8db125db0f46e637bc1527c31052513f5475806031a615c59608cf4c3da9658ec0090d467ed4057e5e36d0442b92572ee6ac16b399a58c93130ef4e7e42ff9b0a0c8b8f50b9ef018dd9149a097c9714b084d2bccc182cb1486f500ae5029dcb928de627408d48e0fd4def8bf760108e7c1e41730a2cb038c7c33ceb9a477636e389e429efa96343b17c60613e3d56c49de59c294949edf400ec971ada93c12e7cd28591c1023d93c874c4989") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xe803}, 0x0) 14:45:51 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfe00}]) io_destroy(r1) 14:45:51 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendto$unix(r0, &(0x7f0000000140)="a40ad2e3c93e1b9c6efc34f6a018171f0b85f4db822e398f6f157519ff1aa6988474748462698bc4f77032c14a637585193cc142d55dcae882", 0x39, 0x10, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x80000) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote, 0x0}, &(0x7f00000004c0)=0x14) accept4$packet(r0, &(0x7f0000004900)={0x11, 0x0, 0x0}, &(0x7f0000004940)=0x14, 0x0) sendmmsg(r2, &(0x7f000000b880)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="280f77e0486d4ffccbff0d8f60d7c03d55dd06b2cec324caa4304e35fa198057ec88500d92c0e41712a07bd4a7d984ee61df5ef88e75b228a47d17c57a2f071ae8478ebbdf0f27fe86882f28e4f9e27e8231117cd78a211d80223624cff8bbc67688c5535a152cd466175d668ccc704043565975759388803dc7f2a279c1e3bb428e8eec145c656e96a2d3ca20e394c44b2b5f149d68e9e95a06bc39becac51702a361aea4fdac2017e461ea083c0c0fd5f96a4e7b7775f3ba67222750179647759d9b9f1c91d2e3abed864ca47dac3cad169ed39521ffc47f50d4fd13", 0xdd}, {&(0x7f0000000200)="fce45232990d7bb0e3a39f28301c42fd255d56f3d102a95def3e7a0b94b79683817b68a5a229b807408bbcfd893914fa8f0a9438ec8f2cdc6ebc", 0x3a}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="38000000000000000f01000001040000344353b2a2e3c23ce7527f960045620c8db2c32658bfe20b406f5632262db4b7279c35eb6200000068000000000000000b01000005000000458ffb781624f8789cc35a200ab0a108279d84721437168710f7d935a0cc043d29d56a065286c03c2b1916a9bfb3a990730acd1d2d8adff4e93e85ec3a1c822a6721caa4b6e930996879cbc04d858ab901c9ff5dc4f9a148"], 0xa0}, 0x5}, {{&(0x7f0000000500)=@can={0x1d, r3}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000580)="914433f879f82a4da0e3beb63bfe600c278dab5071dad240875378b3fd262f", 0x1f}, {&(0x7f00000005c0)="461714e6999b673b8677d76846301f67487b678d6c05e202f9105ed5d3d332f27eb05e45bb41d713c57f9880b873a469a480ad380736c460e231462b89ed2bd11f11742d464fab5e121e42fb920d3b353f916bc28dfa7a6f8e575f3f213dce095e083d37133161dc7423fed1ec795dfbd960f774f70a686c010d173006cc51561cd6c63cc18eff5159e59c21a7f471fa6545a947f40fecd61ba1ac17adc4cce6b07f4eb2dd42ba27d67923bf7b25b665bc46bf04113c0c75694567234a9f4dd6c765072388974ce383a95ab1bc9076e68a4cfc5d7c925fcbccbdf31919f0795f86f4789af838703f09f5ea41b82f6120d31f0d", 0xf3}, {&(0x7f00000006c0)="e443b789d61f92245752edbfeddac4bc9a8e0fb172c7ec4630b255f4bb1293b9b24c9d71801474560519d296f6df025fc04a242061756c1a48d08e1dccef189eedc59a1123152cf421ba087815ce37cbb51534df45447dc4e9102452ab82a8f6334efe3b4f5f3d8f33988b32626d6bebeab8ea9aec16d6a5bf497204ab66f01b71ec9972ad37e6e708678f124d87a1d378252ec92e7997e0", 0x98}, {&(0x7f0000000780)="ffb9a06206645c517e", 0x9}, {&(0x7f00000007c0)="5a9755bda12cfbc68a0f3138282e5edbd41d8cc9bcc0be081068e8dc8ea0bff466873713c3eecda17e308a2bc28af61ec3b571ce4002cb7ea9a2fc858cd1f8362ea5adfc115cf437b1322bcf0ae6c9841f42ff20c22091b0a1f824e89968f50fd65dec00c8094b5b4bd300c5e1f1f8e937db4182", 0x74}], 0x5, &(0x7f00000008c0)=[{0x38, 0x11f, 0x80000001, "09b3ea192f497d83841bd807ae137a7612bba4f6d595fd5f7cc80716f73db982ac7bd50f84225382"}, {0x48, 0x117, 0x6, "0675728cb830283839441d1032b9c6d5a3958f5df77b14f3bfce734eede3c9496fbfe908973ef9d14967a8c72e376b32f265"}, {0x1010, 0x103, 0xda12, "75f4b867c2b19b427e2cfff00d65767b9479acedb08fd6e62863baf641fa9e8997684f9ca9de7c9406f4d3ef69eddc0bda5f8d38526261970b37e5d709ea319842f291c37019d247957dc3597efafbe121ae78eca8290af2a558500324884ecc7c21948d5006f37f6f74fed36bc8cf9d0b59e41ac63b1a32bfcc1a8867c03d452d043b97360ea2a78aaab0fef1688dc9747b6fcc3d30947651fbc00b6911f4c7a703321fc3dd0a799372ffe683ba7f07a6e6ae05f71e329cd5dd749021fc393552f4a2a979a66f8cf85316a4a94e2edf3bf9f3bba33f0d24e34bccfed05dcf2a46e918ec9576c9120bd3c22e339812042abfdbd932d9255bc6c16106958dc8488f471e5acc455924fd0b8220737b683b9cb9727c51d3d5eeee00d4f5235c64b1caf3b73c20491b094996cfa5e0fae53875ae3ef45cf25080406de4ef6155874eb811457440baf174e592d9b8502f19fac6bc8a713fa122d10036dfcabdda4c79fb0122d384fde6ab1ea11fdb1356c176fadafc69aadccfaf3f2d7d0f3b53a55d3ecb4e4ba2fd4fdd208d6e98b8f2ecffd02423fe4da7dde2a955285aa1eeed199a6cb19e71ea2da6d34633723d95e1ffae70875262c2fdcc992422a1dea8a219709bf68563e31efaa52138bf6322c21a264addda84bb28f5b460f99baec968f79377c13dc6cd94ab685d551326da10b944763396701992a219bae63da54554b7fa0054d938afa12d72bdfe1a8841099d58146972dd9950d377e51a423ea1439a42112bfe3581fb0e28331ee428dd233a55608314339c5e0fc917091d93c4c32ea73498478c9aec22c9a715ac1d98c1b9401ebcd0c4eda22ebe39503febab868eef7e234d23dbe3a0fd0026ed303455e0f3a7eed3635be30f0fd99760d6b1df59df4a77a5472671d5a3131de7fc185f7fbdcb03a0ad04945b1506657783e98a2ff262e7931720ef72606cafa6559cd00ec7135859c77bddd3fe244957fa8b615d2043fed85955426c4197f88d6aad46ae7254b6bcc17d16dec7bfaaa07fa068ef1f61e214e82662b3a0655feb033b93dc720243fe6d5b44e6a72969bf251ba2b8bd7796f6737a93251419a06af8244dfa9da9054bf76b4b770ae64d2016c1765b92fbbde3184c2549268d89c4916d817e9435cdcf3e43a5df59f431ee41f7076a236d4c188bfdaf6ae28c463cb6a6c9eeed820dcb21b2f6b2e32badaa39e6e151005f7989161e119f3a4159c3ba54e6234761fb7420f9c9d1a0d2f6494a94e520d4aae40f1d7f642ca5de7e785abbe954071d3fd39898a7b14387027f3c84661791033f445b9e7879eeeebeb5a79ce451eb7cd3263439f1f0a840366d81a116cc10eae7dd57ad26fc741dff5dadbc025c381daca9b52805819abfa734e10f0b8479c0a059b9115a376b355862926b9f3913426030bbc5090b09c8bf00daf1552e4824a0b4e99a01172cda9ca654061a502945caf9b971472c4a37ba7f139b3ebd96932f682f1566f19943a6b043d9db9ca66fd5419e4142daa92029378ef96414f65572939cd3ee0e3caf0857c952b14ce15704bc321da0c924c9caeb820b5dc4ee425b467ac2df686fe24635ec42833a656ad2562267f1888455849864feee2834736031f61b07f104beb71e266dce3a8057bf18ac7c8e2e44aefc123c1ee99188a065cb6d85ba705858341f17fe3da7364ed30431fdcd37b33e2daa612d2bd4d00fc9f70118daeff0ce2d66a2d7820974febe4a383abc36d50c7ed60e8d15e1a7afc3f4d026fea994b8a6a34c408ec84f7d614d5d4e6c6f3dd1addb4c1d9a929bfad67750ab386978b86f149caa001d41a17e6830c76d003b75329632b6643b94271d234efbde88c443c5242d5949b0124d50f0e545f32db143e32650abc8fafe8983be6801f4e23f090c2d7321d5d7163954dfefe1b99538a56e2d736b0b6ec3774e7836c543b4e2c534c210cf06fb6df48d53b1c63aea4fbd025cf6629e1635234deaa348b018160e1a1505e57d835e02429e749cfb61e635adf9152ed8f2a8cc6f4b155be671ba8bebb2b8060dd714966b867d64389d9c06036d05f94f3e06b0d7ea22439d07780d01e8fe48507336cc83eaf0cbea7ac2e61877fb87f756b4580edcca9d6762155484d891f8e11dffe6835c8c77d841319637e328b2581fcb8fc1bcecd6c85b5dfb875578316f860e6f210ab1429be0a9ae26f1b6b3761008297ed51557c3e21e3bd2e05335139c5941d1d34b547d78486b77a63339dec371b2a609023f7d5f6309a57692f0e4dc3c5eba3f83720cfdabff09e61ec9501dfcb7ee3e7af0f8e570d44cc2338dbc34b38d7008e97ef28dec9d45475d4e8d9c8f9d5cbd6817b7d32df56d4536d1ff45850b64ec2be5225a384046a80e6af973d8d095df7262aa3710ee8d774cc77ab949ad89a268b5250b3a84766ebe15cafb196fdce5495dcca87fe23befaf8933b5a8d806f95113cc225cfca566e7ec7185e696fd7906f7bdee3979043fe5c9c277ad7470ba5858cbac101166c1f67b8969bd65b1f1e147e8319a65b64fe165598e6d9f93f3bab90d7b998ba5e882a3054095d86622238b328cafd715c8c838bcea0fc774b710d28d98ee9c12e16d6816ba4c1c35a1fa49fe1131ee0fc3e6c2012e40d3ff03576fafba3011e4f2942d8280d713d50bebbcdb84b61b14a6901ee691be7a1f1f05e8f1345ba26b7f7997c9505cd1b0bf03c807b6d0b1c172a1a6ff9fe9df8e41025b456817111bbef1feccfdce09cacded20c86263446db9cae34210ad2daf85c02bf8e3dd7e1b00e357353d309825c067ac6a07d06f46863dc41138f0a7c28dab84471b65823f31524d9f69d8f6c3aa41012be3307612ab4b646fcf87293572150158a324e7731a6dbdbc6b441dbf85163ec98637fcc41ec703529d0028eb2f551ae584379dd2bc4831a3603f4489b63758c186899b74a331d3163b0c19c256ee0d06f572c84f1050c08f71421da33e557834a2ec7374a3da4e8516a0cf78c219d28b2fa868d137763fe1cdbe0290ebda1fca0db6b7665c2303b391eff81d874e869c8533dd0dca59072eefbb3d4f3576c9ca0f702e82beb48c3422912da4fc1380414f224857f5ab806a705190e890817fbba971bc87aeafd6db095c89494d3ffa1d74616d2b8b831a013ec89b6b2a76b91068b72a414f8e9f8be8cba1a00f3e5a3a57a516b6a4d5cb60a0d54c642ba563577411d3c87503519325743de3ee90645c6423771f201645d8489f1d09a7d4c0386992b25fbfe2e8760618cdbf283b3b4a040aad6a823492ff6c0ddc0e358c21c26566728d82457ce64c38463edbca037a1d832f025b90a258fdd20a93c94dabfc406e770735da13373ce5b2d8fb96202445b453356b1e63b8437b52c15a09010425955eb7b29dcfce4e6d51f64aa5e79b64995c9fe9002943496a551b411280134c5d49a5d60316f13db62ff460080461b9ab820ff027cb47803fc7cf9e461292723d320b3eb7adaeab4450944000313aebba56af1bdb3156b21c3294340a1b7ed48f7514bbaa69acbfb8e7ba711267ee6c0b23a9bbe758f0e8ba7c60a4d745100a086688584bd46a4a80638e6787eacc6f852d92b973cf4f612f3e0ad00f58c6c0a99030e904585685764fa2cad3cda416e7aeb242171725a79e3d8e27d4a6431b735134a84646caef14d06abab9d33d28e7a5a4dfd0e5e5bf43fbf080ddf5e6ab9495db4ebf0071df27087ca9caa64f2027e29274f2967e7c5aa538ee3a60a75b427871fd6f7101b86c66811675ef863bc3671affe3412f0d93f7082da2666e25000d00d0bc166550622dab094e18758614ac59f6969287345b5a6d49d83da74e2d2026ea3fade1e750b789e971d1413ada0e69817e987b6caed43c6e60ca3ff0a221b3d31f8fc346ab3ab9e3bba6a1b2b19c406dc2d95967fd081d313add765e9a8ee15e471b7a81165e78742518943353605c34d8b545bbda69f410e742933e2b0ddb418f4fd9abeb798c4aca2dcc282dd41cb30405961e21e2791883e3355b4029fd41e1a200f1483e4dcd810efde9312af60a73a7e7a03c79fb0f1e11484efbb01aa830630b5afc26ea80e5395a0922b4b6f193984911fd30b0516a030fe1d286a2745c699c964a1acd742a8464b109acfba68f6ede0f957b9c0d383854ecae50ea607cca8d6853d2d2d2301d84f154026890731414385af6f6f9b54a58e4fe1ce13409cecf6de73355046afc825ba2628b454df7f05d3a111293ea76f7d69991c107514ce7e8bea41fe156fc2fd84d420ab3fc62d82d9bc67bcb63cef3fefb57724384b4161097f16825359c9722e1aa7e082a8e9cb948e5fdbe86b78ad2655e9f13e28761890c6eaaf441212d4e94db28b673e601f5dd80ae966549015c9d4190c61db0c54f05dc538c80714f417feae4e599d18bba6da9e224129219064fba8241deddf26704cae183faea80ce7b8e698e787fc53b9907f6fad9abf90499529dba49ea1dbf619ffa831e0e19f79085c9b98c82103bd4d842a21b6e9fd7033e5542ec5a5ef3dfff3555e175603c92532fba456189d0644352afc817c819872f512891e5f43b40d79fc0a0046b80c79091d4cb874a2a121f2290641158c4d41460fab74fb05cc4bb27878270b1ba3eb391a54881597be0c7d1c147c4212fe54d13c6ca62b33a5a47d0c9e4d95408ab554d09d60ce9726a043b4062dcebc5420894bdb50c76ec71d2ce6f90c8f265e0cfe01dac5ef40f5e48dc0abf8012d06f48ae4745362cac309663693d06fcb3f9ddaf539f7718c257230d8e69f6d0eacf60492c001453a119e51d073da7c66c66abee5af72499ccd1f8dac8c58e28acdb57cff9dd512ab0b42651c127a6d427d8b606a2c0e0083ea2dab87e66546a5a218ec7aa5b8c73597a21a5c4b01957d002fa48c8e9d3fa9a6cdb0e546629c45cecadfb601e51bb85f74fc437e82220eacd3d21e5c0daf7f16bf02809c3b0e63e076905ed3e681e9444e0944d14c8c36271cfbaef69955e45d760c960bfd65d600a29130d6fd6e9ac4db29902deccb675324edd86dbde9a0d30504186143dbe52248d8956d7a57ad0a5c009a63de5388d28ce4de2b5a669b0fe8465b9e5879f8bf6a2d631699446b3b37d2a3206ee585f127afbabaa1d64c773ab62c6383105f70a6c213407b687afb4c048432b0119b2944e6973bb9cce9c8717a4a4bfc7792ccb05bfd1e258aea53b7bed1ceaf3dcbd87040d42dfdf47083062bcb60b29027168687c2452852f0e1bf66738efb695e9450673617ce747e1025d46b857ca1fa78b843b27a6db3bfe644d5e093ee7f73fea563b74dfe38c548dee499de3e226ba3d6bf76acfde9a589166734718dda877c3d02292704fa3f36d8682b0bcb4a0c7a0c611a749c7883e440db5aad52013efb43ae4596ff8a74ef09f626119a7e53da583776f6cd019dbe5d010e28b7fbd85e3b56255de21cf8df0c8506db796aa0ca188c8043166032d6c260ce72a9741dd3e88471fb2c20f277a853f72f7281e3eac2541c50d5d58be0f447546a08d3ab04c5775f740f028f2b3f000aa2016c65bba290c1f7f3289406e5587346db12c5afbab226b2fd6670cee1785ac9cfdc34c05364c53790b8c779e93ccfabd07dcfc4f18bb1c9b6a4887312984d12fc0a1654a8e327375cf8860c62065835f1d36855379df324b3fa80cf73f1624976793d396b94f19c50a94417adeaf7144b709ff70430db74bd71d3c3349e4da9b8237c9058b7b7e1ee4a81d14124b33c91385a2c1e98ffb7b4462f5"}, {0xb0, 0x18c, 0x8, "02aa2a7e9e9eb5d74b843991b27bc669384a63c185cb0dd9d49372bdc5efe9a3a0bdfcb6146d841565367bf81bdc5c77329a90abda8d3586ccbe87f84c075296b6f59c6f5cd913871e3ead9e518d8aac1ca4a86b890f51cb89845fe05f3ed6ad4c9cbbc0ceb2bd963e9059a4ee29080bc1c6e8e388c4d40f6dbc0c3c23fcd2dd8bff76891b89184a8c9bf55cd5c601e1f771ddd30022015a052c"}, {0x58, 0x10f, 0xfffffffeffffffff, "796cb0d2487335b3b402ed10436c0f786ac5244ad949028b134bc18af9e5e387e45b001873241bd8a4fc2ef80c12c4a43795bb9a46297268ed675f3d7be538339a82d491316b7d"}], 0x1198}, 0x3}, {{&(0x7f0000001a80)=@llc={0x1a, 0x0, 0x6, 0x3f, 0x1, 0x3ff}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b00)="377f0c8ce853ba2dabf4ce1d73313816e4bb53eb3f55f1b13be98195117b14ef60ef239af034d11ad74299e2ed03c1fa22cef0e842e05bedd177ac87ebac06af9ceb60fc3c75a0c523eb43d504f918ecbd83505a1f33560842e4c414a02b8b6e6c48b196032a4ed53a654676f20c3d27c9164faed1bb3905fde97bac43f1904e0f9d04a0c88a42b4ba3409fb08c7ef54ca9be2449847fa9366744c3dde678eb4fa15cded48248dc698a32d5ebfd381209a83da65ff9f32d6773345adae7e7b98f206d3fb0d91f8fddbc02a5124f775398584b158713253c37743788b230903ca85021661b86b", 0xe6}, {&(0x7f0000001c00)="96b60b02ec61c6edc68cccdfde2ac0346e0f8a062f5c757fc33906599df307979f7021a4f2ea857a78faea3c59977237ab65", 0x32}], 0x2, &(0x7f0000001c80)=[{0x100, 0x10e, 0x5, "05ee0c118f9af9987e0436e623fee5a07a048271e87f055c18e7444a5fb4f56ad1145d21ed56302e3a8915d387fada56d6660a3e3c437cae424f5e34f4c6c8c607d3adb840e8882580b636ab6861cacd5541a2ee25a6cdd3a3a385359d7ac1fd4af1cd43f9e72cbe6c771827e6c8ef520cc294a7246b98c053aa331021cc5973c5b222eb2b044975c9c88b8486b4e66b87cd356a81996a032248ae746c5b3e129b30188b3a7ef1220d8feb46992ded5ab1872b331b69520c85a6b2b2765e16c35dabe8d8e7db27e4834990ce683df90868496a0df0fda533fc3ff7910429030a36f922d6c8ba565b62"}, {0x100, 0x1ff, 0x0, "f7983f1c3180f8f4de9ba91352798a68f8f56c54891fa4aa22e066d467f908f500be43f85f008821e6a1b1a10193a7bf3548235b60a1eb6380cfd127ed819cd38eb03ac772688eb5a6ce24f3d93c77532837012e8eb326a502b1479de529cd304978481ba66a7d83380d67382fa6b01fc99bc48ce666918a4c38aad1dc7949a983181e68b38dc8abecdb96e2c68ec011291b11aeca67662a0e3e37da534e779a7091265fcbb5d35cee4cb2fec042a7a8628052d1196aae7159288d4773091b888e8e26ad5875884ee72264ad8ff3227033edefca3ffaad09c58a0f9b8a50669bd63cb27092b45b2fd69d36"}, {0x78, 0x10c, 0x9, "3e96c4daa0374fe4a7a15160ad5c2e5d58af5957912856039b0d930c707b49978d64d3bb6b211334375b7d54eefb0ccd0df4d039ddb89672d7545bcfe3c74a10d83e2b485555b03ba831ef1d3ef98129b4fe95f2fa203ff2ccdf6b214d07aa2403cb"}, {0xd0, 0x114, 0x0, "87864a269efda8a49a8f07a054ae75c4c6c8c77c7e01ca686223b311eaa91825b67be28308d7451a86f41d4d07f3c9d07ad7bea2343c3b88a202c241a02103d23cc06c6b6fe2be2e2ff01612e5939437ffbff1475c0b34179d2a448d54ece5e9757c0624d806b7e56f6fa4195b8a6df04847fa063fd53e3e78a0f4e4f854b45ebb30879823da60c6077d8b3d3286b554af109f053df51969429a5d6b6c3189d8f913ba72bcd6abf202ed3c67676fe2204283baeb19a4f2dc47"}, {0x60, 0x11c, 0x1f, "04c3ea7ec9cdfc0d1e37a43871459c9c7532ca414502017fc7510002e00641a1dd672f528c4ed21270eb4578a1449f8b0eb3fc1eac9754109fca63b98c24dca4fcc0de9b966486b0a86d"}, {0x60, 0x116, 0xf59, "b76ac5850cc0dc7f8aeb4f03d455137e51d75bfe9e3de4a9c2a89b55c6453a898f9d5f2a1185149dcbf02e7127b61bdc9857fb74c29af923086430e038b3f70f60c48177080ceec788b850aa91"}, {0x50, 0x1ff, 0x9, "974231a81a75f5d5d41674606662b9cc9dea2b5337d6ab8715c688d74135638a418bd446b5659080fe4fc54136fed0f3c875578e4c5c2baed9323b7a668b"}, {0xd8, 0x11e, 0x401, "6a16f03e745927a9d308c061f7f80e88748e64574c74ba0de1ebe2d750f8a40967770c0b3f0ed7e92a0f4245d866b70866a271f67463d198a2a6ff9c4ee565452474af3361a3ac3bde0324b24078b72bffafcb9ce12efd5cad88c0aca48edb307f1168b35ca8864e8ccf1c991babd241a4b410fd446d6f165480c7f1e23eb4a3bb95b91119f4b0ea66d53689df9dcbdd80a55dd520961fdd459a6098a1c8a2f437818d626dd3278d48f4870db830ebdb03bc7c26d521547f9594496a50591d374ff62169"}, {0x108, 0x100, 0x7, "5540ecee95d7f7af595186f442b11721b8707ceb599af924b8fe0eb6899209050a669f9c1ca14910984eaf429e3e91430bf58cf045d60e4861d3b1a8d7e93e82cea4e1b84e0e45f2d31457306b2c9ac2bdff8b13b2c0eb0da123caade628d7f0b93a3f67d2e43e951808eaa49ccc19f0ca69a444ce0ae1d894a655538dc0a38e2b2c1788d3f6e6ebd888c53101006eb6046236f5cdabd8bb18d336cdf2245d22d7591d758212e77aaea9882e9211be7682da25cdf387226e30b3e8b798205300963bd34f53eac9b0e4586a778ab1db85a07b6773e42b0e7e8d489bd0e44a1e3af48f1dea1389da19d899ac9a09d10798a37fefb0"}], 0x638}, 0x10001}, {{0x0, 0x0, &(0x7f0000002300)=[{&(0x7f00000022c0)="f9f473fd9430aaf85c0578ffb816386ae584b114a4b0b48f0654c5488e3cd41f86e851b59e50aa59e9397616", 0x2c}], 0x1}, 0xab4a}, {{&(0x7f0000002340)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x81, 0x6, "66ceb6dc4e924640794340e95c676501abb71ba06511c98cc3fe9217c75383502f28f39e0d16941fc8a97b6c434378ffbcd150cfcfef972e78126b3f12815c", 0x14}, 0x80, &(0x7f00000034c0)=[{&(0x7f00000023c0)="f84c7526b421b0c97555c7e0c195828d52f65298d39870d8e9242e8b41c73eeafb8640c9", 0x24}, {&(0x7f0000002400)="356f3866db6048ff874c6d5c1f366e9b3cf2533dcc7a163f810d3c7beaf5249191efad15240f2e52c6e683a026257cb7a3ecb26ae524a3c0561468e7c3d2d3e6c45b31e19cb008b7a5499fa9476b4e3542f6d536c20457717ad04aaee49960a926dd9dc27a20d24201be7e8176826a9ed12f897d995ecdad3fafbf3a95e1f33940f9d646be8c94c8cefa51304c0936b2aa860b1c5ae78def86a9efab3f4f2d4a7df06f4cca7d9fdb7267f9e76b1eee94b5bd250605ad", 0xb6}, {&(0x7f00000024c0)="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", 0x1000}], 0x3, &(0x7f0000003500)=[{0x80, 0x115, 0x1, "3337cf3097a42283465480057619f8b609e8f4e91a2b1e439b460128e4e57d7028c0618f9a4da2c870c9437c2ba960b6df415ef6ceb1453cbdbf7604407493e660dc5dccba2a30d39dea9134b61e63439ac5ada0720dff03917fb9d261280c6c57906619469b2b8244f46d42db3e0d"}, {0x1010, 0x11a, 0x8, "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"}, {0xe0, 0x116, 0x101, "b510888957297ff38026a6040833b1cf551aaca122c14e216005bf68ed4650efedaa0073d5a177c3832e504c3ec6c9d2a098c196e68d47fed9a0d3fa4eec98fcebc381a5feba83eb1db67827fdf4aed294c13305d4324e3d1a5d15b8e3cbf3da34fc06d195d66b4923779698fb60595046cc30b7b7b8c6daae0cbbc4a6c4f53c6bee8b4848c506fc65666d6faa9954c9585827c0d6b88a3d1f1c31f3a37cc3dfb636aed599a5d5976e0225b29ca612fd60b2fa9072825a0fa3777f8711e6ef2100c901a896ab9e9663fe"}, {0xa8, 0x110, 0x9, "fb83ebf2534c7176c0a5684cddb25c3b4c9813a43d86e69333be79f432e13436e83f528fa3c8826f1e3a05bb21f0a4974341e2612f9756ade3ea9afc818011fdf31041118550a80ef77ce063b6a2a941e2cd50921c4fb6d6f3cc24d6c5724f6db4ae354a6710abd64c60b6ed350de9be32b6d43995a38188a87961842c3660033ecaeceb5973d6b8e4210b679288397b0b"}, {0xd8, 0x101, 0x3d4925b5, "74097164dff2df247adc43c6788db0b08ecb2a11695f2a52e30f93feaf203a77872658a1380b685bf6523b3e68f4266c739d9d499a11e4e595351b84bc85ca284f883cde05ffa26e002cb0e5e89e5c984c2a9427cf01463b89251742713fced53cfdf42be233a5d8f0503ea240449a8e8b9e6bf78fb6415b4bab3ea598dee4d71c59374bed89ad4d8d4f411dc2107699d47e9bd487b8ee2b4b12b507510899f67af096a1aab4d8cae9f78cfa621b550ea761bac03b5b9aae4da04e2926ee3782ded81b"}, {0x100, 0x115, 0x7, "1ca7d97abaf1d26223017006b96b119688ae281811237d6d593e73296ef1b32b3a3cbee95a6749df6b7f1adbc118d2dabcad34da9dcdd8c37a0a802ef0a12bf65c87c3e8de12dca2750e75c61b0a904a2d487124b2b7596739ca26de5d8096ac0cfdf82c24122523281fd41d4f30ed3a88e7a07971d097d72b41fa4e18e67797bac72f201e134a4f231a059928113f38e428c903e14dedaab053f64eccdc38adabbc618446b931df980b4560fad8f60a9cf2b54c752481cdd65e8c3e4eba6978941b86f2f3dc2185f7af7240ece730c070299365f01d2e975c66aad3239cf6720863f82386423f4017d6bb5da53275"}], 0x13f0}, 0x6}, {{&(0x7f0000004980)=@can={0x1d, r4}, 0x80, &(0x7f0000004e00)=[{&(0x7f0000004a00)="fc4b323cd051dec2ba0c80762ba6718f40be2632862d466c5af385ad04afec561409ed35ac4b3ab2f99c79ce30148e11", 0x30}, {&(0x7f0000004a40)="887c65ee16a8ed5ff51331e073fa1577f068abf47896145d43b221e4c127d1f7c5581706a4db87f1ee0bba52cf58be04c3e36c0137f711fe7e97ffd7b93f5a977fc2c262ab0413eb9c97f14555291f55545a2ed0a185fd0529739df74860a09eefe873f3f3154aac18fc9462894c7cfd722432e3ba257fc59a3a8e", 0x7b}, {&(0x7f0000004ac0)="62cc1d76109053960f3566b26b93a7c20b4033a1e3a4c2d1f8dcc3f3f8dc2325d4868c58bd53278cc01f75d2e58cc21594dbc4484560ed4e6875e4180827fa00e5760ff1c40f0b9a755cf4eaf2b763b3de955adcbeedf6755eb98637fc98e04ebe5ca9d5a5cf7a9641c56fa176b8279691c7c029001ddc0d04a75e78eea679507724434353adf57235f7137c7db4dc3b7e90b30b5a3d0a4a54d7c200106f", 0x9e}, {&(0x7f0000004b80)="04939842", 0x4}, {&(0x7f0000004bc0)="6976814523279d2d38678074812f18c759f44a2d7ee4c1c10bea3f00a1565b9f40f16afeb1da99d11134542df79c0079dcd766a6181f36f75416b1db1e16aeb461a07b38e8641253f0ebcc385a98a5ab6fb1e5e22372c009e3290a701d5f08cd4aa2eeb90facadb18b", 0x69}, {&(0x7f0000004c40)="168902242e", 0x5}, {&(0x7f0000004c80)="acb9ac8e3aa2fafad004c3d61b4700def8920434650c6bb421c034757a6acfc8c833599f4d428681a9c9a7a780480ef05e6821d2f7ef1302a711842f1c4232537631061e1c56297662b1e0d396e3b035aa3d84c87e7ecdd2680abf98c5d921d54c4adcc38d04d0232123a31e4c45bf35334c4cabc6da5db3e3f6929a25c49e20a28bfa92b0833147ca85ae39233f460a9f406bfee441d5e47604e0bbeadfa227b6b2675c546beead", 0xa8}, {&(0x7f0000004d40)="0b4d06f9fa1ad5f9caae41968a3b5450f7180e227f8cc3323a4d9ab1b91b0e44edd9d2eb98868b1a4b6e457f5dcf97adc311a5539c1caa8ce44ab643e33efe732d9d5ebca035f2ca7f0ea70c7771545619cbc939ed91c8eb08490b601767c28d1610ca7e52ed02e3cce38ffd28cb7289c1dc45bb9dd541f2a4d354f5dea815d67f229267632b5280d5", 0x89}], 0x8, &(0x7f0000004e80)=[{0xb0, 0x113, 0x9, "4edf06849f14662392faa7946582f49ee61ef4115e50f80d1b2582d9af5ad7a911ce63584e0ad68a26909680b73aab07610e60719f524c15840f720c94315ec75c2d4c3222d6cb22c3ee9108f71aaf91d7053fd9280b5ff034c0fb0cf2a97643a27f8e2a5b8d177ab4f09a2280598019dfdd49f9231594eeca97fa8eb3ac7ee8a1932570eff285ea3830c685ef2c8b9f3368feb1ca01a60bf7255999"}, {0x98, 0x11f, 0x9, "7e00163a92ea76c4bad8c44ccb2ac41256c6cd22e88c3b85f7b3d66a4da7aecdcdf4960b36c7ebc82a9afd3c9d3858b4673c6aed7670967223f938e3956b1c3e7a26eb61577da402e894e3909f8c50764ec1453007758ad6eb5c63ffa73085186c313ac95ad49249fc919221f4197dac941fd57ac62aa15793ac2fb4584bc911defb9d"}, {0x100, 0x117, 0x2, "8602743bbbadaeb326d3f6df2cb6f254a222bc307d00432135d87233481ead4a296d26c3dd235b305181c1a2149492f0a3df218027470ca828608085748860fba22ecd63bba1d7fdf339b6126db647d372e1b234ee3fec4a4da568e1cbcbeb4a8e4c2d2b2efbae34fc487091a65f7cd90ba6723c7338216025e754c6643aeaf5dcbaa1292b162c303a78e5b29c6214d31ce2a6107ec2621801d8e3021dc40ca52db553aefb65e797ee575466f855153dd90ff7218d6f687d62f23bb3eb3d3890b4f49a4e8eccdf99d383cb4fea7b5ea3eda8aa7ca16b6b0b0b1ea2da6e86fc030348655b3504db9d820c"}], 0x248}, 0x401}, {{&(0x7f0000005100)=@l2={0x1f, 0x6, {0x4c78, 0x3f, 0x0, 0x0, 0xc, 0x7f}, 0xea58, 0x9}, 0x80, &(0x7f0000006480)=[{&(0x7f0000005180)="dbdc83303fc75444b8ef81ab285f9ce624ed43edc74df1efe38096177fb386111bf4409aa7aa90dbc42d40294a08bdc5857a4a79313a3de0812062c21670695772d3c205f91f24336a0823ba93ed7c318cb352264f4f48f1cb9d94af78a09b456086bb4376f5997f72253941c4", 0x6d}, {&(0x7f0000005200)="ac2a16c05204843a36efb1549deb1014c8a3b33830cde9bcadac2fe83dfa4f7abf921ab010d416315eacbf6a5b2376bab40177ca7a2bb854265319aac498952216b79d462f282da23077d6b8b3b9eb6fce059133cbee1190f5324179d6dac0e97ca498a6108f8c3b9d7342252acebf906186012f608050f7a6114b76aa", 0x7d}, {&(0x7f0000005280)="cf670b3019dcbf1a22208ff19fa0f7a48b091c7de16a886d2ec92393710505ff8db0574a5be01fe7f1e7a4d9f6f1717be2c20ef326978807f2ace54fd678fee1172ddec69d1be54b8972e166fc40e8ea7b77ceed9bee6abbe0c541979a89a4b175201dec7320e30256c638753b558f91c51ea3f60671d07039d746bc0ff8250fcec1825e72435955204a232d7a7b3cb033f3fd88a204397279223afffa05ccdbe0b4ed41855ef918b85ce12c31ae8bf5d93c6b2657", 0xb5}, {&(0x7f0000005340)="6a7f0de451afe9daf49ff753851c54e46b53835322a94b32852a8ab929d639ac64938fd79196bc0934dbaabfe81f9d0cf5ddc92fd02a40b93e91e171b507b019ab05f0a5186582aace9917b623fbcedec485aa1ff975faf8302e0bf8d8c45860858d2b9b10427b662b880d1fc647c6bd710a67a5a0f2453faabd504f6473845a4781a6565a0d2d0d1ab9", 0x8a}, {&(0x7f0000005400)="35a9b7c3c8c940e73d8620bc3fd130b0cce2a2dcd3e1fc46359ab73d9e84a72c0c8ba1bc7f1dc9f005f67f8ef9505db4c7649bf1d87161d4d83bb37f090b6b43f7", 0x41}, {&(0x7f0000005480)="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", 0x1000}], 0x6, &(0x7f0000006500)=[{0x28, 0x10b, 0x7ff, "0574852d263387de49b8a1c95c6fb89d4ee0770a902c5ece"}, {0x100, 0xe1570cedb5141944, 0x66, "97efdfa3e3cae5611f58391f934d637c7071927c4eb4c170448e0a9c6687cc9b68cafd50109a0f9e3bdd79b28fa6939ff4918d2922f87f8369a45f37a955f1dd54ad35fe5e9f42ba5d4506bbb9bdf8472c3a5428fe5c6f956bd6f890c745cb2972439fa6ba3fd1d351d270007dfd34c83632b1db53c0fc59fa96f74d3bef57abddfbbf0e2b4b1d942893376664f7846af3d0af1b5f7bfbc129f2ea2cd9774dc44f2f9e8b9bbf312f07ec5335bbebd8fabfba83e096c8141be3cb862f701f64e5215e4d59d21f3a1da79338896e8f717fe2d088047e474c8c2e4f26398d63dffaa69dd07741e593c6b5dae2c4"}, {0xe0, 0x0, 0x5ce76a38, "3d55bb85c7fd76dd5953c06ad4d7aee86f70bb6cb1823f915ba6715caad89742ee52e7d891e46afc04f5b04c8bb9d4d836ebf047a4f87575579e2c47fe61f0bff58a7757e5d31db04362f804bb36e4491516582f5785881d309baa067b1c5c2f7c37e264c2b7ebc92cd2b024de95a0b18143b97c0c5001332b1a9d7ca14c117f5e0eeee1e46ecd816fd044fed9e00ac3125b48b84647ff43af23f191a5bd7c0e9c74cb438b9d097b52953032aa62c732ae4a8a8ee748197e9087a5536efcdbe52f82bf1cd38fb0baa1b225"}, {0x68, 0x116, 0x3, "24f4e8e676112d9abb1b646004e5161d29f733ae7c5b3183a40a48d926254af51baecb23e693e72097f60e84fdf3eebc3877c150b24b5b3566a72dab8785775fc2655e3fd69b3e8fec3671e74ed60244e196e44534"}, {0x38, 0x0, 0x7, "810f260ef09f1fc212b1a7a70cb7f13c607575ca2bfc54a056ce105bd0a95c446bee6176"}, {0xa8, 0x11f, 0xfffffffffffffff7, "24441c77fcd47f74ecdd3bb4689ccb30c73f275c5ca82164e54fd92fbc1daa4048a7b9cb317b2a388c3f87eff8119d947583625e0f98f23d7e5c4aae234a059eaa249cac78ad8191d3601ac115582d893cd2c943cf7a938da240ce9d2b3e12cf5a11bb5d1e3641e424414dad5530ffbc519bc6e26c7c06e61a3b8b261ab8cd47acd0d2e3a6853c79b74f44f8976b4a0da293ea035d97bb"}], 0x350}, 0x60c}, {{&(0x7f0000006880)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @empty}, 0x0, 0x2, 0x0, 0x1}}, 0x80, &(0x7f0000006b00)=[{&(0x7f0000006900)="0ade041fd84591b56179b4cd397fc26c1a8a666409b2e5ef21b48e709704f8446d5de79ab6f28f524d811205df59a170c5260eff18c933ecd85359cf402e6b62a0c3222802c2111963d5781d6e30294d831f29074f745c15323b2c510cf5ac1eba27101bac654e39bd1d10695ec329997cfe7d79706882689233a5c0079cae7363a660c57c795c233242cc4723b3fdad309097f9f8bcf041279cf516809f722243f14fe0e4bb1e205b44e777bbb3e23036c1acbc4312e32a1e1d35b2b07bdfc724ff9e826371148eac", 0xc9}, {&(0x7f0000006a00)="9816e236335ee1", 0x7}, {&(0x7f0000006a40)="d5abac0f3d998eca660f4699e2854ee1e70b5b5e8d8267c59da32cac2e7c974f816945eed72ef9b1c3b4d9a5f68b880b1b8bab8efdcebaca28792e6ae3ea36f66e88e90ff510febc24ccb5f3b08caefecd93bb459b2157b79bef53f25ada89722b06149e345e6014c0489e70ae9477778b984b182af40dcf1ba2d48712f82b46a4a7fea90a79988ebe8564c0ef4e895f9b6b05d25bef64be9c542b71194c7b22da1965ba71b1c02cd3846a265bc1e5", 0xaf}], 0x3, &(0x7f0000006b40)=[{0x100, 0x10d, 0x1, "b724139ea03faa3ea0c6979fdbe9e5f833c529842f6984f89e38e584c2fc72ae6d8b2503c6d9277663a1f33f22b825babd59d787668d7d2ccda5edfa3c11d322e887011b392b588c2f8929ea4351f5743a9bedeba874f0deb82d1b6ca6dde3c421981d3bf8c6b87cc4c34ceadff1da025e7b54a01d2f275a5434e0cbff3f00c0ae59cfb8eb5e8f35830b338278be27024e3544980273ec6c8dccab3b8b00f0b8038b7041ac91b6070d51fe0863ed4dcb8d8963085f3c9072c73f855e42d497a1648a0e3a332008a55a626b992581d8a7ea3ebcfc0521b37643f85bfbd810cb25f9016e4fbc1f9342f2f35c030a"}, {0xd0, 0x118, 0x1f, "500b619d98ab7926748a184ba24cc2def399c3f52e4b4844f079352d0276b8c8add1f0e522fb13ec48a7223eb66b95d60593e4033ee90c8e5bd2d95fc1e3ea90d426cb8dbc21359f2a26dc3f1a9a323e346a53615de272989e62e3254e7bf7a0afe386d71ad3e9ef6cf78b2e13456a065e57a03daf982dc4a9ddb63e973dad303777a67c21a19d9645715f7fbf3a64da0ad014a7f0fedd82231f6d5e64fee196cd99ee6ab5d6a09466fe0bef4411b086fb5732bb8124e37606e5727b9d0b1e"}], 0x1d0}, 0x7fff}, {{0x0, 0x0, &(0x7f0000008f40)=[{&(0x7f0000006d40)="cd4d4d14bf6c78033937", 0xa}, {&(0x7f0000006d80)="2970a599e6c21ed660248be5c79064c3dde0ac45e51416c475001c28b1ccc058d3f8cf", 0x23}, {&(0x7f0000006dc0)="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", 0x1000}, {&(0x7f0000007dc0)="68c13e84e306d5a1d75271fa278a757692bea22ed728d737689f", 0x1a}, {&(0x7f0000007e00)="861a6e88358031eeb6ac0710b2ac6669fd405672c4e64270ef36acbef8e5cba6f3bc30fb", 0x24}, {&(0x7f0000007e40)="c63e5fa35d6fd5a587b8b3d8b05b799d7c862e07a50ee5827f984b8a56b8d843c2198e47016778e1e45c", 0x2a}, {&(0x7f0000007e80)="4714b68eda45bd8cf0b9a9109625825cebd610166f985335ea75fe9e01cab85db8131f27ac0097c50aca0d22cee7b4555146f49406cd92907ddcbdbe316ecd92be93a9879387196cd402eb57161b18a5fc61aab7b8e9177b4fb8afcdfa545bc4204a678e4deab696a07e31f2fa74d87c61c270d5bc9ebdb3f3fcb09317153c507ba76712830aa491a2d57931aefe7e9c0add14498156eb4b1c38", 0x9a}, {&(0x7f0000007f40)="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", 0x1000}], 0x8, &(0x7f0000008fc0)=[{0x60, 0x10f, 0x3c3, "d5e827e805e72a218dc257610a9e70a60d269fcf16bdbf581ed0015c281ce816ec2de294a319baa732d6d620bbd8c3f6aaed0c05f30374a56247dc2b3a85326b19069e7e3f1aeb938fef2b4625"}, {0x108, 0x114, 0xb5a7, "058d6455d626e87efbb55d36c04a6ce79dabe64c4e3db13732c308d5d6a5341f0bcd3f96fd61e956babaf9aa63d1a0dbd047cc9fca1a6b76fc2b36cb106e903ef31b93a0b66c0e4d52aaefa699c4fce5a66c17ccf842af28f0f27ee7f0009d63f87f3e4a2c1e8bed347dd36f5e363db9512ac2aaeaaacf778277160cead33d42d7d938efb1e17c02a5f8b42b46b0e1072494937bfdfff72ecd9317d3092943953268706c653b0c930c241fd40d113f689f02f11748dbba586230f907b1f814439567f26811b250fb28d9ac5c4e406c2d3084c891c79cb0470eb769f094331522d0b7365fb542563733d6f3f4722ac93a33c8ebb9b8fb"}, {0xa8, 0x10c, 0xce, "2ec8020da07829c943b862278e8f99cf528bd161237e3478eaac3265677c82911fe3ec1d1ee55f2a24e143877bcffc2df2b3b14ad66e28439b6fa6011dda74d65f95a3dffaf75785ed2ffe9e3d27237bb121c1ed1ae26b9ed6556ed1821850a0258c1c48afb65b6a7056c605854c5056de421544ecdf0e76c3b8cb1bb6c5a301aaf9659826a933297af79966d0e9769cded4"}, {0x108, 0x0, 0x4, "3792debe57f1eeeb482eafbde7aac36c1ea509d353617ef04a823387555f3f203ffaa70555725d2cbe9f7718c7acc04f95ebab4cbe3d47ab6816791f89c3230fab1292cf197d306c8459c44f4a23c0e3879dfb91220f534367c7004d1e40f32a657405e371e3af57078de3555dbe4e0a4988c7d0d79ccc39a91bc718f8e00177bb455e91f6f86f74e84d5160c91b0466da973d52a34cf7a7e3c80cf1651d2755e9e9c3ab286778e61c63dd0ca782b55b39900d06bbfc8b65f4c78b7a675475bf459e342db1df07f7e7d698dd21fb0c15b83d6ab6fb8772da5af9e7e81e72462c6c39a5581e95743f772e4299c9706d1c9cbc9295"}], 0x318}, 0x268}, {{&(0x7f0000009300)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009380)="b2006d3d8942b83478842b6ebee72ef8569faf6691b46dbb08025291abab0fd570680529cf9d577db3f930171c47d68e17fa90deb8aa22d22d8325f72cf88ce5181e183eef6ac08c19b763adf92e6c7b8891e262f7ca0dcb332dfa937cb97e735a0d723d14003ba5dda4e662fbf733c2e5468556c500025ecc5d38c904deebfa17eff1a43c4fb827728f15be89371099956017320c", 0x95}, {&(0x7f0000009440)="ba0d09daacacea39ff40c759129980b324f674132130e149d8957387a9b061b2069f3483fe99066cf054bd1fb79c4dd53703803cb1681b660a11c8cd2d727c34c0fcd6df7390f93f58110dffb6cda83b36d24ad147bf16e556853538166f3a773068f57f7129be775b22948d5de4452f1b8a8fb2f26ca5720150d7c3ab5bc5d18418aab78b0697e553c010062c9639b90c5fe194a6f097efe4e72bbef4ea541c20b5a32a7db56e80c1407587781f7a0c49ca62fa1bb45c3ba76702c03226fd9f4b70a95299415c1b386f3ba6cf166f179e868e7984c63bb2fbb06db15e54fae3aa3316438eba97abdaadf245a65aeb", 0xef}, {&(0x7f0000009540)="9a7f756df46419a0b315b4e8614bf68c0c462b0d90d4e8df83d81594369581dc1d5d1d1374eb871d80ba83780e859695da236a28bec59e3654c191f3392983dd3b01bda8b4cd84e834be9772e2ac672dfcefb19ab66cc7d32ccc34080ab9876348cd8657580631be2f34549fb66be75e3ac3b86322f4f2fe07ea9450ff477dec6580e566f049f1c377094c", 0x8b}], 0x3, &(0x7f0000009640)=[{0x1010, 0x102, 0x5, "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"}, {0x40, 0x13b, 0x66c, "a1a891e12843a175c603e3dae829defb48912294b8f7d01ea6f0774ceccd24389758caa509972fffa1fe7e66d5e9"}, {0x1010, 0x10b, 0x4, "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"}, {0x88, 0x11b, 0x4, "13e1cc783f7ab172e7eadbf44b25978a8e0c8e9b539b230633755c16e688bfb4c6a41268669dc0d0e2c44d9e591ed93bc221bebf349328e9ff931c9b6f6a01edfab4019d61679f6e2aff983ed8aa9f4017fb307bd74d0f9069a5a57d706466a0102b52823b08381a7c8241fd70da97b922"}, {0x40, 0x105, 0x1f, "fcf33b0818ef583598cb38867936eba3c1118d61c2802c24d00976265a331eda7a7779dd1187958a18cdd6"}, {0xe8, 0x11f, 0x1, "fa32825f57110cb2f4b54ee870063d87b09677cfa8ce30d97aa90d2233ce0732cd067f1a9b5f68d17d1778ae5d5db958544f4a4366880d994790ff9706f9acc01e0a6f31561c0ef86a08de2848c1b88de48fd0b91034d8625b3aac3b3fa22ee27dae42a3d1e12c3ddce67062e516dcc3ca096aa0724836af51c46aad702010b50350d23f42e563e98025e2c821e33babd76d6bd244c7efc95aaf1d9b6e30bbe0e1fc6bfeed1fd2307bffb6d92b70bef467d83e34f35b85590f30b8f36df4c8656f2455875498dfb289247e93cd097e8cde5cb6"}], 0x2210}, 0x40}], 0xa, 0x80) close(r1) sendto$ax25(r2, &(0x7f0000000040)="76e19dd0910c3a71485166fd292986cc85e0569d00e610f29e053953db63d6642a84fdc70a3598adf6fee6a119fa064f4082ebbda6f8fc1da8089c223cbb", 0x3e, 0x80, &(0x7f0000000080)={{0x3, @bcast, 0x3}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000100)='\xbd@\x00') 14:45:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) 14:45:51 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:51 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) 14:45:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) [ 499.583908][T25434] FAULT_INJECTION: forcing a failure. [ 499.583908][T25434] name failslab, interval 1, probability 0, space 0, times 0 [ 499.601865][T25434] CPU: 1 PID: 25434 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 499.609869][T25434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.619927][T25434] Call Trace: [ 499.623236][T25434] dump_stack+0x172/0x1f0 [ 499.627591][T25434] should_fail.cold+0xa/0x15 [ 499.632199][T25434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.638022][T25434] ? ___might_sleep+0x163/0x280 [ 499.642883][T25434] __should_failslab+0x121/0x190 [ 499.647834][T25434] should_failslab+0x9/0x14 [ 499.652347][T25434] kmem_cache_alloc+0x2b2/0x6f0 [ 499.657204][T25434] ? lock_downgrade+0x880/0x880 [ 499.662059][T25434] ? kasan_check_read+0x11/0x20 [ 499.666924][T25434] __kernfs_new_node+0xef/0x690 [ 499.671794][T25434] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 499.677264][T25434] ? wait_for_completion+0x440/0x440 [ 499.682570][T25434] ? mutex_unlock+0xd/0x10 [ 499.686995][T25434] ? kernfs_activate+0x192/0x1f0 [ 499.691943][T25434] kernfs_new_node+0x99/0x130 [ 499.696633][T25434] __kernfs_create_file+0x51/0x340 [ 499.701762][T25434] sysfs_add_file_mode_ns+0x222/0x560 [ 499.707146][T25434] internal_create_group+0x35b/0xc40 [ 499.712438][T25434] ? bd_set_size+0x89/0xb0 [ 499.716867][T25434] ? remove_files.isra.0+0x190/0x190 [ 499.722168][T25434] sysfs_create_group+0x20/0x30 [ 499.727027][T25434] lo_ioctl+0x10af/0x2150 [ 499.731371][T25434] ? lo_rw_aio+0x1120/0x1120 [ 499.735967][T25434] blkdev_ioctl+0x6f2/0x1d10 [ 499.740563][T25434] ? blkpg_ioctl+0xa90/0xa90 [ 499.745159][T25434] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 499.750979][T25434] ? __fget+0x35a/0x550 [ 499.755148][T25434] block_ioctl+0xee/0x130 [ 499.759480][T25434] ? blkdev_fallocate+0x410/0x410 [ 499.764537][T25434] do_vfs_ioctl+0xd6e/0x1390 [ 499.769142][T25434] ? ioctl_preallocate+0x210/0x210 [ 499.774295][T25434] ? __fget+0x381/0x550 [ 499.778466][T25434] ? ksys_dup3+0x3e0/0x3e0 [ 499.782890][T25434] ? do_sys_open+0x31d/0x5d0 [ 499.787489][T25434] ? tomoyo_file_ioctl+0x23/0x30 [ 499.792430][T25434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.798677][T25434] ? security_file_ioctl+0x93/0xc0 [ 499.803798][T25434] ksys_ioctl+0xab/0xd0 [ 499.807967][T25434] __x64_sys_ioctl+0x73/0xb0 [ 499.812565][T25434] do_syscall_64+0x103/0x610 [ 499.817167][T25434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.823063][T25434] RIP: 0033:0x458127 [ 499.826963][T25434] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.846568][T25434] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 499.854980][T25434] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 499.862952][T25434] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 499.870923][T25434] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:45:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x1000000}, 0x0) 14:45:51 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) [ 499.878894][T25434] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 499.886865][T25434] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 499.950044][T25434] hfs: invalid gid -1 14:45:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) [ 499.972299][T25434] hfs: unable to parse mount options 14:45:51 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) close(r0) 14:45:51 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x8, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x0, 0x400000) 14:45:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x7ffff000}, 0x0) 14:45:51 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfefd}]) io_destroy(r1) 14:45:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1b) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r0) fstat(r0, 0x0) poll(&(0x7f00000000c0)=[{r1, 0x100}, {r1, 0x2000}], 0x2, 0xffff) 14:45:51 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) 14:45:51 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0002, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000500)=0x1) sendto$unix(r0, &(0x7f0000000380)="d4ce19073f0fe8805b7fb7791e1f7635cfe2fd407d7fc518f2d57888979cec46d2235b839ba6b11dd915dcdf10a413b64c1c7c1b61509b945bc5eb9580dec46f060c1cba05f6efd669713c38984617cff3e5b4b808463c3180f0bc22b02375edd2462069515c2d243e99d505bb66d608841427003ac35485da8ab879740894200b7ffa5acf1f385123b5cb4c6786130ea5fa0d8ad4345775a99faab5341142cfb988aec15b3f2eb4d89ab9c4dfa4dbff268e7cd92dba39c5eacc6f6ec8276cc6e4e0d886e43f789b023e493b1c", 0xcd, 0x8804, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e20}, 0x6e) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28c3c3f3", @ANYRES16=r1, @ANYBLOB="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"], 0x1c4}, 0x1, 0x0, 0x0, 0x8000}, 0x4) write$ppp(r0, &(0x7f0000000340)="3e65827b416c88fefcc2", 0xa) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 14:45:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xe8030000}, 0x0) [ 500.366282][T25484] FAULT_INJECTION: forcing a failure. [ 500.366282][T25484] name failslab, interval 1, probability 0, space 0, times 0 [ 500.413441][T25484] CPU: 1 PID: 25484 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 500.421436][T25484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.431486][T25484] Call Trace: [ 500.434800][T25484] dump_stack+0x172/0x1f0 [ 500.439153][T25484] should_fail.cold+0xa/0x15 [ 500.443771][T25484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.449616][T25484] ? ___might_sleep+0x163/0x280 [ 500.454479][T25484] __should_failslab+0x121/0x190 [ 500.459449][T25484] should_failslab+0x9/0x14 [ 500.463958][T25484] kmem_cache_alloc+0x2b2/0x6f0 [ 500.468817][T25484] ? lock_downgrade+0x880/0x880 [ 500.473670][T25484] ? kasan_check_read+0x11/0x20 [ 500.478530][T25484] __kernfs_new_node+0xef/0x690 [ 500.483390][T25484] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 500.488856][T25484] ? wait_for_completion+0x440/0x440 [ 500.494188][T25484] ? mutex_unlock+0xd/0x10 [ 500.498607][T25484] ? kernfs_activate+0x192/0x1f0 [ 500.503552][T25484] kernfs_new_node+0x99/0x130 [ 500.508238][T25484] __kernfs_create_file+0x51/0x340 [ 500.513361][T25484] sysfs_add_file_mode_ns+0x222/0x560 [ 500.518742][T25484] internal_create_group+0x35b/0xc40 [ 500.524047][T25484] ? bd_set_size+0x89/0xb0 [ 500.528478][T25484] ? remove_files.isra.0+0x190/0x190 [ 500.533794][T25484] sysfs_create_group+0x20/0x30 [ 500.538737][T25484] lo_ioctl+0x10af/0x2150 [ 500.543117][T25484] ? lo_rw_aio+0x1120/0x1120 [ 500.547713][T25484] blkdev_ioctl+0x6f2/0x1d10 [ 500.552320][T25484] ? blkpg_ioctl+0xa90/0xa90 [ 500.556916][T25484] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 500.562736][T25484] ? __fget+0x35a/0x550 [ 500.566914][T25484] block_ioctl+0xee/0x130 [ 500.571249][T25484] ? blkdev_fallocate+0x410/0x410 [ 500.576313][T25484] do_vfs_ioctl+0xd6e/0x1390 [ 500.580916][T25484] ? ioctl_preallocate+0x210/0x210 [ 500.586030][T25484] ? __fget+0x381/0x550 [ 500.590197][T25484] ? ksys_dup3+0x3e0/0x3e0 [ 500.594618][T25484] ? do_sys_open+0x31d/0x5d0 [ 500.599224][T25484] ? tomoyo_file_ioctl+0x23/0x30 [ 500.604164][T25484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.610413][T25484] ? security_file_ioctl+0x93/0xc0 [ 500.615707][T25484] ksys_ioctl+0xab/0xd0 [ 500.619883][T25484] __x64_sys_ioctl+0x73/0xb0 [ 500.624481][T25484] do_syscall_64+0x103/0x610 [ 500.629083][T25484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.634976][T25484] RIP: 0033:0x458127 [ 500.638879][T25484] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:45:51 executing program 1: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) 14:45:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xeffdffff}, 0x0) 14:45:52 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 500.658480][T25484] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 500.666892][T25484] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 500.674868][T25484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 500.682838][T25484] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 500.690809][T25484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 500.698782][T25484] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:52 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1f, 0x404000) accept$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00\xa2\xa9Z\xb8=(;\xd6G\xeeY\xfb\x1auI\xe4\xfd\xa1\xa7Z\xebpi\xcam\xc0\x19\x104[\xbd\xa8\xd5+\xe8\x98\x88\xc8\x82\x17Xh\xc0=\xc5u\xc6\x02\xf4') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) io_setup(0x8, &(0x7f0000000200)=0x0) io_pgetevents(r3, 0x10001, 0x6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000380)={&(0x7f0000000340)={0x3}, 0x8}) fstat(r1, 0x0) [ 500.719452][T25484] hfs: invalid gid -1 [ 500.763529][T25484] hfs: unable to parse mount options 14:45:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) 14:45:52 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast2}]}, &(0x7f0000000100)=0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000000a000a, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x3, 0x7, 0x2, 0xfffffffffffffffc, @time, {0x2, 0x6d}, {0x81, 0xa3}, @raw8={"3308c3b38f103bbc9a351bd6"}}], 0x22d) close(r1) 14:45:52 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfeffff}]) io_destroy(r1) 14:45:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xfffffdef}, 0x0) 14:45:52 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) 14:45:52 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x3, {0x9, 0x80000000, 0x481, 0x1d, 0x5, 0x8001}, 0x0, 0x3f}, 0xe) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x9, &(0x7f0000000100)='vboxnet0\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r1, &(0x7f00000000c0)='\x00\x00\x00\x00\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r2, 0x0) 14:45:52 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0xfffffffffffff4c5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x81}, &(0x7f0000000180)=0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0005, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$sndseq(r2, &(0x7f0000000000)=[{0x5, 0x4, 0x0, 0x0, @time={r3, r4+30000000}, {0x2}, {}, @queue={0x0, {0x5, 0x3d08}}}], 0x30) prctl$PR_GET_TIMERSLACK(0x1e) close(r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x7fffffff, 0x7, [0xffff000000000000, 0x1, 0x583, 0x100000001, 0x0, 0x3f, 0xffffffff]}, 0x16) [ 501.136462][T25528] FAULT_INJECTION: forcing a failure. [ 501.136462][T25528] name failslab, interval 1, probability 0, space 0, times 0 [ 501.183171][T25528] CPU: 0 PID: 25528 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 501.191192][T25528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.201245][T25528] Call Trace: [ 501.204554][T25528] dump_stack+0x172/0x1f0 [ 501.208901][T25528] should_fail.cold+0xa/0x15 [ 501.213502][T25528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.219321][T25528] ? ___might_sleep+0x163/0x280 [ 501.224183][T25528] __should_failslab+0x121/0x190 [ 501.229128][T25528] should_failslab+0x9/0x14 [ 501.233647][T25528] kmem_cache_alloc+0x2b2/0x6f0 [ 501.240130][T25528] ? lock_downgrade+0x880/0x880 [ 501.244989][T25528] ? kasan_check_read+0x11/0x20 [ 501.249853][T25528] __kernfs_new_node+0xef/0x690 [ 501.254714][T25528] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 501.260196][T25528] ? wait_for_completion+0x440/0x440 [ 501.265497][T25528] ? mutex_unlock+0xd/0x10 [ 501.269922][T25528] ? kernfs_activate+0x192/0x1f0 [ 501.274870][T25528] kernfs_new_node+0x99/0x130 [ 501.279560][T25528] __kernfs_create_file+0x51/0x340 [ 501.284679][T25528] sysfs_add_file_mode_ns+0x222/0x560 [ 501.290066][T25528] internal_create_group+0x35b/0xc40 [ 501.295359][T25528] ? bd_set_size+0x89/0xb0 [ 501.299801][T25528] ? remove_files.isra.0+0x190/0x190 [ 501.305105][T25528] sysfs_create_group+0x20/0x30 [ 501.309967][T25528] lo_ioctl+0x10af/0x2150 [ 501.314309][T25528] ? lo_rw_aio+0x1120/0x1120 [ 501.318910][T25528] blkdev_ioctl+0x6f2/0x1d10 [ 501.323507][T25528] ? blkpg_ioctl+0xa90/0xa90 [ 501.328106][T25528] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 501.333926][T25528] ? __fget+0x35a/0x550 [ 501.338096][T25528] block_ioctl+0xee/0x130 [ 501.342791][T25528] ? blkdev_fallocate+0x410/0x410 [ 501.347828][T25528] do_vfs_ioctl+0xd6e/0x1390 [ 501.352429][T25528] ? ioctl_preallocate+0x210/0x210 [ 501.357547][T25528] ? __fget+0x381/0x550 [ 501.361818][T25528] ? ksys_dup3+0x3e0/0x3e0 [ 501.366243][T25528] ? do_sys_open+0x31d/0x5d0 [ 501.370847][T25528] ? tomoyo_file_ioctl+0x23/0x30 [ 501.375809][T25528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:45:52 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x0, 0x0, @tick, {}, {0x0, 0x2}}], 0xffffffffffffffca) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in=@empty}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) close(r0) ioctl$NBD_DO_IT(r0, 0xab03) 14:45:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:45:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, &(0x7f0000000200)) [ 501.382079][T25528] ? security_file_ioctl+0x93/0xc0 [ 501.387203][T25528] ksys_ioctl+0xab/0xd0 [ 501.391370][T25528] __x64_sys_ioctl+0x73/0xb0 [ 501.395975][T25528] do_syscall_64+0x103/0x610 [ 501.400575][T25528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.406472][T25528] RIP: 0033:0x458127 [ 501.410369][T25528] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:45:53 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000140)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) readv(r3, &(0x7f0000000240)=[{&(0x7f00000013c0)=""/135, 0x87}], 0x1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0xfffffffffffffe01) writev(r5, &(0x7f0000001540)=[{&(0x7f0000001480)='g', 0x1}], 0x1) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x1, 0xfffffffffffffff8) dup2(r3, r5) fcntl$setown(r8, 0x8, r6) tkill(r6, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000180)) fstat(r1, 0x0) [ 501.429974][T25528] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 501.438396][T25528] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 501.446376][T25528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 501.454384][T25528] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 501.462359][T25528] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 501.470330][T25528] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 501.501568][T25528] hfs: invalid gid -1 [ 501.558395][T25528] hfs: unable to parse mount options 14:45:53 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) 14:45:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x7ffffffff000}, 0x0) 14:45:53 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) 14:45:53 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x181001, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000180)=0x2, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8800000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x3c229ab8, 0x80, 0x5, 0x7fffffff}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r2, &(0x7f00000000c0)=0x4) close(r1) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000100)={0x11c, 0x3}) 14:45:53 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf0ff7f00000000}, 0x0) 14:45:53 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000}]) io_destroy(r1) 14:45:53 executing program 4: socket(0x14, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) connect$x25(r1, &(0x7f00000001c0)={0x9, @remote={[], 0x2}}, 0x12) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000c00)) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x800000000000000, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, 0x0) r4 = syz_open_dev$vcsa(0x0, 0x80000001, 0x2000) sendmsg$alg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)='b', 0x1}], 0x1, 0x0, 0x0, 0x10}, 0x4000) r5 = gettid() syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r4, 0x0, 0x10) getgid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x200000000000012, 0x0, @tid=r5}, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x1c9c380}, {r6, r7+30000000}}, &(0x7f0000000100)) tkill(r5, 0x1004200000016) fgetxattr(r3, 0x0, 0x0, 0xfffffe89) close(r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r1, 0x8) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x3, 0x0, 0xe2fe, 0x0, 0x0, 0x4, 0xffffffffffffb1b0, 0x10000, 0x0, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8001, 0x0, 0x800, 0x5, 0x4, 0x1, 0x0, 0x0, 0x6b74, 0x8000}, {0x1, 0x0, 0x0, 0xea7, 0x5, 0x20, 0x7, 0x1, 0x80000001, 0x81, 0x8245, 0x0, 0x2}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) timer_delete(0x0) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000000)={0xcb, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}]}) [ 501.919336][T25580] FAULT_INJECTION: forcing a failure. [ 501.919336][T25580] name failslab, interval 1, probability 0, space 0, times 0 [ 501.934056][T25580] CPU: 1 PID: 25580 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 501.942090][T25580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.952144][T25580] Call Trace: [ 501.955450][T25580] dump_stack+0x172/0x1f0 [ 501.959803][T25580] should_fail.cold+0xa/0x15 [ 501.964393][T25580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.970201][T25580] ? ___might_sleep+0x163/0x280 [ 501.975046][T25580] __should_failslab+0x121/0x190 [ 501.979971][T25580] should_failslab+0x9/0x14 [ 501.984476][T25580] kmem_cache_alloc_trace+0x2d1/0x760 [ 501.989851][T25580] kobject_uevent_env+0x2fb/0x1030 [ 501.994951][T25580] kobject_uevent+0x20/0x26 [ 501.999438][T25580] lo_ioctl+0x112b/0x2150 [ 502.003774][T25580] ? lo_rw_aio+0x1120/0x1120 [ 502.008395][T25580] blkdev_ioctl+0x6f2/0x1d10 [ 502.012968][T25580] ? blkpg_ioctl+0xa90/0xa90 [ 502.017544][T25580] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 502.023354][T25580] ? __fget+0x35a/0x550 [ 502.027499][T25580] block_ioctl+0xee/0x130 [ 502.031813][T25580] ? blkdev_fallocate+0x410/0x410 [ 502.036926][T25580] do_vfs_ioctl+0xd6e/0x1390 [ 502.041879][T25580] ? ioctl_preallocate+0x210/0x210 [ 502.047012][T25580] ? __fget+0x381/0x550 [ 502.051195][T25580] ? ksys_dup3+0x3e0/0x3e0 [ 502.055629][T25580] ? do_sys_open+0x31d/0x5d0 [ 502.060229][T25580] ? tomoyo_file_ioctl+0x23/0x30 14:45:53 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x525, 0x400, 0x2, 0x0, 0x0, [{r0, 0x0, 0x5}, {r0, 0x0, 0xffffffffffffffff}]}) fsetxattr(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="807472a7a71fa7"], &(0x7f0000000a00)='lo^&wlan0\x00', 0xa, 0x2) write$sndseq(r0, &(0x7f000086afd0), 0x0) close(r0) sendmmsg$inet_sctp(r0, &(0x7f0000000940)=[{&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x100000001, @mcast1, 0x5a}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000000c0)="f10a6b6aae74fd26f1f6f33b4a03b491cc2cc6643bf1e01c22d4c8fee168e0a19149c5005519eee97846ab01220ef8afd4f949a8ccbcd64f937627142b59fb28b5f82a3090019e0812969b5dcd836c8db2e24b9183dbddc0020cd1bd67f44cd35d266780e9f665516fce499c5d46f1e0525e7d0c68d44b26b97d3e2becf6b3f83b94890d711b1aeea1de2ab68995e288c849f23219a189dc32b1adef66128a866bd87be3f6b82115cea81312567394e4fa8f5306b7abfc5d3e9a4c23b272fdef5b131456b9e996595c5208e9b0c7f013d4b2ba79c8a2e05320aef8527809fdb2ca04973dda43", 0xe6}, {&(0x7f00000001c0)="9c54bd4adb7f80bc2e02aa8b956db0bb8c8d1238bc56acdb0e06c15756b4b6ae80161a0aa1373a5b75d97708b6bdea72d18865", 0x33}, {&(0x7f00000002c0)="3374464c048e1b6685046b512aa04505ac2b60d42e3820be9ee3da79424058e9c5a3dd5879e569d091453c6819d89a185362e718cfa838e7d0a3170e1c7cfb30f8ce655be743ec8416239e081c9796a9e0a8ad4878aa1fdf9bc0b555227936eaa1d69e9fcb3a760bebd7269c28696fd5526989ff823e4f2e46259b83f685acfebc74e1fc6aed46fb7f16cef232e5979f7f98e33cac", 0x95}, {&(0x7f0000000380)="aea6f77e128065b94be8dea55788367d6fd82c3e278bc03bb237b01c24da919c50b19d86552b9d9c3c599706881f78df4c89a4b9b13e62a511a8be5f63132fa2b0839a3dc2cadec995890546800f6d0cf09e4f5ff194a6ac2c211db863091d55b24add28493874b4d47069a87a566163664dd65f46e3d05f0daf23f2d920b32eca65c7afde6970184adc820ee638bdb1b33e32f6923d27257330b458bd63139b2116818ef81008800a5dcd51c643a55ed9c6975259", 0xb5}, {&(0x7f0000000440)="fc2494ca97d92409a7eaec9dea8577373b296dad9d92990857e16cb6783072e6be9b1f466c8710c69e61ff3bc88164988b4b93b99084dd5840dcc0f95079f13ab09fbf728046ca06fd8be78b5927326bfca6ff6425a3ed16257cef93dc5871460ba965eb0d2cd45c37ec16572b1d3fb97647c0bd8e40f57f3e2fdb530feb0d2564864cc9202aa95512fd3794", 0x8c}, {&(0x7f0000000500)="e911e924a2551c3445715896ad93365ec3c325dd0bfd2b0ccb4b8beb721264929607403674724da077b10553c7d811298788872ae3701d37b483154629d850e08329124660cd1d76746266b985fab9e8f1d478de2c997ba56e6d3fcb452f4e93d301813676af1317ca4aa22d9c99994742db7f36445a7d0190d0aa4ffccab5b5640043709858b33fa90d133c163e308b23639bfd9ce6be5038ec325baef7d11a378a9cf4982cd558a20cdbca1913629ab8fa72636261c86cadfc58ebdd754baae90816fba7b66dcb", 0xc8}, {&(0x7f0000000600)="940422efd01213aaef770f458288d7dbd2110d1343131da94831258437bf345d883fc19bf39222004643fcdd6e3ba5d9b2d2d9bce9ca994582b7b76625286be0ef697ab7644881f525d12a1bd2e2eb69d6a82df9efaaaca2ca359433a87ba477c912fed29f44cdb85c5b4f03eaf0284f8ca8f276ad65e1208db303e9fc833e28cef8683bf6f22ce872aa73fdbf26f7fca47c4fd8837e7bdabe5f3c06", 0x9c}], 0x7, 0x0, 0x0, 0x4}, {&(0x7f00000006c0)=@in6={0xa, 0x4e24, 0xffffffff, @ipv4={[], [], @loopback}, 0x8001}, 0x1c, &(0x7f00000008c0)=[{&(0x7f0000000700)="a70a95df9b14c21424364ab90ce10a0ed5c31a7faf48d500e5aae3d4a37003761e28edec1ef78d673ff4b2fc3f717ab98d6ac2291be2a415c7c32aa60726457493aa45fda7d8a70e9de09280da7673cb16397f8a9a270c3b81578d0aa84ed96943914b427ff901af3cf0b5b8364ad621349851c026337eddb6bad6c8d936af1866d2024ccbf79a6a59b803fd816d23b4536b4991ac2260ef81594b741732f85fdbfdb2019f40fa53128dd7616990df67bbcef5303d8b168c8e75ea9b4583282004a39c94009c12eb2de9aeddac3e0e8175bdeebc312407db508ac8c6a742", 0xde}, {&(0x7f0000000800)="a938b2ae9c47a358e6bc8a48d2d321f82fb1226c6b03002b94ade620441acf68efa489fd95d6a2dd2998cfd270647d24d1e2e5c01f3dd55a8403672f804370c85abdd468a01d4ddf11435f7a12dd434263583b7ff2f90f9eb6a3c5130abb1de729045c705ebe234c0c1ea7a897f7efc39075fab20bd9ea7f363945c0848486072d77af15be8aa8381d3e4b5ae0", 0x8d}], 0x2, &(0x7f0000000900)=ANY=[@ANYBLOB="1800004000000000841b9e00000005000000000000000200"], 0x18}], 0x2, 0x8000) [ 502.065293][T25580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.071538][T25580] ? security_file_ioctl+0x93/0xc0 [ 502.076684][T25580] ksys_ioctl+0xab/0xd0 [ 502.080831][T25580] __x64_sys_ioctl+0x73/0xb0 [ 502.085413][T25580] do_syscall_64+0x103/0x610 [ 502.089996][T25580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.095873][T25580] RIP: 0033:0x458127 [ 502.099764][T25580] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:45:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf0ffffff7f0000}, 0x0) 14:45:53 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x4004510f, &(0x7f0000000200)) [ 502.119984][T25580] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 502.128377][T25580] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 502.136330][T25580] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 502.144313][T25580] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 502.152272][T25580] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 502.160226][T25580] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 502.192052][T25580] hfs: invalid gid -1 14:45:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 502.235725][T25580] hfs: unable to parse mount options 14:45:53 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, 0x0) 14:45:53 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:53 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000000)=""/33, &(0x7f0000000280)=0xfffffffffffffc62) sendto$netrom(r0, &(0x7f00000000c0)="eb0a2e83c1b139bb5c86e4b0d1116d6a5b11e21b366377f730902c81cb56af8d4c1d3a1edbb34c254705f7002755773f1545aa9658e71bf70b3e4e4ae7111f9ae3003d2d3740e7184a3736", 0x4b, 0x20000000, &(0x7f0000000140)={{0x3, @default, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl(r0, 0x0, &(0x7f00000001c0)="1cf2e2bc5e575835b2dea713ea1fc49256d15cfb8b93e41cae76c79600f3f5b46bc023c479fbc6b24940ef279dc39e91f88048e73c2eaef9c8e329606efab6636b0311decf0a4d647c2f89bf4662999551fc") close(r0) 14:45:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xe803000000000000}, 0x0) 14:45:54 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, 0x0) [ 502.468267][T25624] FAULT_INJECTION: forcing a failure. [ 502.468267][T25624] name failslab, interval 1, probability 0, space 0, times 0 [ 502.503564][T25624] CPU: 1 PID: 25624 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 502.511592][T25624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.521660][T25624] Call Trace: [ 502.524971][T25624] dump_stack+0x172/0x1f0 [ 502.529323][T25624] should_fail.cold+0xa/0x15 [ 502.533932][T25624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.539763][T25624] ? ___might_sleep+0x163/0x280 [ 502.544625][T25624] __should_failslab+0x121/0x190 [ 502.549572][T25624] should_failslab+0x9/0x14 [ 502.554082][T25624] kmem_cache_alloc_trace+0x2d1/0x760 [ 502.559472][T25624] kobject_uevent_env+0x2fb/0x1030 [ 502.564602][T25624] kobject_uevent+0x20/0x26 [ 502.569115][T25624] lo_ioctl+0x112b/0x2150 [ 502.573461][T25624] ? lo_rw_aio+0x1120/0x1120 [ 502.578088][T25624] blkdev_ioctl+0x6f2/0x1d10 [ 502.582694][T25624] ? blkpg_ioctl+0xa90/0xa90 [ 502.587301][T25624] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 502.593133][T25624] ? __fget+0x35a/0x550 [ 502.597310][T25624] block_ioctl+0xee/0x130 [ 502.601648][T25624] ? blkdev_fallocate+0x410/0x410 [ 502.606684][T25624] do_vfs_ioctl+0xd6e/0x1390 [ 502.611292][T25624] ? ioctl_preallocate+0x210/0x210 [ 502.616412][T25624] ? __fget+0x381/0x550 [ 502.620586][T25624] ? ksys_dup3+0x3e0/0x3e0 [ 502.625015][T25624] ? do_sys_open+0x31d/0x5d0 [ 502.629615][T25624] ? tomoyo_file_ioctl+0x23/0x30 [ 502.634559][T25624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.640837][T25624] ? security_file_ioctl+0x93/0xc0 [ 502.645968][T25624] ksys_ioctl+0xab/0xd0 [ 502.650140][T25624] __x64_sys_ioctl+0x73/0xb0 [ 502.654847][T25624] do_syscall_64+0x103/0x610 [ 502.659449][T25624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.665344][T25624] RIP: 0033:0x458127 [ 502.669247][T25624] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.688949][T25624] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 502.697368][T25624] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 502.705343][T25624] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 502.713318][T25624] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 502.721637][T25624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 502.729615][T25624] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 502.756279][T25624] hfs: invalid gid -1 [ 502.766290][T25624] hfs: unable to parse mount options 14:45:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xeffdffff00000000}, 0x0) 14:45:54 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000}]) io_destroy(r1) 14:45:56 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8, 0xffffffffffff0001}, {0x4, 0x9}]}, 0x14, 0x1) fstat(r0, 0x0) 14:45:56 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0xf, 0x103, 0x4, {0xfff, 0x1, 0x1a8fc000000000, 0x2}}) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x0, 0x0, @tick, {}, {0x0, 0x80000}}], 0x30) close(r0) 14:45:56 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x4004510f, 0x0) 14:45:56 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:45:56 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000}]) io_destroy(r1) [ 505.022087][T25656] FAULT_INJECTION: forcing a failure. [ 505.022087][T25656] name failslab, interval 1, probability 0, space 0, times 0 [ 505.046903][T25656] CPU: 0 PID: 25656 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 505.054911][T25656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.068281][T25656] Call Trace: [ 505.071585][T25656] dump_stack+0x172/0x1f0 [ 505.075936][T25656] should_fail.cold+0xa/0x15 [ 505.080543][T25656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.086365][T25656] ? ___might_sleep+0x163/0x280 [ 505.091230][T25656] __should_failslab+0x121/0x190 [ 505.096181][T25656] should_failslab+0x9/0x14 [ 505.100702][T25656] __kmalloc+0x2dc/0x740 [ 505.104970][T25656] ? kobject_uevent_env+0x2fb/0x1030 [ 505.110777][T25656] ? rcu_read_lock_sched_held+0x110/0x130 [ 505.116510][T25656] ? kobject_get_path+0xc4/0x1b0 [ 505.121569][T25656] kobject_get_path+0xc4/0x1b0 [ 505.126346][T25656] kobject_uevent_env+0x31f/0x1030 [ 505.131478][T25656] kobject_uevent+0x20/0x26 [ 505.135995][T25656] lo_ioctl+0x112b/0x2150 [ 505.140370][T25656] ? lo_rw_aio+0x1120/0x1120 [ 505.144969][T25656] blkdev_ioctl+0x6f2/0x1d10 [ 505.149571][T25656] ? blkpg_ioctl+0xa90/0xa90 [ 505.154169][T25656] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 505.159993][T25656] ? __fget+0x35a/0x550 [ 505.164164][T25656] block_ioctl+0xee/0x130 [ 505.168497][T25656] ? blkdev_fallocate+0x410/0x410 [ 505.173538][T25656] do_vfs_ioctl+0xd6e/0x1390 [ 505.178149][T25656] ? ioctl_preallocate+0x210/0x210 [ 505.183271][T25656] ? __fget+0x381/0x550 [ 505.187442][T25656] ? ksys_dup3+0x3e0/0x3e0 [ 505.191868][T25656] ? do_sys_open+0x31d/0x5d0 [ 505.196474][T25656] ? tomoyo_file_ioctl+0x23/0x30 [ 505.201420][T25656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.207669][T25656] ? security_file_ioctl+0x93/0xc0 [ 505.212801][T25656] ksys_ioctl+0xab/0xd0 [ 505.216968][T25656] __x64_sys_ioctl+0x73/0xb0 [ 505.221566][T25656] do_syscall_64+0x103/0x610 [ 505.226165][T25656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.232064][T25656] RIP: 0033:0x458127 [ 505.235962][T25656] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.256599][T25656] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.265025][T25656] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 505.273011][T25656] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 505.280993][T25656] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 505.288969][T25656] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 505.296956][T25656] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 505.315138][T25656] hfs: invalid gid -1 14:45:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x3e8}, 0x0) [ 505.319150][T25656] hfs: unable to parse mount options 14:45:56 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xe803}, 0x0) 14:45:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') clock_gettime(0x0, &(0x7f00000013c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001280)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/138, 0x8a}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/191, 0xbf}], 0x3, &(0x7f0000000340)=""/23, 0x17}, 0x100000000}, {{&(0x7f0000000380)=@caif=@util, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/89, 0x59}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/25, 0x19}, {&(0x7f0000000500)=""/81, 0x51}], 0x4, &(0x7f00000005c0)=""/34, 0x22}, 0x200}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000600)=""/231, 0xe7}, {&(0x7f0000000700)=""/225, 0xe1}, {&(0x7f0000000800)=""/144, 0x90}, {&(0x7f00000008c0)=""/98, 0x62}, {&(0x7f0000000940)=""/109, 0x6d}, {&(0x7f00000009c0)=""/2, 0x2}, {&(0x7f0000000a00)=""/63, 0x3f}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/232, 0xe8}], 0x9}, 0xd22}, {{&(0x7f0000000d00)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d80)=""/169, 0xa9}, {&(0x7f0000000e40)=""/156, 0x9c}, {&(0x7f0000000f00)=""/179, 0xb3}, {&(0x7f0000000fc0)=""/28, 0x1c}], 0x4, &(0x7f0000001040)}, 0x7658}, {{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001200)=[{&(0x7f0000001100)=""/75, 0x4b}, {&(0x7f0000001180)=""/107, 0x6b}], 0x2, &(0x7f0000001240)=""/12, 0xc}, 0x3f}], 0x5, 0x40000000, &(0x7f0000001400)={r1, r2+10000000}) sendmsg$xdp(r0, &(0x7f0000001600)={&(0x7f0000001440)={0x2c, 0x3, r3, 0xb}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001480)="a6648e8bc100c2e257ef1621479480f584cd9337a591316735e9d9f05ea3d6b79c6092784082323f3667c6888d4b601489ebf8e48ed56fab9bd62a4138f5d6ad492ac210af36c887881f11dec2963359c1427f31a0677f191683f671b5f977a379a1d5b40f2c6d04ab5b8a382ebd3194abeeb138d28dbce47c5f3e67ea5b11405bde5613dfb026d1da18bf40a5519fca8f9decd675d39827e429f6c7eac4c1c6acfacef63f34fb96eccdf10a63534f3f7222eb8fd35a9fae741648277daa03536dc698b012068ac07219daeed7f433239d79ac44", 0xd4}, {&(0x7f0000001580)="0109907551440057ccaa8c7c10", 0xd}], 0x2, 0x0, 0x0, 0x80}, 0x4000000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(r0, &(0x7f0000001780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001040)={&(0x7f0000001640)=@deltfilter={0x128, 0x2d, 0x400, 0x70bd29, 0x25dfdbfb, {0x0, r3, {0x2, 0xb}, {0xffff, 0xc}, {0xffff, 0xfdcd08b5d7e252b9}}, [@TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0xe8, 0x2, [@TCA_CGROUP_EMATCHES={0x64, 0x3, [@TCA_EMATCH_TREE_LIST={0x3c, 0x2, @TCF_EM_CONTAINER={0x38, 0x7, {0x3f, 0x0, 0xfffffffffffffffc, 0x0, "faaa7060c1d1fc09423891a66b1d15180f01da4db4af015d46e342eb47bdc8783e41e97809ff91"}}}, @TCA_EMATCH_TREE_LIST={0x24, 0x2, @TCF_EM_NBYTE={0x20, 0xaee1, {0x3, 0x2, 0x400, 0x0, {0xad3, 0x7, 0x1, "dcdfafad63337d"}}}}]}, @TCA_CGROUP_POLICE={0xc, 0x2, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}}, @TCA_CGROUP_ACT={0x74, 0x1, @m_skbedit={0x70, 0x3, {{0xc, 0x1, 'skbedit\x00'}, {0x44, 0x2, [@TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x2}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x1}, @TCA_SKBEDIT_PTYPE={0x8, 0x7, 0x7}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xffff}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x1, 0xfff1}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x400, 0x134, 0x0, 0xd076, 0x6}}]}, {0x18, 0x6, "a1c3d275ee280f3558c4f44588b0e84cf8"}}}}]}}]}, 0x128}}, 0x80) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:56 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xd37}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=r1, @ANYBLOB="1580000000000000006cf499a29abc9cee5e990cf9bd7a361b"], &(0x7f0000000100)=0x1d) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r2) 14:45:56 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:45:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f}, 0x0) 14:45:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x10081, 0x4, 0x100000, 0x0, @tick, {}, {0x0, 0x4}}], 0x30) close(r0) [ 505.582867][T25689] FAULT_INJECTION: forcing a failure. [ 505.582867][T25689] name failslab, interval 1, probability 0, space 0, times 0 [ 505.599665][T25689] CPU: 1 PID: 25689 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 505.607662][T25689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.617721][T25689] Call Trace: [ 505.621032][T25689] dump_stack+0x172/0x1f0 [ 505.625367][T25689] should_fail.cold+0xa/0x15 [ 505.629958][T25689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.635790][T25689] ? ___might_sleep+0x163/0x280 [ 505.640637][T25689] __should_failslab+0x121/0x190 [ 505.645555][T25689] should_failslab+0x9/0x14 [ 505.650043][T25689] kmem_cache_alloc_node+0x264/0x710 [ 505.655326][T25689] ? find_held_lock+0x35/0x130 [ 505.660086][T25689] __alloc_skb+0xd5/0x5e0 [ 505.664398][T25689] ? skb_trim+0x190/0x190 [ 505.668718][T25689] ? kasan_check_read+0x11/0x20 [ 505.673589][T25689] alloc_uevent_skb+0x83/0x1e2 [ 505.678358][T25689] kobject_uevent_env+0xa63/0x1030 [ 505.683465][T25689] kobject_uevent+0x20/0x26 [ 505.688052][T25689] lo_ioctl+0x112b/0x2150 [ 505.692380][T25689] ? lo_rw_aio+0x1120/0x1120 [ 505.696964][T25689] blkdev_ioctl+0x6f2/0x1d10 [ 505.701545][T25689] ? blkpg_ioctl+0xa90/0xa90 [ 505.706138][T25689] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 505.711933][T25689] ? __fget+0x35a/0x550 [ 505.716087][T25689] block_ioctl+0xee/0x130 [ 505.720408][T25689] ? blkdev_fallocate+0x410/0x410 [ 505.725413][T25689] do_vfs_ioctl+0xd6e/0x1390 [ 505.729989][T25689] ? ioctl_preallocate+0x210/0x210 [ 505.735089][T25689] ? __fget+0x381/0x550 [ 505.739256][T25689] ? ksys_dup3+0x3e0/0x3e0 [ 505.743671][T25689] ? do_sys_open+0x31d/0x5d0 [ 505.748244][T25689] ? tomoyo_file_ioctl+0x23/0x30 [ 505.753170][T25689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.759411][T25689] ? security_file_ioctl+0x93/0xc0 [ 505.764519][T25689] ksys_ioctl+0xab/0xd0 [ 505.768659][T25689] __x64_sys_ioctl+0x73/0xb0 [ 505.773232][T25689] do_syscall_64+0x103/0x610 [ 505.777816][T25689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.783706][T25689] RIP: 0033:0x458127 [ 505.787602][T25689] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.807289][T25689] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.815728][T25689] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 505.823708][T25689] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:45:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0xfffffffffffffffb, 0x9}) ioctl(r1, 0x7fd, &(0x7f00000001c0)="0adc3ac1a34e404f001d000000090000008d53d80000000000000051831843aaad718b317bd91639c3019c30996a47aa80d00346e3c633060000006f0289864cb15af0fbfc0c95aebcbc0cfc61906691fe7c3999387bbb4135cb319482fb769272f002fdb444c91294241b508b6e8c0c5b559e2ba1d6ba7a0ebec6aa18969b8b10a22552c72f4e1355f6746929f1be125eaed0b2566e1fa482b9c3b1740593aad73f2465efe9fc19a89d2a6fe59d0cbc1c39a106a8e0") ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000000)={0x40, 0x401, 0x7ff}) fstat(r0, 0x0) [ 505.831684][T25689] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 505.839659][T25689] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 505.847634][T25689] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 505.879944][T25689] hfs: invalid gid -1 [ 505.887941][T25689] hfs: unable to parse mount options 14:45:57 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:45:57 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x40000000}]) io_destroy(r1) 14:45:57 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2001) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/129) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r1) 14:45:57 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffff000}, 0x0) 14:45:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x0, 'syz1\x00', @default, 0x8, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:45:57 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:45:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0a000000000000000223880403daf4e6b01bab41818d3915c23823a325861305d71e88e9e5e6228a18d891601bd714beb2e2c1e438fb2575b4c71699a43d3c652ccc2e1e3646c247fbc8c4dac13766c4919af9cc9d122599") fstat(r0, 0x0) 14:45:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xe8030000}, 0x0) 14:45:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000080)=""/4096) [ 506.355101][T25738] FAULT_INJECTION: forcing a failure. [ 506.355101][T25738] name failslab, interval 1, probability 0, space 0, times 0 [ 506.381782][T25738] CPU: 0 PID: 25738 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 506.389806][T25738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.399869][T25738] Call Trace: [ 506.403178][T25738] dump_stack+0x172/0x1f0 [ 506.407519][T25738] should_fail.cold+0xa/0x15 [ 506.412470][T25738] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 506.418290][T25738] ? ___might_sleep+0x163/0x280 [ 506.423154][T25738] __should_failslab+0x121/0x190 [ 506.428097][T25738] should_failslab+0x9/0x14 [ 506.432610][T25738] kmem_cache_alloc_node+0x264/0x710 [ 506.437912][T25738] ? find_held_lock+0x35/0x130 [ 506.442691][T25738] __alloc_skb+0xd5/0x5e0 [ 506.447039][T25738] ? skb_trim+0x190/0x190 [ 506.451380][T25738] ? kasan_check_read+0x11/0x20 [ 506.456241][T25738] alloc_uevent_skb+0x83/0x1e2 [ 506.461011][T25738] kobject_uevent_env+0xa63/0x1030 [ 506.466144][T25738] kobject_uevent+0x20/0x26 [ 506.470665][T25738] lo_ioctl+0x112b/0x2150 [ 506.475019][T25738] ? lo_rw_aio+0x1120/0x1120 [ 506.479624][T25738] blkdev_ioctl+0x6f2/0x1d10 [ 506.484220][T25738] ? blkpg_ioctl+0xa90/0xa90 [ 506.488825][T25738] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 506.494652][T25738] ? __fget+0x35a/0x550 [ 506.498826][T25738] block_ioctl+0xee/0x130 [ 506.503160][T25738] ? blkdev_fallocate+0x410/0x410 [ 506.508193][T25738] do_vfs_ioctl+0xd6e/0x1390 [ 506.512806][T25738] ? ioctl_preallocate+0x210/0x210 [ 506.517927][T25738] ? __fget+0x381/0x550 [ 506.522092][T25738] ? ksys_dup3+0x3e0/0x3e0 [ 506.526515][T25738] ? do_sys_open+0x31d/0x5d0 [ 506.531120][T25738] ? tomoyo_file_ioctl+0x23/0x30 [ 506.536062][T25738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 506.542321][T25738] ? security_file_ioctl+0x93/0xc0 [ 506.547443][T25738] ksys_ioctl+0xab/0xd0 [ 506.551609][T25738] __x64_sys_ioctl+0x73/0xb0 [ 506.556212][T25738] do_syscall_64+0x103/0x610 [ 506.560816][T25738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 506.566710][T25738] RIP: 0033:0x458127 [ 506.570621][T25738] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.590262][T25738] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:45:58 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:45:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xeffdffff}, 0x0) [ 506.598684][T25738] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 506.606664][T25738] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 506.614662][T25738] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 506.622635][T25738] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 506.630609][T25738] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 506.651357][T25738] hfs: invalid gid -1 14:45:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000100)={0x3, @bcast, r2}) [ 506.705079][T25738] hfs: unable to parse mount options 14:45:58 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xeffdffff}]) io_destroy(r1) 14:45:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0a0d1fe45425933188b0709da16c6307e5a0d64f2b0ea234551d1c656d3adc0dc3c35e91d877c819e9dda3338d4dc912fba0955faacd317ba1e3cad26a1ec9f4d78934cf0f39ffca70c92aeb587ffa8385ff85495bd5444445614d7188d6fb9829c040710a77a0c280ae13dc1b5f6626177a36fcad0baae555d77a5d7c3b6a9936a006dfa98ea7f0a5b2709633f7bd10121979f09605b744bb02ae3e0d8232c09700e211acd6763212d27f0a72aefbb4dfe55a52459a5a17ff7b57d72487cd1c5a72af352090918dac0c7a0934f10e9057161d80d23cfad504190690e54915b0ae524972c77f16b532b14293aaeb1633240a6978a6bd37000000000000") fstat(r0, 0x0) 14:45:58 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xfffffdef}, 0x0) 14:45:58 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000080)={r1, 0x5024da41, 0x4, "49895122"}, 0xc) close(r0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000000c0)) 14:45:58 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:45:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:45:58 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip_vs\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r2, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x1, r0}) 14:45:58 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) dup2(r2, 0xffffffffffffffff) 14:45:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r2) [ 507.223188][T25783] FAULT_INJECTION: forcing a failure. [ 507.223188][T25783] name failslab, interval 1, probability 0, space 0, times 0 [ 507.262834][T25783] CPU: 0 PID: 25783 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 507.270945][T25783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.281005][T25783] Call Trace: [ 507.284317][T25783] dump_stack+0x172/0x1f0 [ 507.288759][T25783] should_fail.cold+0xa/0x15 [ 507.293372][T25783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 507.299194][T25783] ? ___might_sleep+0x163/0x280 [ 507.304153][T25783] __should_failslab+0x121/0x190 [ 507.309100][T25783] should_failslab+0x9/0x14 [ 507.313610][T25783] kmem_cache_alloc+0x2b2/0x6f0 [ 507.318471][T25783] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 507.324280][T25783] ? lock_downgrade+0x880/0x880 [ 507.329144][T25783] skb_clone+0x150/0x3b0 [ 507.333400][T25783] netlink_broadcast_filtered+0x870/0xb20 [ 507.339159][T25783] netlink_broadcast+0x3a/0x50 [ 507.343933][T25783] kobject_uevent_env+0xa94/0x1030 [ 507.349075][T25783] kobject_uevent+0x20/0x26 [ 507.353587][T25783] lo_ioctl+0x112b/0x2150 [ 507.357932][T25783] ? lo_rw_aio+0x1120/0x1120 [ 507.362535][T25783] blkdev_ioctl+0x6f2/0x1d10 [ 507.367131][T25783] ? blkpg_ioctl+0xa90/0xa90 [ 507.371729][T25783] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 507.377565][T25783] ? __fget+0x35a/0x550 [ 507.381743][T25783] block_ioctl+0xee/0x130 [ 507.386102][T25783] ? blkdev_fallocate+0x410/0x410 [ 507.391149][T25783] do_vfs_ioctl+0xd6e/0x1390 [ 507.395760][T25783] ? ioctl_preallocate+0x210/0x210 [ 507.400886][T25783] ? __fget+0x381/0x550 [ 507.405056][T25783] ? ksys_dup3+0x3e0/0x3e0 [ 507.409479][T25783] ? do_sys_open+0x31d/0x5d0 [ 507.414087][T25783] ? tomoyo_file_ioctl+0x23/0x30 [ 507.419127][T25783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 507.425592][T25783] ? security_file_ioctl+0x93/0xc0 [ 507.430718][T25783] ksys_ioctl+0xab/0xd0 [ 507.434900][T25783] __x64_sys_ioctl+0x73/0xb0 [ 507.439501][T25783] do_syscall_64+0x103/0x610 [ 507.444102][T25783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 507.449998][T25783] RIP: 0033:0x458127 [ 507.453899][T25783] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:45:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='wchan\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback, @multicast1}, &(0x7f0000000180)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={r2, @broadcast, @local}, 0xc) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@rand_addr, @empty, @broadcast}, &(0x7f00000000c0)=0xc) fstat(r0, 0x0) 14:45:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffffffff000}, 0x0) [ 507.473510][T25783] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 507.481959][T25783] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 507.489967][T25783] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 507.497946][T25783] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 507.505952][T25783] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 507.513936][T25783] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 507.550925][T25783] hfs: invalid gid -1 [ 507.569834][T25783] hfs: unable to parse mount options 14:45:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfcfdffff}]) io_destroy(r1) 14:45:59 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) dup2(r2, 0xffffffffffffffff) 14:45:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000000)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) close(r0) 14:45:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f00000000}, 0x0) 14:45:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) r2 = getpid() sched_getattr(r2, &(0x7f0000000040), 0x30, 0x0) 14:45:59 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:45:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ffffff7f0000}, 0x0) [ 507.974094][T25820] FAULT_INJECTION: forcing a failure. [ 507.974094][T25820] name failslab, interval 1, probability 0, space 0, times 0 [ 508.017574][T25820] CPU: 0 PID: 25820 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 508.025606][T25820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.035759][T25820] Call Trace: [ 508.035793][T25820] dump_stack+0x172/0x1f0 [ 508.035816][T25820] should_fail.cold+0xa/0x15 [ 508.035837][T25820] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.035860][T25820] ? ___might_sleep+0x163/0x280 [ 508.058669][T25820] __should_failslab+0x121/0x190 [ 508.063626][T25820] should_failslab+0x9/0x14 [ 508.068148][T25820] kmem_cache_alloc+0x2b2/0x6f0 [ 508.068162][T25820] ? __fget+0x381/0x550 [ 508.068184][T25820] getname_flags+0xd6/0x5b0 [ 508.068201][T25820] do_mkdirat+0xa0/0x2a0 [ 508.068218][T25820] ? __ia32_sys_mknod+0xb0/0xb0 [ 508.068233][T25820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 508.068255][T25820] ? do_syscall_64+0x26/0x610 [ 508.081773][T25820] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.081792][T25820] ? do_syscall_64+0x26/0x610 [ 508.081809][T25820] ? lockdep_hardirqs_on+0x418/0x5d0 14:45:59 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x8, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000700)=0x403) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000000000000ba000000a80c8cf6bed3a2e4e97caeae187fce605cd25e9dea72c659003938e66f7aa3a78f10d4f3942e4157855d85da180705f101c71963d819bd5ded2b0289580c73bb0cb5dba35d0adedf7d43ff5879165b9880b033f08e8176c7876e043638b1191743c8688cc7168c5a096636ec286d1454d4ac2a04f4cea16075bfad202e68336abb5a741f4612358e3d2ab6ca5d075198ed9eb3fd630aaadb449c338ec190b51782a9413f94a035bb1a3b9e8fdc28dd2e1c542cf0a0a8f3e274fb408277"], &(0x7f0000000140)=0xde) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = request_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='security\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r3, 0x4, 0x8}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'crct10dif-arm64-ce\x00'}}, &(0x7f0000000300)="9f10926b8bb586864e2688bccfc22eb623427d2133c7eceea80c20c00d45e0baaf3bd7e3f2", &(0x7f0000000340)=""/129) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000400)) sendmsg$nl_route_sched(r1, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)=@deltaction={0x110, 0x31, 0x108, 0x70bd2a, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x6f6f}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x5, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x11, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @TCA_ACT_TAB={0x48, 0x1, [{0x10, 0xd, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x6, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x7, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4040}, 0x4) fstat(r1, 0x0) 14:45:59 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) dup2(r2, 0xffffffffffffffff) 14:45:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) [ 508.081830][T25820] __x64_sys_mkdir+0x5c/0x80 [ 508.101030][T25820] do_syscall_64+0x103/0x610 [ 508.101052][T25820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.101064][T25820] RIP: 0033:0x4576d7 [ 508.101079][T25820] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.101087][T25820] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:45:59 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x100000000, 0xd37, 0x0, 0x5}, {0x2, 0x3f, 0x4, 0xe5}, {0x7, 0xa12, 0x4, 0xfd}, {0x8, 0xfff, 0x4aa, 0x9}, {0x8000, 0x1, 0x6, 0x1}, {0x0, 0x300000000000000, 0x4, 0x2}]}, 0x10) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0xfffffffffffffffe, 0x0, @tick, {}, {}, @addr={0x0, 0x7fff}}], 0x30) close(r0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000100)={0x8000}) [ 508.156438][T25820] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 508.156448][T25820] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 508.156456][T25820] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 508.156464][T25820] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 508.156473][T25820] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:45:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x10, 0x4}}, 0x14) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000080)={"0e5c2c2c1a12a3b90c6b2e6d38196aac8e23bfce94dc3324f0939d100001dd2eafdced0028cdf1450165342bb9b17123ff96ed541264c156abed194dadef6d3721947cb0a9591e42085353f3266a90c5db0a626028ec5fcde61b97d9355414fcddfaa4c46356efa47fea25c62372c337ee7c5707d10a101e85bad4d5f55bf9925bf3a39e8f6248fcbd9b2d9f14303225384c7b8b896dcbee913f76d79657c6bd2dee9c8c076d39d91b95bf1c78324ad287909a05f68e73eb289f1d96675373c3149ed1f239501f49a1fff5fa29224a78fbac4d329cc01d4249bbc0ccdb6427c37605fdb64b4a941d066456d283b849eedf62735b2a3e5f61f2161d73eb664ac73f53b86fb319d5c2fb6f26242f712edf5316e463a07a0d669b8d319765d137d3b58eca6cbb66074f2fc68aad0b6cb7e45e89da450981fde02f3a70c7fa67f4f070a53006816d9d6a5c9d11ea109e29267f6432e0a44ae5bb1019b90dbfe787ed2ba96406acde6250c3670ac4c4d0d6af9258c5ebdb8f214ee6a8ddbed46e579cc65563b940cfa92393755ee663ae398eb79285a12451ba675f21402168519d385160c44ed3128b7ef8a45f3e918ace8a75c9e4de27d73ffafaedea8f7f3a61aa7c6f343ce3a959d44cde4e675a6b703bb0e7d02ce89e1f1bc343af1b827216fac0f874294872cfb377e2bd775edd76dac125de4e9cf87589332ffa142214be62a0fb027195693b9765e75c7e76f867a095920b484bdcc34101be1399e03b26af5957d7bd224035397f7a96f03a4e6c5eabcdc983954db7e41fb323bb3a2a89eba196719b8338ab260ffa19b550b36266ee301d71f85163470f1c364348c94d3883ab904cf24803f2273f86f2272a941610eb77f9e2e00353e461780ac5a1fe858c8058edb8cdd522b31ad3967046925732b3a9761d02265510acc30cd5d0e55b2334422efa4393c2bbb215668cf8177942b4c0ec3a32df71998f7e9492a687ac84198d4734177bbee520b30d0243724f27d3770547f4c7df8f20b443c354fecc2f53855f8e309bdcb7f1e3c34bb4984f473c83fe97146061f3edb954ce249aa4c85db1e5bbd6d1901ff24b72476ce746f33b01f80009556336837dc3d1e9bb7c3f668445986a256541f6b93cbb2bb4215ca689737d40837ff53f4771546111e264a88415ce296bbd497686a6748319694e14f19cdae3999d3c2d6e041b9a7aa2b9a7a0d18bce145fb6354066b476a9a14e670e31c600ae9f8058d7ebc35efd49a4db58335fe92f32196e0e83777c855c0e66c5626eb6ad045c24e2cdfe643602fc62ba2ae3ba6d82f22297d3aafff764bf5614e779e0fea4db74bfd54e13e64322a6ba6dcb9d83a3d8a454426569561a04490569d755656267c2de877c59df39a58a8cb7d5f0175b54ee0717f1fce2b55eb4f5aab14998fafef7134b15e9ecea"}) 14:46:00 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfefdffff}]) io_destroy(r1) 14:46:00 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xe803000000000000}, 0x0) 14:46:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:46:00 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x1a72da5d, 0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r1) 14:46:00 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 508.803564][T25857] FAULT_INJECTION: forcing a failure. [ 508.803564][T25857] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.816906][T25857] CPU: 1 PID: 25857 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 508.824885][T25857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.834968][T25857] Call Trace: [ 508.838282][T25857] dump_stack+0x172/0x1f0 [ 508.842638][T25857] should_fail.cold+0xa/0x15 [ 508.847242][T25857] ? lo_ioctl+0xcf/0x2150 [ 508.851600][T25857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.857444][T25857] ? __lock_acquire+0x548/0x3fb0 [ 508.862399][T25857] should_fail_alloc_page+0x50/0x60 [ 508.867601][T25857] __alloc_pages_nodemask+0x1a1/0x7e0 [ 508.872985][T25857] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 508.878706][T25857] ? find_held_lock+0x35/0x130 [ 508.883504][T25857] ? __fget+0x35a/0x550 [ 508.887668][T25857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 508.893483][T25857] cache_grow_begin+0x9c/0x860 [ 508.898255][T25857] ? getname_flags+0xd6/0x5b0 [ 508.902949][T25857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 508.909197][T25857] kmem_cache_alloc+0x62d/0x6f0 [ 508.914052][T25857] ? __fget+0x381/0x550 [ 508.918219][T25857] getname_flags+0xd6/0x5b0 [ 508.922739][T25857] do_mkdirat+0xa0/0x2a0 [ 508.927003][T25857] ? __ia32_sys_mknod+0xb0/0xb0 [ 508.931858][T25857] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 508.937327][T25857] ? do_syscall_64+0x26/0x610 [ 508.942043][T25857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.948116][T25857] ? do_syscall_64+0x26/0x610 [ 508.952806][T25857] ? lockdep_hardirqs_on+0x418/0x5d0 [ 508.958115][T25857] __x64_sys_mkdir+0x5c/0x80 [ 508.962726][T25857] do_syscall_64+0x103/0x610 [ 508.967337][T25857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 508.973234][T25857] RIP: 0033:0x4576d7 [ 508.977138][T25857] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:00 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x2, 0x7f, 0x9, 0x5, 0x1}) 14:46:00 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x7, 0x440b01) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000340)) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000240)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) r4 = getegid() write$FUSE_ENTRY(r1, &(0x7f0000000180)={0x90, 0x0, 0x6, {0x0, 0x3, 0x80000001, 0x9, 0x7, 0x101, {0x2, 0x8001, 0x44, 0x101, 0xfff, 0x6, 0x4, 0x21, 0xbb, 0x100000000, 0x9946f87, r3, r4, 0x3, 0x8}}}, 0x90) write$apparmor_current(r0, &(0x7f0000000300)=@profile={'stack ', '/dev/audio#\x00'}, 0x12) fstat(r1, 0x0) 14:46:00 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xeffdffff00000000}, 0x0) [ 508.996761][T25857] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 509.005183][T25857] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 509.013160][T25857] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 509.021133][T25857] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 509.029112][T25857] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 509.037084][T25857] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 509.084898][T25857] hfs: invalid gid -1 [ 509.091546][T25857] hfs: unable to parse mount options 14:46:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x0, 0x0, 0x100, 0xffffffffffffffff, 0xffffffff}) fstat(r0, 0x0) 14:46:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 14:46:01 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffdef}]) io_destroy(r1) 14:46:01 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) r1 = getuid() r2 = getegid() r3 = geteuid() r4 = getgid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() r7 = getuid() r8 = getegid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="a0040000000000000100000000000000010000000000000003000000000000000100000000000000040000000000000003000000ffff000005002c000000000009000000000000003f00000000005eb89481c2bfe7ad000001000000000000006c00000000000000c90100000100000000000000e500000006000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="ff0200000900000000000000010000000000000001000080ffffffff10000000010100002f6465762f73657175656e6365723200050000000000000003000000000000000900000000000000ff0300000000000000000000070000000400000000000000649d00000000000000800000000000003e01000000000000ff0f00000000000002000000000000000500000009000000ff030000ff03000003000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0100010091da000000000000040000000000000006000000000000000100000081b100007d0000000000000005000000000000000000000000000000650000000000000004000000000000001f0000000200000003000000000000000200000000000000ff07000000000000010001000000000055570000000000000104000000000000010000007e0d0000d28c00000100008006000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0300000005000000000000000100000000000000800000000000000010000000080000002f6465762f73657175656e636572320005000000000000000200000000000000dfad107400000000030000000000000008000000080000000200000000000000001000000000000007000000000000003200000000000000008000000000000009000000000000000100000006000000090000000080000004000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="5bc700000800000000000000050000000000000000010000000000000e000000060000006d696d655f74797065776c616e310000030000000000000001000000000000002c080000000000000700000000000000ffff00000400000003000000000000000500000000000000fffbffffffffffffff0300000000000007000000000000000300000000000000ff0100000300000009000000fafffffff8ffffff", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="00000000060000000000000004000000000000000000000000000000100000005be200002f6465762f73657175656e6365723200010000000000000001000000000000000600000000000000f7ffffffffffffff04000000000000000200000000000000470b000000000000050000000000000008000000000000000000010000000000050000000000000000000000010000003c0f00002000000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000039460000000000000500000000000000020000000000000010000000e70000006d696d655f747970656367726f7570210400000000000000020000000000000077140000000000000500000000000000040000000800000006000000000000000700000000000000090000000000000001000100000000000200000000000000ff0000000000000000000000ff0300000300"/160, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="00100000000000000000000004000000000000000000ff000000000010000000bb327b6d2f6465762f73657175656e6365723200"], 0x4a0) 14:46:01 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:46:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:01 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = getuid() r3 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0xffffffffffffffda, 0x6, {0xd2e, 0x2, 0x0, {0x1, 0x3f, 0x0, 0x7, 0x4, 0x0, 0x8, 0xfffffffffffffffd, 0xedfc, 0x2, 0xe269, r2, r3, 0x4, 0x8000000000000000}}}, 0x78) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) 14:46:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 509.765681][T25897] FAULT_INJECTION: forcing a failure. [ 509.765681][T25897] name failslab, interval 1, probability 0, space 0, times 0 [ 509.854736][T25897] CPU: 0 PID: 25897 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 509.862793][T25897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.872852][T25897] Call Trace: [ 509.876159][T25897] dump_stack+0x172/0x1f0 [ 509.880508][T25897] should_fail.cold+0xa/0x15 [ 509.885220][T25897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 509.891051][T25897] ? ___might_sleep+0x163/0x280 [ 509.895929][T25897] __should_failslab+0x121/0x190 [ 509.900871][T25897] should_failslab+0x9/0x14 [ 509.905384][T25897] kmem_cache_alloc+0x2b2/0x6f0 [ 509.910235][T25897] ? __d_lookup+0x433/0x760 [ 509.914739][T25897] ? lookup_dcache+0x23/0x140 [ 509.919442][T25897] ? d_lookup+0xf9/0x260 [ 509.923692][T25897] ? lockdep_hardirqs_on+0x418/0x5d0 [ 509.928988][T25897] __d_alloc+0x2e/0x8c0 [ 509.933150][T25897] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 509.938906][T25897] d_alloc+0x4d/0x2b0 [ 509.942896][T25897] __lookup_hash+0xcd/0x190 [ 509.947430][T25897] filename_create+0x1a7/0x4f0 [ 509.952202][T25897] ? kern_path_mountpoint+0x40/0x40 [ 509.957407][T25897] ? strncpy_from_user+0x2a8/0x380 [ 509.962528][T25897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 509.968786][T25897] ? getname_flags+0x277/0x5b0 [ 509.973562][T25897] do_mkdirat+0xb5/0x2a0 [ 509.977815][T25897] ? __ia32_sys_mknod+0xb0/0xb0 [ 509.982674][T25897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 509.988169][T25897] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 509.994241][T25897] ? do_syscall_64+0x26/0x610 [ 509.999054][T25897] ? lockdep_hardirqs_on+0x418/0x5d0 [ 510.004356][T25897] __x64_sys_mkdir+0x5c/0x80 [ 510.008957][T25897] do_syscall_64+0x103/0x610 [ 510.013564][T25897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 510.019464][T25897] RIP: 0033:0x4576d7 [ 510.023365][T25897] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.042979][T25897] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:46:01 executing program 2: r0 = socket$inet6(0xa, 0x800, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth0_to_hsr\x00') r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r1) fcntl$setflags(r1, 0x2, 0x1) [ 510.051401][T25897] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 510.059380][T25897] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 510.067380][T25897] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 510.075358][T25897] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 510.083337][T25897] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:01 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:01 executing program 4: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000180)=@req={0xffff, 0x1, 0x7f, 0x4}, 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) getsockopt$rose(r1, 0x104, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0x93, "206a367a9235edd7ca47dd31d0793bf3df8978a0b5391467e7237af8dcb16b92e4aec7ab51db1304647c2b062e026e4aebdf6efcbb366edb8cbff324638a0924ed40ddbb5d411e12b65c71cc17537a547fef64f0dee22507d768b01d1a6349bb9170ca8ac05b5014a0d0b382cf06c16b22f1a7333db296527879090c3748bcbf99af91a6c383810131f57d4991ac074ff46642"}, &(0x7f0000000300)=0x9b) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000340)={r3, 0x7}, &(0x7f0000000380)=0x8) r4 = msgget(0x1, 0x200) msgsnd(r4, &(0x7f00000003c0)={0x3, "b04a179289b87d2944c8495bf62b66a31e62b07f899d145b4c67ff05b7d9a312cc483054e890dd229f1f75f62c91527499bc7e58aaaf162a1cabb4ec9b793e70195cd11986a18fff47edca6d9efff618cea557a6f7910215cd0eeda48164768a27a5948c1bf7a90cd04171017dd01da4893920d35a4f6dad21d7a6dc831d687e9882f2971284756a3d5b302e235517ddbfb2fe1c07bacd48e34df92bc16dd41b95"}, 0xa9, 0x800) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x6, &(0x7f0000000080)="0adc1f123c123f3188b070") fstat(r5, 0x0) 14:46:02 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffdfc}]) io_destroy(r1) 14:46:02 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8102, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x40, 0x8001, 0x795, 0x40, 0xf4, 0x7, 0x5, "46a9c0eae3717996f36541d36e25f9dfbf5e8b3a", "522b9e2a4b92b6cc979a27d68e786a8b1ec50d60"}) r1 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r1, 0x0) 14:46:02 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)=0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x200000, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}], [{@fsname={'fsname'}}, {@fsname={'fsname', 0x3d, '/dev/cachefiles\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) close(r4) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000080)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 14:46:02 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:02 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 510.812085][T25941] FAULT_INJECTION: forcing a failure. [ 510.812085][T25941] name failslab, interval 1, probability 0, space 0, times 0 14:46:02 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x2}}, 0x10) fcntl$notify(r0, 0x402, 0x22) [ 510.890068][T25941] CPU: 0 PID: 25941 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 510.898086][T25941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.908146][T25941] Call Trace: [ 510.911461][T25941] dump_stack+0x172/0x1f0 [ 510.915813][T25941] should_fail.cold+0xa/0x15 [ 510.920423][T25941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 510.926247][T25941] ? ___might_sleep+0x163/0x280 [ 510.931111][T25941] __should_failslab+0x121/0x190 [ 510.936063][T25941] ? ratelimit_state_init+0xb0/0xb0 [ 510.941268][T25941] should_failslab+0x9/0x14 [ 510.945791][T25941] kmem_cache_alloc+0x2b2/0x6f0 [ 510.950651][T25941] ? __save_stack_trace+0x99/0x100 [ 510.955793][T25941] ? ratelimit_state_init+0xb0/0xb0 [ 510.961003][T25941] ext4_alloc_inode+0x1f/0x640 [ 510.965792][T25941] ? ratelimit_state_init+0xb0/0xb0 [ 510.970998][T25941] alloc_inode+0x66/0x190 [ 510.975377][T25941] new_inode_pseudo+0x19/0xf0 [ 510.980058][T25941] new_inode+0x1f/0x40 [ 510.984130][T25941] __ext4_new_inode+0x37e/0x5450 14:46:02 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) [ 510.989084][T25941] ? debug_check_no_obj_freed+0x200/0x464 [ 510.994816][T25941] ? ext4_free_inode+0x1450/0x1450 [ 510.999939][T25941] ? dqget+0x10d0/0x10d0 [ 511.004213][T25941] ext4_mkdir+0x3d5/0xdf0 [ 511.008556][T25941] ? ext4_init_dot_dotdot+0x520/0x520 [ 511.013937][T25941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.020179][T25941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.020253][T25941] ? security_inode_permission+0xd5/0x110 [ 511.020269][T25941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 511.020285][T25941] ? security_inode_mkdir+0xee/0x120 [ 511.020304][T25941] vfs_mkdir+0x433/0x690 [ 511.047997][T25941] do_mkdirat+0x234/0x2a0 [ 511.052341][T25941] ? __ia32_sys_mknod+0xb0/0xb0 [ 511.057197][T25941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 511.057214][T25941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.057228][T25941] ? do_syscall_64+0x26/0x610 [ 511.057243][T25941] ? lockdep_hardirqs_on+0x418/0x5d0 14:46:02 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) [ 511.057261][T25941] __x64_sys_mkdir+0x5c/0x80 [ 511.057277][T25941] do_syscall_64+0x103/0x610 [ 511.057296][T25941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 511.057307][T25941] RIP: 0033:0x4576d7 [ 511.057322][T25941] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.057336][T25941] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:46:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) r2 = semget$private(0x0, 0x6, 0x200) semctl$IPC_INFO(r2, 0x7, 0x3, &(0x7f00000000c0)=""/70) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x1, @random="27ec747caa92"}, 0x64, {0x2, 0x4e20, @broadcast}, 'gretap0\x00'}) 14:46:02 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xa080) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x101, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x9, 0x0, 0x1, 0xfffffffffffffeff}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000000c0)={r2}) write$sndseq(r1, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r1) [ 511.134806][T25941] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 511.134815][T25941] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 511.134823][T25941] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 511.134832][T25941] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 511.134841][T25941] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:03 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffdfe}]) io_destroy(r1) 14:46:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7ffffffc, &(0x7f00000001c0)="3f0067538dee96782efd759f544a7891e762d2ce4cb924d1ad4167bf540a536e68c59825dbc1549e9ecbcdf1f08889429a50cf55c4aac7e366cb6fddcd61bd8d03bc197dc1b5ea58bf3c143ce9964ab2d84e586e2c95a1d7ff23c15319c74746badecf4f9f2b615a531eb69e8c01e7269b3a8ad277") fstat(r0, 0x0) 14:46:03 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r2, r3) 14:46:03 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:03 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x2) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 511.829417][T25974] FAULT_INJECTION: forcing a failure. [ 511.829417][T25974] name failslab, interval 1, probability 0, space 0, times 0 [ 511.842685][T25974] CPU: 1 PID: 25974 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 511.850670][T25974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.860727][T25974] Call Trace: [ 511.864080][T25974] dump_stack+0x172/0x1f0 [ 511.868426][T25974] should_fail.cold+0xa/0x15 [ 511.873027][T25974] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 511.873045][T25974] ? __es_tree_search.isra.0+0x1bf/0x230 [ 511.873071][T25974] __should_failslab+0x121/0x190 [ 511.889420][T25974] should_failslab+0x9/0x14 [ 511.893928][T25974] kmem_cache_alloc+0x47/0x6f0 [ 511.898697][T25974] ? ext4_es_scan+0x6f0/0x6f0 [ 511.903387][T25974] ? do_raw_write_lock+0x124/0x290 [ 511.908519][T25974] __es_insert_extent+0x2cc/0xf20 [ 511.913561][T25974] ext4_es_insert_extent+0x2b7/0xa40 [ 511.913582][T25974] ? ext4_es_scan_clu+0x50/0x50 [ 511.913603][T25974] ? rcu_read_lock_sched_held+0x110/0x130 [ 511.913617][T25974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 511.913638][T25974] ? ext4_es_find_extent_range+0xff/0x600 [ 511.924559][T25974] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 511.947740][T25974] ? ext4_rereserve_cluster+0x240/0x240 [ 511.953306][T25974] ? ext4_find_extent+0x76e/0x9d0 [ 511.958344][T25974] ? ext4_find_extent+0x6a6/0x9d0 [ 511.963382][T25974] ext4_ext_map_blocks+0x2146/0x5300 [ 511.968681][T25974] ? ext4_ext_release+0x10/0x10 [ 511.973550][T25974] ? lock_acquire+0x16f/0x3f0 [ 511.978236][T25974] ? ext4_map_blocks+0x3fd/0x18e0 [ 511.983282][T25974] ext4_map_blocks+0xec7/0x18e0 [ 511.983306][T25974] ? ext4_issue_zeroout+0x190/0x190 [ 511.983328][T25974] ? kasan_check_write+0x14/0x20 [ 511.983348][T25974] ? __brelse+0x95/0xb0 [ 512.002458][T25974] ext4_getblk+0xc4/0x510 [ 512.006803][T25974] ? ext4_iomap_begin+0xfe0/0xfe0 [ 512.011873][T25974] ? ext4_free_inode+0x1450/0x1450 [ 512.016998][T25974] ext4_bread+0x8f/0x230 [ 512.021246][T25974] ? ext4_getblk+0x510/0x510 [ 512.025862][T25974] ext4_append+0x155/0x370 [ 512.030311][T25974] ext4_mkdir+0x61b/0xdf0 [ 512.034690][T25974] ? ext4_init_dot_dotdot+0x520/0x520 [ 512.040075][T25974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.046323][T25974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.052570][T25974] ? security_inode_permission+0xd5/0x110 [ 512.052589][T25974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.052603][T25974] ? security_inode_mkdir+0xee/0x120 [ 512.052622][T25974] vfs_mkdir+0x433/0x690 [ 512.074080][T25974] do_mkdirat+0x234/0x2a0 [ 512.074099][T25974] ? __ia32_sys_mknod+0xb0/0xb0 [ 512.074115][T25974] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 512.074132][T25974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.074146][T25974] ? do_syscall_64+0x26/0x610 [ 512.074167][T25974] ? lockdep_hardirqs_on+0x418/0x5d0 [ 512.104775][T25974] __x64_sys_mkdir+0x5c/0x80 [ 512.109976][T25974] do_syscall_64+0x103/0x610 [ 512.114579][T25974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.120469][T25974] RIP: 0033:0x4576d7 14:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) epoll_create1(0x80000) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x3, 0x4) 14:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, &(0x7f0000000040)=""/222, 0xde, 0x40012000, &(0x7f0000000140)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) syncfs(r0) 14:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000300)={0xa, 0x5, [{0x8}, {0x1ff, 0x0, 0x4000000000}, {0xf7a, 0x0, 0x9}, {0x3, 0x0, 0x2}, {0x1df035aa, 0x0, 0x9}, {0x1, 0x0, 0x6}, {0x4, 0x0, 0x4}, {0x9, 0x0, 0x68}, {0x1, 0x0, 0x36}, {0x100000001, 0x0, 0x9}]}) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000002c0)={0x2, 0x8, 0x5}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20f) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000003c0)=""/141) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x94f5d91a92159ce8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x408, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x44800) 14:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0xf623, @local, 0x6}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r2, 0x7fff}, &(0x7f0000000180)=0x8) 14:46:03 executing program 4: syz_open_procfs(0x0, &(0x7f00000026c0)='task\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fstat(r0, 0x0) [ 512.120484][T25974] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.120492][T25974] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 512.120506][T25974] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 512.120521][T25974] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 512.144018][T25974] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:46:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 512.144027][T25974] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 512.144035][T25974] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 512.156081][T25974] hfs: invalid gid -1 [ 512.253139][T25974] hfs: unable to parse mount options 14:46:04 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffe00}]) io_destroy(r1) 14:46:04 executing program 4: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:46:04 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r2) 14:46:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:46:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:04 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 512.966978][T26014] FAULT_INJECTION: forcing a failure. [ 512.966978][T26014] name failslab, interval 1, probability 0, space 0, times 0 [ 513.061932][T26014] CPU: 1 PID: 26014 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 513.072991][T26014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.083053][T26014] Call Trace: [ 513.086356][T26014] dump_stack+0x172/0x1f0 [ 513.090698][T26014] should_fail.cold+0xa/0x15 [ 513.095305][T26014] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.101143][T26014] ? ___might_sleep+0x163/0x280 [ 513.106006][T26014] __should_failslab+0x121/0x190 [ 513.110976][T26014] should_failslab+0x9/0x14 [ 513.115485][T26014] __kmalloc+0x2dc/0x740 [ 513.119743][T26014] ? ext4_find_extent+0x76e/0x9d0 [ 513.124804][T26014] ext4_find_extent+0x76e/0x9d0 [ 513.130226][T26014] ext4_ext_map_blocks+0x1cc/0x5300 [ 513.135447][T26014] ? ext4_ext_release+0x10/0x10 [ 513.135557][T26014] ? lock_acquire+0x16f/0x3f0 [ 513.145085][T26014] ? ext4_map_blocks+0x3fd/0x18e0 [ 513.150127][T26014] ext4_map_blocks+0xec7/0x18e0 [ 513.150153][T26014] ? ext4_issue_zeroout+0x190/0x190 [ 513.150179][T26014] ? kasan_check_write+0x14/0x20 [ 513.165141][T26014] ? __brelse+0x95/0xb0 [ 513.165163][T26014] ext4_getblk+0xc4/0x510 [ 513.165183][T26014] ? ext4_iomap_begin+0xfe0/0xfe0 [ 513.165203][T26014] ? ext4_free_inode+0x1450/0x1450 [ 513.165221][T26014] ext4_bread+0x8f/0x230 [ 513.165236][T26014] ? ext4_getblk+0x510/0x510 [ 513.165259][T26014] ext4_append+0x155/0x370 [ 513.173729][T26014] ext4_mkdir+0x61b/0xdf0 [ 513.173765][T26014] ? ext4_init_dot_dotdot+0x520/0x520 [ 513.173781][T26014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.173794][T26014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.173811][T26014] ? security_inode_permission+0xd5/0x110 [ 513.173828][T26014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.173848][T26014] ? security_inode_mkdir+0xee/0x120 [ 513.206841][T26014] vfs_mkdir+0x433/0x690 [ 513.206860][T26014] do_mkdirat+0x234/0x2a0 [ 513.206876][T26014] ? __ia32_sys_mknod+0xb0/0xb0 [ 513.206892][T26014] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 513.206909][T26014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:46:04 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:46:04 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r2) 14:46:04 executing program 4: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = dup2(r2, r3) read(r4, &(0x7f00000000c0)=""/85, 0x321) 14:46:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 513.206923][T26014] ? do_syscall_64+0x26/0x610 [ 513.206944][T26014] ? lockdep_hardirqs_on+0x418/0x5d0 [ 513.225113][T26014] __x64_sys_mkdir+0x5c/0x80 [ 513.225132][T26014] do_syscall_64+0x103/0x610 [ 513.225154][T26014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.272899][T26014] RIP: 0033:0x4576d7 [ 513.272914][T26014] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.272921][T26014] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 513.272934][T26014] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 513.272950][T26014] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 513.288006][T26014] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 513.288014][T26014] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 513.288022][T26014] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 513.307938][T26014] hfs: invalid gid -1 [ 513.403590][T26014] hfs: unable to parse mount options 14:46:04 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) 14:46:05 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7ffffffff000}]) io_destroy(r1) 14:46:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:05 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_pts(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r2) 14:46:05 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:46:05 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:05 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) 14:46:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:05 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) [ 514.038276][T26047] FAULT_INJECTION: forcing a failure. [ 514.038276][T26047] name failslab, interval 1, probability 0, space 0, times 0 14:46:05 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f0000000000), 0x0) close(r0) [ 514.142222][T26047] CPU: 0 PID: 26047 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 514.150253][T26047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.160315][T26047] Call Trace: [ 514.163619][T26047] dump_stack+0x172/0x1f0 [ 514.167972][T26047] should_fail.cold+0xa/0x15 [ 514.172617][T26047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.178455][T26047] ? ___might_sleep+0x163/0x280 [ 514.183325][T26047] __should_failslab+0x121/0x190 [ 514.188280][T26047] should_failslab+0x9/0x14 [ 514.193335][T26047] __kmalloc+0x2dc/0x740 [ 514.197597][T26047] ? mark_held_locks+0xa4/0xf0 [ 514.202382][T26047] ? kfree+0x173/0x230 [ 514.206462][T26047] ? ext4_find_extent+0x76e/0x9d0 [ 514.211524][T26047] ext4_find_extent+0x76e/0x9d0 [ 514.216412][T26047] ext4_ext_map_blocks+0x1cc/0x5300 [ 514.221627][T26047] ? ext4_ext_release+0x10/0x10 [ 514.226481][T26047] ? find_held_lock+0x35/0x130 [ 514.231260][T26047] ? lock_acquire+0x16f/0x3f0 [ 514.235965][T26047] ? ext4_map_blocks+0x85d/0x18e0 [ 514.241008][T26047] ext4_map_blocks+0x8c5/0x18e0 [ 514.245871][T26047] ? ext4_issue_zeroout+0x190/0x190 [ 514.251083][T26047] ? kasan_check_write+0x14/0x20 [ 514.256023][T26047] ? __brelse+0x95/0xb0 [ 514.260187][T26047] ext4_getblk+0xc4/0x510 [ 514.264521][T26047] ? ext4_iomap_begin+0xfe0/0xfe0 [ 514.269552][T26047] ? ext4_free_inode+0x1450/0x1450 [ 514.274667][T26047] ext4_bread+0x8f/0x230 [ 514.278913][T26047] ? ext4_getblk+0x510/0x510 [ 514.283514][T26047] ext4_append+0x155/0x370 [ 514.287939][T26047] ext4_mkdir+0x61b/0xdf0 [ 514.292282][T26047] ? ext4_init_dot_dotdot+0x520/0x520 [ 514.297659][T26047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.303908][T26047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.310168][T26047] ? security_inode_permission+0xd5/0x110 [ 514.315899][T26047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.322151][T26047] ? security_inode_mkdir+0xee/0x120 [ 514.327443][T26047] vfs_mkdir+0x433/0x690 [ 514.331692][T26047] do_mkdirat+0x234/0x2a0 [ 514.336029][T26047] ? __ia32_sys_mknod+0xb0/0xb0 [ 514.340903][T26047] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 514.346366][T26047] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.352437][T26047] ? do_syscall_64+0x26/0x610 [ 514.357115][T26047] ? lockdep_hardirqs_on+0x418/0x5d0 [ 514.362406][T26047] __x64_sys_mkdir+0x5c/0x80 [ 514.367008][T26047] do_syscall_64+0x103/0x610 [ 514.371598][T26047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.377484][T26047] RIP: 0033:0x4576d7 [ 514.381379][T26047] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.400989][T26047] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.409410][T26047] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 514.417409][T26047] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 514.425376][T26047] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 514.433343][T26047] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:46:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000000)={0x0, 0x0, [0xca, 0x1ff, 0x1, 0x3]}) close(r0) 14:46:06 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) 14:46:06 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) [ 514.441317][T26047] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) 14:46:06 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xf0ffffff7f0000}]) io_destroy(r1) 14:46:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:06 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:06 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) 14:46:06 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) 14:46:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 515.141093][T26084] FAULT_INJECTION: forcing a failure. [ 515.141093][T26084] name failslab, interval 1, probability 0, space 0, times 0 14:46:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000000c0)=""/185) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80000) connect$can_bcm(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r0) [ 515.200149][T26084] CPU: 0 PID: 26084 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 515.208177][T26084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.218242][T26084] Call Trace: [ 515.221543][T26084] dump_stack+0x172/0x1f0 [ 515.225884][T26084] should_fail.cold+0xa/0x15 [ 515.230485][T26084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.236309][T26084] ? ___might_sleep+0x163/0x280 [ 515.242445][T26084] __should_failslab+0x121/0x190 [ 515.247392][T26084] should_failslab+0x9/0x14 [ 515.251898][T26084] kmem_cache_alloc+0x2b2/0x6f0 [ 515.256766][T26084] ? rcu_read_lock_sched_held+0x110/0x130 [ 515.262497][T26084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.268742][T26084] ? __mark_inode_dirty+0x241/0x1290 [ 515.274054][T26084] ext4_mb_new_blocks+0x5a8/0x3c70 [ 515.279166][T26084] ? mark_held_locks+0xa4/0xf0 [ 515.283938][T26084] ? ext4_find_extent+0x76e/0x9d0 [ 515.288977][T26084] ext4_ext_map_blocks+0x2c28/0x5300 [ 515.294277][T26084] ? ext4_ext_release+0x10/0x10 [ 515.299133][T26084] ? find_held_lock+0x35/0x130 [ 515.303923][T26084] ext4_map_blocks+0x8c5/0x18e0 [ 515.308794][T26084] ? ext4_issue_zeroout+0x190/0x190 [ 515.314005][T26084] ? kasan_check_write+0x14/0x20 [ 515.318953][T26084] ? __brelse+0x95/0xb0 [ 515.323132][T26084] ext4_getblk+0xc4/0x510 [ 515.327482][T26084] ? ext4_iomap_begin+0xfe0/0xfe0 [ 515.332527][T26084] ? ext4_free_inode+0x1450/0x1450 [ 515.337654][T26084] ext4_bread+0x8f/0x230 [ 515.341908][T26084] ? ext4_getblk+0x510/0x510 [ 515.346511][T26084] ext4_append+0x155/0x370 [ 515.350943][T26084] ext4_mkdir+0x61b/0xdf0 [ 515.355287][T26084] ? ext4_init_dot_dotdot+0x520/0x520 [ 515.360661][T26084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.366907][T26084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.373183][T26084] ? security_inode_permission+0xd5/0x110 [ 515.378920][T26084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.385171][T26084] ? security_inode_mkdir+0xee/0x120 [ 515.390461][T26084] vfs_mkdir+0x433/0x690 [ 515.390481][T26084] do_mkdirat+0x234/0x2a0 [ 515.390499][T26084] ? __ia32_sys_mknod+0xb0/0xb0 [ 515.390516][T26084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 515.390537][T26084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.409370][T26084] ? do_syscall_64+0x26/0x610 [ 515.409389][T26084] ? lockdep_hardirqs_on+0x418/0x5d0 [ 515.409408][T26084] __x64_sys_mkdir+0x5c/0x80 [ 515.409427][T26084] do_syscall_64+0x103/0x610 [ 515.434595][T26084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.440492][T26084] RIP: 0033:0x4576d7 [ 515.444394][T26084] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.464001][T26084] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 515.472411][T26084] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 515.480472][T26084] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 515.488447][T26084] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:46:07 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xc9, 0x20000) syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) 14:46:07 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) [ 515.496428][T26084] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 515.504403][T26084] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:07 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:07 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) 14:46:07 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfeffffffffffff}]) io_destroy(r1) 14:46:07 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) write$P9_RWALK(r0, &(0x7f0000000000)={0x16, 0x6f, 0x1, {0x1, [{0x90, 0x1, 0x2}]}}, 0x16) close(r0) 14:46:07 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:07 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802) syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) 14:46:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:46:07 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 516.136474][T26117] FAULT_INJECTION: forcing a failure. [ 516.136474][T26117] name failslab, interval 1, probability 0, space 0, times 0 [ 516.168045][T26117] CPU: 1 PID: 26117 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 516.176073][T26117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.186146][T26117] Call Trace: [ 516.189446][T26117] dump_stack+0x172/0x1f0 [ 516.193802][T26117] should_fail.cold+0xa/0x15 [ 516.198413][T26117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.204236][T26117] ? ___might_sleep+0x163/0x280 [ 516.209106][T26117] __should_failslab+0x121/0x190 [ 516.214062][T26117] should_failslab+0x9/0x14 [ 516.214079][T26117] kmem_cache_alloc+0x2b2/0x6f0 [ 516.214095][T26117] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.214110][T26117] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.214129][T26117] ? __mark_inode_dirty+0x241/0x1290 [ 516.223472][T26117] ext4_mb_new_blocks+0x5a8/0x3c70 [ 516.223488][T26117] ? mark_held_locks+0xa4/0xf0 [ 516.223506][T26117] ? ext4_find_extent+0x76e/0x9d0 [ 516.223534][T26117] ext4_ext_map_blocks+0x2c28/0x5300 [ 516.260894][T26117] ? ext4_ext_release+0x10/0x10 [ 516.265758][T26117] ? find_held_lock+0x35/0x130 [ 516.270554][T26117] ext4_map_blocks+0x8c5/0x18e0 [ 516.275422][T26117] ? ext4_issue_zeroout+0x190/0x190 [ 516.280635][T26117] ? kasan_check_write+0x14/0x20 [ 516.280650][T26117] ? __brelse+0x95/0xb0 [ 516.280676][T26117] ext4_getblk+0xc4/0x510 [ 516.294089][T26117] ? ext4_iomap_begin+0xfe0/0xfe0 [ 516.299129][T26117] ? ext4_free_inode+0x1450/0x1450 [ 516.304254][T26117] ext4_bread+0x8f/0x230 [ 516.308516][T26117] ? ext4_getblk+0x510/0x510 [ 516.313118][T26117] ext4_append+0x155/0x370 [ 516.317544][T26117] ext4_mkdir+0x61b/0xdf0 [ 516.321895][T26117] ? ext4_init_dot_dotdot+0x520/0x520 [ 516.327281][T26117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.333532][T26117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.339791][T26117] ? security_inode_permission+0xd5/0x110 [ 516.345521][T26117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.351781][T26117] ? security_inode_mkdir+0xee/0x120 [ 516.357077][T26117] vfs_mkdir+0x433/0x690 [ 516.361332][T26117] do_mkdirat+0x234/0x2a0 [ 516.365681][T26117] ? __ia32_sys_mknod+0xb0/0xb0 [ 516.370536][T26117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.375998][T26117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.382073][T26117] ? do_syscall_64+0x26/0x610 14:46:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x3e8) 14:46:07 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r1, r2) 14:46:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xe803) 14:46:07 executing program 1: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xf0ff7f) [ 516.386770][T26117] ? lockdep_hardirqs_on+0x418/0x5d0 [ 516.392071][T26117] __x64_sys_mkdir+0x5c/0x80 [ 516.396671][T26117] do_syscall_64+0x103/0x610 [ 516.401278][T26117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.401291][T26117] RIP: 0033:0x4576d7 [ 516.401306][T26117] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:46:07 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x800000020006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) [ 516.401321][T26117] RSP: 002b:00007ff04d372a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 516.430713][T26117] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 516.430722][T26117] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 516.430730][T26117] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 516.430738][T26117] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 516.430755][T26117] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:08 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x100000000000000}]) io_destroy(r1) 14:46:08 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x1000000) 14:46:08 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) close(r0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$RTC_PIE_OFF(r0, 0x7006) 14:46:08 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:08 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 517.154759][T26150] FAULT_INJECTION: forcing a failure. [ 517.154759][T26150] name failslab, interval 1, probability 0, space 0, times 0 [ 517.196726][T26150] CPU: 1 PID: 26150 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 517.204778][T26150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.214932][T26150] Call Trace: [ 517.218241][T26150] dump_stack+0x172/0x1f0 [ 517.222590][T26150] should_fail.cold+0xa/0x15 [ 517.227197][T26150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.233015][T26150] ? ___might_sleep+0x163/0x280 [ 517.239412][T26150] __should_failslab+0x121/0x190 [ 517.244358][T26150] should_failslab+0x9/0x14 [ 517.248874][T26150] __kmalloc_track_caller+0x2d8/0x740 [ 517.254251][T26150] ? mntput+0x74/0xa0 [ 517.258250][T26150] ? strndup_user+0x77/0xd0 [ 517.262777][T26150] memdup_user+0x26/0xb0 [ 517.267029][T26150] strndup_user+0x77/0xd0 [ 517.271365][T26150] ksys_mount+0x3c/0x150 [ 517.275614][T26150] __x64_sys_mount+0xbe/0x150 [ 517.280312][T26150] do_syscall_64+0x103/0x610 [ 517.284914][T26150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.290808][T26150] RIP: 0033:0x45ad2a [ 517.294709][T26150] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.314331][T26150] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.322757][T26150] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 517.330734][T26150] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 517.338718][T26150] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x7ffff000) 14:46:08 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:08 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xe8030000) 14:46:08 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:08 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="20002dbd7000fddbdf250d00002d86000100080002008d00000014000300ac1e0101000000000000000000ddb600080002003e000000080004004e220000"], 0x44}, 0x1, 0x0, 0x0, 0x4008800}, 0x20000000) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000000)) [ 517.346708][T26150] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.354787][T26150] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:09 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x200000000000000}]) io_destroy(r1) 14:46:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xeffdffff) 14:46:09 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:09 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:09 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) recvfrom$llc(r0, &(0x7f0000000000)=""/50, 0x32, 0x40, 0x0, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) [ 517.515993][T26180] FAULT_INJECTION: forcing a failure. [ 517.515993][T26180] name failslab, interval 1, probability 0, space 0, times 0 [ 517.561584][T26180] CPU: 0 PID: 26180 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 517.569606][T26180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.579659][T26180] Call Trace: [ 517.582970][T26180] dump_stack+0x172/0x1f0 [ 517.587315][T26180] should_fail.cold+0xa/0x15 [ 517.591919][T26180] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.597732][T26180] ? ___might_sleep+0x163/0x280 [ 517.602601][T26180] __should_failslab+0x121/0x190 [ 517.607544][T26180] should_failslab+0x9/0x14 [ 517.612052][T26180] __kmalloc_track_caller+0x2d8/0x740 [ 517.617435][T26180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.623682][T26180] ? strndup_user+0x77/0xd0 [ 517.628195][T26180] memdup_user+0x26/0xb0 [ 517.632448][T26180] strndup_user+0x77/0xd0 [ 517.636797][T26180] ksys_mount+0x7b/0x150 [ 517.641048][T26180] __x64_sys_mount+0xbe/0x150 [ 517.645740][T26180] do_syscall_64+0x103/0x610 [ 517.650396][T26180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.656297][T26180] RIP: 0033:0x45ad2a [ 517.660207][T26180] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.679816][T26180] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.688231][T26180] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 517.696201][T26180] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 517.704174][T26180] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xfffffdef) 14:46:09 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 517.712144][T26180] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 517.720119][T26180] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:09 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xffffff7f) 14:46:09 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:09 executing program 2: clock_settime(0x1, &(0x7f0000000000)) clock_settime(0x1, &(0x7f0000000040)={0x0, 0x989680}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x1f, 0xc63, 0x2}) 14:46:10 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x400000000000000}]) io_destroy(r1) 14:46:10 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:10 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f0000000080), 0x0) close(r0) accept4$rose(r0, &(0x7f0000000000)=@full={0xb, @remote, @remote, 0x0, [@remote, @null, @bcast, @rose, @bcast, @rose]}, &(0x7f0000000040)=0x40, 0x80000) 14:46:10 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x7ffffffff000) 14:46:10 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xf0ff7f00000000) 14:46:10 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:10 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) close(r0) ioctl$TIOCSCTTY(r0, 0x540e, 0x7622) socket$l2tp(0x18, 0x1, 0x1) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000180)=0x9, 0x2) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000cc0)={'filter\x00', 0x7, 0x4, 0xfe99, 0x140, 0x278, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000040), {[{{@arp={@loopback, @broadcast, 0xff000000, 0xffffffff, @mac=@dev={[], 0x21}, {[0xff, 0x4be085be941529bd, 0xff]}, @mac=@random="e7968fa6e74f", {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xa9b3, 0x3151, 0x800, 0xfffffffffffffffb, 0x0, 0x7fffffff, 'veth1_to_bridge\x00', 'bcsh0\x00', {}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@dev={[], 0x10}, @loopback, @loopback, 0x1}}}, {{@uncond, 0xaa, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x10000, 'syz0\x00', 0x7}}}, {{@arp={@loopback, @local, 0xffffffff, 0xffffffff, @empty, {[0x0, 0x0, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, 0x734b, 0x152b, 0x101, 0x100000001, 0x3, 0x2, 'veth0_to_team\x00', 'rose0\x00', {}, {0xff}, 0x0, 0x80}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @remote, @multicast1, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x6b0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000080)="6445a4adba565685aef55b709fadd325c615ae4b97c90d34af8b1194c62a644b18d85be51a668b32669760c04904136dc1d3e703b70bc355264e143f35ba5111004bd170ea0ded02b79f027077f49d302e2a20328832b94140fc1dc92cd27be574dadb6f79bb49493faff8d17dc03ccf3d833c6671886c870fc0ef83b42eef304890699fc2834418a2f15608", 0x8c) [ 518.629586][T26223] FAULT_INJECTION: forcing a failure. [ 518.629586][T26223] name failslab, interval 1, probability 0, space 0, times 0 [ 518.650730][T26223] CPU: 0 PID: 26223 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 518.658759][T26223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.668817][T26223] Call Trace: [ 518.668845][T26223] dump_stack+0x172/0x1f0 [ 518.668867][T26223] should_fail.cold+0xa/0x15 [ 518.668888][T26223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 518.668912][T26223] ? ___might_sleep+0x163/0x280 [ 518.668934][T26223] __should_failslab+0x121/0x190 [ 518.691726][T26223] should_failslab+0x9/0x14 [ 518.691744][T26223] __kmalloc_track_caller+0x2d8/0x740 [ 518.691780][T26223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 518.712806][T26223] ? strndup_user+0x77/0xd0 [ 518.712827][T26223] memdup_user+0x26/0xb0 [ 518.712851][T26223] strndup_user+0x77/0xd0 [ 518.725900][T26223] ksys_mount+0x7b/0x150 14:46:10 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 518.730150][T26223] __x64_sys_mount+0xbe/0x150 [ 518.734836][T26223] do_syscall_64+0x103/0x610 [ 518.739434][T26223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.745327][T26223] RIP: 0033:0x45ad2a [ 518.749227][T26223] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 518.768858][T26223] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:46:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xf0ffffff7f0000) 14:46:10 executing program 4: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 518.768873][T26223] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 518.768881][T26223] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 518.768888][T26223] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 518.768896][T26223] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 518.768904][T26223] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:10 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000000000000}]) io_destroy(r1) 14:46:10 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setlease(r1, 0x400, 0x1) 14:46:10 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:10 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x100000000000000) 14:46:10 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:11 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 519.515670][T26246] FAULT_INJECTION: forcing a failure. [ 519.515670][T26246] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 519.531971][T26246] CPU: 1 PID: 26246 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 519.531982][T26246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.531986][T26246] Call Trace: [ 519.532013][T26246] dump_stack+0x172/0x1f0 [ 519.532035][T26246] should_fail.cold+0xa/0x15 14:46:11 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 519.532056][T26246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.532075][T26246] ? __lock_acquire+0x548/0x3fb0 [ 519.532089][T26246] ? __save_stack_trace+0x99/0x100 [ 519.532112][T26246] should_fail_alloc_page+0x50/0x60 [ 519.532128][T26246] __alloc_pages_nodemask+0x1a1/0x7e0 [ 519.532150][T26246] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 519.532163][T26246] ? find_held_lock+0x35/0x130 [ 519.532184][T26246] ? __x64_sys_mount+0xbe/0x150 [ 519.532202][T26246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.532223][T26246] cache_grow_begin+0x9c/0x860 14:46:11 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 519.532248][T26246] ? getname_flags+0xd6/0x5b0 [ 519.568256][T26246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.568285][T26246] kmem_cache_alloc+0x62d/0x6f0 [ 519.568301][T26246] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 519.568317][T26246] ? find_held_lock+0x35/0x130 [ 519.568337][T26246] getname_flags+0xd6/0x5b0 [ 519.599368][T26246] user_path_at_empty+0x2f/0x50 [ 519.599386][T26246] do_mount+0x150/0x2c40 [ 519.599402][T26246] ? copy_mount_options+0x5c/0x3a0 [ 519.599419][T26246] ? copy_mount_string+0x40/0x40 [ 519.599436][T26246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.599458][T26246] ? _copy_from_user+0xdd/0x150 [ 519.614842][T26246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.614857][T26246] ? copy_mount_options+0x280/0x3a0 [ 519.614875][T26246] ksys_mount+0xdb/0x150 [ 519.614894][T26246] __x64_sys_mount+0xbe/0x150 [ 519.664565][T26246] do_syscall_64+0x103/0x610 [ 519.664587][T26246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.664599][T26246] RIP: 0033:0x45ad2a 14:46:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xe803000000000000) 14:46:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 519.664614][T26246] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 519.664622][T26246] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 519.664635][T26246] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 519.664644][T26246] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 519.664652][T26246] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:11 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 519.664660][T26246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 519.664675][T26246] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 519.715125][T26246] hfs: invalid gid -1 [ 519.833761][T26246] hfs: unable to parse mount options 14:46:11 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x8000000000000000}]) io_destroy(r1) 14:46:11 executing program 2: write$sndseq(0xffffffffffffffff, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x8002) ioctl$UI_DEV_DESTROY(r0, 0x5502) close(0xffffffffffffffff) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @null, 0x8, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000040)={0x20000000}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 14:46:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xeffdffff00000000) 14:46:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:11 executing program 4: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:11 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:11 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f0000000040), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x690c, 0x99d, 0x80000000, 0x240, 0x5, 0x3, 0x4, 0x2}}) close(r0) 14:46:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xffffff7f00000000) 14:46:11 executing program 4: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 520.099349][T26294] FAULT_INJECTION: forcing a failure. [ 520.099349][T26294] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 520.113149][T26294] CPU: 1 PID: 26294 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 520.121133][T26294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.131198][T26294] Call Trace: [ 520.134504][T26294] dump_stack+0x172/0x1f0 [ 520.138851][T26294] should_fail.cold+0xa/0x15 [ 520.143457][T26294] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:46:11 executing program 4: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 520.149291][T26294] ? __lock_acquire+0x548/0x3fb0 [ 520.154250][T26294] ? __save_stack_trace+0x99/0x100 [ 520.159399][T26294] should_fail_alloc_page+0x50/0x60 [ 520.164610][T26294] __alloc_pages_nodemask+0x1a1/0x7e0 [ 520.170089][T26294] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 520.175821][T26294] ? find_held_lock+0x35/0x130 [ 520.180689][T26294] ? __x64_sys_mount+0xbe/0x150 [ 520.185550][T26294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 520.191375][T26294] cache_grow_begin+0x9c/0x860 [ 520.196151][T26294] ? getname_flags+0xd6/0x5b0 [ 520.200843][T26294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.207104][T26294] kmem_cache_alloc+0x62d/0x6f0 [ 520.211964][T26294] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 520.217625][T26294] ? find_held_lock+0x35/0x130 [ 520.222434][T26294] getname_flags+0xd6/0x5b0 [ 520.226973][T26294] user_path_at_empty+0x2f/0x50 [ 520.231844][T26294] do_mount+0x150/0x2c40 [ 520.236097][T26294] ? copy_mount_options+0x5c/0x3a0 [ 520.241219][T26294] ? copy_mount_string+0x40/0x40 [ 520.246168][T26294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.252415][T26294] ? _copy_from_user+0xdd/0x150 [ 520.257289][T26294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.263535][T26294] ? copy_mount_options+0x280/0x3a0 [ 520.268755][T26294] ksys_mount+0xdb/0x150 [ 520.273015][T26294] __x64_sys_mount+0xbe/0x150 [ 520.277709][T26294] do_syscall_64+0x103/0x610 [ 520.282332][T26294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.288237][T26294] RIP: 0033:0x45ad2a [ 520.292149][T26294] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 520.311772][T26294] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.320201][T26294] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 520.328189][T26294] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 520.336175][T26294] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 520.344156][T26294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 520.352136][T26294] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 [ 520.434260][T26294] hfs: invalid gid -1 [ 520.438395][T26294] hfs: unable to parse mount options 14:46:12 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xeffdffffffffffff}]) io_destroy(r1) 14:46:12 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 14:46:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x1a) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:12 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x3, 0x1ff, 0xfff}) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x83fa, 0x2, 0x2000000000, 0x1, 0x6, 0x2, 0x3, 0x9, 0x6, 0x38, 0x3c8, 0xfffffffffffffffd, 0x8, 0x20, 0x1, 0x8, 0x25b4c3f5, 0x4}, [{0x6474e557, 0x7, 0x81, 0x6, 0x6, 0x1, 0x6, 0xb2}, {0x6, 0x5f3, 0xdef, 0xff, 0xffffffffffff802e, 0x5, 0x8, 0xffffffffffffff4b}], "6ebb5ab536b2fa836782f28106c6df6ddde0890aca5c52c75c74a89734d246c0e8e2714cc29a150cb028a053adb004ba34a8915d7a7d2ca14da639b08e26829c07613903891a2e18f45092d0", [[]]}, 0x1c4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) close(r0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000180)) 14:46:12 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:46:12 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 520.898489][T26313] FAULT_INJECTION: forcing a failure. [ 520.898489][T26313] name failslab, interval 1, probability 0, space 0, times 0 [ 520.988314][T26313] CPU: 0 PID: 26313 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 520.996337][T26313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.006396][T26313] Call Trace: [ 521.009700][T26313] dump_stack+0x172/0x1f0 [ 521.014043][T26313] should_fail.cold+0xa/0x15 [ 521.018647][T26313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.024466][T26313] ? ___might_sleep+0x163/0x280 [ 521.029331][T26313] __should_failslab+0x121/0x190 [ 521.034271][T26313] should_failslab+0x9/0x14 [ 521.038795][T26313] kmem_cache_alloc_trace+0x2d1/0x760 [ 521.044176][T26313] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 521.049985][T26313] ? rcu_read_lock_sched_held+0x110/0x130 [ 521.055714][T26313] ? kmem_cache_alloc_trace+0x354/0x760 [ 521.061286][T26313] legacy_init_fs_context+0x48/0xe0 [ 521.067719][T26313] ? generic_parse_monolithic+0x200/0x200 [ 521.073472][T26313] alloc_fs_context+0x365/0x640 [ 521.078855][T26313] fs_context_for_mount+0x25/0x30 [ 521.083887][T26313] do_mount+0x13d7/0x2c40 [ 521.088231][T26313] ? copy_mount_string+0x40/0x40 [ 521.093180][T26313] ? _copy_from_user+0xdd/0x150 [ 521.098042][T26313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.104283][T26313] ? copy_mount_options+0x280/0x3a0 [ 521.109980][T26313] ksys_mount+0xdb/0x150 [ 521.114231][T26313] __x64_sys_mount+0xbe/0x150 [ 521.118926][T26313] do_syscall_64+0x103/0x610 [ 521.123525][T26313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.129418][T26313] RIP: 0033:0x45ad2a [ 521.133313][T26313] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 521.152924][T26313] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 521.161344][T26313] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 521.169324][T26313] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 521.177305][T26313] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:12 executing program 5: open$dir(&(0x7f0000000080)='./file0\x00', 0x240800, 0x12) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) ioctl$KVM_RUN(r1, 0xae80, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:12 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0xae, 0x4, 0x800, 0x8001, 0x10, 0x0, 0x80000001, 0x2, 0x0, 0x0, 0x6, 0x1}) io_setup(0x2, &(0x7f0000000040)=0x0) io_pgetevents(r1, 0x3c2178da, 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={0x9}, 0x8}) [ 521.185284][T26313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 521.193260][T26313] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:46:12 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:13 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfcfdffffffffffff}]) io_destroy(r1) 14:46:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) read(r1, &(0x7f0000000000)=""/130, 0x82) 14:46:13 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:46:13 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x12200, 0x0) getsockname$netlink(r0, &(0x7f0000000140), &(0x7f0000000180)=0xc) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0x8c, 0xc8c7}}, 0x30) close(r0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000001c0)=0x7) setuid(r1) 14:46:13 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:13 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x1, 0x0, @remote, 0x3}, 0x1e1) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x18, 0x29, 0x37, "ddca"}], 0x18}}], 0x1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) sched_getparam(r3, &(0x7f0000000040)) r4 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x40, 0x103080) write$P9_ROPEN(r4, &(0x7f0000000180)={0x18, 0x71, 0x1, {{0x12, 0x4, 0x3}, 0xfffffffffffffffb}}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80010}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r5, 0x500, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) 14:46:13 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 521.922053][T26350] FAULT_INJECTION: forcing a failure. [ 521.922053][T26350] name failslab, interval 1, probability 0, space 0, times 0 [ 521.991626][T26350] CPU: 0 PID: 26350 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 521.999650][T26350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.009764][T26350] Call Trace: [ 522.013080][T26350] dump_stack+0x172/0x1f0 [ 522.017433][T26350] should_fail.cold+0xa/0x15 [ 522.022039][T26350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.027867][T26350] ? ___might_sleep+0x163/0x280 [ 522.032735][T26350] __should_failslab+0x121/0x190 [ 522.037809][T26350] should_failslab+0x9/0x14 [ 522.042330][T26350] kmem_cache_alloc_trace+0x2d1/0x760 [ 522.047720][T26350] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 522.053555][T26350] ? rcu_read_lock_sched_held+0x110/0x130 [ 522.059285][T26350] ? kmem_cache_alloc_trace+0x354/0x760 [ 522.064872][T26350] legacy_init_fs_context+0x48/0xe0 [ 522.070084][T26350] ? generic_parse_monolithic+0x200/0x200 [ 522.075818][T26350] alloc_fs_context+0x365/0x640 [ 522.080683][T26350] fs_context_for_mount+0x25/0x30 [ 522.085714][T26350] do_mount+0x13d7/0x2c40 14:46:13 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x4) [ 522.090069][T26350] ? copy_mount_string+0x40/0x40 [ 522.095019][T26350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.101271][T26350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.109021][T26350] ? copy_mount_options+0x280/0x3a0 [ 522.109039][T26350] ksys_mount+0xdb/0x150 [ 522.109059][T26350] __x64_sys_mount+0xbe/0x150 [ 522.123167][T26350] do_syscall_64+0x103/0x610 [ 522.127784][T26350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.133685][T26350] RIP: 0033:0x45ad2a [ 522.133699][T26350] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 522.133707][T26350] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 522.133720][T26350] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 522.133729][T26350] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 522.133737][T26350] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:13 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20001, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x234) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x10, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r1, &(0x7f0000000140)="c4efb0270f4d6939a6e00f5bbaddae1f904e5fa3771173545f17ef3d394af4bbd017abb694e0b43db105798510545fc8c475cb6fcca4d28a8cffd0d52e88845ca1743901216cbd1b520ba4657ab3f17dfe997037b97b716f3261f2442f66255f83e8d69373a8fcf1f40a13f62e127cea75b42e2e7da2260494108b91dafef719fc5978c08d7dc37359021d35c1a4fc46aceb302d2584017bb24b69e63df4e82d495c21a9a749c5c1f2227fca3608f6fb30bb20840a67b5c72a3298658c8528db6e1633ded4ceff1487a8", &(0x7f0000000040)=""/48}, 0x18) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000240)={0x0, 0xbe, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:13 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) [ 522.133744][T26350] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 522.133762][T26350] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:14 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfefdffffffffffff}]) io_destroy(r1) 14:46:14 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0xd59, 0x3a, 0x7ff, 0xffffffffffffffc0, @tick=0x2, {0x3, 0x2}, {0x100000000, 0x5}, @time=@time}, {0x3, 0x100, 0xffffffffffffffff, 0x8, @time={0x0, 0x989680}, {0xd9, 0x2}, {0x7ff, 0x1}, @raw8={"5f2413a0c5189e9015862e58"}}, {0xedd, 0x5, 0x0, 0x1f, @tick=0x6, {0x3, 0x4}, {0x5, 0x1}, @note={0xffffffff, 0x80, 0x8, 0x2, 0xf}}, {0x8000, 0x5, 0x5, 0x9, @time={0x77359400}, {0x3, 0x8}, {0x6, 0xef}, @quote={{0x3e4f, 0x4}, 0x3, &(0x7f0000000000)={0x5, 0x9, 0x7c0000000000000, 0x2255, @time={0x0, 0x1c9c380}, {0x8, 0x8}, {0x2, 0x7}, @addr={0x4, 0x6}}}}, {0x7, 0x83, 0x1, 0x20, @tick=0x8, {0x100000000, 0x80}, {0x401, 0x2}, @note={0x41, 0x3, 0x10001, 0x800, 0x6}}], 0xf0) accept$inet(r0, 0x0, &(0x7f0000000240)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e24, 0x1, @mcast2, 0x10001}, {0xa, 0x4e22, 0x72, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x6, [0xff, 0x800, 0x100000000, 0x3ff, 0x1, 0x1ff, 0xfffffffffffffff8, 0x80000001]}, 0x5c) close(r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000380)) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x1, 0x4}, &(0x7f0000000100)=0x18) 14:46:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40800, 0x88) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x3f) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:14 executing program 4: r0 = syz_open_dev$amidi(0x0, 0x10, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x101b00) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="3504c198a7b31c25f21433985044fb729d3ee92e6ed8521dee6be8", 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200000000000011, 0x803, 0x0) 14:46:14 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:14 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 522.812130][T26388] FAULT_INJECTION: forcing a failure. [ 522.812130][T26388] name failslab, interval 1, probability 0, space 0, times 0 [ 522.832542][T26388] CPU: 1 PID: 26388 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 522.840529][T26388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.850584][T26388] Call Trace: [ 522.853882][T26388] dump_stack+0x172/0x1f0 [ 522.858223][T26388] should_fail.cold+0xa/0x15 [ 522.862822][T26388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.868634][T26388] ? ___might_sleep+0x163/0x280 [ 522.873491][T26388] __should_failslab+0x121/0x190 [ 522.878428][T26388] should_failslab+0x9/0x14 [ 522.882933][T26388] kmem_cache_alloc_trace+0x2d1/0x760 [ 522.888308][T26388] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 522.894118][T26388] ? rcu_read_lock_sched_held+0x110/0x130 [ 522.899848][T26388] ? kmem_cache_alloc_trace+0x354/0x760 [ 522.905406][T26388] legacy_init_fs_context+0x48/0xe0 [ 522.910612][T26388] ? generic_parse_monolithic+0x200/0x200 [ 522.916337][T26388] alloc_fs_context+0x365/0x640 [ 522.921192][T26388] fs_context_for_mount+0x25/0x30 [ 522.926218][T26388] do_mount+0x13d7/0x2c40 [ 522.930555][T26388] ? copy_mount_string+0x40/0x40 [ 522.935495][T26388] ? _copy_from_user+0xdd/0x150 [ 522.940352][T26388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.946597][T26388] ? copy_mount_options+0x280/0x3a0 [ 522.951800][T26388] ksys_mount+0xdb/0x150 [ 522.956047][T26388] __x64_sys_mount+0xbe/0x150 [ 522.960736][T26388] do_syscall_64+0x103/0x610 [ 522.965348][T26388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.971235][T26388] RIP: 0033:0x45ad2a [ 522.975137][T26388] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 522.994736][T26388] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 523.003159][T26388] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x3, r1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r2) setsockopt$inet6_buf(r2, 0x29, 0x1c, &(0x7f0000000000)="917b016073b1c399c2bf0f3ba0a33ae66279cc045c6951b8be1f64f7c871a95e746581383c3966b73aa9293ab0fb478a6a20ced180f94bb45173cbd009c4b49da831d8998a4b3ea33d24e7a39a72b32e45bd505de9f6bd8522", 0x59) 14:46:14 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0xf) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = dup(r1) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000000)={0x2, 0x2}, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0xb000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff0000/0x3000)=nil, &(0x7f00000000c0)="7de90b83b0ba8a5a97c52645ffa46492868463fe6670aff52eca4982d40c2e4d9e9d74734987fedf6db43e44801eff4e0e1ee4d090aa0fad3e6a9a49c09447d7a97ede8c99de21f1e4f1067ea4c9644cd841618acab13ac3f388a32c20f346157cf84b5d1c2776af0f83b79742982ac8b1f4ba7dce74edcf1e4c324c8ac0e7be7d66659b1c4f7d3c674a84a3714273498823e5525c56e952b2d9f3987d90769c41493dd9e9aefe3a250fda179319dc899bde2075cdd90717", 0xb8, r0}, 0x68) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x294}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) [ 523.011129][T26388] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 523.019098][T26388] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 523.027067][T26388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 523.035032][T26388] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:14 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:14 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffffffffffdef}]) io_destroy(r1) 14:46:14 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xa0, 0x1, 0x1ec5, "c87bddbb695fdc557a5efc02336a648a", "28466ab4087bd0ac597a283d8851c14bdaec23c0234a4e206dbb98715a526213ed199cbe5f58f673bcb231d6e3c9bbd5b72767f0f566440d78b7cac5ab6d01988f422b3effc6d912a3de2fc3d5e076f60a58be5e17dc6eeb018080791b196c0fe4744899fc8905d550fd4a36c67991dc5cdefd8bb5bdc235ecdb9fcff0aa13970dbea6c07ce8cca86a86e1"}, 0xa0, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:14 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r2, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) openat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) close(r2) 14:46:14 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 523.405726][T26415] FAULT_INJECTION: forcing a failure. [ 523.405726][T26415] name failslab, interval 1, probability 0, space 0, times 0 14:46:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'ip6erspan0\x00', {0x2, 0x4e23, @multicast1}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 523.513597][T26415] CPU: 0 PID: 26415 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 523.521615][T26415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.531675][T26415] Call Trace: [ 523.534980][T26415] dump_stack+0x172/0x1f0 [ 523.539335][T26415] should_fail.cold+0xa/0x15 [ 523.543939][T26415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.549765][T26415] ? ___might_sleep+0x163/0x280 [ 523.554631][T26415] __should_failslab+0x121/0x190 [ 523.559574][T26415] should_failslab+0x9/0x14 [ 523.564083][T26415] kmem_cache_alloc+0x2b2/0x6f0 [ 523.568943][T26415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.575182][T26415] ? should_fail+0x1de/0x852 [ 523.579800][T26415] getname_kernel+0x53/0x370 [ 523.584400][T26415] kern_path+0x20/0x40 [ 523.588488][T26415] lookup_bdev.part.0+0x7b/0x1b0 [ 523.593431][T26415] ? blkdev_open+0x290/0x290 [ 523.598026][T26415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.604271][T26415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.610523][T26415] ? vfs_parse_fs_string+0x111/0x170 [ 523.615821][T26415] blkdev_get_by_path+0x81/0x130 [ 523.620784][T26415] mount_bdev+0x5d/0x3c0 [ 523.625031][T26415] ? hfs_show_options+0x630/0x630 [ 523.630066][T26415] ? vfs_parse_fs_string+0x116/0x170 [ 523.635446][T26415] hfs_mount+0x35/0x40 [ 523.639607][T26415] ? hfs_statfs+0x4b0/0x4b0 [ 523.644120][T26415] legacy_get_tree+0xf2/0x200 [ 523.648811][T26415] vfs_get_tree+0x123/0x450 [ 523.653324][T26415] do_mount+0x1436/0x2c40 [ 523.657674][T26415] ? copy_mount_string+0x40/0x40 [ 523.662625][T26415] ? _copy_from_user+0xdd/0x150 [ 523.667488][T26415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.673731][T26415] ? copy_mount_options+0x280/0x3a0 [ 523.678958][T26415] ksys_mount+0xdb/0x150 [ 523.683207][T26415] __x64_sys_mount+0xbe/0x150 [ 523.687897][T26415] do_syscall_64+0x103/0x610 [ 523.692527][T26415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.692541][T26415] RIP: 0033:0x45ad2a [ 523.692556][T26415] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 523.692571][T26415] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 523.721942][T26415] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 523.721953][T26415] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 523.721961][T26415] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 523.721969][T26415] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 523.721977][T26415] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:15 executing program 4: r0 = syz_open_dev$amidi(0x0, 0x10, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x101b00) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="3504c198a7b31c25f21433985044fb729d3ee92e6ed8521dee6be8", 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200000000000011, 0x803, 0x0) 14:46:15 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffffffffffdfc}]) io_destroy(r1) 14:46:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f00000000c0)={0x3ffffffffffffffc}) 14:46:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000)=0x60, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x21, &(0x7f0000ad2000), &(0x7f0000000080)=0xfdd2) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:15 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:15 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) close(r0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) [ 524.014710][T26432] FAULT_INJECTION: forcing a failure. [ 524.014710][T26432] name failslab, interval 1, probability 0, space 0, times 0 [ 524.093666][T26432] CPU: 1 PID: 26432 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 524.101711][T26432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.112464][T26432] Call Trace: [ 524.115781][T26432] dump_stack+0x172/0x1f0 [ 524.120130][T26432] should_fail.cold+0xa/0x15 [ 524.124732][T26432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.130557][T26432] ? ___might_sleep+0x163/0x280 [ 524.135418][T26432] __should_failslab+0x121/0x190 [ 524.140369][T26432] should_failslab+0x9/0x14 [ 524.144888][T26432] kmem_cache_alloc+0x2b2/0x6f0 [ 524.149770][T26432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.156065][T26432] ? should_fail+0x1de/0x852 [ 524.160676][T26432] getname_kernel+0x53/0x370 [ 524.165289][T26432] kern_path+0x20/0x40 [ 524.169376][T26432] lookup_bdev.part.0+0x7b/0x1b0 [ 524.174324][T26432] ? blkdev_open+0x290/0x290 [ 524.178924][T26432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.185180][T26432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.191444][T26432] ? vfs_parse_fs_string+0x111/0x170 [ 524.196762][T26432] blkdev_get_by_path+0x81/0x130 [ 524.201720][T26432] mount_bdev+0x5d/0x3c0 [ 524.205991][T26432] ? hfs_show_options+0x630/0x630 [ 524.211025][T26432] ? vfs_parse_fs_string+0x116/0x170 [ 524.216328][T26432] hfs_mount+0x35/0x40 [ 524.220407][T26432] ? hfs_statfs+0x4b0/0x4b0 [ 524.224927][T26432] legacy_get_tree+0xf2/0x200 [ 524.229653][T26432] vfs_get_tree+0x123/0x450 [ 524.234194][T26432] do_mount+0x1436/0x2c40 [ 524.239282][T26432] ? copy_mount_string+0x40/0x40 [ 524.244230][T26432] ? _copy_from_user+0xdd/0x150 [ 524.249092][T26432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.255336][T26432] ? copy_mount_options+0x280/0x3a0 [ 524.260543][T26432] ksys_mount+0xdb/0x150 [ 524.264810][T26432] __x64_sys_mount+0xbe/0x150 [ 524.269495][T26432] do_syscall_64+0x103/0x610 [ 524.274091][T26432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.279983][T26432] RIP: 0033:0x45ad2a [ 524.283879][T26432] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 524.303487][T26432] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.311910][T26432] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 524.319888][T26432] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 524.327864][T26432] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 524.335844][T26432] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:15 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 524.343820][T26432] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x400002, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000300)={0x2, 0x0, [{}, {}]}) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x2, 0x7ff, 0x7, 0x3ff, 0x1c0000, 0xfffffffffffffffc, 0x0, 0x100, 0x7f, 0x7, 0x1, 0x7, 0x5, 0x8, 0x0, 0x8, 0x8, 0xed, 0x7, 0xd0d, 0x81, 0x2, 0x3, 0x2, 0x6, 0x8, 0x2eeac312, 0x7fffffff, 0x0, 0x0, 0x6c, 0x1]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x8000000a0006, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4}], 0x30) close(r0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r0, 0x0, 0x1, 0x9e32, 0x2172}) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000080)=r1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x29, 0x28, 0x10, 0x9, 0x2, 0xfffffffffffffffd, 0x2, 0x76, 0xffffffffffffffff}}) finit_module(r2, &(0x7f0000000100)='/dev/sequencer2\x00', 0x6) 14:46:16 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200101, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x40, 0x8, 0x0, 0x0, "6df18caac4d92e8fb2dc3d885244f70eb39de522af7a0573a2bfab33a07c4e39"}) 14:46:16 executing program 4: r0 = syz_open_dev$amidi(0x0, 0x10, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x101b00) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="3504c198a7b31c25f21433985044fb729d3ee92e6ed8521dee6be8", 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200000000000011, 0x803, 0x0) 14:46:16 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:16 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1ffd, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x4, 0x0, 0x2, @time={0x0, 0x1c9c380}, {0x1f}, {0x7}}], 0xdb) ioctl$TCSBRKP(r0, 0x5425, 0xffffffff00000000) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2822], 0xb07) 14:46:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x202, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000180), 0x4) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000140)={0x65, "5a11f11d68431b70073d5b338825b1654ab5ee0e3710b3d3bce4ec6660d1e73e", 0x1, 0x1}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni-avx2\x00'}, 0x58) 14:46:16 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:16 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffffffffffdfe}]) io_destroy(r1) [ 525.112730][T26479] FAULT_INJECTION: forcing a failure. [ 525.112730][T26479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 525.125982][T26479] CPU: 1 PID: 26479 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 525.133962][T26479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.144018][T26479] Call Trace: [ 525.147327][T26479] dump_stack+0x172/0x1f0 [ 525.151674][T26479] should_fail.cold+0xa/0x15 [ 525.156287][T26479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.162100][T26479] ? __lock_acquire+0x548/0x3fb0 [ 525.167049][T26479] should_fail_alloc_page+0x50/0x60 [ 525.172251][T26479] __alloc_pages_nodemask+0x1a1/0x7e0 [ 525.177665][T26479] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 525.183389][T26479] ? find_held_lock+0x35/0x130 [ 525.188160][T26479] ? __lock_acquire+0x548/0x3fb0 [ 525.193102][T26479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.198918][T26479] cache_grow_begin+0x9c/0x860 [ 525.203687][T26479] ? getname_kernel+0x53/0x370 14:46:16 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 525.208454][T26479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.214707][T26479] kmem_cache_alloc+0x62d/0x6f0 [ 525.219557][T26479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.225800][T26479] ? should_fail+0x1de/0x852 [ 525.230396][T26479] getname_kernel+0x53/0x370 [ 525.234990][T26479] kern_path+0x20/0x40 [ 525.240001][T26479] lookup_bdev.part.0+0x7b/0x1b0 [ 525.244954][T26479] ? blkdev_open+0x290/0x290 [ 525.249548][T26479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.255796][T26479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.262051][T26479] ? vfs_parse_fs_string+0x111/0x170 [ 525.267347][T26479] blkdev_get_by_path+0x81/0x130 [ 525.272295][T26479] mount_bdev+0x5d/0x3c0 [ 525.276545][T26479] ? hfs_show_options+0x630/0x630 [ 525.281574][T26479] ? vfs_parse_fs_string+0x116/0x170 [ 525.286864][T26479] hfs_mount+0x35/0x40 [ 525.290936][T26479] ? hfs_statfs+0x4b0/0x4b0 [ 525.295449][T26479] legacy_get_tree+0xf2/0x200 [ 525.300133][T26479] vfs_get_tree+0x123/0x450 [ 525.304644][T26479] do_mount+0x1436/0x2c40 [ 525.308983][T26479] ? copy_mount_string+0x40/0x40 [ 525.313942][T26479] ? _copy_from_user+0xdd/0x150 [ 525.318804][T26479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.325071][T26479] ? copy_mount_options+0x280/0x3a0 [ 525.330278][T26479] ksys_mount+0xdb/0x150 [ 525.334522][T26479] __x64_sys_mount+0xbe/0x150 [ 525.339207][T26479] do_syscall_64+0x103/0x610 [ 525.343806][T26479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.349692][T26479] RIP: 0033:0x45ad2a [ 525.353582][T26479] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 525.373199][T26479] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 525.381613][T26479] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 525.389581][T26479] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 525.397552][T26479] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 525.405517][T26479] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0xfffffffffffffd4e) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0xfffffffffffffe08) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:16 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000000a0004, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x10081, 0x4, 0x0, 0x0, @tick, {0x0, 0x3}}], 0x30) close(r0) [ 525.413483][T26479] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) dup(r1) syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40) [ 525.491598][T26479] hfs: invalid gid -1 [ 525.500251][T26479] hfs: unable to parse mount options 14:46:17 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 525.768015][T26509] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:46:17 executing program 4: r0 = syz_open_dev$amidi(0x0, 0x10, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x101b00) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="3504c198a7b31c25f21433985044fb729d3ee92e6ed8521dee6be8", 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x200000000000011, 0x803, 0x0) 14:46:17 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = fcntl$dupfd(r0, 0x408, r0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000140)={0xf, @output={0x1000, 0x0, {0x0, 0x9}, 0x401, 0x9}}) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:17 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:17 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfffffffffffffe00}]) io_destroy(r1) [ 526.195073][T26522] FAULT_INJECTION: forcing a failure. [ 526.195073][T26522] name failslab, interval 1, probability 0, space 0, times 0 14:46:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80003) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 526.288587][T26522] CPU: 0 PID: 26522 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 526.296623][T26522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.306690][T26522] Call Trace: [ 526.306821][T26522] dump_stack+0x172/0x1f0 [ 526.306842][T26522] should_fail.cold+0xa/0x15 [ 526.306862][T26522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.306888][T26522] ? ___might_sleep+0x163/0x280 [ 526.329760][T26522] __should_failslab+0x121/0x190 [ 526.334715][T26522] should_failslab+0x9/0x14 [ 526.339232][T26522] kmem_cache_alloc_trace+0x2d1/0x760 [ 526.344612][T26522] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 526.344637][T26522] __memcg_init_list_lru_node+0x8a/0x1e0 [ 526.344657][T26522] __list_lru_init+0x3cf/0x6e0 [ 526.344677][T26522] alloc_super+0x762/0x890 [ 526.344695][T26522] ? test_single_super+0x10/0x10 [ 526.370185][T26522] sget_userns+0xf1/0x560 [ 526.374520][T26522] ? kill_litter_super+0x60/0x60 [ 526.379480][T26522] ? test_single_super+0x10/0x10 [ 526.384417][T26522] ? kill_litter_super+0x60/0x60 [ 526.389354][T26522] sget+0x10c/0x150 [ 526.393174][T26522] mount_bdev+0xff/0x3c0 [ 526.397421][T26522] ? hfs_show_options+0x630/0x630 [ 526.402454][T26522] hfs_mount+0x35/0x40 [ 526.406528][T26522] ? hfs_statfs+0x4b0/0x4b0 [ 526.411049][T26522] legacy_get_tree+0xf2/0x200 [ 526.415730][T26522] vfs_get_tree+0x123/0x450 [ 526.420250][T26522] do_mount+0x1436/0x2c40 [ 526.424590][T26522] ? copy_mount_string+0x40/0x40 [ 526.429545][T26522] ? _copy_from_user+0xdd/0x150 [ 526.434416][T26522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.440764][T26522] ? copy_mount_options+0x280/0x3a0 [ 526.445994][T26522] ksys_mount+0xdb/0x150 [ 526.450271][T26522] __x64_sys_mount+0xbe/0x150 [ 526.454969][T26522] do_syscall_64+0x103/0x610 [ 526.459568][T26522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.465464][T26522] RIP: 0033:0x45ad2a [ 526.469361][T26522] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:17 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 526.488970][T26522] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 526.497393][T26522] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 526.505363][T26522] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 526.513332][T26522] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 526.521305][T26522] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 526.529279][T26522] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x10000, 0x7f2, 0x8, 0xfffffffffffffc49, 0xffff}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x9}, &(0x7f0000000280)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r3, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000854}, 0x20000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:18 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 526.999702][T26548] FAULT_INJECTION: forcing a failure. [ 526.999702][T26548] name failslab, interval 1, probability 0, space 0, times 0 [ 527.029529][T26548] CPU: 1 PID: 26548 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 527.037546][T26548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.047612][T26548] Call Trace: [ 527.050928][T26548] dump_stack+0x172/0x1f0 [ 527.055290][T26548] should_fail.cold+0xa/0x15 [ 527.059935][T26548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.068815][T26548] ? ___might_sleep+0x163/0x280 [ 527.073690][T26548] __should_failslab+0x121/0x190 [ 527.078638][T26548] should_failslab+0x9/0x14 [ 527.083155][T26548] __kmalloc+0x2dc/0x740 [ 527.087407][T26548] ? lockdep_init_map+0x1be/0x6d0 [ 527.092438][T26548] ? prealloc_shrinker+0xa6/0x350 [ 527.097472][T26548] prealloc_shrinker+0xa6/0x350 [ 527.102334][T26548] alloc_super+0x710/0x890 [ 527.106771][T26548] ? test_single_super+0x10/0x10 [ 527.111719][T26548] sget_userns+0xf1/0x560 [ 527.116066][T26548] ? kill_litter_super+0x60/0x60 [ 527.121010][T26548] ? test_single_super+0x10/0x10 [ 527.125952][T26548] ? kill_litter_super+0x60/0x60 [ 527.130894][T26548] sget+0x10c/0x150 [ 527.134717][T26548] mount_bdev+0xff/0x3c0 [ 527.139322][T26548] ? hfs_show_options+0x630/0x630 [ 527.144362][T26548] hfs_mount+0x35/0x40 [ 527.148453][T26548] ? hfs_statfs+0x4b0/0x4b0 [ 527.152982][T26548] legacy_get_tree+0xf2/0x200 [ 527.157743][T26548] vfs_get_tree+0x123/0x450 [ 527.162258][T26548] do_mount+0x1436/0x2c40 [ 527.166601][T26548] ? copy_mount_string+0x40/0x40 [ 527.171527][T26548] ? _copy_from_user+0xdd/0x150 [ 527.176375][T26548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.182628][T26548] ? copy_mount_options+0x280/0x3a0 [ 527.187826][T26548] ksys_mount+0xdb/0x150 [ 527.192056][T26548] __x64_sys_mount+0xbe/0x150 [ 527.196721][T26548] do_syscall_64+0x103/0x610 [ 527.201306][T26548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.207180][T26548] RIP: 0033:0x45ad2a [ 527.211055][T26548] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 527.230660][T26548] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 527.239057][T26548] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 527.247017][T26548] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 527.254977][T26548] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 527.262930][T26548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 527.270906][T26548] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:18 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)='J', 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000a00)="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", 0x480, 0x0, 0x0, 0x0) 14:46:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) connect(r1, &(0x7f0000000840)=@caif=@dbg={0x25, 0x3, 0x5}, 0x80) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x100, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000140)="31bf61ef65ef961af85f6070929fdd1f826df61b18bf68884644cd4968d7c3273b29007499e042cb7646d9762cd832417c17f9827f468133f698189b316b50f858eb15ffb3f6ea27624f560fef1c631f4ef9d0bbfeed0e7739c68a56a1bc88feb5e6aad101ac4a29cf2cec2bf8dc1973d1039b8ff93dfe3ed234bc0fd785ca68c5534abb7143c5f2dfd081", 0x8b}, {&(0x7f0000000200)="9db6c42400494fce3a923e15a7e965084a36174021b7365c76f9ac41ff29a00dfabf39323b0fe1596c517de16d79c5777a2339a82aacee47e87694e4a0cb0c9b49c9713489fa090de0344281a363043d83cd77a1f2635c61d6fca69d40e93c3ef09344be8a849573a5e7b4301940720cd18c0e51af9d27fe08109cd5a7ffe4fbc034e861c6cbf145a0807599e012c76e0996269bfb5d4b527bb0165d28e0a20c430c3bbddb127a165959a454a9abb022dcdd46a64f101058efd630fc6252b38d53f43b0846e99891b1952d5dbc8e34bea6319cb02a9de231542b695d0b0b3afc581b49f3d47bcc4ef76d76a70e4b861a10", 0xf1, 0x7}, {&(0x7f0000000300)="8cdb72aeb60c44482dda74cfe13aecb17745c52ad1e4513d97b224ce6c3a29e196c88c8aed500be5c5ff728e716881b1d94d9f7c5357918f8aea84722c4007bf00191054cfa04ec7065a90a7331f5cd7981e8ba391dcdf7220a6d9106de1b14c609e1aa86781171afab2fc116e0bbee505daa09cb62832962d6de14568d43d1334a268c895bfd357b6d797bebae1974cef141a8be076dbc03ed6a5fa0e8b99e3ee3cb949f8b179f0", 0xa8}, {&(0x7f00000003c0)="5ff3b898bf6df9d9dbb8ff2ce65f33f42c5509c17eb73c3df905ed74d5c6967f21f4305179879411147cb9e4d2223f49f80244340a7c3ffb2bdabff0053871e1af7bbd022d8447343a70f1fb8cbf4ac2a5c52346a9e98b62809d90dcc6b9b5b45143be46c3a7", 0x66, 0x9}, {&(0x7f0000000440)="f6448942c16761294a20dd22f896a03245a600b43738841489a337b6b6c7acbdb741946dddd12ab8f0255b2d1f842882b0ff75c4cfd79edbbd94f39883779e569a13f0ddfff9569c1874cd7c28e5cad959bdafecdf9fb3c192cd8a615112", 0x5e, 0x7}, {&(0x7f00000004c0)="b11b9fc556352d5666a01c54492daa64b283d6415b374e7bef80c26aa8287fc384f9bb56ec12248aaf0b2ff41899791830bd5cadfdeffcbd3737ad19d8743d5b9956d9a9a937c96ffcbeb76bf5a79a140a39dbbf29480f86133e2372ee9587319105f9796c8fd149651baa9d1484e97978dd151d44ad05c2015bec6384c45c5f911b2b0e27547847acaed69f39611bff6978ef5599ae3f5ee3362cd7c90da42774baa8155a9c4b4e82e817488ed53bd8eec41eb77fdf84539546cad027d755dfa195901fc49f8fd100ba8039848f8cdb5479390377406bc4640ae79ee9a802", 0xdf}], 0x1009, &(0x7f0000000700)={[{@part={'part', 0x3d, 0x3}}, {@quiet='quiet'}, {@part={'part', 0x3d, 0x1}}, {@codepage={'codepage', 0x3d, 'maciceland'}}, {@file_umask={'file_umask', 0x3d, 0x5}}, {@file_umask={'file_umask', 0x3d, 0x7f}}, {@part={'part', 0x3d, 0x17f}}, {@session={'session', 0x3d, 0x7}}, {@creator={'creator', 0x3d, "c3750653"}}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_gt={'euid>', r2}}]}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:18 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:18 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2}]) io_destroy(r1) 14:46:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:18 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:19 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) [ 527.530164][T26563] FAULT_INJECTION: forcing a failure. [ 527.530164][T26563] name failslab, interval 1, probability 0, space 0, times 0 [ 527.544291][T26563] CPU: 0 PID: 26563 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 527.552284][T26563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.552313][T26563] Call Trace: [ 527.552340][T26563] dump_stack+0x172/0x1f0 [ 527.552365][T26563] should_fail.cold+0xa/0x15 [ 527.552388][T26563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.580423][T26563] ? ___might_sleep+0x163/0x280 [ 527.585290][T26563] __should_failslab+0x121/0x190 [ 527.590241][T26563] should_failslab+0x9/0x14 [ 527.594759][T26563] kmem_cache_alloc_trace+0x2d1/0x760 [ 527.594782][T26563] ? kasan_check_write+0x14/0x20 [ 527.594801][T26563] ? lock_downgrade+0x880/0x880 [ 527.594820][T26563] alloc_super+0x55/0x890 [ 527.594835][T26563] ? kasan_check_read+0x11/0x20 [ 527.594850][T26563] ? test_single_super+0x10/0x10 [ 527.594865][T26563] sget_userns+0xf1/0x560 [ 527.594877][T26563] ? kill_litter_super+0x60/0x60 [ 527.594891][T26563] ? test_single_super+0x10/0x10 [ 527.594902][T26563] ? kill_litter_super+0x60/0x60 [ 527.594914][T26563] sget+0x10c/0x150 [ 527.594931][T26563] mount_bdev+0xff/0x3c0 [ 527.594945][T26563] ? hfs_show_options+0x630/0x630 [ 527.594962][T26563] hfs_mount+0x35/0x40 [ 527.594975][T26563] ? hfs_statfs+0x4b0/0x4b0 [ 527.594998][T26563] legacy_get_tree+0xf2/0x200 [ 527.669604][T26563] vfs_get_tree+0x123/0x450 [ 527.674121][T26563] do_mount+0x1436/0x2c40 [ 527.678461][T26563] ? copy_mount_string+0x40/0x40 [ 527.683409][T26563] ? _copy_from_user+0xdd/0x150 [ 527.688272][T26563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.694520][T26563] ? copy_mount_options+0x280/0x3a0 [ 527.699737][T26563] ksys_mount+0xdb/0x150 [ 527.704020][T26563] __x64_sys_mount+0xbe/0x150 [ 527.708707][T26563] do_syscall_64+0x103/0x610 [ 527.713327][T26563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.719223][T26563] RIP: 0033:0x45ad2a [ 527.723119][T26563] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 527.742735][T26563] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 527.751171][T26563] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 527.759166][T26563] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 527.767146][T26563] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 527.775147][T26563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 527.783130][T26563] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = eventfd2(0x8, 0x1) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000180)={0x3, r2}) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x800) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000080)={0x9c1, 0x100, 0x0, 0x7, 0x40, 0x8, 0x100000000}, 0xc) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:19 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 14:46:19 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, r1) 14:46:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0xffffffffffffffbd) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:19 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4}]) io_destroy(r1) 14:46:19 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:19 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8000000000000071, 0xffff}, &(0x7f0000000040)=0x8) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r2, 0x6}, 0x8) 14:46:19 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x406, 0x0) dup2(r0, r1) 14:46:20 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x406, 0x0) dup2(r0, r1) 14:46:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 528.499614][T26605] FAULT_INJECTION: forcing a failure. [ 528.499614][T26605] name failslab, interval 1, probability 0, space 0, times 0 14:46:20 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 528.593728][T26605] CPU: 1 PID: 26605 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 528.601776][T26605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.611842][T26605] Call Trace: [ 528.615150][T26605] dump_stack+0x172/0x1f0 [ 528.619506][T26605] should_fail.cold+0xa/0x15 [ 528.624110][T26605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.630015][T26605] ? ___might_sleep+0x163/0x280 [ 528.634876][T26605] __should_failslab+0x121/0x190 [ 528.639824][T26605] should_failslab+0x9/0x14 [ 528.644332][T26605] kmem_cache_alloc_trace+0x2d1/0x760 [ 528.649714][T26605] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 528.655537][T26605] __memcg_init_list_lru_node+0x8a/0x1e0 [ 528.661181][T26605] __list_lru_init+0x3cf/0x6e0 [ 528.665953][T26605] alloc_super+0x762/0x890 [ 528.665968][T26605] ? test_single_super+0x10/0x10 [ 528.665984][T26605] sget_userns+0xf1/0x560 [ 528.665997][T26605] ? kill_litter_super+0x60/0x60 [ 528.666015][T26605] ? test_single_super+0x10/0x10 [ 528.689531][T26605] ? kill_litter_super+0x60/0x60 [ 528.689546][T26605] sget+0x10c/0x150 [ 528.689564][T26605] mount_bdev+0xff/0x3c0 [ 528.702522][T26605] ? hfs_show_options+0x630/0x630 [ 528.707551][T26605] hfs_mount+0x35/0x40 [ 528.707565][T26605] ? hfs_statfs+0x4b0/0x4b0 [ 528.707582][T26605] legacy_get_tree+0xf2/0x200 [ 528.707601][T26605] vfs_get_tree+0x123/0x450 [ 528.716153][T26605] do_mount+0x1436/0x2c40 [ 528.716173][T26605] ? copy_mount_string+0x40/0x40 [ 528.716195][T26605] ? _copy_from_user+0xdd/0x150 [ 528.725349][T26605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.725362][T26605] ? copy_mount_options+0x280/0x3a0 [ 528.725382][T26605] ksys_mount+0xdb/0x150 [ 528.755113][T26605] __x64_sys_mount+0xbe/0x150 [ 528.759805][T26605] do_syscall_64+0x103/0x610 [ 528.764406][T26605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.770296][T26605] RIP: 0033:0x45ad2a [ 528.774189][T26605] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:20 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 528.793806][T26605] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 528.802222][T26605] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 528.810194][T26605] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 528.818182][T26605] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 528.826153][T26605] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 528.834120][T26605] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:20 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x406, 0x0) dup2(r0, r1) 14:46:21 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfe}]) io_destroy(r1) 14:46:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x215e5a3cf9a16a48) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:21 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) [ 529.509357][T26629] FAULT_INJECTION: forcing a failure. [ 529.509357][T26629] name failslab, interval 1, probability 0, space 0, times 0 [ 529.522744][T26629] CPU: 0 PID: 26629 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 529.530757][T26629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.540825][T26629] Call Trace: [ 529.544127][T26629] dump_stack+0x172/0x1f0 [ 529.548469][T26629] should_fail.cold+0xa/0x15 [ 529.553078][T26629] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 529.558896][T26629] ? ___might_sleep+0x163/0x280 [ 529.563776][T26629] __should_failslab+0x121/0x190 [ 529.568721][T26629] should_failslab+0x9/0x14 [ 529.573238][T26629] kmem_cache_alloc_trace+0x2d1/0x760 [ 529.578618][T26629] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 529.584480][T26629] __memcg_init_list_lru_node+0x8a/0x1e0 [ 529.590125][T26629] __list_lru_init+0x3cf/0x6e0 [ 529.590146][T26629] alloc_super+0x762/0x890 [ 529.590161][T26629] ? test_single_super+0x10/0x10 [ 529.590180][T26629] sget_userns+0xf1/0x560 [ 529.608591][T26629] ? kill_litter_super+0x60/0x60 [ 529.613539][T26629] ? test_single_super+0x10/0x10 [ 529.618484][T26629] ? kill_litter_super+0x60/0x60 [ 529.623424][T26629] sget+0x10c/0x150 [ 529.627238][T26629] mount_bdev+0xff/0x3c0 [ 529.627254][T26629] ? hfs_show_options+0x630/0x630 [ 529.627272][T26629] hfs_mount+0x35/0x40 [ 529.627286][T26629] ? hfs_statfs+0x4b0/0x4b0 [ 529.627308][T26629] legacy_get_tree+0xf2/0x200 [ 529.640613][T26629] vfs_get_tree+0x123/0x450 [ 529.640631][T26629] do_mount+0x1436/0x2c40 14:46:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x2d9) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x105000, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) [ 529.640653][T26629] ? copy_mount_string+0x40/0x40 [ 529.640672][T26629] ? _copy_from_user+0xdd/0x150 [ 529.640693][T26629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.663582][T26629] ? copy_mount_options+0x280/0x3a0 [ 529.663602][T26629] ksys_mount+0xdb/0x150 [ 529.663620][T26629] __x64_sys_mount+0xbe/0x150 [ 529.663640][T26629] do_syscall_64+0x103/0x610 [ 529.663659][T26629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.663670][T26629] RIP: 0033:0x45ad2a 14:46:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x480000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000040)) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 529.663684][T26629] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 529.663691][T26629] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 529.663705][T26629] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 529.663713][T26629] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 529.663722][T26629] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 529.663730][T26629] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 529.663739][T26629] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 14:46:21 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}]) io_destroy(r1) 14:46:21 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:21 executing program 5: r0 = semget(0x0, 0x2, 0x21) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x1]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) write$binfmt_misc(r3, &(0x7f0000000140)={'syz1', "badd35a793898be63b96d5be49694f26fa7375d6c01a8cb637c5c58b9c9efcc8f2b78b3ac843de1c6babb1cbe1d4cbcb519dd50547b1c26d0608a4b8882d9d065f5ca25f8f1c5aa3935348f82170a4a5cbf279e717e39514c9a44e0f8b07851bc10420ef274e31209fa932b4431b3d2e2dfba7c9c8437c086d33eb9f42acef79e1a96cee1e3b8777d4d772c1e9c3"}, 0x92) 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r1) 14:46:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 529.956563][T26660] FAULT_INJECTION: forcing a failure. [ 529.956563][T26660] name failslab, interval 1, probability 0, space 0, times 0 [ 530.022447][T26660] CPU: 0 PID: 26660 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 530.030475][T26660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.040534][T26660] Call Trace: [ 530.043842][T26660] dump_stack+0x172/0x1f0 [ 530.048184][T26660] should_fail.cold+0xa/0x15 [ 530.052797][T26660] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.058610][T26660] ? ___might_sleep+0x163/0x280 [ 530.063476][T26660] __should_failslab+0x121/0x190 [ 530.068422][T26660] should_failslab+0x9/0x14 [ 530.072938][T26660] kmem_cache_alloc_trace+0x2d1/0x760 [ 530.078320][T26660] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 530.084146][T26660] __memcg_init_list_lru_node+0x8a/0x1e0 [ 530.089803][T26660] __list_lru_init+0x3cf/0x6e0 [ 530.094579][T26660] alloc_super+0x762/0x890 [ 530.099004][T26660] ? test_single_super+0x10/0x10 [ 530.103954][T26660] sget_userns+0xf1/0x560 [ 530.109808][T26660] ? kill_litter_super+0x60/0x60 [ 530.114763][T26660] ? test_single_super+0x10/0x10 [ 530.119712][T26660] ? kill_litter_super+0x60/0x60 [ 530.124668][T26660] sget+0x10c/0x150 [ 530.128482][T26660] mount_bdev+0xff/0x3c0 [ 530.132734][T26660] ? hfs_show_options+0x630/0x630 [ 530.137795][T26660] hfs_mount+0x35/0x40 [ 530.141871][T26660] ? hfs_statfs+0x4b0/0x4b0 [ 530.146380][T26660] legacy_get_tree+0xf2/0x200 [ 530.151066][T26660] vfs_get_tree+0x123/0x450 [ 530.155579][T26660] do_mount+0x1436/0x2c40 [ 530.159922][T26660] ? copy_mount_string+0x40/0x40 [ 530.164871][T26660] ? _copy_from_user+0xdd/0x150 [ 530.169734][T26660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.175993][T26660] ? copy_mount_options+0x280/0x3a0 [ 530.181202][T26660] ksys_mount+0xdb/0x150 [ 530.185458][T26660] __x64_sys_mount+0xbe/0x150 [ 530.190149][T26660] do_syscall_64+0x103/0x610 [ 530.194758][T26660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.200663][T26660] RIP: 0033:0x45ad2a 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r1) 14:46:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x7, 0x4, 0xfffffffffffffffc}) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000140)={"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"}) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 530.204566][T26660] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 530.224174][T26660] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 530.232599][T26660] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 530.240576][T26660] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 530.248555][T26660] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 530.256532][T26660] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 530.264539][T26660] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:21 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(0xffffffffffffffff, r1) 14:46:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(generic-gcm-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7, 0x40000) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f00000002c0)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="e0000000ff56e173703325520a1e3390f5087c6bae55d0ba9b400efae014b4bb1fd6c3fb547b57efde41c16c0c49eb8bcce972", @ANYRES16=r2, @ANYBLOB="000125bd7000fedbdf250e000000540001002400020008000300458f0000080002000000000008000200a600000008000300030000002c000200080004000600000008000400000000000800030002000000080002002c0000000800020002000000400007000c00040009000000000000000c000300000000000000000008000100010100000c0004000080000000000000080002000800000008000200175b0000380007000c00040000000000000000000c000400f001000000000000080001000000000008000100060000000c000400e20d000000000000"], 0xe0}, 0x1, 0x0, 0x0, 0x800}, 0x4804) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x24000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x24, r4, 0x104, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x66b5}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x20200) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:22 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xeffd}]) io_destroy(r1) 14:46:22 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, 0xffffffffffffffff) 14:46:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x1000, &(0x7f0000000080)=0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:22 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 530.966133][T26704] FAULT_INJECTION: forcing a failure. [ 530.966133][T26704] name failslab, interval 1, probability 0, space 0, times 0 14:46:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 531.023589][T26704] CPU: 1 PID: 26704 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 531.031612][T26704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.041678][T26704] Call Trace: [ 531.044985][T26704] dump_stack+0x172/0x1f0 [ 531.049339][T26704] should_fail.cold+0xa/0x15 [ 531.053947][T26704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.059784][T26704] ? ___might_sleep+0x163/0x280 [ 531.068203][T26704] __should_failslab+0x121/0x190 [ 531.073151][T26704] should_failslab+0x9/0x14 [ 531.077664][T26704] kmem_cache_alloc_trace+0x2d1/0x760 [ 531.083060][T26704] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 531.088889][T26704] __memcg_init_list_lru_node+0x8a/0x1e0 [ 531.094535][T26704] __list_lru_init+0x3cf/0x6e0 [ 531.099398][T26704] alloc_super+0x762/0x890 [ 531.103822][T26704] ? test_single_super+0x10/0x10 [ 531.108775][T26704] sget_userns+0xf1/0x560 [ 531.113108][T26704] ? kill_litter_super+0x60/0x60 [ 531.118055][T26704] ? test_single_super+0x10/0x10 14:46:22 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 531.122990][T26704] ? kill_litter_super+0x60/0x60 [ 531.127938][T26704] sget+0x10c/0x150 [ 531.131765][T26704] mount_bdev+0xff/0x3c0 [ 531.136013][T26704] ? hfs_show_options+0x630/0x630 [ 531.141049][T26704] hfs_mount+0x35/0x40 [ 531.145127][T26704] ? hfs_statfs+0x4b0/0x4b0 [ 531.149649][T26704] legacy_get_tree+0xf2/0x200 [ 531.154347][T26704] vfs_get_tree+0x123/0x450 [ 531.158864][T26704] do_mount+0x1436/0x2c40 [ 531.163207][T26704] ? copy_mount_string+0x40/0x40 [ 531.168178][T26704] ? _copy_from_user+0xdd/0x150 [ 531.173041][T26704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.179296][T26704] ? copy_mount_options+0x280/0x3a0 [ 531.184504][T26704] ksys_mount+0xdb/0x150 [ 531.188766][T26704] __x64_sys_mount+0xbe/0x150 [ 531.193452][T26704] do_syscall_64+0x103/0x610 [ 531.198059][T26704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.203955][T26704] RIP: 0033:0x45ad2a 14:46:22 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 531.207855][T26704] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 531.227470][T26704] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.235898][T26704] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 531.245382][T26704] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 531.253358][T26704] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 531.261333][T26704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:22 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, 0xffffffffffffffff) 14:46:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 531.269310][T26704] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:23 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 531.676001][T26726] FAULT_INJECTION: forcing a failure. [ 531.676001][T26726] name failslab, interval 1, probability 0, space 0, times 0 [ 531.722156][T26726] CPU: 0 PID: 26726 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 531.730147][T26726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.740197][T26726] Call Trace: [ 531.743506][T26726] dump_stack+0x172/0x1f0 [ 531.747934][T26726] should_fail.cold+0xa/0x15 [ 531.752533][T26726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.758348][T26726] ? ___might_sleep+0x163/0x280 [ 531.763209][T26726] __should_failslab+0x121/0x190 [ 531.768149][T26726] should_failslab+0x9/0x14 [ 531.772656][T26726] kmem_cache_alloc_trace+0x2d1/0x760 [ 531.778041][T26726] __memcg_init_list_lru_node+0x8a/0x1e0 [ 531.783678][T26726] __list_lru_init+0x3cf/0x6e0 [ 531.788453][T26726] alloc_super+0x762/0x890 [ 531.792876][T26726] ? test_single_super+0x10/0x10 [ 531.797817][T26726] sget_userns+0xf1/0x560 [ 531.802146][T26726] ? kill_litter_super+0x60/0x60 [ 531.807095][T26726] ? test_single_super+0x10/0x10 [ 531.812033][T26726] ? kill_litter_super+0x60/0x60 [ 531.816972][T26726] sget+0x10c/0x150 [ 531.820802][T26726] mount_bdev+0xff/0x3c0 [ 531.825052][T26726] ? hfs_show_options+0x630/0x630 [ 531.830085][T26726] hfs_mount+0x35/0x40 [ 531.834156][T26726] ? hfs_statfs+0x4b0/0x4b0 [ 531.838665][T26726] legacy_get_tree+0xf2/0x200 [ 531.843349][T26726] vfs_get_tree+0x123/0x450 [ 531.847856][T26726] do_mount+0x1436/0x2c40 [ 531.852195][T26726] ? copy_mount_string+0x40/0x40 [ 531.857134][T26726] ? copy_mount_options+0x1ea/0x3a0 [ 531.862332][T26726] ? copy_mount_options+0x1f3/0x3a0 [ 531.867533][T26726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.874033][T26726] ? copy_mount_options+0x280/0x3a0 [ 531.879241][T26726] ksys_mount+0xdb/0x150 [ 531.883486][T26726] __x64_sys_mount+0xbe/0x150 [ 531.888170][T26726] do_syscall_64+0x103/0x610 [ 531.892805][T26726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.898703][T26726] RIP: 0033:0x45ad2a [ 531.902605][T26726] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:23 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfcfd}]) io_destroy(r1) 14:46:23 executing program 4: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:23 executing program 5: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @remote, @bcast, 0x1, @null}, &(0x7f0000000040)=0x1c, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x9, @default, @netrom={'nr', 0x0}, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @null, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:23 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) dup2(r0, 0xffffffffffffffff) 14:46:23 executing program 1: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x8000000009917, 0x400000000000fffd}, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$smack_current(0xffffffffffffffff, 0x0, 0x0) getgid() getegid() fstat(0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 531.922208][T26726] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 531.922223][T26726] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 531.922233][T26726] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 531.922242][T26726] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 531.922250][T26726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 531.922265][T26726] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:23 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x71, 0x80800) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000280)=0x60) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x4, r2, 0x2d, 0xffffffffffffff9c}, 0x10) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x76, 0x7, 0x8000}, 0x4) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 532.191311][T26752] FAULT_INJECTION: forcing a failure. [ 532.191311][T26752] name failslab, interval 1, probability 0, space 0, times 0 [ 532.229670][T26752] CPU: 0 PID: 26752 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 532.237694][T26752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.247764][T26752] Call Trace: [ 532.251078][T26752] dump_stack+0x172/0x1f0 [ 532.255424][T26752] should_fail.cold+0xa/0x15 [ 532.260021][T26752] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.265839][T26752] ? ___might_sleep+0x163/0x280 [ 532.270699][T26752] __should_failslab+0x121/0x190 [ 532.275642][T26752] should_failslab+0x9/0x14 [ 532.280151][T26752] kmem_cache_alloc_trace+0x2d1/0x760 [ 532.285536][T26752] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 532.291356][T26752] __memcg_init_list_lru_node+0x8a/0x1e0 [ 532.296994][T26752] __list_lru_init+0x3cf/0x6e0 [ 532.301786][T26752] alloc_super+0x762/0x890 [ 532.306207][T26752] ? test_single_super+0x10/0x10 [ 532.311176][T26752] sget_userns+0xf1/0x560 [ 532.315510][T26752] ? kill_litter_super+0x60/0x60 [ 532.320456][T26752] ? test_single_super+0x10/0x10 [ 532.325391][T26752] ? kill_litter_super+0x60/0x60 [ 532.330334][T26752] sget+0x10c/0x150 [ 532.334155][T26752] mount_bdev+0xff/0x3c0 [ 532.338404][T26752] ? hfs_show_options+0x630/0x630 [ 532.343439][T26752] hfs_mount+0x35/0x40 [ 532.347514][T26752] ? hfs_statfs+0x4b0/0x4b0 [ 532.352024][T26752] legacy_get_tree+0xf2/0x200 [ 532.356711][T26752] vfs_get_tree+0x123/0x450 [ 532.361231][T26752] do_mount+0x1436/0x2c40 [ 532.365570][T26752] ? copy_mount_string+0x40/0x40 [ 532.370514][T26752] ? _copy_from_user+0xdd/0x150 [ 532.375372][T26752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.381617][T26752] ? copy_mount_options+0x280/0x3a0 [ 532.386828][T26752] ksys_mount+0xdb/0x150 [ 532.391075][T26752] __x64_sys_mount+0xbe/0x150 [ 532.395777][T26752] do_syscall_64+0x103/0x610 [ 532.400380][T26752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.406275][T26752] RIP: 0033:0x45ad2a [ 532.410181][T26752] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 532.429798][T26752] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:46:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 532.438217][T26752] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 532.446187][T26752] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 532.454160][T26752] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 532.462133][T26752] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 532.470106][T26752] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) accept$alg(r0, 0x0, 0x0) 14:46:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x18) 14:46:24 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfdef}]) io_destroy(r1) 14:46:24 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 533.029898][T26778] FAULT_INJECTION: forcing a failure. [ 533.029898][T26778] name failslab, interval 1, probability 0, space 0, times 0 [ 533.067465][T26778] CPU: 0 PID: 26778 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 533.080259][T26778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.090326][T26778] Call Trace: [ 533.093632][T26778] dump_stack+0x172/0x1f0 [ 533.097973][T26778] should_fail.cold+0xa/0x15 [ 533.097993][T26778] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.098017][T26778] ? ___might_sleep+0x163/0x280 [ 533.108397][T26778] __should_failslab+0x121/0x190 [ 533.108423][T26778] should_failslab+0x9/0x14 [ 533.122714][T26778] kmem_cache_alloc_trace+0x2d1/0x760 [ 533.128124][T26778] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 533.134047][T26778] __memcg_init_list_lru_node+0x8a/0x1e0 [ 533.139692][T26778] __list_lru_init+0x3cf/0x6e0 [ 533.144468][T26778] alloc_super+0x762/0x890 [ 533.148886][T26778] ? test_single_super+0x10/0x10 [ 533.153825][T26778] sget_userns+0xf1/0x560 [ 533.158164][T26778] ? kill_litter_super+0x60/0x60 [ 533.163110][T26778] ? test_single_super+0x10/0x10 [ 533.168050][T26778] ? kill_litter_super+0x60/0x60 [ 533.172989][T26778] sget+0x10c/0x150 [ 533.176810][T26778] mount_bdev+0xff/0x3c0 [ 533.181058][T26778] ? hfs_show_options+0x630/0x630 [ 533.186095][T26778] hfs_mount+0x35/0x40 [ 533.190173][T26778] ? hfs_statfs+0x4b0/0x4b0 [ 533.194683][T26778] legacy_get_tree+0xf2/0x200 [ 533.199364][T26778] vfs_get_tree+0x123/0x450 [ 533.203874][T26778] do_mount+0x1436/0x2c40 [ 533.208216][T26778] ? copy_mount_string+0x40/0x40 [ 533.213167][T26778] ? _copy_from_user+0xdd/0x150 [ 533.218028][T26778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.224274][T26778] ? copy_mount_options+0x280/0x3a0 [ 533.229483][T26778] ksys_mount+0xdb/0x150 [ 533.233732][T26778] __x64_sys_mount+0xbe/0x150 [ 533.239185][T26778] do_syscall_64+0x103/0x610 [ 533.243804][T26778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.249697][T26778] RIP: 0033:0x45ad2a [ 533.253605][T26778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WMz]\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4%\xef\x93\xb4D\xc5\xa7\x8d\x01\xe6\x18\xff>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x82\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:\bE\x96~\x0e\xe8Y\xbbn\x0f0x0}, &(0x7f0000000500)=0xc) stat(0x0, &(0x7f0000000380)) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, 0x4e20, 0x8, 0x4e24, 0x0, 0xa, 0x0, 0x0, 0x2b, r3}, {0x7, 0x3ff, 0x9d, 0x6, 0x3, 0x0, 0x6, 0x2}, {0x0, 0x1, 0x1, 0xca07}, 0x0, 0x6e6bc0, 0x0, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x20}, 0x4d6}, 0xa, @in6=@ipv4={[], [], @local}, 0x0, 0x3, 0x3, 0x401, 0x7, 0x5, 0x4}}, 0xe8) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) 14:46:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r2) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 533.273213][T26778] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 533.281627][T26778] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 533.289605][T26778] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 533.297595][T26778] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 533.305565][T26778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 533.313537][T26778] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xa6e, 0x40000) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/152, 0x98, 0x101, &(0x7f0000000200)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x24) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) bind$can_raw(r1, &(0x7f0000000380)={0x1d, r2}, 0x10) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000340)=0xffffffff, 0x4) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, 0x1, 0x3, 0x8, &(0x7f0000ffc000/0x4000)=nil, 0x3}) 14:46:24 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:24 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) r0 = syz_open_procfs(0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5}) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000200)) mlockall(0x7) munlockall() 14:46:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffb, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000040)={0x3, 0x9274, 0x1000, 0x879e, 0x4, 0x9}) 14:46:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 533.680956][T26804] FAULT_INJECTION: forcing a failure. [ 533.680956][T26804] name failslab, interval 1, probability 0, space 0, times 0 [ 533.717716][T26804] CPU: 1 PID: 26804 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 533.725736][T26804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.735821][T26804] Call Trace: [ 533.739127][T26804] dump_stack+0x172/0x1f0 [ 533.743469][T26804] should_fail.cold+0xa/0x15 [ 533.748087][T26804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.753901][T26804] ? ___might_sleep+0x163/0x280 [ 533.758766][T26804] __should_failslab+0x121/0x190 [ 533.763706][T26804] should_failslab+0x9/0x14 [ 533.768231][T26804] kmem_cache_alloc_trace+0x2d1/0x760 [ 533.773624][T26804] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 533.779450][T26804] __memcg_init_list_lru_node+0x8a/0x1e0 [ 533.785093][T26804] __list_lru_init+0x3cf/0x6e0 [ 533.789868][T26804] alloc_super+0x762/0x890 [ 533.794325][T26804] ? test_single_super+0x10/0x10 [ 533.799278][T26804] sget_userns+0xf1/0x560 [ 533.803609][T26804] ? kill_litter_super+0x60/0x60 [ 533.803626][T26804] ? test_single_super+0x10/0x10 [ 533.803638][T26804] ? kill_litter_super+0x60/0x60 [ 533.803652][T26804] sget+0x10c/0x150 [ 533.803670][T26804] mount_bdev+0xff/0x3c0 [ 533.803683][T26804] ? hfs_show_options+0x630/0x630 [ 533.803702][T26804] hfs_mount+0x35/0x40 [ 533.831504][T26804] ? hfs_statfs+0x4b0/0x4b0 [ 533.831524][T26804] legacy_get_tree+0xf2/0x200 [ 533.831542][T26804] vfs_get_tree+0x123/0x450 [ 533.849247][T26804] do_mount+0x1436/0x2c40 [ 533.853594][T26804] ? copy_mount_string+0x40/0x40 [ 533.858538][T26804] ? _copy_from_user+0xdd/0x150 [ 533.863400][T26804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.869643][T26804] ? copy_mount_options+0x280/0x3a0 [ 533.874845][T26804] ksys_mount+0xdb/0x150 [ 533.879096][T26804] __x64_sys_mount+0xbe/0x150 [ 533.883793][T26804] do_syscall_64+0x103/0x610 [ 533.888409][T26804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.894305][T26804] RIP: 0033:0x45ad2a [ 533.898200][T26804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 533.917803][T26804] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 533.926214][T26804] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 533.934188][T26804] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 533.942160][T26804] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 533.950129][T26804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 533.958103][T26804] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:25 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfdfc}]) io_destroy(r1) 14:46:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) sendto$isdn(r0, &(0x7f0000000300)={0xfffffffffffffff7, 0x7f, "e20f5eb01590a37be861aaecbe1fe4dbdcf57bfe16f883141d5d55d7a6d4f230c62aaa46eef4db99009c3bb92cb9587261386b73fbed79b53f79cf3aa44ca0c75c58ceb9e2e016a37a46f075f0d195b7bc392376dd68"}, 0x5e, 0x0, &(0x7f0000000380)={0x22, 0x4, 0x4f, 0x0, 0xfffffffffffff86c}, 0x6) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) io_setup(0xfffffffffffffff7, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) io_pgetevents(r3, 0x1, 0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}], &(0x7f0000000200)={r4, r5+30000000}, &(0x7f0000000280)={&(0x7f0000000240)={0x9}, 0x8}) r6 = msgget(0x2, 0x80) r7 = getuid() r8 = getegid() r9 = getuid() getgroups(0x4, &(0x7f00000003c0)=[0x0, 0x0, 0xee01, 0xee00]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) r12 = fcntl$getown(r2, 0x9) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000440)={{0x1, r7, r8, r9, r10, 0x40, 0x1}, 0x3, 0x3, 0x200, 0x101, 0x5, 0x1, r11, r12}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:25 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:25 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 534.234834][T26823] FAULT_INJECTION: forcing a failure. [ 534.234834][T26823] name failslab, interval 1, probability 0, space 0, times 0 [ 534.260321][T26823] CPU: 0 PID: 26823 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 534.268320][T26823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.278402][T26823] Call Trace: [ 534.281705][T26823] dump_stack+0x172/0x1f0 [ 534.286067][T26823] should_fail.cold+0xa/0x15 [ 534.290664][T26823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 534.296480][T26823] ? ___might_sleep+0x163/0x280 [ 534.301340][T26823] __should_failslab+0x121/0x190 [ 534.306281][T26823] should_failslab+0x9/0x14 [ 534.310796][T26823] kmem_cache_alloc_node_trace+0x270/0x720 [ 534.316605][T26823] ? kmem_cache_alloc_trace+0x354/0x760 [ 534.322156][T26823] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 534.327970][T26823] __kmalloc_node+0x3d/0x70 [ 534.332484][T26823] kvmalloc_node+0x68/0x100 [ 534.336994][T26823] __list_lru_init+0x4a6/0x6e0 [ 534.341769][T26823] alloc_super+0x762/0x890 [ 534.346225][T26823] ? test_single_super+0x10/0x10 [ 534.351163][T26823] sget_userns+0xf1/0x560 [ 534.355495][T26823] ? kill_litter_super+0x60/0x60 [ 534.360433][T26823] ? test_single_super+0x10/0x10 [ 534.365367][T26823] ? kill_litter_super+0x60/0x60 [ 534.370304][T26823] sget+0x10c/0x150 [ 534.374125][T26823] mount_bdev+0xff/0x3c0 [ 534.378366][T26823] ? hfs_show_options+0x630/0x630 [ 534.383395][T26823] hfs_mount+0x35/0x40 [ 534.387465][T26823] ? hfs_statfs+0x4b0/0x4b0 [ 534.391978][T26823] legacy_get_tree+0xf2/0x200 [ 534.396663][T26823] vfs_get_tree+0x123/0x450 [ 534.401173][T26823] do_mount+0x1436/0x2c40 [ 534.405511][T26823] ? copy_mount_string+0x40/0x40 [ 534.410456][T26823] ? _copy_from_user+0xdd/0x150 [ 534.415317][T26823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.421655][T26823] ? copy_mount_options+0x280/0x3a0 [ 534.426858][T26823] ksys_mount+0xdb/0x150 [ 534.431123][T26823] __x64_sys_mount+0xbe/0x150 [ 534.435817][T26823] do_syscall_64+0x103/0x610 [ 534.440417][T26823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.446306][T26823] RIP: 0033:0x45ad2a [ 534.450205][T26823] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 534.469812][T26823] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 534.478223][T26823] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 534.486189][T26823] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 534.494168][T26823] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 534.502139][T26823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 534.510106][T26823] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x80000000, 0x7fff, 0x8}, &(0x7f0000000180)=0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 14:46:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="f3588fc0a870d0ac51a8cc87f8f9c25060ead4981d830d9ddc29eae5936529e36080cae1f9ebc20d7e5c233b494d777dc6d3eec9987658cc0d658e08a1fdd6cd727e365f9fdd864ac146d9e094db8a805b0143cd347ddefb659a2580", 0x5c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:26 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfdfe}]) io_destroy(r1) 14:46:26 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:26 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@local, @rand_addr=0x7, r2}, 0xc) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000240)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xce, 0xffff, 0x400, 0xfff, 0xf15, 0x4, 0x100000000, 0x9, 0x0, 0x1, 0x1, 0xa65, 0x0, 0x6, 0x1, 0x7], 0xf002, 0x200100}) 14:46:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 535.312300][T26856] FAULT_INJECTION: forcing a failure. [ 535.312300][T26856] name failslab, interval 1, probability 0, space 0, times 0 [ 535.358963][T26856] CPU: 0 PID: 26856 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 535.366987][T26856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.377046][T26856] Call Trace: [ 535.380380][T26856] dump_stack+0x172/0x1f0 [ 535.384728][T26856] should_fail.cold+0xa/0x15 [ 535.389343][T26856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 535.395161][T26856] ? ___might_sleep+0x163/0x280 [ 535.400110][T26856] __should_failslab+0x121/0x190 [ 535.405059][T26856] should_failslab+0x9/0x14 [ 535.409579][T26856] kmem_cache_alloc_trace+0x2d1/0x760 [ 535.414957][T26856] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 535.420875][T26856] __memcg_init_list_lru_node+0x8a/0x1e0 [ 535.426524][T26856] __list_lru_init+0x3cf/0x6e0 [ 535.431294][T26856] alloc_super+0x762/0x890 [ 535.435720][T26856] ? test_single_super+0x10/0x10 [ 535.440702][T26856] sget_userns+0xf1/0x560 [ 535.445048][T26856] ? kill_litter_super+0x60/0x60 [ 535.450081][T26856] ? test_single_super+0x10/0x10 [ 535.455017][T26856] ? kill_litter_super+0x60/0x60 [ 535.459955][T26856] sget+0x10c/0x150 [ 535.463789][T26856] mount_bdev+0xff/0x3c0 [ 535.468034][T26856] ? hfs_show_options+0x630/0x630 [ 535.473070][T26856] hfs_mount+0x35/0x40 [ 535.477140][T26856] ? hfs_statfs+0x4b0/0x4b0 [ 535.477159][T26856] legacy_get_tree+0xf2/0x200 [ 535.477176][T26856] vfs_get_tree+0x123/0x450 [ 535.477195][T26856] do_mount+0x1436/0x2c40 [ 535.495160][T26856] ? copy_mount_string+0x40/0x40 [ 535.500112][T26856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:46:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffffb7) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 535.506351][T26856] ? copy_mount_options+0x280/0x3a0 [ 535.511561][T26856] ksys_mount+0xdb/0x150 [ 535.515805][T26856] __x64_sys_mount+0xbe/0x150 [ 535.515827][T26856] do_syscall_64+0x103/0x610 [ 535.515848][T26856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.530956][T26856] RIP: 0033:0x45ad2a [ 535.534848][T26856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 535.554450][T26856] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 535.554466][T26856] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 535.554473][T26856] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 535.554481][T26856] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 535.554489][T26856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 535.554497][T26856] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:27 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfe00}]) io_destroy(r1) 14:46:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4400, 0x0) fcntl$getown(r1, 0x9) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000001c0)=0x1c) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000080)=0xc4f4) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x10001) 14:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:27 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x4, 0xa094f7b794f229db, 0x1, 0x6, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2}, 0x8) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r3 = dup3(r0, r0, 0x80000) write$apparmor_exec(r3, &(0x7f0000000000)={'stack ', 'bdev!@.\x00'}, 0xe) 14:46:27 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 536.185902][T26886] FAULT_INJECTION: forcing a failure. [ 536.185902][T26886] name failslab, interval 1, probability 0, space 0, times 0 14:46:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 536.281029][T26886] CPU: 0 PID: 26886 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 536.289048][T26886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.299187][T26886] Call Trace: [ 536.302484][T26886] dump_stack+0x172/0x1f0 [ 536.306836][T26886] should_fail.cold+0xa/0x15 [ 536.311440][T26886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.317255][T26886] ? ___might_sleep+0x163/0x280 [ 536.322110][T26886] __should_failslab+0x121/0x190 [ 536.327054][T26886] should_failslab+0x9/0x14 [ 536.331564][T26886] kmem_cache_alloc_trace+0x2d1/0x760 [ 536.336945][T26886] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 536.342776][T26886] __memcg_init_list_lru_node+0x8a/0x1e0 [ 536.348419][T26886] __list_lru_init+0x3cf/0x6e0 [ 536.353187][T26886] alloc_super+0x762/0x890 [ 536.357604][T26886] ? test_single_super+0x10/0x10 [ 536.362540][T26886] sget_userns+0xf1/0x560 [ 536.366868][T26886] ? kill_litter_super+0x60/0x60 [ 536.371810][T26886] ? test_single_super+0x10/0x10 [ 536.376762][T26886] ? kill_litter_super+0x60/0x60 [ 536.381711][T26886] sget+0x10c/0x150 [ 536.385532][T26886] mount_bdev+0xff/0x3c0 [ 536.389788][T26886] ? hfs_show_options+0x630/0x630 [ 536.394816][T26886] hfs_mount+0x35/0x40 [ 536.398888][T26886] ? hfs_statfs+0x4b0/0x4b0 [ 536.403400][T26886] legacy_get_tree+0xf2/0x200 [ 536.408080][T26886] vfs_get_tree+0x123/0x450 [ 536.412592][T26886] do_mount+0x1436/0x2c40 [ 536.416934][T26886] ? copy_mount_string+0x40/0x40 [ 536.421880][T26886] ? _copy_from_user+0xdd/0x150 [ 536.426742][T26886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.432998][T26886] ? copy_mount_options+0x280/0x3a0 [ 536.438204][T26886] ksys_mount+0xdb/0x150 [ 536.442457][T26886] __x64_sys_mount+0xbe/0x150 [ 536.447146][T26886] do_syscall_64+0x103/0x610 [ 536.451740][T26886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.457640][T26886] RIP: 0033:0x45ad2a [ 536.461538][T26886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:28 executing program 5: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @random}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="08000000961a7c2a0b883b603e4799afbbe15f017bc07c3012950879cf2a7076722249638bcd9bd3070000009e5f121b4879f443e26024da1f5297bfc3e982c0aa08"], &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e20, @local}}, 0x2, 0xf9}, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 536.481144][T26886] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 536.489556][T26886] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 536.497530][T26886] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 536.505504][T26886] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 536.513475][T26886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 536.521440][T26886] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:28 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:28 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfefd}]) io_destroy(r1) 14:46:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9, 0x88afa7beb5882bbd) bind$xdp(r1, &(0x7f0000000180)={0x2c, 0x6, r2, 0x2b, r3}, 0x10) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:28 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:28 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 537.151180][T26920] FAULT_INJECTION: forcing a failure. [ 537.151180][T26920] name failslab, interval 1, probability 0, space 0, times 0 14:46:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x200000000004) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 537.213000][T26920] CPU: 1 PID: 26920 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 537.221019][T26920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.231074][T26920] Call Trace: [ 537.234374][T26920] dump_stack+0x172/0x1f0 [ 537.239659][T26920] should_fail.cold+0xa/0x15 [ 537.244318][T26920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.250131][T26920] ? ___might_sleep+0x163/0x280 [ 537.254989][T26920] __should_failslab+0x121/0x190 [ 537.259927][T26920] should_failslab+0x9/0x14 [ 537.264435][T26920] kmem_cache_alloc_trace+0x2d1/0x760 [ 537.269812][T26920] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 537.275625][T26920] __memcg_init_list_lru_node+0x8a/0x1e0 [ 537.281267][T26920] __list_lru_init+0x3cf/0x6e0 [ 537.286044][T26920] alloc_super+0x762/0x890 [ 537.290460][T26920] ? test_single_super+0x10/0x10 [ 537.295406][T26920] sget_userns+0xf1/0x560 [ 537.299733][T26920] ? kill_litter_super+0x60/0x60 [ 537.304679][T26920] ? test_single_super+0x10/0x10 [ 537.309612][T26920] ? kill_litter_super+0x60/0x60 [ 537.314545][T26920] sget+0x10c/0x150 [ 537.318356][T26920] mount_bdev+0xff/0x3c0 [ 537.322604][T26920] ? hfs_show_options+0x630/0x630 [ 537.327630][T26920] hfs_mount+0x35/0x40 [ 537.331700][T26920] ? hfs_statfs+0x4b0/0x4b0 [ 537.336206][T26920] legacy_get_tree+0xf2/0x200 [ 537.340887][T26920] vfs_get_tree+0x123/0x450 [ 537.345391][T26920] do_mount+0x1436/0x2c40 [ 537.349728][T26920] ? copy_mount_string+0x40/0x40 [ 537.354675][T26920] ? _copy_from_user+0xdd/0x150 [ 537.359534][T26920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.365784][T26920] ? copy_mount_options+0x280/0x3a0 [ 537.370987][T26920] ksys_mount+0xdb/0x150 [ 537.375231][T26920] __x64_sys_mount+0xbe/0x150 [ 537.379912][T26920] do_syscall_64+0x103/0x610 [ 537.384506][T26920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.390395][T26920] RIP: 0033:0x45ad2a [ 537.394297][T26920] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:29 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:29 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 537.413897][T26920] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 537.422315][T26920] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 537.430292][T26920] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 537.438264][T26920] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 537.446242][T26920] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 537.454219][T26920] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffd4f) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) 14:46:29 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:29 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfeffff}]) io_destroy(r1) 14:46:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:29 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000040)=""/29) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:29 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 538.150541][T26947] FAULT_INJECTION: forcing a failure. [ 538.150541][T26947] name failslab, interval 1, probability 0, space 0, times 0 [ 538.183447][T26947] CPU: 0 PID: 26947 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 14:46:29 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 538.191457][T26947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.201510][T26947] Call Trace: [ 538.204822][T26947] dump_stack+0x172/0x1f0 [ 538.209166][T26947] should_fail.cold+0xa/0x15 [ 538.213779][T26947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.219594][T26947] ? ___might_sleep+0x163/0x280 [ 538.224455][T26947] __should_failslab+0x121/0x190 [ 538.229405][T26947] should_failslab+0x9/0x14 [ 538.233915][T26947] kmem_cache_alloc_trace+0x2d1/0x760 [ 538.239299][T26947] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 538.245122][T26947] __memcg_init_list_lru_node+0x8a/0x1e0 [ 538.250792][T26947] __list_lru_init+0x3cf/0x6e0 [ 538.255569][T26947] alloc_super+0x762/0x890 [ 538.259989][T26947] ? test_single_super+0x10/0x10 [ 538.264931][T26947] sget_userns+0xf1/0x560 [ 538.269263][T26947] ? kill_litter_super+0x60/0x60 [ 538.274237][T26947] ? test_single_super+0x10/0x10 [ 538.279174][T26947] ? kill_litter_super+0x60/0x60 [ 538.284113][T26947] sget+0x10c/0x150 [ 538.287931][T26947] mount_bdev+0xff/0x3c0 [ 538.292182][T26947] ? hfs_show_options+0x630/0x630 [ 538.297216][T26947] hfs_mount+0x35/0x40 [ 538.301291][T26947] ? hfs_statfs+0x4b0/0x4b0 [ 538.305805][T26947] legacy_get_tree+0xf2/0x200 [ 538.310482][T26947] vfs_get_tree+0x123/0x450 [ 538.315000][T26947] do_mount+0x1436/0x2c40 [ 538.319331][T26947] ? copy_mount_string+0x40/0x40 [ 538.319351][T26947] ? _copy_from_user+0xdd/0x150 [ 538.319372][T26947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.319385][T26947] ? copy_mount_options+0x280/0x3a0 [ 538.319403][T26947] ksys_mount+0xdb/0x150 [ 538.319421][T26947] __x64_sys_mount+0xbe/0x150 14:46:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 538.349483][T26947] do_syscall_64+0x103/0x610 [ 538.354081][T26947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.359974][T26947] RIP: 0033:0x45ad2a [ 538.363869][T26947] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 538.383515][T26947] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 538.383531][T26947] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:29 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 538.383538][T26947] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 538.383546][T26947] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 538.383553][T26947] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 538.383562][T26947] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:30 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:30 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 538.624323][T26973] FAULT_INJECTION: forcing a failure. [ 538.624323][T26973] name failslab, interval 1, probability 0, space 0, times 0 [ 538.658826][T26973] CPU: 1 PID: 26973 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 538.666856][T26973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.676939][T26973] Call Trace: [ 538.680288][T26973] dump_stack+0x172/0x1f0 [ 538.684638][T26973] should_fail.cold+0xa/0x15 [ 538.689256][T26973] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.695118][T26973] ? ___might_sleep+0x163/0x280 [ 538.699998][T26973] __should_failslab+0x121/0x190 [ 538.704944][T26973] should_failslab+0x9/0x14 [ 538.709457][T26973] kmem_cache_alloc_trace+0x2d1/0x760 [ 538.714850][T26973] __memcg_init_list_lru_node+0x8a/0x1e0 [ 538.720493][T26973] __list_lru_init+0x3cf/0x6e0 [ 538.725306][T26973] alloc_super+0x762/0x890 [ 538.729783][T26973] ? test_single_super+0x10/0x10 [ 538.734741][T26973] sget_userns+0xf1/0x560 [ 538.739082][T26973] ? kill_litter_super+0x60/0x60 [ 538.744073][T26973] ? test_single_super+0x10/0x10 [ 538.749045][T26973] ? kill_litter_super+0x60/0x60 [ 538.753991][T26973] sget+0x10c/0x150 [ 538.757843][T26973] mount_bdev+0xff/0x3c0 [ 538.762117][T26973] ? hfs_show_options+0x630/0x630 [ 538.767180][T26973] hfs_mount+0x35/0x40 [ 538.771266][T26973] ? hfs_statfs+0x4b0/0x4b0 [ 538.775817][T26973] legacy_get_tree+0xf2/0x200 [ 538.780520][T26973] vfs_get_tree+0x123/0x450 [ 538.785028][T26973] do_mount+0x1436/0x2c40 [ 538.789419][T26973] ? copy_mount_string+0x40/0x40 [ 538.794397][T26973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.800637][T26973] ? copy_mount_options+0x280/0x3a0 [ 538.805844][T26973] ksys_mount+0xdb/0x150 [ 538.810094][T26973] __x64_sys_mount+0xbe/0x150 [ 538.814789][T26973] do_syscall_64+0x103/0x610 [ 538.819419][T26973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.825321][T26973] RIP: 0033:0x45ad2a [ 538.829217][T26973] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 538.848936][T26973] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 538.857355][T26973] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 538.865325][T26973] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 538.873306][T26973] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 538.881282][T26973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 538.889254][T26973] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:30 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000}]) io_destroy(r1) 14:46:30 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) ioctl$CAPI_INSTALLED(r0, 0x80024322) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x76) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0x200) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000080)={0x0, 0xfffffffffffffe5d, &(0x7f0000000040)={0x0}}, 0x0) 14:46:30 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:30 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 539.310881][T26986] FAULT_INJECTION: forcing a failure. [ 539.310881][T26986] name failslab, interval 1, probability 0, space 0, times 0 14:46:30 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 539.377078][T26986] CPU: 0 PID: 26986 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 539.385095][T26986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.385102][T26986] Call Trace: [ 539.385129][T26986] dump_stack+0x172/0x1f0 [ 539.385152][T26986] should_fail.cold+0xa/0x15 [ 539.385174][T26986] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.413201][T26986] ? ___might_sleep+0x163/0x280 [ 539.418058][T26986] __should_failslab+0x121/0x190 [ 539.423003][T26986] should_failslab+0x9/0x14 [ 539.427517][T26986] kmem_cache_alloc_trace+0x2d1/0x760 [ 539.432893][T26986] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 539.432918][T26986] __memcg_init_list_lru_node+0x8a/0x1e0 [ 539.432938][T26986] __list_lru_init+0x3cf/0x6e0 [ 539.432964][T26986] alloc_super+0x762/0x890 [ 539.449186][T26986] ? test_single_super+0x10/0x10 [ 539.449225][T26986] sget_userns+0xf1/0x560 [ 539.449251][T26986] ? kill_litter_super+0x60/0x60 [ 539.449288][T26986] ? test_single_super+0x10/0x10 [ 539.449317][T26986] ? kill_litter_super+0x60/0x60 [ 539.449351][T26986] sget+0x10c/0x150 [ 539.458702][T26986] mount_bdev+0xff/0x3c0 [ 539.458719][T26986] ? hfs_show_options+0x630/0x630 [ 539.458737][T26986] hfs_mount+0x35/0x40 [ 539.458760][T26986] ? hfs_statfs+0x4b0/0x4b0 [ 539.458789][T26986] legacy_get_tree+0xf2/0x200 [ 539.472943][T26986] vfs_get_tree+0x123/0x450 [ 539.472961][T26986] do_mount+0x1436/0x2c40 [ 539.472982][T26986] ? copy_mount_string+0x40/0x40 [ 539.473006][T26986] ? _copy_from_user+0xdd/0x150 [ 539.481739][T26986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.481763][T26986] ? copy_mount_options+0x280/0x3a0 [ 539.481788][T26986] ksys_mount+0xdb/0x150 [ 539.481805][T26986] __x64_sys_mount+0xbe/0x150 [ 539.481826][T26986] do_syscall_64+0x103/0x610 [ 539.547701][T26986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.553588][T26986] RIP: 0033:0x45ad2a [ 539.557496][T26986] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, 0x0, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = getpgrp(r3) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r4) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) sync_file_range(r0, 0x0, 0xffffffffffffff81, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) [ 539.577106][T26986] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 539.585562][T26986] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 539.593554][T26986] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 539.601533][T26986] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 539.609519][T26986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 539.617490][T26986] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:31 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:31 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:31 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000}]) io_destroy(r1) 14:46:31 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:31 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:31 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0xc4, "d5c5ff7af1d6742094c5a54d0bf874a3a51bd711e03a3287789294ba1fc6b0d1a863059a1c48dcb6af66f785228684700da5decc92c3dcdcf95d40675a78922d3602e4abb96459944730932019ad07083299e8d5bbeef88677c781a9e3d20360b91eb5b8d3fca94956794f89776f1f242bc0fc8bde0b07368bd6e5726121fcb7346005bb6b6821afa8a28ffe031dbe9d0ef0c6d16283436383fc19a24a916bec975a25655d6ba8f6fca53224901ec0f042de6d72854b701cf43546745d491359f3926cc9"}, &(0x7f0000000040)=0xe8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:32 executing program 4: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:32 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001340)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2001) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000013c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000001480)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x1c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x0, 0x10000}) bind$alg(r2, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(crct10dif-generic,ecb-aes-ce)\x00'}, 0x2e26507642ad3aaa) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:32 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 540.566122][T27028] FAULT_INJECTION: forcing a failure. [ 540.566122][T27028] name failslab, interval 1, probability 0, space 0, times 0 [ 540.615955][T27028] CPU: 0 PID: 27028 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 540.623980][T27028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.634033][T27028] Call Trace: [ 540.637336][T27028] dump_stack+0x172/0x1f0 [ 540.641678][T27028] should_fail.cold+0xa/0x15 [ 540.646275][T27028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.652095][T27028] ? ___might_sleep+0x163/0x280 [ 540.656984][T27028] __should_failslab+0x121/0x190 [ 540.661930][T27028] should_failslab+0x9/0x14 14:46:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x2e257440}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0x7, @remote, 0x8}}, 0x369f, 0xffffffff, 0x800000008000000, 0x8, 0x1}, &(0x7f0000000080)=0x98) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 540.666436][T27028] kmem_cache_alloc_trace+0x2d1/0x760 [ 540.671818][T27028] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 540.677641][T27028] __memcg_init_list_lru_node+0x8a/0x1e0 [ 540.683282][T27028] __list_lru_init+0x3cf/0x6e0 [ 540.683303][T27028] alloc_super+0x762/0x890 [ 540.683320][T27028] ? test_single_super+0x10/0x10 [ 540.683335][T27028] sget_userns+0xf1/0x560 [ 540.683348][T27028] ? kill_litter_super+0x60/0x60 [ 540.683363][T27028] ? test_single_super+0x10/0x10 [ 540.683375][T27028] ? kill_litter_super+0x60/0x60 [ 540.683388][T27028] sget+0x10c/0x150 [ 540.683406][T27028] mount_bdev+0xff/0x3c0 [ 540.683426][T27028] ? hfs_show_options+0x630/0x630 [ 540.697533][T27028] hfs_mount+0x35/0x40 [ 540.697547][T27028] ? hfs_statfs+0x4b0/0x4b0 [ 540.697565][T27028] legacy_get_tree+0xf2/0x200 [ 540.697583][T27028] vfs_get_tree+0x123/0x450 [ 540.697599][T27028] do_mount+0x1436/0x2c40 [ 540.697619][T27028] ? copy_mount_string+0x40/0x40 [ 540.697637][T27028] ? _copy_from_user+0xdd/0x150 [ 540.697664][T27028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.767795][T27028] ? copy_mount_options+0x280/0x3a0 [ 540.773008][T27028] ksys_mount+0xdb/0x150 [ 540.777259][T27028] __x64_sys_mount+0xbe/0x150 [ 540.781943][T27028] do_syscall_64+0x103/0x610 [ 540.786550][T27028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.792444][T27028] RIP: 0033:0x45ad2a [ 540.796343][T27028] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x65, "983dd25236e34d529e9421578e70c6f4a3b4b1439027496b8738052f55d77e4224c84c061127e5449b3c057266b92d0ca20662fb3d28d1209c0c63469d2f5d3ae5ddbb8535ac5ebb704e357f0e6915f8c4f5401e78b31e26dacd0f1b9a97509c5cbfa4b233"}, &(0x7f0000000200)=0x89) r2 = accept4(r0, 0x0, 0x0, 0x80000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000040)) getpeername$tipc(r3, &(0x7f0000000240)=@id, &(0x7f0000000280)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 540.815952][T27028] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 540.824374][T27028] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 540.832345][T27028] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 540.840322][T27028] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 540.848324][T27028] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 540.856301][T27028] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:32 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000}]) io_destroy(r1) 14:46:32 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:32 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:32 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400801, 0x0) read$alg(r1, &(0x7f00000009c0)=""/112, 0x70) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0xfffffffffffffedd) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000980), 0x10) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 541.437620][T27060] FAULT_INJECTION: forcing a failure. [ 541.437620][T27060] name failslab, interval 1, probability 0, space 0, times 0 14:46:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x170) r2 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) mount$9p_xen(&(0x7f0000000040)='hash\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x800, &(0x7f0000000380)={'trans=xen,', {[{@posixacl='posixacl'}, {@aname={'aname', 0x3d, 'tunl0\x00'}}, {@version_u='version=9p2000.u'}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@euid_gt={'euid>', r3}}, {@subj_role={'subj_role', 0x3d, '\xd7eth1'}}, {@euid_eq={'euid'}}]}}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'tunl0\x00', 0x8}) [ 541.513509][T27060] CPU: 0 PID: 27060 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 541.521538][T27060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.531590][T27060] Call Trace: [ 541.534890][T27060] dump_stack+0x172/0x1f0 [ 541.539250][T27060] should_fail.cold+0xa/0x15 [ 541.543848][T27060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 541.549660][T27060] ? ___might_sleep+0x163/0x280 [ 541.554517][T27060] __should_failslab+0x121/0x190 [ 541.559457][T27060] should_failslab+0x9/0x14 [ 541.563961][T27060] kmem_cache_alloc_trace+0x2d1/0x760 [ 541.569346][T27060] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 541.575164][T27060] __memcg_init_list_lru_node+0x8a/0x1e0 [ 541.580813][T27060] __list_lru_init+0x3cf/0x6e0 [ 541.585580][T27060] alloc_super+0x762/0x890 [ 541.589998][T27060] ? test_single_super+0x10/0x10 [ 541.594941][T27060] sget_userns+0xf1/0x560 [ 541.599269][T27060] ? kill_litter_super+0x60/0x60 [ 541.604213][T27060] ? test_single_super+0x10/0x10 [ 541.609149][T27060] ? kill_litter_super+0x60/0x60 [ 541.614083][T27060] sget+0x10c/0x150 [ 541.617901][T27060] mount_bdev+0xff/0x3c0 [ 541.622149][T27060] ? hfs_show_options+0x630/0x630 [ 541.627176][T27060] hfs_mount+0x35/0x40 [ 541.631242][T27060] ? hfs_statfs+0x4b0/0x4b0 [ 541.635763][T27060] legacy_get_tree+0xf2/0x200 [ 541.640450][T27060] vfs_get_tree+0x123/0x450 [ 541.644967][T27060] do_mount+0x1436/0x2c40 [ 541.649305][T27060] ? copy_mount_string+0x40/0x40 [ 541.654246][T27060] ? copy_mount_options+0x198/0x3a0 [ 541.659447][T27060] ? __sanitizer_cov_trace_pc+0x8/0x50 [ 541.664912][T27060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.671150][T27060] ? copy_mount_options+0x280/0x3a0 [ 541.676356][T27060] ksys_mount+0xdb/0x150 [ 541.680605][T27060] __x64_sys_mount+0xbe/0x150 [ 541.685289][T27060] do_syscall_64+0x103/0x610 [ 541.689901][T27060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.695803][T27060] RIP: 0033:0x45ad2a [ 541.699698][T27060] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 541.719387][T27060] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 541.727804][T27060] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 541.735792][T27060] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 541.743780][T27060] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 541.751760][T27060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 541.759738][T27060] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x2a7}}, 0x0) 14:46:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:33 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x40000000}]) io_destroy(r1) 14:46:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x7fffffff, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:33 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:33 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 542.436234][T27096] FAULT_INJECTION: forcing a failure. [ 542.436234][T27096] name failslab, interval 1, probability 0, space 0, times 0 [ 542.455789][T27096] CPU: 1 PID: 27096 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 542.463784][T27096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.473848][T27096] Call Trace: [ 542.477145][T27096] dump_stack+0x172/0x1f0 [ 542.481484][T27096] should_fail.cold+0xa/0x15 [ 542.486088][T27096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.491901][T27096] ? ___might_sleep+0x163/0x280 [ 542.496766][T27096] __should_failslab+0x121/0x190 [ 542.501710][T27096] should_failslab+0x9/0x14 [ 542.506212][T27096] kmem_cache_alloc_trace+0x2d1/0x760 [ 542.511590][T27096] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 542.517407][T27096] __memcg_init_list_lru_node+0x8a/0x1e0 [ 542.523051][T27096] __list_lru_init+0x3cf/0x6e0 [ 542.527827][T27096] alloc_super+0x762/0x890 [ 542.532245][T27096] ? test_single_super+0x10/0x10 [ 542.537186][T27096] sget_userns+0xf1/0x560 [ 542.541516][T27096] ? kill_litter_super+0x60/0x60 [ 542.546458][T27096] ? test_single_super+0x10/0x10 [ 542.551393][T27096] ? kill_litter_super+0x60/0x60 [ 542.556329][T27096] sget+0x10c/0x150 [ 542.560146][T27096] mount_bdev+0xff/0x3c0 [ 542.564416][T27096] ? hfs_show_options+0x630/0x630 [ 542.569448][T27096] hfs_mount+0x35/0x40 [ 542.573523][T27096] ? hfs_statfs+0x4b0/0x4b0 [ 542.578031][T27096] legacy_get_tree+0xf2/0x200 [ 542.582716][T27096] vfs_get_tree+0x123/0x450 [ 542.587234][T27096] do_mount+0x1436/0x2c40 [ 542.591600][T27096] ? copy_mount_string+0x40/0x40 [ 542.596547][T27096] ? _copy_from_user+0xdd/0x150 [ 542.601412][T27096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.607656][T27096] ? copy_mount_options+0x280/0x3a0 [ 542.612864][T27096] ksys_mount+0xdb/0x150 [ 542.617112][T27096] __x64_sys_mount+0xbe/0x150 [ 542.621801][T27096] do_syscall_64+0x103/0x610 [ 542.626398][T27096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.632295][T27096] RIP: 0033:0x45ad2a [ 542.636196][T27096] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 542.655805][T27096] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 542.664224][T27096] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 542.672192][T27096] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 14:46:34 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x14100, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x800) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/189, 0xbd}, {&(0x7f0000000200)=""/119, 0x77}], 0x2, &(0x7f0000000280)=""/70, 0x46}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 542.680172][T27096] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 542.688145][T27096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 542.696113][T27096] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) recvfrom(r0, &(0x7f0000000000)=""/143, 0x8f, 0x40000001, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x1, 0x0, {0xa, 0x4e20, 0x8e2f, @loopback, 0x1}}}, 0x80) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/ip_tables_names\x00') write$FUSE_LSEEK(r2, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, 0x2, {0x3}}, 0x18) 14:46:34 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:34 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 543.308087][T27117] FAULT_INJECTION: forcing a failure. [ 543.308087][T27117] name failslab, interval 1, probability 0, space 0, times 0 [ 543.335314][T27117] CPU: 1 PID: 27117 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 543.343312][T27117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.353365][T27117] Call Trace: [ 543.356671][T27117] dump_stack+0x172/0x1f0 [ 543.361013][T27117] should_fail.cold+0xa/0x15 [ 543.365611][T27117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 543.371460][T27117] ? ___might_sleep+0x163/0x280 [ 543.376315][T27117] __should_failslab+0x121/0x190 [ 543.381252][T27117] should_failslab+0x9/0x14 [ 543.385774][T27117] kmem_cache_alloc_trace+0x2d1/0x760 [ 543.391153][T27117] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 543.396971][T27117] __memcg_init_list_lru_node+0x8a/0x1e0 [ 543.402612][T27117] __list_lru_init+0x3cf/0x6e0 [ 543.407381][T27117] alloc_super+0x762/0x890 [ 543.411799][T27117] ? test_single_super+0x10/0x10 [ 543.416739][T27117] sget_userns+0xf1/0x560 [ 543.421080][T27117] ? kill_litter_super+0x60/0x60 [ 543.426020][T27117] ? test_single_super+0x10/0x10 [ 543.430959][T27117] ? kill_litter_super+0x60/0x60 [ 543.435899][T27117] sget+0x10c/0x150 [ 543.439717][T27117] mount_bdev+0xff/0x3c0 [ 543.443976][T27117] ? hfs_show_options+0x630/0x630 [ 543.449005][T27117] hfs_mount+0x35/0x40 [ 543.453077][T27117] ? hfs_statfs+0x4b0/0x4b0 [ 543.457583][T27117] legacy_get_tree+0xf2/0x200 [ 543.462268][T27117] vfs_get_tree+0x123/0x450 [ 543.466794][T27117] do_mount+0x1436/0x2c40 [ 543.471132][T27117] ? copy_mount_string+0x40/0x40 [ 543.476076][T27117] ? _copy_from_user+0xdd/0x150 [ 543.480935][T27117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.487176][T27117] ? copy_mount_options+0x280/0x3a0 [ 543.492378][T27117] ksys_mount+0xdb/0x150 [ 543.496621][T27117] __x64_sys_mount+0xbe/0x150 [ 543.501316][T27117] do_syscall_64+0x103/0x610 [ 543.505916][T27117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.511830][T27117] RIP: 0033:0x45ad2a [ 543.515725][T27117] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 543.535340][T27117] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 543.543759][T27117] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:35 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xeffdffff}]) io_destroy(r1) 14:46:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fcntl$getown(r1, 0x9) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x200}, 0xc) recvfrom$inet(r1, &(0x7f0000000000)=""/85, 0x55, 0x103, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) 14:46:35 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 543.551727][T27117] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 543.559708][T27117] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 543.567674][T27117] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 543.575643][T27117] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffd}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x1}}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0xdb872f0708b2f1e5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:35 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:35 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 543.776092][T27143] FAULT_INJECTION: forcing a failure. [ 543.776092][T27143] name failslab, interval 1, probability 0, space 0, times 0 [ 543.826376][T27143] CPU: 0 PID: 27143 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 543.834399][T27143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.844448][T27143] Call Trace: [ 543.847745][T27143] dump_stack+0x172/0x1f0 [ 543.852107][T27143] should_fail.cold+0xa/0x15 [ 543.856711][T27143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 543.862531][T27143] ? ___might_sleep+0x163/0x280 [ 543.867414][T27143] __should_failslab+0x121/0x190 [ 543.872356][T27143] should_failslab+0x9/0x14 [ 543.876869][T27143] kmem_cache_alloc_trace+0x2d1/0x760 [ 543.882254][T27143] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 543.888335][T27143] __memcg_init_list_lru_node+0x8a/0x1e0 [ 543.893988][T27143] __list_lru_init+0x3cf/0x6e0 [ 543.898780][T27143] alloc_super+0x762/0x890 [ 543.903208][T27143] ? test_single_super+0x10/0x10 [ 543.908151][T27143] sget_userns+0xf1/0x560 [ 543.912478][T27143] ? kill_litter_super+0x60/0x60 [ 543.917416][T27143] ? test_single_super+0x10/0x10 [ 543.922357][T27143] ? kill_litter_super+0x60/0x60 14:46:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x185) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="6d8191a3611738460a73b46c3a241d61bb36c4faa502b16493c2fbb00a812d292d060ee9e5aab78257d688fd8addc950f649b57321129fbccbc52292bb165ba9f0051e19b2714bcbc237b538eba3e21c96dd220c2769f3a9de18124c0cec849e4860a6face759561eb1443c7eec360", 0x6f) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 543.927306][T27143] sget+0x10c/0x150 [ 543.931126][T27143] mount_bdev+0xff/0x3c0 [ 543.935376][T27143] ? hfs_show_options+0x630/0x630 [ 543.940408][T27143] hfs_mount+0x35/0x40 [ 543.944480][T27143] ? hfs_statfs+0x4b0/0x4b0 [ 543.948991][T27143] legacy_get_tree+0xf2/0x200 [ 543.953672][T27143] vfs_get_tree+0x123/0x450 [ 543.958182][T27143] do_mount+0x1436/0x2c40 [ 543.962521][T27143] ? copy_mount_string+0x40/0x40 [ 543.962546][T27143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.962560][T27143] ? copy_mount_options+0x280/0x3a0 [ 543.962578][T27143] ksys_mount+0xdb/0x150 [ 543.962600][T27143] __x64_sys_mount+0xbe/0x150 [ 543.979460][T27143] do_syscall_64+0x103/0x610 [ 543.979482][T27143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.979494][T27143] RIP: 0033:0x45ad2a [ 543.979509][T27143] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:35 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) [ 543.979518][T27143] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 544.030798][T27143] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 544.038783][T27143] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 544.046764][T27143] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 544.054930][T27143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 544.064812][T27143] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:36 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfcfdffff}]) io_destroy(r1) 14:46:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:36 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:36 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 544.725342][T27170] FAULT_INJECTION: forcing a failure. [ 544.725342][T27170] name failslab, interval 1, probability 0, space 0, times 0 [ 544.766151][T27170] CPU: 1 PID: 27170 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 544.774155][T27170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.784204][T27170] Call Trace: [ 544.787508][T27170] dump_stack+0x172/0x1f0 [ 544.791868][T27170] should_fail.cold+0xa/0x15 [ 544.796466][T27170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 544.802288][T27170] ? ___might_sleep+0x163/0x280 [ 544.807158][T27170] __should_failslab+0x121/0x190 [ 544.812095][T27170] should_failslab+0x9/0x14 [ 544.816607][T27170] kmem_cache_alloc_node_trace+0x270/0x720 [ 544.822451][T27170] __kmalloc_node+0x3d/0x70 [ 544.826969][T27170] kvmalloc_node+0x68/0x100 [ 544.831481][T27170] __list_lru_init+0x4a6/0x6e0 [ 544.836252][T27170] alloc_super+0x78d/0x890 [ 544.840683][T27170] ? test_single_super+0x10/0x10 [ 544.845627][T27170] sget_userns+0xf1/0x560 [ 544.849963][T27170] ? kill_litter_super+0x60/0x60 [ 544.854903][T27170] ? test_single_super+0x10/0x10 [ 544.859840][T27170] ? kill_litter_super+0x60/0x60 [ 544.864785][T27170] sget+0x10c/0x150 [ 544.868598][T27170] mount_bdev+0xff/0x3c0 [ 544.872844][T27170] ? hfs_show_options+0x630/0x630 [ 544.877876][T27170] hfs_mount+0x35/0x40 [ 544.881945][T27170] ? hfs_statfs+0x4b0/0x4b0 [ 544.886455][T27170] legacy_get_tree+0xf2/0x200 [ 544.891132][T27170] vfs_get_tree+0x123/0x450 [ 544.895637][T27170] do_mount+0x1436/0x2c40 [ 544.899972][T27170] ? copy_mount_string+0x40/0x40 [ 544.904916][T27170] ? _copy_from_user+0xdd/0x150 [ 544.909860][T27170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.916099][T27170] ? copy_mount_options+0x280/0x3a0 [ 544.921305][T27170] ksys_mount+0xdb/0x150 [ 544.925547][T27170] __x64_sys_mount+0xbe/0x150 [ 544.930231][T27170] do_syscall_64+0x103/0x610 [ 544.934827][T27170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.940721][T27170] RIP: 0033:0x45ad2a [ 544.944624][T27170] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 544.964227][T27170] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 544.972634][T27170] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 544.980603][T27170] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 544.988570][T27170] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 544.996545][T27170] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 545.004509][T27170] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffff5f) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:36 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:36 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x2000, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x4044082, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) 14:46:37 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfefdffff}]) io_destroy(r1) 14:46:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:37 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:37 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:37 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 545.681322][T27204] FAULT_INJECTION: forcing a failure. [ 545.681322][T27204] name failslab, interval 1, probability 0, space 0, times 0 [ 545.707830][T27204] CPU: 0 PID: 27204 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 545.715822][T27204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.725873][T27204] Call Trace: [ 545.729171][T27204] dump_stack+0x172/0x1f0 [ 545.733516][T27204] should_fail.cold+0xa/0x15 [ 545.738124][T27204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.743943][T27204] ? ___might_sleep+0x163/0x280 [ 545.748803][T27204] __should_failslab+0x121/0x190 [ 545.753745][T27204] should_failslab+0x9/0x14 [ 545.758272][T27204] kmem_cache_alloc_trace+0x2d1/0x760 [ 545.763648][T27204] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 545.769469][T27204] __memcg_init_list_lru_node+0x8a/0x1e0 [ 545.775120][T27204] __list_lru_init+0x3cf/0x6e0 [ 545.779890][T27204] alloc_super+0x78d/0x890 [ 545.784310][T27204] ? test_single_super+0x10/0x10 [ 545.789259][T27204] sget_userns+0xf1/0x560 [ 545.793594][T27204] ? kill_litter_super+0x60/0x60 [ 545.798537][T27204] ? test_single_super+0x10/0x10 [ 545.803475][T27204] ? kill_litter_super+0x60/0x60 [ 545.808411][T27204] sget+0x10c/0x150 [ 545.812232][T27204] mount_bdev+0xff/0x3c0 [ 545.816481][T27204] ? hfs_show_options+0x630/0x630 [ 545.821516][T27204] hfs_mount+0x35/0x40 [ 545.825591][T27204] ? hfs_statfs+0x4b0/0x4b0 [ 545.830103][T27204] legacy_get_tree+0xf2/0x200 [ 545.834801][T27204] vfs_get_tree+0x123/0x450 [ 545.839309][T27204] do_mount+0x1436/0x2c40 [ 545.843651][T27204] ? copy_mount_string+0x40/0x40 [ 545.848592][T27204] ? _copy_from_user+0xdd/0x150 [ 545.853453][T27204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.859695][T27204] ? copy_mount_options+0x280/0x3a0 [ 545.864901][T27204] ksys_mount+0xdb/0x150 [ 545.869146][T27204] __x64_sys_mount+0xbe/0x150 [ 545.873830][T27204] do_syscall_64+0x103/0x610 14:46:37 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:37 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) 14:46:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 545.878425][T27204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.884316][T27204] RIP: 0033:0x45ad2a [ 545.888211][T27204] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 545.907811][T27204] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 545.916216][T27204] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 545.916226][T27204] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 545.916235][T27204] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 545.916244][T27204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 545.916252][T27204] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000040)={0x572, 0x5, 0x100000001, 0x4}) 14:46:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:37 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:38 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffdef}]) io_destroy(r1) 14:46:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:38 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x78, &(0x7f0000000000)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x5, 0x0}}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}, 0xa6}, @in6={0xa, 0x4e22, 0x8, @mcast2, 0x1}, @in={0x2, 0x4e24, @local}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x2}, &(0x7f0000000200)=0x8) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 546.542707][T27240] FAULT_INJECTION: forcing a failure. [ 546.542707][T27240] name failslab, interval 1, probability 0, space 0, times 0 [ 546.573206][T27240] CPU: 1 PID: 27240 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 546.581208][T27240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.591270][T27240] Call Trace: [ 546.594578][T27240] dump_stack+0x172/0x1f0 [ 546.598922][T27240] should_fail.cold+0xa/0x15 [ 546.603529][T27240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 546.609348][T27240] ? ___might_sleep+0x163/0x280 [ 546.614218][T27240] __should_failslab+0x121/0x190 [ 546.619164][T27240] should_failslab+0x9/0x14 [ 546.623676][T27240] kmem_cache_alloc_node_trace+0x270/0x720 [ 546.629507][T27240] __kmalloc_node+0x3d/0x70 [ 546.634017][T27240] kvmalloc_node+0x68/0x100 [ 546.638529][T27240] __list_lru_init+0x4a6/0x6e0 [ 546.643310][T27240] alloc_super+0x78d/0x890 [ 546.647729][T27240] ? test_single_super+0x10/0x10 [ 546.652680][T27240] sget_userns+0xf1/0x560 [ 546.657009][T27240] ? kill_litter_super+0x60/0x60 [ 546.661953][T27240] ? test_single_super+0x10/0x10 [ 546.666913][T27240] ? kill_litter_super+0x60/0x60 [ 546.671849][T27240] sget+0x10c/0x150 [ 546.675665][T27240] mount_bdev+0xff/0x3c0 [ 546.679914][T27240] ? hfs_show_options+0x630/0x630 [ 546.684947][T27240] hfs_mount+0x35/0x40 [ 546.684963][T27240] ? hfs_statfs+0x4b0/0x4b0 [ 546.684981][T27240] legacy_get_tree+0xf2/0x200 [ 546.685000][T27240] vfs_get_tree+0x123/0x450 [ 546.693554][T27240] do_mount+0x1436/0x2c40 [ 546.693575][T27240] ? copy_mount_string+0x40/0x40 [ 546.693594][T27240] ? _copy_from_user+0xdd/0x150 [ 546.693615][T27240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 546.723152][T27240] ? copy_mount_options+0x280/0x3a0 [ 546.728357][T27240] ksys_mount+0xdb/0x150 [ 546.732603][T27240] __x64_sys_mount+0xbe/0x150 [ 546.737296][T27240] do_syscall_64+0x103/0x610 [ 546.741893][T27240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.747785][T27240] RIP: 0033:0x45ad2a [ 546.751680][T27240] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 546.771289][T27240] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 546.779706][T27240] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x800) recvfrom$llc(r3, &(0x7f0000000080)=""/52, 0x34, 0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000040)=0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/120, &(0x7f00000001c0)=0x78) [ 546.787685][T27240] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 546.795656][T27240] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 546.803723][T27240] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 546.811705][T27240] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:38 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) 14:46:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xe0180, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xd7, 0x40) 14:46:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:38 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:39 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffdfc}]) io_destroy(r1) 14:46:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x376) prctl$PR_GET_NO_NEW_PRIVS(0x27) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:39 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x48, r2, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfd8d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) [ 547.570071][T27275] FAULT_INJECTION: forcing a failure. [ 547.570071][T27275] name failslab, interval 1, probability 0, space 0, times 0 [ 547.681702][T27275] CPU: 1 PID: 27275 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 547.689735][T27275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.699807][T27275] Call Trace: [ 547.703110][T27275] dump_stack+0x172/0x1f0 [ 547.707451][T27275] should_fail.cold+0xa/0x15 [ 547.712050][T27275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 547.717864][T27275] ? ___might_sleep+0x163/0x280 [ 547.722725][T27275] __should_failslab+0x121/0x190 [ 547.727680][T27275] should_failslab+0x9/0x14 [ 547.732189][T27275] kmem_cache_alloc_node_trace+0x270/0x720 [ 547.738009][T27275] __kmalloc_node+0x3d/0x70 [ 547.742515][T27275] kvmalloc_node+0x68/0x100 [ 547.747030][T27275] __list_lru_init+0x4a6/0x6e0 [ 547.751803][T27275] alloc_super+0x78d/0x890 [ 547.756224][T27275] ? test_single_super+0x10/0x10 [ 547.761168][T27275] sget_userns+0xf1/0x560 [ 547.765503][T27275] ? kill_litter_super+0x60/0x60 [ 547.770444][T27275] ? test_single_super+0x10/0x10 [ 547.775378][T27275] ? kill_litter_super+0x60/0x60 [ 547.780318][T27275] sget+0x10c/0x150 [ 547.784134][T27275] mount_bdev+0xff/0x3c0 [ 547.788377][T27275] ? hfs_show_options+0x630/0x630 [ 547.793405][T27275] hfs_mount+0x35/0x40 [ 547.797474][T27275] ? hfs_statfs+0x4b0/0x4b0 [ 547.801979][T27275] legacy_get_tree+0xf2/0x200 [ 547.806662][T27275] vfs_get_tree+0x123/0x450 [ 547.811176][T27275] do_mount+0x1436/0x2c40 [ 547.815516][T27275] ? copy_mount_string+0x40/0x40 [ 547.820456][T27275] ? _copy_from_user+0xdd/0x150 [ 547.825354][T27275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.831598][T27275] ? copy_mount_options+0x280/0x3a0 [ 547.836801][T27275] ksys_mount+0xdb/0x150 [ 547.841049][T27275] __x64_sys_mount+0xbe/0x150 [ 547.845736][T27275] do_syscall_64+0x103/0x610 [ 547.850340][T27275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.856233][T27275] RIP: 0033:0x45ad2a [ 547.860135][T27275] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="8400000055164f0de1be2d268a", @ANYRES16=r2, @ANYBLOB="31002dbd7000fddbdf25160000005400010008000300090000000c00020008000200ffffffff100001007564703a73797a320000000008000300000400002400020008000100190000000800040007000000080002000000000008000400eaae00001c000100100001007564703a73797a31000000000800030007000000"], 0x84}}, 0x80) [ 547.879742][T27275] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 547.888170][T27275] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 547.896238][T27275] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 547.904216][T27275] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 547.913155][T27275] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 547.921132][T27275] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000040)={0x5, 0x800, 0x9, 0x80000000}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000080)) 14:46:39 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 548.160132][T27302] FAULT_INJECTION: forcing a failure. [ 548.160132][T27302] name failslab, interval 1, probability 0, space 0, times 0 [ 548.185073][T27302] CPU: 1 PID: 27302 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 548.193073][T27302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.203123][T27302] Call Trace: [ 548.206424][T27302] dump_stack+0x172/0x1f0 [ 548.210786][T27302] should_fail.cold+0xa/0x15 [ 548.215391][T27302] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.221209][T27302] ? ___might_sleep+0x163/0x280 [ 548.226065][T27302] __should_failslab+0x121/0x190 [ 548.231007][T27302] should_failslab+0x9/0x14 [ 548.235512][T27302] kmem_cache_alloc_trace+0x2d1/0x760 [ 548.241341][T27302] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 548.247162][T27302] __memcg_init_list_lru_node+0x8a/0x1e0 [ 548.252804][T27302] __list_lru_init+0x3cf/0x6e0 [ 548.257575][T27302] alloc_super+0x78d/0x890 [ 548.261993][T27302] ? test_single_super+0x10/0x10 [ 548.266938][T27302] sget_userns+0xf1/0x560 [ 548.271269][T27302] ? kill_litter_super+0x60/0x60 [ 548.276228][T27302] ? test_single_super+0x10/0x10 [ 548.281167][T27302] ? kill_litter_super+0x60/0x60 [ 548.286109][T27302] sget+0x10c/0x150 [ 548.289922][T27302] mount_bdev+0xff/0x3c0 [ 548.294166][T27302] ? hfs_show_options+0x630/0x630 [ 548.299198][T27302] hfs_mount+0x35/0x40 [ 548.303358][T27302] ? hfs_statfs+0x4b0/0x4b0 [ 548.307871][T27302] legacy_get_tree+0xf2/0x200 [ 548.312552][T27302] vfs_get_tree+0x123/0x450 [ 548.317064][T27302] do_mount+0x1436/0x2c40 [ 548.321405][T27302] ? copy_mount_string+0x40/0x40 [ 548.326349][T27302] ? _copy_from_user+0xdd/0x150 [ 548.331208][T27302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.337446][T27302] ? copy_mount_options+0x280/0x3a0 [ 548.342660][T27302] ksys_mount+0xdb/0x150 [ 548.346919][T27302] __x64_sys_mount+0xbe/0x150 [ 548.351602][T27302] do_syscall_64+0x103/0x610 [ 548.356201][T27302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.362093][T27302] RIP: 0033:0x45ad2a [ 548.365992][T27302] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 548.385592][T27302] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 548.394008][T27302] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 548.401985][T27302] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 548.410043][T27302] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 548.418019][T27302] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 548.425999][T27302] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:40 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffdfe}]) io_destroy(r1) 14:46:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:40 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 548.662631][T27310] FAULT_INJECTION: forcing a failure. [ 548.662631][T27310] name failslab, interval 1, probability 0, space 0, times 0 [ 548.707633][T27310] CPU: 1 PID: 27310 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 548.715658][T27310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.725717][T27310] Call Trace: [ 548.729033][T27310] dump_stack+0x172/0x1f0 [ 548.733378][T27310] should_fail.cold+0xa/0x15 [ 548.737980][T27310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.743796][T27310] ? ___might_sleep+0x163/0x280 [ 548.748660][T27310] __should_failslab+0x121/0x190 [ 548.753597][T27310] should_failslab+0x9/0x14 [ 548.758101][T27310] kmem_cache_alloc_trace+0x2d1/0x760 [ 548.763487][T27310] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 548.769314][T27310] __memcg_init_list_lru_node+0x8a/0x1e0 [ 548.774971][T27310] __list_lru_init+0x3cf/0x6e0 [ 548.779744][T27310] alloc_super+0x78d/0x890 [ 548.784175][T27310] ? test_single_super+0x10/0x10 [ 548.789116][T27310] sget_userns+0xf1/0x560 [ 548.793445][T27310] ? kill_litter_super+0x60/0x60 [ 548.798387][T27310] ? test_single_super+0x10/0x10 [ 548.803324][T27310] ? kill_litter_super+0x60/0x60 [ 548.808264][T27310] sget+0x10c/0x150 [ 548.812088][T27310] mount_bdev+0xff/0x3c0 [ 548.816331][T27310] ? hfs_show_options+0x630/0x630 [ 548.821358][T27310] hfs_mount+0x35/0x40 [ 548.825426][T27310] ? hfs_statfs+0x4b0/0x4b0 [ 548.829936][T27310] legacy_get_tree+0xf2/0x200 [ 548.834618][T27310] vfs_get_tree+0x123/0x450 [ 548.839122][T27310] do_mount+0x1436/0x2c40 [ 548.843458][T27310] ? copy_mount_string+0x40/0x40 [ 548.848405][T27310] ? _copy_from_user+0xdd/0x150 [ 548.853261][T27310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.859505][T27310] ? copy_mount_options+0x280/0x3a0 [ 548.864711][T27310] ksys_mount+0xdb/0x150 [ 548.868969][T27310] __x64_sys_mount+0xbe/0x150 [ 548.873661][T27310] do_syscall_64+0x103/0x610 [ 548.878255][T27310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.884152][T27310] RIP: 0033:0x45ad2a [ 548.888044][T27310] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x1a0200000000004) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 548.907650][T27310] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 548.916065][T27310] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 548.924037][T27310] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 548.932005][T27310] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 548.939974][T27310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 548.947944][T27310] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:40 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) sysfs$1(0x1, &(0x7f0000000140)='s\v\xef\xd4temvmn\x82t0bdV\xeb(\xf9\xc1/\xeb\xad\xcb\xa5+\xab#\xe6\xf2\x02\xb3\xe2\xc3\xb8\x1eUum!5\xa8uc\xf9\xa7\x8c\x99\xe7D\x03\xbb\xe9e\xa1\x1bj\b\x13\xa1\xc4\x1c\x97\xb4\xf8@P\xaaH\xfc\xc0\xd29\xe6\x9f;I[\x1c\xb2\xb0\xcd\xf7|\x80\xff\xae\x0f\xb4s\x9b;\xdah\x12\xd6\xc3u\xcc\xac\xfd\xec\xc7\xd7l\xc0\xed\x94\xd9\x9e\xb0a>\xedz\xe4\xe8\x92\x9b\xa9{\xda\xc9N6$\xd7$\x81z.Y\xc2}r\x1a\xda2\x13\xda\n\xe1\x9c\xf7\x9dbR/\xebn?$M\xc9Y\x00\xde\x94/[^\x16t\xa1ya\xbe\xf5\x9e\xc7') r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0xffffffffffffff8f, &(0x7f00000000c0)={0x0, 0xbfbf39d6f54994a0}}, 0x890) 14:46:40 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:40 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffe00}]) io_destroy(r1) 14:46:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x400000000) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000200)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) sendmmsg$unix(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1800000000000000d9b870fe34c6152e", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x40}], 0x1, 0x8000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x50, 0x1c, 0x28, 0x70bd2b, 0x25dfdbfb, {0x10}, [@generic="27c6dd066080ee391ca8663a47c55885dc86b594bddffcc3075ce185defdfee53f6dc1dcc082f0f3d68994fbd285e53c1c", @typed={0x8, 0x18, @ipv4=@broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x40050}, 0x40) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000400)={0x0, 0xfffffffffffffd57, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0xc801}, 0x0) 14:46:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:40 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0xcc0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f00000001c0)={{0x1, @name="a58a7c639d05630c495db0b959028a4cc87e73c215f3ca131b98cb07efd95970"}, 0x8, 0x6, 0x9}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x84200, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x10000) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000140)="63904fab8a1a0a608a62c2da012c374ff501b62000e7eda5e8ae3b19502e1fa55c34d58d02a31d2773") ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf4, r4, 0x602, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x871}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0xe}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) epoll_create1(0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 549.571205][T27337] FAULT_INJECTION: forcing a failure. [ 549.571205][T27337] name failslab, interval 1, probability 0, space 0, times 0 [ 549.623395][T27337] CPU: 1 PID: 27337 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 549.631509][T27337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.641567][T27337] Call Trace: [ 549.644877][T27337] dump_stack+0x172/0x1f0 [ 549.649223][T27337] should_fail.cold+0xa/0x15 [ 549.653824][T27337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 549.659684][T27337] ? ___might_sleep+0x163/0x280 [ 549.664571][T27337] __should_failslab+0x121/0x190 [ 549.669515][T27337] should_failslab+0x9/0x14 [ 549.674029][T27337] kmem_cache_alloc_trace+0x2d1/0x760 [ 549.679400][T27337] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 549.685217][T27337] __memcg_init_list_lru_node+0x8a/0x1e0 [ 549.690859][T27337] __list_lru_init+0x3cf/0x6e0 [ 549.695627][T27337] alloc_super+0x762/0x890 [ 549.700048][T27337] ? test_single_super+0x10/0x10 [ 549.705009][T27337] sget_userns+0xf1/0x560 [ 549.709338][T27337] ? kill_litter_super+0x60/0x60 [ 549.714270][T27337] ? test_single_super+0x10/0x10 [ 549.719206][T27337] ? kill_litter_super+0x60/0x60 [ 549.724135][T27337] sget+0x10c/0x150 [ 549.727944][T27337] mount_bdev+0xff/0x3c0 [ 549.732178][T27337] ? hfs_show_options+0x630/0x630 [ 549.737198][T27337] hfs_mount+0x35/0x40 [ 549.741261][T27337] ? hfs_statfs+0x4b0/0x4b0 [ 549.745778][T27337] legacy_get_tree+0xf2/0x200 [ 549.750460][T27337] vfs_get_tree+0x123/0x450 [ 549.754975][T27337] do_mount+0x1436/0x2c40 [ 549.759313][T27337] ? copy_mount_string+0x40/0x40 [ 549.764255][T27337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.770493][T27337] ? copy_mount_options+0x280/0x3a0 [ 549.775688][T27337] ksys_mount+0xdb/0x150 [ 549.779943][T27337] __x64_sys_mount+0xbe/0x150 [ 549.784623][T27337] do_syscall_64+0x103/0x610 [ 549.789216][T27337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.795105][T27337] RIP: 0033:0x45ad2a [ 549.799003][T27337] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 549.818605][T27337] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 549.827021][T27337] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 549.835017][T27337] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 549.844121][T27337] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 549.852097][T27337] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 549.860075][T27337] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) 14:46:41 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:41 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:41 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:41 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 550.067926][T27362] FAULT_INJECTION: forcing a failure. [ 550.067926][T27362] name failslab, interval 1, probability 0, space 0, times 0 [ 550.137289][T27362] CPU: 0 PID: 27362 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 550.145312][T27362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.155364][T27362] Call Trace: [ 550.158668][T27362] dump_stack+0x172/0x1f0 [ 550.163014][T27362] should_fail.cold+0xa/0x15 [ 550.167617][T27362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 550.173438][T27362] ? ___might_sleep+0x163/0x280 [ 550.178300][T27362] __should_failslab+0x121/0x190 [ 550.183248][T27362] should_failslab+0x9/0x14 [ 550.187770][T27362] kmem_cache_alloc_trace+0x2d1/0x760 [ 550.193174][T27362] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 550.193199][T27362] __memcg_init_list_lru_node+0x8a/0x1e0 [ 550.193219][T27362] __list_lru_init+0x3cf/0x6e0 [ 550.193238][T27362] alloc_super+0x78d/0x890 [ 550.193259][T27362] ? test_single_super+0x10/0x10 [ 550.218761][T27362] sget_userns+0xf1/0x560 [ 550.223103][T27362] ? kill_litter_super+0x60/0x60 [ 550.228044][T27362] ? test_single_super+0x10/0x10 [ 550.232984][T27362] ? kill_litter_super+0x60/0x60 [ 550.237922][T27362] sget+0x10c/0x150 [ 550.241738][T27362] mount_bdev+0xff/0x3c0 [ 550.246014][T27362] ? hfs_show_options+0x630/0x630 [ 550.251036][T27362] hfs_mount+0x35/0x40 [ 550.255131][T27362] ? hfs_statfs+0x4b0/0x4b0 [ 550.259649][T27362] legacy_get_tree+0xf2/0x200 [ 550.264329][T27362] vfs_get_tree+0x123/0x450 [ 550.268846][T27362] do_mount+0x1436/0x2c40 [ 550.273183][T27362] ? copy_mount_string+0x40/0x40 [ 550.278123][T27362] ? _copy_from_user+0xdd/0x150 [ 550.282973][T27362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.289212][T27362] ? copy_mount_options+0x280/0x3a0 [ 550.294411][T27362] ksys_mount+0xdb/0x150 [ 550.298667][T27362] __x64_sys_mount+0xbe/0x150 [ 550.303343][T27362] do_syscall_64+0x103/0x610 [ 550.307937][T27362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.313822][T27362] RIP: 0033:0x45ad2a [ 550.317718][T27362] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 550.337537][T27362] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 550.345951][T27362] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 550.353921][T27362] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 550.361900][T27362] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 550.369873][T27362] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 550.377864][T27362] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:41 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:42 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7ffffffff000}]) io_destroy(r1) 14:46:42 executing program 1: ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x400, 0x7, 0xa78, 0xfff, 0x3, 0x20, 0xbe}, 0xc) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={[{@nobarrier='nobarrier'}, {@locktable={'locktable', 0x3d, '/dev/vsock\x00'}}, {@barrier='barrier'}, {@lockproto_dlm='lockproto=dlm'}, {@rgrplvb='rgrplvb'}, {@acl='acl'}, {@nobarrier='nobarrier'}, {@suiddir='suiddir'}], [{@euid_gt={'euid>'}}, {@uid_eq={'uid'}}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vsock\x00'}}, {@uid_eq={'uid'}}, {@permit_directio='permit_directio'}]}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:42 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 550.726476][T27380] gfs2: not a GFS2 filesystem 14:46:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 550.792876][T27382] gfs2: not a GFS2 filesystem 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000000)='ppp0systemppp1vboxnet0\x00', 0xffffffffffffffff}, 0x30) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080), &(0x7f0000000240)=0x4) rt_sigqueueinfo(r2, 0xe, &(0x7f0000000140)={0x1d, 0x3, 0x1}) [ 550.886659][T27388] FAULT_INJECTION: forcing a failure. [ 550.886659][T27388] name failslab, interval 1, probability 0, space 0, times 0 [ 550.916917][T27388] CPU: 0 PID: 27388 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 550.924929][T27388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.934984][T27388] Call Trace: [ 550.938303][T27388] dump_stack+0x172/0x1f0 [ 550.942655][T27388] should_fail.cold+0xa/0x15 [ 550.947259][T27388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 550.953088][T27388] ? ___might_sleep+0x163/0x280 [ 550.957952][T27388] __should_failslab+0x121/0x190 [ 550.962894][T27388] should_failslab+0x9/0x14 [ 550.967398][T27388] kmem_cache_alloc_trace+0x2d1/0x760 [ 550.972812][T27388] __memcg_init_list_lru_node+0x8a/0x1e0 [ 550.978455][T27388] __list_lru_init+0x3cf/0x6e0 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x4000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) r3 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev={0xfe, 0x80, [], 0x27}, 0x4e24, 0x0, 0x4e20, 0xf86e, 0x2, 0x20, 0x80, 0x17, r2, r3}, {0x4, 0x7, 0x7, 0x4, 0x10001, 0x5, 0xfff, 0x2}, {0xfffffffffffffffc, 0x3f, 0x6, 0x7f}, 0x2, 0x6e6bbb, 0x0, 0x1, 0x3}, {{@in6=@rand_addr="cf55fdea36458df9c321a3605002ed14", 0x4d4, 0x32}, 0xa, @in=@broadcast, 0x3507, 0x0, 0x1, 0x2, 0x3, 0x200, 0x100000001}}, 0xe8) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x8001}, &(0x7f0000000040)=0x8) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000440)={0xd000}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e20, 0x8, @remote, 0x200}}, 0x80, 0x2}, &(0x7f0000000080)=0x90) [ 550.983226][T27388] alloc_super+0x762/0x890 [ 550.987651][T27388] ? test_single_super+0x10/0x10 [ 550.992594][T27388] sget_userns+0xf1/0x560 [ 550.997015][T27388] ? kill_litter_super+0x60/0x60 [ 551.001956][T27388] ? test_single_super+0x10/0x10 [ 551.006904][T27388] ? kill_litter_super+0x60/0x60 [ 551.011850][T27388] sget+0x10c/0x150 [ 551.015673][T27388] mount_bdev+0xff/0x3c0 [ 551.019919][T27388] ? hfs_show_options+0x630/0x630 [ 551.024953][T27388] hfs_mount+0x35/0x40 [ 551.029025][T27388] ? hfs_statfs+0x4b0/0x4b0 [ 551.033537][T27388] legacy_get_tree+0xf2/0x200 [ 551.038224][T27388] vfs_get_tree+0x123/0x450 [ 551.042744][T27388] do_mount+0x1436/0x2c40 [ 551.047101][T27388] ? copy_mount_string+0x40/0x40 [ 551.052060][T27388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.058308][T27388] ? copy_mount_options+0x280/0x3a0 [ 551.063517][T27388] ksys_mount+0xdb/0x150 [ 551.067784][T27388] __x64_sys_mount+0xbe/0x150 [ 551.072477][T27388] do_syscall_64+0x103/0x610 [ 551.077077][T27388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.082976][T27388] RIP: 0033:0x45ad2a [ 551.086876][T27388] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 551.106968][T27388] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 551.115385][T27388] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 551.123358][T27388] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f00000002c0)={0x90, 0x0, 0x6, {0x2, 0x0, 0x2, 0x2, 0x9, 0x5, {0x1, 0xab56, 0x4, 0xffffffffffffffe1, 0x4, 0x500, 0x1, 0xd7e3, 0x9, 0x7, 0x4, r3, r4, 0xfffffffffffffffb, 0xbb}}}, 0x90) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x480200, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000003c0)={0x7}) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 551.131339][T27388] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 551.139316][T27388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 551.147294][T27388] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = semget(0x3, 0x7, 0x400) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0xc31a, 0x80000001]) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000140)="cdb3a682736d9b23eb40c6e7373fd3d1e0220551ce978325cdfa25fca61a12d7e73bac0c76d0dc3fc7142ea6472180bf162a638a2130288207e34468a4d5498a4892e1ae42ce8bba9e05a8b182cbdd58d273f6f5077abb5568c1c23a2576b79379939a048edef7e5d3e2e6780ed3ef0dc2afc087b3b3684bf1c776aed8b58f26b5296de863bc3658fe13bd707879d36fe01caccb4fe600c0c9ec0f4fa0e8ecae5ed3da14a62e3ade3c3d0757fa6cc573a9460a9cd1e58a72c4dff81a111a8fba31") bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000240)={@default, @default, @bcast, 0x6f, 0x0, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:42 executing program 1: ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 14:46:43 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}]) io_destroy(r1) 14:46:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)="c587c6d67ad8b305ddd52ae8cfb9f50c4ac38c101a2f5f8ad30a6066ccd77ff8883880bab6c43b2328ace90b8d912165f734800b494ee1bc569bfe87204e529642ecee99832d894b72b529be3e4f13fb2c4c8800840543ed7b8c44db3606455d26ea0d7965299131709457e2c9deb732bfbf4a13e01e43a473ae166636ec74b88865bd60a22db8ec2a255dd8e024844da4f711d50caa09d66b90e8356928110a168471bebe5b610864323cadd37f241612c9a30bf21a71e9c73f27feee8d235bc34257854573d12128", 0xc9, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r2, 0x7, 0x492}, &(0x7f0000000240)=ANY=[@ANYBLOB="656e633d61726d36340000000019a3ddce54deddd7b700"/74], &(0x7f00000002c0)="816f6db041547626ab0ade484ea0f09fa93c043deac5cc7ac9e770494c868daf2fcae842164cff4d3a64b66e613ee6da043ba666ab60499783f3a536d331facce3eb0f829024d9f8e9f2a47a1e85df9acc8dac77d03522b9e7cc5835949e7ca28c08640c20e1bd", &(0x7f0000000340)=""/163) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:43 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 551.619439][T27413] FAULT_INJECTION: forcing a failure. [ 551.619439][T27413] name failslab, interval 1, probability 0, space 0, times 0 [ 551.649051][T27413] CPU: 0 PID: 27413 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 551.657095][T27413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.657102][T27413] Call Trace: [ 551.657129][T27413] dump_stack+0x172/0x1f0 [ 551.657158][T27413] should_fail.cold+0xa/0x15 [ 551.679547][T27413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 551.685473][T27413] ? ___might_sleep+0x163/0x280 [ 551.690336][T27413] __should_failslab+0x121/0x190 [ 551.690353][T27413] should_failslab+0x9/0x14 [ 551.690370][T27413] kmem_cache_alloc_trace+0x2d1/0x760 [ 551.690395][T27413] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 551.711081][T27413] __memcg_init_list_lru_node+0x8a/0x1e0 [ 551.711101][T27413] __list_lru_init+0x3cf/0x6e0 [ 551.711121][T27413] alloc_super+0x78d/0x890 [ 551.711136][T27413] ? test_single_super+0x10/0x10 [ 551.711156][T27413] sget_userns+0xf1/0x560 [ 551.731428][T27413] ? kill_litter_super+0x60/0x60 [ 551.731446][T27413] ? test_single_super+0x10/0x10 [ 551.731458][T27413] ? kill_litter_super+0x60/0x60 [ 551.731471][T27413] sget+0x10c/0x150 [ 551.731489][T27413] mount_bdev+0xff/0x3c0 [ 551.758721][T27413] ? hfs_show_options+0x630/0x630 [ 551.763829][T27413] hfs_mount+0x35/0x40 [ 551.767919][T27413] ? hfs_statfs+0x4b0/0x4b0 [ 551.772454][T27413] legacy_get_tree+0xf2/0x200 [ 551.777251][T27413] vfs_get_tree+0x123/0x450 [ 551.781800][T27413] do_mount+0x1436/0x2c40 [ 551.786156][T27413] ? copy_mount_string+0x40/0x40 [ 551.791137][T27413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.797414][T27413] ? copy_mount_options+0x280/0x3a0 [ 551.802857][T27413] ksys_mount+0xdb/0x150 [ 551.807251][T27413] __x64_sys_mount+0xbe/0x150 [ 551.812225][T27413] do_syscall_64+0x103/0x610 [ 551.816946][T27413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.823048][T27413] RIP: 0033:0x45ad2a [ 551.827237][T27413] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 551.847011][T27413] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 551.855444][T27413] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a 14:46:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) msgget$private(0x0, 0x400) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getpeername$netrom(r1, &(0x7f0000000300)={{0x3, @default}, [@null, @remote, @remote, @null, @null, @bcast, @remote, @null]}, &(0x7f0000000380)=0x48) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}, 0x200, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000080)='ip6tnl0\x00', 0x20, 0x7, 0x2}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') r3 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x8000, 0x200) write$P9_RLOCK(r3, &(0x7f0000000400)={0x8, 0x35, 0x1, 0x3}, 0x8) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x890}, 0x40000) [ 551.863557][T27413] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 551.871548][T27413] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 551.879538][T27413] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 551.887818][T27413] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:43 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x2) 14:46:43 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfeffffffffffff}]) io_destroy(r1) [ 552.027101][T27430] FAULT_INJECTION: forcing a failure. [ 552.027101][T27430] name failslab, interval 1, probability 0, space 0, times 0 [ 552.052925][T27430] CPU: 0 PID: 27430 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 552.060974][T27430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.071316][T27430] Call Trace: [ 552.074667][T27430] dump_stack+0x172/0x1f0 [ 552.079162][T27430] should_fail.cold+0xa/0x15 [ 552.084076][T27430] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 552.089908][T27430] ? ___might_sleep+0x163/0x280 [ 552.102196][T27430] __should_failslab+0x121/0x190 [ 552.109385][T27430] should_failslab+0x9/0x14 [ 552.109408][T27430] kmem_cache_alloc_trace+0x2d1/0x760 [ 552.119390][T27430] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 552.125229][T27430] __memcg_init_list_lru_node+0x8a/0x1e0 [ 552.130973][T27430] __list_lru_init+0x3cf/0x6e0 [ 552.135796][T27430] alloc_super+0x78d/0x890 [ 552.140235][T27430] ? test_single_super+0x10/0x10 [ 552.145196][T27430] sget_userns+0xf1/0x560 [ 552.149542][T27430] ? kill_litter_super+0x60/0x60 [ 552.154500][T27430] ? test_single_super+0x10/0x10 [ 552.159545][T27430] ? kill_litter_super+0x60/0x60 [ 552.164675][T27430] sget+0x10c/0x150 [ 552.168507][T27430] mount_bdev+0xff/0x3c0 [ 552.172980][T27430] ? hfs_show_options+0x630/0x630 [ 552.178088][T27430] hfs_mount+0x35/0x40 [ 552.182276][T27430] ? hfs_statfs+0x4b0/0x4b0 [ 552.186888][T27430] legacy_get_tree+0xf2/0x200 [ 552.191587][T27430] vfs_get_tree+0x123/0x450 [ 552.196112][T27430] do_mount+0x1436/0x2c40 [ 552.200471][T27430] ? copy_mount_string+0x40/0x40 [ 552.205585][T27430] ? _copy_from_user+0xdd/0x150 [ 552.211029][T27430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.217295][T27430] ? copy_mount_options+0x280/0x3a0 [ 552.222707][T27430] ksys_mount+0xdb/0x150 [ 552.226976][T27430] __x64_sys_mount+0xbe/0x150 [ 552.231683][T27430] do_syscall_64+0x103/0x610 [ 552.236539][T27430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.242622][T27430] RIP: 0033:0x45ad2a [ 552.246539][T27430] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 552.266443][T27430] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:46:43 executing program 1: ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 14:46:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f00000001c0)={0x1, 0xc5c}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x6, r3, 0x0, 0x0, 0x1}}, 0x20) [ 552.274957][T27430] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 552.282974][T27430] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 552.291134][T27430] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 552.299349][T27430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 552.307425][T27430] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:43 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:43 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x100000000000000}]) io_destroy(r1) 14:46:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0x8001) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80321}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x11c, r4, 0xb00, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x900000000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcec}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x16}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x188}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xca}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x1}, 0x80) setfsuid(r3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x12400, 0x0) [ 552.455912][T27446] FAULT_INJECTION: forcing a failure. [ 552.455912][T27446] name failslab, interval 1, probability 0, space 0, times 0 [ 552.469040][T27446] CPU: 1 PID: 27446 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 552.477480][T27446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.477487][T27446] Call Trace: [ 552.477513][T27446] dump_stack+0x172/0x1f0 [ 552.477536][T27446] should_fail.cold+0xa/0x15 [ 552.500225][T27446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 552.506242][T27446] ? ___might_sleep+0x163/0x280 [ 552.511203][T27446] __should_failslab+0x121/0x190 [ 552.516164][T27446] should_failslab+0x9/0x14 [ 552.520855][T27446] kmem_cache_alloc_trace+0x2d1/0x760 [ 552.526690][T27446] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 552.532604][T27446] __memcg_init_list_lru_node+0x8a/0x1e0 [ 552.538264][T27446] __list_lru_init+0x3cf/0x6e0 [ 552.543065][T27446] alloc_super+0x78d/0x890 [ 552.549042][T27446] ? test_single_super+0x10/0x10 [ 552.554099][T27446] sget_userns+0xf1/0x560 [ 552.558447][T27446] ? kill_litter_super+0x60/0x60 [ 552.563558][T27446] ? test_single_super+0x10/0x10 [ 552.568642][T27446] ? kill_litter_super+0x60/0x60 [ 552.573605][T27446] sget+0x10c/0x150 [ 552.577443][T27446] mount_bdev+0xff/0x3c0 [ 552.582034][T27446] ? hfs_show_options+0x630/0x630 [ 552.587230][T27446] hfs_mount+0x35/0x40 [ 552.591323][T27446] ? hfs_statfs+0x4b0/0x4b0 [ 552.595851][T27446] legacy_get_tree+0xf2/0x200 [ 552.600652][T27446] vfs_get_tree+0x123/0x450 [ 552.605880][T27446] do_mount+0x1436/0x2c40 [ 552.610236][T27446] ? copy_mount_string+0x40/0x40 [ 552.615300][T27446] ? _copy_from_user+0xdd/0x150 [ 552.620454][T27446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.627421][T27446] ? copy_mount_options+0x280/0x3a0 [ 552.632641][T27446] ksys_mount+0xdb/0x150 [ 552.636912][T27446] __x64_sys_mount+0xbe/0x150 [ 552.641868][T27446] do_syscall_64+0x103/0x610 [ 552.646570][T27446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.652612][T27446] RIP: 0033:0x45ad2a [ 552.656816][T27446] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 552.676826][T27446] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 552.685428][T27446] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 552.693503][T27446] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 552.701501][T27446] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 552.709651][T27446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 552.717670][T27446] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xe8, "72e930f448a9fa2d0536c6112fa7cd68d23754ee51bf2aa31cfd69cf07e4555e624c4233ec19dd60e24cd361dab50043d4351cc80921ebf44f363754eb55c8782497594885e9be0fe799d9565ed602045e1a3cf29d5de133bcf8726e4b3ad16553d3635e4b6b4569de215b940df361e1b912d00ac148a01dc0870a1284d19ef9ef04ed6f00f232e003cf11fa5852c7bae27f7e13e8638ff1288e8a19595f0dec52d3cb26c557075fe562e4735813d7c01a4897343c3f144ed746cfc9bc2ad13b97af64d20f6d27df7516bab6614834bc860e521d9aff9806384bc0ff1ee6afcfe8c0e6d47010653f"}, &(0x7f0000000000)=0xf0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={r2, 0x5, 0x30, 0x8, 0xb4f5}, &(0x7f0000000080)=0x18) 14:46:44 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000140)={r1, r0, 0x0, 0x64, &(0x7f0000000000)="2d030c5fe63526bf4ae82faba2134027e8cc6e9b1fa2e69f0e24f91735a8dd9914588bb4d2c66ceb30fd869794468b807fcdbc1751cfa5ee8517cf381081a7e9447f32874b450f2dc6ddd61f17312f4b0da1485fda36d081afe5e0c91b8e649442cfdce3", 0x5, 0x6, 0x1, 0x7, 0x6, 0x3, 0x3, 'syz1\x00'}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0xc, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x2, 0x3, 0x0, 0x7, 0x77642cef5b6d87e6, 0x1, 0xffffffffffffffff}, @map={0x18, 0xf, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x10001, 0xa, 0x9, 0xf, 0x10, 0xc}, @call={0x85, 0x0, 0x0, 0x22}, @exit, @exit, @exit]}, &(0x7f0000000280)='GPL\x00', 0x7, 0xc6, &(0x7f00000002c0)=""/198, 0x41f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0xfff}, 0x8, 0x10, &(0x7f0000000400)={0x80000001, 0x7, 0x7, 0xa7}, 0x10}, 0x70) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockname$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004340)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000004440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000004480)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000044c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000045c0)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000004640)={0x0, @loopback, @dev}, &(0x7f0000004680)=0xc) recvmsg$kcm(r2, &(0x7f0000004800)={&(0x7f00000046c0)=@can={0x1d, 0x0}, 0x80, &(0x7f00000047c0)=[{&(0x7f0000004740)=""/77, 0x4d}], 0x1}, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004880)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000004980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000005fc0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f00000060c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000068c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000069c0)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000006a00)={@empty, @broadcast, 0x0}, &(0x7f0000006a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000006b40)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000006c40)=0xe8) accept$packet(r1, &(0x7f0000006d40)={0x11, 0x0, 0x0}, &(0x7f0000006d80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006e80)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000006f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006fc0)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000070c0)=0xe8) accept4(r0, &(0x7f00000071c0)=@can={0x1d, 0x0}, &(0x7f0000007240)=0x80, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000007280)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000007380)=0xe8) getsockname$packet(r1, &(0x7f00000073c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007400)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007480)={'vcan0\x00', 0x0}) clock_gettime(0x0, &(0x7f0000009340)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000009200)=[{{&(0x7f00000074c0)=@ipx, 0x80, &(0x7f0000007840)=[{&(0x7f0000007540)=""/215, 0xd7}, {&(0x7f0000007640)=""/183, 0xb7}, {&(0x7f0000007700)=""/225, 0xe1}, {&(0x7f0000007800)=""/41, 0x29}], 0x4, &(0x7f0000007880)=""/128, 0x80}, 0x2}, {{&(0x7f0000007900)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000007a40)=[{&(0x7f0000007980)=""/182, 0xb6}], 0x1, &(0x7f0000007a80)=""/24, 0x18}, 0xdb3a}, {{&(0x7f0000007ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007b80)=[{&(0x7f0000007b40)=""/40, 0x28}], 0x1, &(0x7f0000007bc0)=""/67, 0x43}, 0x4}, {{0x0, 0x0, &(0x7f0000007c80)=[{&(0x7f0000007c40)=""/36, 0x24}], 0x1, &(0x7f0000007cc0)=""/119, 0x77}, 0x8}, {{&(0x7f0000007d40)=@x25={0x9, @remote}, 0x80, &(0x7f0000008180)=[{&(0x7f0000007dc0)=""/131, 0x83}, {&(0x7f0000007e80)=""/100, 0x64}, {&(0x7f0000007f00)=""/169, 0xa9}, {&(0x7f0000007fc0)=""/169, 0xa9}, {&(0x7f0000008080)=""/195, 0xc3}], 0x5, &(0x7f0000008200)=""/4096, 0x1000}, 0x1}], 0x5, 0x2e88366e2e54c048, &(0x7f0000009380)={r23, r24+10000000}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000009780)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000009880)=0xe8) getpeername$packet(r1, &(0x7f0000009c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009c80)=0x14) getpeername$packet(r1, &(0x7f0000009cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009d00)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000009d40)={0x0, @empty, @multicast1}, &(0x7f0000009d80)=0xc) accept4$packet(r1, &(0x7f0000009dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009e00)=0x14, 0x800) accept$packet(r0, &(0x7f0000009e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009ec0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f000000a180)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f000000a280)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f000000a2c0)={0x0, @multicast2, @multicast2}, &(0x7f00000005c0)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f000000a340)={@local, @rand_addr, 0x0}, &(0x7f000000a380)=0xc) recvmmsg(r0, &(0x7f000000c600)=[{{&(0x7f000000bc40)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c300)=[{&(0x7f000000bcc0)=""/197, 0xc5}, {&(0x7f000000bdc0)=""/64, 0x40}, {&(0x7f000000be00)=""/237, 0xed}, {&(0x7f000000bf00)=""/253, 0xfd}, {&(0x7f000000c000)=""/176, 0xb0}, {&(0x7f000000c0c0)=""/19, 0x13}, {&(0x7f000000c100)=""/238, 0xee}, {&(0x7f000000c200)=""/101, 0x65}, {&(0x7f000000c280)=""/105, 0x69}], 0x9, &(0x7f000000c3c0)=""/106, 0x6a}, 0x5}, {{&(0x7f000000c440)=@un=@abs, 0x80, &(0x7f000000c4c0), 0x0, &(0x7f000000c500)=""/200, 0xc8}, 0x4}], 0x2, 0x40002000, &(0x7f000000c680)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f000000c780)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000c880)=0xe8) accept$packet(r2, &(0x7f000000d5c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d600)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f000000df40)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x504008}, 0xc, &(0x7f000000df00)={&(0x7f000000d640)=ANY=[@ANYBLOB="b0080000", @ANYRES16=r4, @ANYBLOB="000825bd7000fddbdf250200000008000100", @ANYRES32=r5, @ANYBLOB="ac01020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ba020000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ff0f000008000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="4400020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040003000000080007000000000008000100", @ANYRES32=r12, @ANYBLOB="f800020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004001212000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000140004000100000800800000020001ff00f8ffff08000100", @ANYRES32=r14, @ANYBLOB="640102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000400000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000200000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040008000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000500000008000600", @ANYRES32=r16, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="b8010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r22, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400e474000008000600", @ANYRES32=r25, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r26, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r27, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400862f000008000600", @ANYRES32=r28, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r29, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="08000100", @ANYRES32=r31, @ANYBLOB="dc0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r32, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400be72000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r33, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002600000008000600", @ANYRES32=r34, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r35, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r36, @ANYBLOB="3800010024000100616374697665706f7274000000000000006bfb7b0514e2c3fdb5ffac0000001000000000000000668ec31f5e", @ANYRES32=r37, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040008000000"], 0x8b0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:46:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 553.072225][T27465] FAULT_INJECTION: forcing a failure. [ 553.072225][T27465] name failslab, interval 1, probability 0, space 0, times 0 [ 553.086192][T27465] CPU: 0 PID: 27465 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 553.094207][T27465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.104284][T27465] Call Trace: [ 553.104313][T27465] dump_stack+0x172/0x1f0 [ 553.104337][T27465] should_fail.cold+0xa/0x15 [ 553.104357][T27465] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 553.104379][T27465] ? ___might_sleep+0x163/0x280 [ 553.104400][T27465] __should_failslab+0x121/0x190 [ 553.104416][T27465] should_failslab+0x9/0x14 [ 553.104434][T27465] kmem_cache_alloc_trace+0x2d1/0x760 [ 553.104454][T27465] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 553.104479][T27465] __memcg_init_list_lru_node+0x8a/0x1e0 [ 553.104502][T27465] __list_lru_init+0x3cf/0x6e0 [ 553.159201][T27465] alloc_super+0x78d/0x890 [ 553.163641][T27465] ? test_single_super+0x10/0x10 [ 553.168605][T27465] sget_userns+0xf1/0x560 [ 553.173056][T27465] ? kill_litter_super+0x60/0x60 [ 553.178021][T27465] ? test_single_super+0x10/0x10 [ 553.183010][T27465] ? kill_litter_super+0x60/0x60 [ 553.188328][T27465] sget+0x10c/0x150 [ 553.192205][T27465] mount_bdev+0xff/0x3c0 [ 553.196478][T27465] ? hfs_show_options+0x630/0x630 [ 553.201532][T27465] hfs_mount+0x35/0x40 [ 553.205729][T27465] ? hfs_statfs+0x4b0/0x4b0 [ 553.210500][T27465] legacy_get_tree+0xf2/0x200 [ 553.215209][T27465] vfs_get_tree+0x123/0x450 [ 553.219738][T27465] do_mount+0x1436/0x2c40 [ 553.224376][T27465] ? copy_mount_string+0x40/0x40 [ 553.229345][T27465] ? _copy_from_user+0xdd/0x150 [ 553.234219][T27465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.241613][T27465] ? copy_mount_options+0x280/0x3a0 [ 553.246925][T27465] ksys_mount+0xdb/0x150 [ 553.251321][T27465] __x64_sys_mount+0xbe/0x150 [ 553.256116][T27465] do_syscall_64+0x103/0x610 [ 553.260834][T27465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.266747][T27465] RIP: 0033:0x45ad2a [ 553.270703][T27465] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 553.290736][T27465] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 553.299312][T27465] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 553.307388][T27465] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 553.315810][T27465] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 553.323822][T27465] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 553.332224][T27465] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:44 executing program 1: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:44 executing program 3 (fault-call:0 fault-nth:79): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 553.527185][T27479] FAULT_INJECTION: forcing a failure. [ 553.527185][T27479] name failslab, interval 1, probability 0, space 0, times 0 [ 553.573196][T27479] CPU: 0 PID: 27479 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 553.581326][T27479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.594534][T27479] Call Trace: [ 553.598031][T27479] dump_stack+0x172/0x1f0 [ 553.602943][T27479] should_fail.cold+0xa/0x15 [ 553.608458][T27479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 553.614296][T27479] ? ___might_sleep+0x163/0x280 [ 553.619265][T27479] __should_failslab+0x121/0x190 [ 553.624230][T27479] should_failslab+0x9/0x14 [ 553.628798][T27479] kmem_cache_alloc_trace+0x2d1/0x760 [ 553.634197][T27479] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 553.640030][T27479] __memcg_init_list_lru_node+0x8a/0x1e0 [ 553.645698][T27479] __list_lru_init+0x3cf/0x6e0 [ 553.650527][T27479] alloc_super+0x78d/0x890 [ 553.655295][T27479] ? test_single_super+0x10/0x10 [ 553.660261][T27479] sget_userns+0xf1/0x560 [ 553.664619][T27479] ? kill_litter_super+0x60/0x60 [ 553.669670][T27479] ? test_single_super+0x10/0x10 [ 553.674629][T27479] ? kill_litter_super+0x60/0x60 [ 553.679702][T27479] sget+0x10c/0x150 [ 553.683661][T27479] mount_bdev+0xff/0x3c0 [ 553.687926][T27479] ? hfs_show_options+0x630/0x630 [ 553.692990][T27479] hfs_mount+0x35/0x40 [ 553.697095][T27479] ? hfs_statfs+0x4b0/0x4b0 [ 553.701718][T27479] legacy_get_tree+0xf2/0x200 [ 553.706457][T27479] vfs_get_tree+0x123/0x450 [ 553.710986][T27479] do_mount+0x1436/0x2c40 [ 553.715340][T27479] ? copy_mount_string+0x40/0x40 [ 553.720300][T27479] ? _copy_from_user+0xdd/0x150 [ 553.725173][T27479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.731797][T27479] ? copy_mount_options+0x280/0x3a0 [ 553.737097][T27479] ksys_mount+0xdb/0x150 [ 553.741363][T27479] __x64_sys_mount+0xbe/0x150 [ 553.746155][T27479] do_syscall_64+0x103/0x610 [ 553.750806][T27479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.756723][T27479] RIP: 0033:0x45ad2a 14:46:45 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x200000000000000}]) io_destroy(r1) 14:46:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 553.760683][T27479] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 553.780998][T27479] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 553.781013][T27479] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 553.781022][T27479] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 553.781029][T27479] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 553.781037][T27479] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:45 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 553.781045][T27479] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:45 executing program 3 (fault-call:0 fault-nth:80): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:45 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 553.982437][T27499] FAULT_INJECTION: forcing a failure. [ 553.982437][T27499] name failslab, interval 1, probability 0, space 0, times 0 [ 554.051187][T27499] CPU: 0 PID: 27499 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 554.062722][T27499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.072954][T27499] Call Trace: [ 554.076400][T27499] dump_stack+0x172/0x1f0 [ 554.080803][T27499] should_fail.cold+0xa/0x15 [ 554.085425][T27499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 554.091341][T27499] ? ___might_sleep+0x163/0x280 [ 554.096502][T27499] __should_failslab+0x121/0x190 [ 554.101465][T27499] should_failslab+0x9/0x14 [ 554.107519][T27499] kmem_cache_alloc_trace+0x2d1/0x760 [ 554.113089][T27499] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 554.119016][T27499] __memcg_init_list_lru_node+0x8a/0x1e0 [ 554.124883][T27499] __list_lru_init+0x3cf/0x6e0 [ 554.129837][T27499] alloc_super+0x78d/0x890 [ 554.134278][T27499] ? test_single_super+0x10/0x10 [ 554.139351][T27499] sget_userns+0xf1/0x560 [ 554.143703][T27499] ? kill_litter_super+0x60/0x60 [ 554.148747][T27499] ? test_single_super+0x10/0x10 [ 554.153740][T27499] ? kill_litter_super+0x60/0x60 [ 554.159044][T27499] sget+0x10c/0x150 [ 554.162967][T27499] mount_bdev+0xff/0x3c0 [ 554.167231][T27499] ? hfs_show_options+0x630/0x630 [ 554.172372][T27499] hfs_mount+0x35/0x40 [ 554.176709][T27499] ? hfs_statfs+0x4b0/0x4b0 [ 554.181382][T27499] legacy_get_tree+0xf2/0x200 [ 554.186421][T27499] vfs_get_tree+0x123/0x450 [ 554.190950][T27499] do_mount+0x1436/0x2c40 [ 554.195310][T27499] ? copy_mount_string+0x40/0x40 [ 554.200359][T27499] ? _copy_from_user+0xdd/0x150 [ 554.205545][T27499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.211826][T27499] ? copy_mount_options+0x280/0x3a0 [ 554.217049][T27499] ksys_mount+0xdb/0x150 [ 554.221550][T27499] __x64_sys_mount+0xbe/0x150 [ 554.226437][T27499] do_syscall_64+0x103/0x610 [ 554.231052][T27499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.236962][T27499] RIP: 0033:0x45ad2a [ 554.240873][T27499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 554.260843][T27499] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 554.269278][T27499] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 554.277273][T27499] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 554.285353][T27499] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 554.293522][T27499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:45 executing program 1: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:45 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 554.301514][T27499] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:45 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:45 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:46 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x400000000000000}]) io_destroy(r1) 14:46:46 executing program 3 (fault-call:0 fault-nth:81): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 5: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 554.881852][T27524] FAULT_INJECTION: forcing a failure. [ 554.881852][T27524] name failslab, interval 1, probability 0, space 0, times 0 [ 554.907352][T27524] CPU: 0 PID: 27524 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 554.915632][T27524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.915639][T27524] Call Trace: [ 554.915666][T27524] dump_stack+0x172/0x1f0 [ 554.915689][T27524] should_fail.cold+0xa/0x15 [ 554.915710][T27524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 554.915732][T27524] ? ___might_sleep+0x163/0x280 [ 554.915793][T27524] __should_failslab+0x121/0x190 [ 554.933840][T27524] should_failslab+0x9/0x14 [ 554.933859][T27524] kmem_cache_alloc_trace+0x2d1/0x760 [ 554.933877][T27524] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 554.933899][T27524] __memcg_init_list_lru_node+0x8a/0x1e0 [ 554.933918][T27524] __list_lru_init+0x3cf/0x6e0 [ 554.933936][T27524] alloc_super+0x78d/0x890 [ 554.933960][T27524] ? test_single_super+0x10/0x10 [ 554.976051][T27524] sget_userns+0xf1/0x560 [ 554.976067][T27524] ? kill_litter_super+0x60/0x60 [ 554.976082][T27524] ? test_single_super+0x10/0x10 [ 554.976094][T27524] ? kill_litter_super+0x60/0x60 [ 554.976106][T27524] sget+0x10c/0x150 [ 554.976122][T27524] mount_bdev+0xff/0x3c0 [ 554.976144][T27524] ? hfs_show_options+0x630/0x630 [ 554.985339][T27524] hfs_mount+0x35/0x40 [ 554.985354][T27524] ? hfs_statfs+0x4b0/0x4b0 14:46:46 executing program 5: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:46 executing program 5: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) [ 554.985371][T27524] legacy_get_tree+0xf2/0x200 [ 554.985388][T27524] vfs_get_tree+0x123/0x450 [ 554.985405][T27524] do_mount+0x1436/0x2c40 [ 554.985425][T27524] ? copy_mount_string+0x40/0x40 [ 555.050274][T27524] ? _copy_from_user+0xdd/0x150 [ 555.055236][T27524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.061504][T27524] ? copy_mount_options+0x280/0x3a0 [ 555.066743][T27524] ksys_mount+0xdb/0x150 [ 555.071044][T27524] __x64_sys_mount+0xbe/0x150 [ 555.075937][T27524] do_syscall_64+0x103/0x610 [ 555.080553][T27524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.086464][T27524] RIP: 0033:0x45ad2a [ 555.090378][T27524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 555.110248][T27524] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 555.118680][T27524] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 555.126671][T27524] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 555.134659][T27524] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 555.142828][T27524] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 555.150824][T27524] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:46 executing program 1: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, 0x0, 0x0) 14:46:46 executing program 5: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x0, 0x78}}) 14:46:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) 14:46:46 executing program 3 (fault-call:0 fault-nth:82): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 555.395343][T27543] FAULT_INJECTION: forcing a failure. [ 555.395343][T27543] name failslab, interval 1, probability 0, space 0, times 0 [ 555.432661][T27543] CPU: 0 PID: 27543 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 555.440887][T27543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.450957][T27543] Call Trace: [ 555.454279][T27543] dump_stack+0x172/0x1f0 [ 555.458639][T27543] should_fail.cold+0xa/0x15 [ 555.463342][T27543] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 555.469269][T27543] ? ___might_sleep+0x163/0x280 [ 555.474316][T27543] __should_failslab+0x121/0x190 [ 555.479276][T27543] should_failslab+0x9/0x14 [ 555.484071][T27543] kmem_cache_alloc_trace+0x2d1/0x760 [ 555.489473][T27543] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 555.495397][T27543] __memcg_init_list_lru_node+0x8a/0x1e0 [ 555.501089][T27543] __list_lru_init+0x3cf/0x6e0 [ 555.506266][T27543] alloc_super+0x78d/0x890 [ 555.510707][T27543] ? test_single_super+0x10/0x10 [ 555.515669][T27543] sget_userns+0xf1/0x560 [ 555.520228][T27543] ? kill_litter_super+0x60/0x60 [ 555.525315][T27543] ? test_single_super+0x10/0x10 [ 555.530459][T27543] ? kill_litter_super+0x60/0x60 [ 555.535414][T27543] sget+0x10c/0x150 [ 555.539299][T27543] mount_bdev+0xff/0x3c0 [ 555.543568][T27543] ? hfs_show_options+0x630/0x630 [ 555.548705][T27543] hfs_mount+0x35/0x40 [ 555.552894][T27543] ? hfs_statfs+0x4b0/0x4b0 [ 555.557421][T27543] legacy_get_tree+0xf2/0x200 [ 555.562172][T27543] vfs_get_tree+0x123/0x450 [ 555.566860][T27543] do_mount+0x1436/0x2c40 [ 555.571391][T27543] ? copy_mount_string+0x40/0x40 [ 555.576358][T27543] ? _copy_from_user+0xdd/0x150 [ 555.581262][T27543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.587870][T27543] ? copy_mount_options+0x280/0x3a0 [ 555.593208][T27543] ksys_mount+0xdb/0x150 [ 555.597627][T27543] __x64_sys_mount+0xbe/0x150 [ 555.602670][T27543] do_syscall_64+0x103/0x610 [ 555.607562][T27543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.613745][T27543] RIP: 0033:0x45ad2a [ 555.617701][T27543] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 555.637505][T27543] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 555.645946][T27543] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 555.653946][T27543] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 555.662126][T27543] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 555.670117][T27543] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 555.678435][T27543] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:47 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000000000000}]) io_destroy(r1) 14:46:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) 14:46:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 3 (fault-call:0 fault-nth:83): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 555.965630][T27556] FAULT_INJECTION: forcing a failure. [ 555.965630][T27556] name failslab, interval 1, probability 0, space 0, times 0 [ 555.989050][T27556] CPU: 0 PID: 27556 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 555.997065][T27556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.007538][T27556] Call Trace: [ 556.010862][T27556] dump_stack+0x172/0x1f0 [ 556.015234][T27556] should_fail.cold+0xa/0x15 [ 556.015254][T27556] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 556.015279][T27556] ? ___might_sleep+0x163/0x280 [ 556.015299][T27556] __should_failslab+0x121/0x190 [ 556.015319][T27556] should_failslab+0x9/0x14 [ 556.025870][T27556] kmem_cache_alloc_node_trace+0x270/0x720 [ 556.025887][T27556] ? kmem_cache_alloc_trace+0x354/0x760 [ 556.025909][T27556] __kmalloc_node+0x3d/0x70 [ 556.025928][T27556] kvmalloc_node+0x68/0x100 [ 556.025944][T27556] __list_lru_init+0x4a6/0x6e0 [ 556.025963][T27556] alloc_super+0x78d/0x890 [ 556.025978][T27556] ? test_single_super+0x10/0x10 [ 556.025994][T27556] sget_userns+0xf1/0x560 [ 556.026012][T27556] ? kill_litter_super+0x60/0x60 [ 556.092346][T27556] ? test_single_super+0x10/0x10 [ 556.097342][T27556] ? kill_litter_super+0x60/0x60 [ 556.102301][T27556] sget+0x10c/0x150 [ 556.107816][T27556] mount_bdev+0xff/0x3c0 [ 556.112079][T27556] ? hfs_show_options+0x630/0x630 [ 556.117228][T27556] hfs_mount+0x35/0x40 [ 556.121345][T27556] ? hfs_statfs+0x4b0/0x4b0 [ 556.125884][T27556] legacy_get_tree+0xf2/0x200 [ 556.130585][T27556] vfs_get_tree+0x123/0x450 [ 556.135403][T27556] do_mount+0x1436/0x2c40 [ 556.139989][T27556] ? copy_mount_string+0x40/0x40 [ 556.145195][T27556] ? _copy_from_user+0xdd/0x150 [ 556.150290][T27556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.156552][T27556] ? copy_mount_options+0x280/0x3a0 [ 556.161825][T27556] ksys_mount+0xdb/0x150 [ 556.166089][T27556] __x64_sys_mount+0xbe/0x150 [ 556.170878][T27556] do_syscall_64+0x103/0x610 [ 556.175491][T27556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.181683][T27556] RIP: 0033:0x45ad2a [ 556.185602][T27556] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 556.205555][T27556] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:46:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, 0x0) 14:46:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 556.214251][T27556] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 556.222242][T27556] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 556.222257][T27556] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 556.238784][T27556] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 556.246938][T27556] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)) 14:46:47 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x8000000000000000}]) io_destroy(r1) 14:46:47 executing program 3 (fault-call:0 fault-nth:84): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)) 14:46:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)) [ 556.491106][T27578] FAULT_INJECTION: forcing a failure. [ 556.491106][T27578] name failslab, interval 1, probability 0, space 0, times 0 [ 556.543724][T27578] CPU: 1 PID: 27578 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 556.551812][T27578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.562351][T27578] Call Trace: [ 556.562376][T27578] dump_stack+0x172/0x1f0 [ 556.562400][T27578] should_fail.cold+0xa/0x15 [ 556.562420][T27578] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 556.562444][T27578] ? ___might_sleep+0x163/0x280 [ 556.562467][T27578] __should_failslab+0x121/0x190 [ 556.590981][T27578] should_failslab+0x9/0x14 [ 556.595512][T27578] kmem_cache_alloc_trace+0x2d1/0x760 [ 556.601028][T27578] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 556.606861][T27578] __memcg_init_list_lru_node+0x8a/0x1e0 [ 556.612722][T27578] __list_lru_init+0x3cf/0x6e0 [ 556.617551][T27578] alloc_super+0x78d/0x890 [ 556.622120][T27578] ? test_single_super+0x10/0x10 [ 556.627159][T27578] sget_userns+0xf1/0x560 [ 556.631509][T27578] ? kill_litter_super+0x60/0x60 [ 556.636474][T27578] ? test_single_super+0x10/0x10 [ 556.641521][T27578] ? kill_litter_super+0x60/0x60 [ 556.646479][T27578] sget+0x10c/0x150 [ 556.650396][T27578] mount_bdev+0xff/0x3c0 [ 556.654747][T27578] ? hfs_show_options+0x630/0x630 [ 556.659960][T27578] hfs_mount+0x35/0x40 [ 556.664049][T27578] ? hfs_statfs+0x4b0/0x4b0 [ 556.668810][T27578] legacy_get_tree+0xf2/0x200 [ 556.673513][T27578] vfs_get_tree+0x123/0x450 [ 556.678041][T27578] do_mount+0x1436/0x2c40 [ 556.682485][T27578] ? copy_mount_string+0x40/0x40 [ 556.687440][T27578] ? copy_mount_options+0x1d9/0x3a0 [ 556.692657][T27578] ? copy_mount_options+0x1d9/0x3a0 [ 556.697878][T27578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.704162][T27578] ? copy_mount_options+0x280/0x3a0 [ 556.709385][T27578] ksys_mount+0xdb/0x150 [ 556.713811][T27578] __x64_sys_mount+0xbe/0x150 [ 556.718604][T27578] do_syscall_64+0x103/0x610 [ 556.723312][T27578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.729345][T27578] RIP: 0033:0x45ad2a [ 556.733258][T27578] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 556.753288][T27578] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 556.761863][T27578] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 556.769974][T27578] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 556.777968][T27578] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 556.786040][T27578] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:46:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 556.794120][T27578] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="23000000190081ae08060c04000f00000a007f03fe0200018701546fabca1b4e7d06a6", 0x23}], 0x1}, 0x0) 14:46:48 executing program 3 (fault-call:0 fault-nth:85): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 556.931394][T27592] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 557.027737][T27596] FAULT_INJECTION: forcing a failure. [ 557.027737][T27596] name failslab, interval 1, probability 0, space 0, times 0 [ 557.070634][T27596] CPU: 1 PID: 27596 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 557.078917][T27596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.089260][T27596] Call Trace: [ 557.092601][T27596] dump_stack+0x172/0x1f0 [ 557.096961][T27596] should_fail.cold+0xa/0x15 [ 557.101704][T27596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 557.107707][T27596] ? ___might_sleep+0x163/0x280 [ 557.112580][T27596] __should_failslab+0x121/0x190 [ 557.117635][T27596] should_failslab+0x9/0x14 [ 557.122249][T27596] kmem_cache_alloc_trace+0x2d1/0x760 [ 557.127737][T27596] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 557.127785][T27596] __memcg_init_list_lru_node+0x8a/0x1e0 [ 557.127811][T27596] __list_lru_init+0x3cf/0x6e0 [ 557.139328][T27596] alloc_super+0x78d/0x890 [ 557.139345][T27596] ? test_single_super+0x10/0x10 [ 557.139367][T27596] sget_userns+0xf1/0x560 [ 557.157844][T27596] ? kill_litter_super+0x60/0x60 [ 557.162806][T27596] ? test_single_super+0x10/0x10 [ 557.167748][T27596] ? kill_litter_super+0x60/0x60 [ 557.172810][T27596] sget+0x10c/0x150 [ 557.176628][T27596] mount_bdev+0xff/0x3c0 [ 557.180876][T27596] ? hfs_show_options+0x630/0x630 [ 557.185922][T27596] hfs_mount+0x35/0x40 [ 557.189996][T27596] ? hfs_statfs+0x4b0/0x4b0 [ 557.194507][T27596] legacy_get_tree+0xf2/0x200 [ 557.199197][T27596] vfs_get_tree+0x123/0x450 [ 557.203706][T27596] do_mount+0x1436/0x2c40 [ 557.208048][T27596] ? copy_mount_string+0x40/0x40 [ 557.213000][T27596] ? _copy_from_user+0xdd/0x150 [ 557.217861][T27596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.224103][T27596] ? copy_mount_options+0x280/0x3a0 [ 557.229309][T27596] ksys_mount+0xdb/0x150 [ 557.233554][T27596] __x64_sys_mount+0xbe/0x150 [ 557.239220][T27596] do_syscall_64+0x103/0x610 [ 557.243817][T27596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.249703][T27596] RIP: 0033:0x45ad2a 14:46:48 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 14:46:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:48 executing program 5: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x285ff6bb7af29fad) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) tkill(r0, 0x1000000000016) [ 557.253604][T27596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 557.273203][T27596] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 557.281612][T27596] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 557.289583][T27596] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 557.297551][T27596] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 557.305520][T27596] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 557.313486][T27596] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:49 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xeffdffffffffffff}]) io_destroy(r1) 14:46:49 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc2003, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x1ca) r1 = gettid() write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup(0xffffffffffffffff) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r3 = epoll_create1(0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x32, r3, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000000)={0x17, 0x7, 0x2, {{0xa, '/dev/full\x00'}, 0xffffffffffff9d29}}, 0x17) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) write$P9_RGETATTR(r0, 0x0, 0x0) tkill(r1, 0x1000000000016) 14:46:49 executing program 3 (fault-call:0 fault-nth:86): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 557.661338][T27613] FAULT_INJECTION: forcing a failure. [ 557.661338][T27613] name failslab, interval 1, probability 0, space 0, times 0 [ 557.732594][T27613] CPU: 1 PID: 27613 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 557.740608][T27613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.750661][T27613] Call Trace: [ 557.753965][T27613] dump_stack+0x172/0x1f0 [ 557.758317][T27613] should_fail.cold+0xa/0x15 [ 557.762918][T27613] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 557.768731][T27613] ? ___might_sleep+0x163/0x280 [ 557.768761][T27613] __should_failslab+0x121/0x190 [ 557.768777][T27613] should_failslab+0x9/0x14 [ 557.768793][T27613] kmem_cache_alloc_trace+0x2d1/0x760 [ 557.768817][T27613] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 557.778590][T27613] __memcg_init_list_lru_node+0x8a/0x1e0 [ 557.778612][T27613] __list_lru_init+0x3cf/0x6e0 [ 557.778632][T27613] alloc_super+0x78d/0x890 [ 557.778647][T27613] ? test_single_super+0x10/0x10 [ 557.778666][T27613] sget_userns+0xf1/0x560 [ 557.818291][T27613] ? kill_litter_super+0x60/0x60 [ 557.823231][T27613] ? test_single_super+0x10/0x10 [ 557.828167][T27613] ? kill_litter_super+0x60/0x60 [ 557.833165][T27613] sget+0x10c/0x150 [ 557.836980][T27613] mount_bdev+0xff/0x3c0 [ 557.841226][T27613] ? hfs_show_options+0x630/0x630 [ 557.846264][T27613] hfs_mount+0x35/0x40 [ 557.850340][T27613] ? hfs_statfs+0x4b0/0x4b0 [ 557.854845][T27613] legacy_get_tree+0xf2/0x200 [ 557.859524][T27613] vfs_get_tree+0x123/0x450 [ 557.864030][T27613] do_mount+0x1436/0x2c40 [ 557.868370][T27613] ? copy_mount_string+0x40/0x40 [ 557.873311][T27613] ? _copy_from_user+0xdd/0x150 [ 557.878177][T27613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.884413][T27613] ? copy_mount_options+0x280/0x3a0 [ 557.889615][T27613] ksys_mount+0xdb/0x150 [ 557.893862][T27613] __x64_sys_mount+0xbe/0x150 [ 557.898545][T27613] do_syscall_64+0x103/0x610 [ 557.903147][T27613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.909040][T27613] RIP: 0033:0x45ad2a [ 557.912933][T27613] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:49 executing program 5: gettid() ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002700)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x5}, {0x46, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x18}, {0x7}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x8}}, 0xe8) 14:46:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 557.932531][T27613] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 557.940936][T27613] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 557.948907][T27613] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 557.956873][T27613] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 557.964841][T27613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 557.972810][T27613] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:49 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) 14:46:49 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 14:46:49 executing program 3 (fault-call:0 fault-nth:87): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 558.225327][T27640] FAULT_INJECTION: forcing a failure. [ 558.225327][T27640] name failslab, interval 1, probability 0, space 0, times 0 [ 558.295534][T27640] CPU: 0 PID: 27640 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 558.303547][T27640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.313608][T27640] Call Trace: [ 558.316912][T27640] dump_stack+0x172/0x1f0 [ 558.321249][T27640] should_fail.cold+0xa/0x15 [ 558.325850][T27640] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.331666][T27640] ? ___might_sleep+0x163/0x280 [ 558.336533][T27640] __should_failslab+0x121/0x190 [ 558.341471][T27640] should_failslab+0x9/0x14 [ 558.345985][T27640] kmem_cache_alloc_trace+0x2d1/0x760 [ 558.351372][T27640] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 558.357189][T27640] __memcg_init_list_lru_node+0x8a/0x1e0 [ 558.362828][T27640] __list_lru_init+0x3cf/0x6e0 [ 558.367601][T27640] alloc_super+0x78d/0x890 [ 558.372022][T27640] ? test_single_super+0x10/0x10 [ 558.376969][T27640] sget_userns+0xf1/0x560 [ 558.381300][T27640] ? kill_litter_super+0x60/0x60 [ 558.381317][T27640] ? test_single_super+0x10/0x10 [ 558.381329][T27640] ? kill_litter_super+0x60/0x60 [ 558.381348][T27640] sget+0x10c/0x150 [ 558.396120][T27640] mount_bdev+0xff/0x3c0 [ 558.396135][T27640] ? hfs_show_options+0x630/0x630 [ 558.396153][T27640] hfs_mount+0x35/0x40 [ 558.396166][T27640] ? hfs_statfs+0x4b0/0x4b0 [ 558.396183][T27640] legacy_get_tree+0xf2/0x200 [ 558.396200][T27640] vfs_get_tree+0x123/0x450 [ 558.396216][T27640] do_mount+0x1436/0x2c40 [ 558.396236][T27640] ? copy_mount_string+0x40/0x40 [ 558.396256][T27640] ? _copy_from_user+0xdd/0x150 [ 558.396277][T27640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.447258][T27640] ? copy_mount_options+0x280/0x3a0 [ 558.452460][T27640] ksys_mount+0xdb/0x150 [ 558.456708][T27640] __x64_sys_mount+0xbe/0x150 [ 558.461391][T27640] do_syscall_64+0x103/0x610 [ 558.465991][T27640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.471880][T27640] RIP: 0033:0x45ad2a [ 558.475790][T27640] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 558.495393][T27640] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 558.503805][T27640] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 558.511787][T27640] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 558.519764][T27640] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 558.527745][T27640] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 558.535730][T27640] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:50 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfcfdffffffffffff}]) io_destroy(r1) 14:46:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@initdev, 0x400, 0x0, 0x3, 0x3}, 0x20) 14:46:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r1, &(0x7f00000000c0)=0x201, 0xdd) 14:46:50 executing program 3 (fault-call:0 fault-nth:88): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 558.878419][T27665] FAULT_INJECTION: forcing a failure. [ 558.878419][T27665] name failslab, interval 1, probability 0, space 0, times 0 [ 558.931914][T27665] CPU: 0 PID: 27665 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 558.939935][T27665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.949991][T27665] Call Trace: [ 558.953297][T27665] dump_stack+0x172/0x1f0 [ 558.957642][T27665] should_fail.cold+0xa/0x15 [ 558.962243][T27665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.968059][T27665] ? ___might_sleep+0x163/0x280 [ 558.972923][T27665] __should_failslab+0x121/0x190 [ 558.977862][T27665] should_failslab+0x9/0x14 [ 558.982372][T27665] kmem_cache_alloc_trace+0x2d1/0x760 [ 558.987778][T27665] __memcg_init_list_lru_node+0x8a/0x1e0 [ 558.993425][T27665] __list_lru_init+0x3cf/0x6e0 [ 558.998196][T27665] alloc_super+0x78d/0x890 [ 559.002615][T27665] ? test_single_super+0x10/0x10 [ 559.007558][T27665] sget_userns+0xf1/0x560 [ 559.011887][T27665] ? kill_litter_super+0x60/0x60 [ 559.016917][T27665] ? test_single_super+0x10/0x10 [ 559.021848][T27665] ? kill_litter_super+0x60/0x60 [ 559.026795][T27665] sget+0x10c/0x150 [ 559.030611][T27665] mount_bdev+0xff/0x3c0 [ 559.034858][T27665] ? hfs_show_options+0x630/0x630 [ 559.039890][T27665] hfs_mount+0x35/0x40 [ 559.043968][T27665] ? hfs_statfs+0x4b0/0x4b0 [ 559.048559][T27665] legacy_get_tree+0xf2/0x200 [ 559.053243][T27665] vfs_get_tree+0x123/0x450 [ 559.057761][T27665] do_mount+0x1436/0x2c40 [ 559.062110][T27665] ? copy_mount_string+0x40/0x40 [ 559.067060][T27665] ? _copy_from_user+0xdd/0x150 [ 559.071920][T27665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.078161][T27665] ? copy_mount_options+0x280/0x3a0 [ 559.083370][T27665] ksys_mount+0xdb/0x150 [ 559.087615][T27665] __x64_sys_mount+0xbe/0x150 [ 559.092300][T27665] do_syscall_64+0x103/0x610 [ 559.096902][T27665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.096915][T27665] RIP: 0033:0x45ad2a [ 559.096930][T27665] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:46:50 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 14:46:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x201, 0xdd) [ 559.096945][T27665] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 559.126801][T27665] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 559.126810][T27665] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 559.126818][T27665] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 559.126825][T27665] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 559.126833][T27665] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:51 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfefdffffffffffff}]) io_destroy(r1) 14:46:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:51 executing program 3 (fault-call:0 fault-nth:89): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:51 executing program 5: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10}, 0xc4632de8) 14:46:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 559.608592][T27688] FAULT_INJECTION: forcing a failure. [ 559.608592][T27688] name failslab, interval 1, probability 0, space 0, times 0 [ 559.675282][T27688] CPU: 1 PID: 27688 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 559.683313][T27688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.693374][T27688] Call Trace: [ 559.696684][T27688] dump_stack+0x172/0x1f0 [ 559.701031][T27688] should_fail.cold+0xa/0x15 [ 559.705636][T27688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.711455][T27688] ? ___might_sleep+0x163/0x280 [ 559.716323][T27688] __should_failslab+0x121/0x190 [ 559.721282][T27688] should_failslab+0x9/0x14 [ 559.725798][T27688] kmem_cache_alloc_trace+0x2d1/0x760 [ 559.731179][T27688] ? bdev_name.isra.0+0x1aa/0x200 [ 559.736219][T27688] hfs_fill_super+0xe5/0x1520 [ 559.740911][T27688] ? address_val+0x90/0x90 [ 559.745348][T27688] ? enable_ptr_key_workfn+0x30/0x30 [ 559.750652][T27688] ? reacquire_held_locks+0xfb/0x520 [ 559.755946][T27688] ? alloc_super+0x158/0x890 [ 559.760565][T27688] ? hfs_show_options+0x630/0x630 [ 559.765680][T27688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.771952][T27688] ? vsnprintf+0x58b/0x1af0 [ 559.776466][T27688] ? pointer+0xa30/0xa30 [ 559.780729][T27688] ? snprintf+0xbb/0xf0 [ 559.784896][T27688] ? vsprintf+0x40/0x40 [ 559.789057][T27688] ? wait_for_completion+0x440/0x440 [ 559.794351][T27688] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 559.800087][T27688] ? set_blocksize+0x2bf/0x340 [ 559.804865][T27688] mount_bdev+0x307/0x3c0 [ 559.809196][T27688] ? hfs_show_options+0x630/0x630 [ 559.814223][T27688] hfs_mount+0x35/0x40 [ 559.818303][T27688] ? hfs_statfs+0x4b0/0x4b0 [ 559.822839][T27688] legacy_get_tree+0xf2/0x200 [ 559.827615][T27688] vfs_get_tree+0x123/0x450 [ 559.832152][T27688] do_mount+0x1436/0x2c40 [ 559.836488][T27688] ? copy_mount_string+0x40/0x40 [ 559.841430][T27688] ? _copy_from_user+0xdd/0x150 [ 559.846304][T27688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.852551][T27688] ? copy_mount_options+0x280/0x3a0 [ 559.857774][T27688] ksys_mount+0xdb/0x150 [ 559.862027][T27688] __x64_sys_mount+0xbe/0x150 [ 559.866715][T27688] do_syscall_64+0x103/0x610 [ 559.871322][T27688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.877246][T27688] RIP: 0033:0x45ad2a [ 559.881153][T27688] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 559.900853][T27688] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 559.909266][T27688] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 559.917245][T27688] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 14:46:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 559.925233][T27688] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 559.933216][T27688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 559.941189][T27688] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:51 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 14:46:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:51 executing program 3 (fault-call:0 fault-nth:90): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 560.363150][T27715] FAULT_INJECTION: forcing a failure. [ 560.363150][T27715] name failslab, interval 1, probability 0, space 0, times 0 [ 560.385227][T27715] CPU: 0 PID: 27715 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 560.393266][T27715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.403321][T27715] Call Trace: [ 560.406630][T27715] dump_stack+0x172/0x1f0 [ 560.411236][T27715] should_fail.cold+0xa/0x15 [ 560.415929][T27715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.421790][T27715] ? ___might_sleep+0x163/0x280 [ 560.426652][T27715] __should_failslab+0x121/0x190 [ 560.431596][T27715] should_failslab+0x9/0x14 [ 560.436111][T27715] kmem_cache_alloc_trace+0x2d1/0x760 [ 560.441497][T27715] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 560.447321][T27715] __memcg_init_list_lru_node+0x8a/0x1e0 [ 560.452973][T27715] __list_lru_init+0x3cf/0x6e0 [ 560.457760][T27715] alloc_super+0x78d/0x890 [ 560.462193][T27715] ? test_single_super+0x10/0x10 [ 560.467144][T27715] sget_userns+0xf1/0x560 [ 560.471568][T27715] ? kill_litter_super+0x60/0x60 [ 560.476804][T27715] ? test_single_super+0x10/0x10 [ 560.481744][T27715] ? kill_litter_super+0x60/0x60 [ 560.486704][T27715] sget+0x10c/0x150 [ 560.490519][T27715] mount_bdev+0xff/0x3c0 [ 560.494772][T27715] ? hfs_show_options+0x630/0x630 [ 560.499813][T27715] hfs_mount+0x35/0x40 [ 560.503920][T27715] ? hfs_statfs+0x4b0/0x4b0 [ 560.508430][T27715] legacy_get_tree+0xf2/0x200 [ 560.513121][T27715] vfs_get_tree+0x123/0x450 [ 560.517630][T27715] do_mount+0x1436/0x2c40 [ 560.528329][T27715] ? copy_mount_string+0x40/0x40 [ 560.533287][T27715] ? _copy_from_user+0xdd/0x150 [ 560.538150][T27715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.544659][T27715] ? copy_mount_options+0x280/0x3a0 [ 560.549868][T27715] ksys_mount+0xdb/0x150 [ 560.554119][T27715] __x64_sys_mount+0xbe/0x150 [ 560.558806][T27715] do_syscall_64+0x103/0x610 [ 560.563412][T27715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.569302][T27715] RIP: 0033:0x45ad2a [ 560.573199][T27715] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 560.592818][T27715] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 560.601240][T27715] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 560.609219][T27715] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 560.617191][T27715] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 560.625166][T27715] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 560.633143][T27715] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:52 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffffffffdef}]) io_destroy(r1) 14:46:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x0, 0x0, 0x2, 0x1}, 0x20) 14:46:52 executing program 3 (fault-call:0 fault-nth:91): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x20000201, 0xdd) 14:46:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:52 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 14:46:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @dev}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r2, &(0x7f0000000000)=[{&(0x7f0000001180)=""/252, 0xfc}], 0x1) [ 561.038454][T27739] FAULT_INJECTION: forcing a failure. [ 561.038454][T27739] name failslab, interval 1, probability 0, space 0, times 0 [ 561.087250][T27739] CPU: 0 PID: 27739 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 561.095271][T27739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.105804][T27739] Call Trace: [ 561.109114][T27739] dump_stack+0x172/0x1f0 [ 561.113466][T27739] should_fail.cold+0xa/0x15 [ 561.118068][T27739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 561.123893][T27739] ? ___might_sleep+0x163/0x280 [ 561.128763][T27739] __should_failslab+0x121/0x190 [ 561.133712][T27739] should_failslab+0x9/0x14 [ 561.138231][T27739] kmem_cache_alloc_trace+0x2d1/0x760 [ 561.143612][T27739] ? bdev_name.isra.0+0x1aa/0x200 [ 561.148648][T27739] hfs_fill_super+0xe5/0x1520 [ 561.153329][T27739] ? address_val+0x90/0x90 [ 561.157765][T27739] ? enable_ptr_key_workfn+0x30/0x30 [ 561.163069][T27739] ? reacquire_held_locks+0xfb/0x520 [ 561.168362][T27739] ? alloc_super+0x158/0x890 [ 561.172958][T27739] ? hfs_show_options+0x630/0x630 [ 561.177989][T27739] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.184238][T27739] ? vsnprintf+0x58b/0x1af0 [ 561.188769][T27739] ? pointer+0xa30/0xa30 [ 561.193034][T27739] ? snprintf+0xbb/0xf0 [ 561.197197][T27739] ? vsprintf+0x40/0x40 [ 561.201360][T27739] ? wait_for_completion+0x440/0x440 [ 561.206651][T27739] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 561.212379][T27739] ? set_blocksize+0x2bf/0x340 [ 561.217158][T27739] mount_bdev+0x307/0x3c0 [ 561.221502][T27739] ? hfs_show_options+0x630/0x630 [ 561.226632][T27739] hfs_mount+0x35/0x40 [ 561.230708][T27739] ? hfs_statfs+0x4b0/0x4b0 [ 561.235220][T27739] legacy_get_tree+0xf2/0x200 [ 561.240835][T27739] vfs_get_tree+0x123/0x450 [ 561.245347][T27739] do_mount+0x1436/0x2c40 [ 561.249694][T27739] ? copy_mount_string+0x40/0x40 [ 561.254641][T27739] ? _copy_from_user+0xdd/0x150 [ 561.259505][T27739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.265768][T27739] ? copy_mount_options+0x280/0x3a0 [ 561.270984][T27739] ksys_mount+0xdb/0x150 [ 561.275231][T27739] __x64_sys_mount+0xbe/0x150 [ 561.279923][T27739] do_syscall_64+0x103/0x610 [ 561.284524][T27739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.290419][T27739] RIP: 0033:0x45ad2a [ 561.294316][T27739] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 561.313933][T27739] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 561.322358][T27739] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 561.330336][T27739] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 14:46:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) [ 561.338316][T27739] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 561.346289][T27739] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 561.354267][T27739] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:52 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) socket(0x1000000000000010, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x28e, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:53 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffffffffdfc}]) io_destroy(r1) 14:46:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:53 executing program 3 (fault-call:0 fault-nth:92): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:53 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) [ 561.860439][T27766] FAULT_INJECTION: forcing a failure. [ 561.860439][T27766] name failslab, interval 1, probability 0, space 0, times 0 [ 561.879126][T27766] CPU: 1 PID: 27766 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 561.887132][T27766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.897193][T27766] Call Trace: [ 561.900497][T27766] dump_stack+0x172/0x1f0 [ 561.904840][T27766] should_fail.cold+0xa/0x15 [ 561.909443][T27766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 561.915256][T27766] ? ___might_sleep+0x163/0x280 [ 561.920124][T27766] __should_failslab+0x121/0x190 [ 561.925064][T27766] should_failslab+0x9/0x14 [ 561.929577][T27766] kmem_cache_alloc_trace+0x2d1/0x760 [ 561.934967][T27766] ? bdev_name.isra.0+0x1aa/0x200 [ 561.940007][T27766] hfs_fill_super+0xe5/0x1520 [ 561.944687][T27766] ? address_val+0x90/0x90 [ 561.949119][T27766] ? enable_ptr_key_workfn+0x30/0x30 [ 561.954408][T27766] ? reacquire_held_locks+0xfb/0x520 [ 561.959692][T27766] ? alloc_super+0x158/0x890 [ 561.964345][T27766] ? hfs_show_options+0x630/0x630 [ 561.969369][T27766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.975611][T27766] ? vsnprintf+0x58b/0x1af0 [ 561.980125][T27766] ? pointer+0xa30/0xa30 [ 561.984376][T27766] ? snprintf+0xbb/0xf0 [ 561.988536][T27766] ? vsprintf+0x40/0x40 [ 561.992699][T27766] ? wait_for_completion+0x440/0x440 [ 561.997988][T27766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.003709][T27766] ? set_blocksize+0x2bf/0x340 [ 562.008488][T27766] mount_bdev+0x307/0x3c0 [ 562.012822][T27766] ? hfs_show_options+0x630/0x630 [ 562.017853][T27766] hfs_mount+0x35/0x40 [ 562.021956][T27766] ? hfs_statfs+0x4b0/0x4b0 [ 562.026558][T27766] legacy_get_tree+0xf2/0x200 [ 562.031237][T27766] vfs_get_tree+0x123/0x450 [ 562.035760][T27766] do_mount+0x1436/0x2c40 [ 562.040105][T27766] ? copy_mount_string+0x40/0x40 [ 562.045050][T27766] ? _copy_from_user+0xdd/0x150 [ 562.049912][T27766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.056150][T27766] ? copy_mount_options+0x280/0x3a0 [ 562.061358][T27766] ksys_mount+0xdb/0x150 [ 562.065606][T27766] __x64_sys_mount+0xbe/0x150 [ 562.070301][T27766] do_syscall_64+0x103/0x610 [ 562.080734][T27766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.086722][T27766] RIP: 0033:0x45ad2a [ 562.090631][T27766] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 562.110632][T27766] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 562.119057][T27766] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 562.127028][T27766] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 562.135170][T27766] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 [ 562.143138][T27766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 562.151113][T27766] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:53 executing program 3 (fault-call:0 fault-nth:93): syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 562.334865][T27777] FAULT_INJECTION: forcing a failure. [ 562.334865][T27777] name failslab, interval 1, probability 0, space 0, times 0 [ 562.353972][T27777] CPU: 0 PID: 27777 Comm: syz-executor.3 Not tainted 5.1.0-rc3+ #50 [ 562.362486][T27777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.372547][T27777] Call Trace: [ 562.375851][T27777] dump_stack+0x172/0x1f0 [ 562.380195][T27777] should_fail.cold+0xa/0x15 [ 562.384803][T27777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 562.390619][T27777] ? ___might_sleep+0x163/0x280 [ 562.395475][T27777] __should_failslab+0x121/0x190 [ 562.400413][T27777] should_failslab+0x9/0x14 [ 562.404921][T27777] __kmalloc_track_caller+0x2d8/0x740 [ 562.410301][T27777] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 562.416112][T27777] ? match_number.isra.0+0x8d/0x190 [ 562.421318][T27777] kmemdup_nul+0x31/0xa0 [ 562.425599][T27777] match_number.isra.0+0x8d/0x190 [ 562.430627][T27777] ? match_strdup+0x80/0x80 [ 562.435133][T27777] ? match_wildcard+0x320/0x320 [ 562.439994][T27777] match_int+0x5a/0x80 [ 562.444066][T27777] hfs_fill_super+0xf22/0x1520 [ 562.448835][T27777] ? address_val+0x90/0x90 [ 562.453263][T27777] ? hfs_show_options+0x630/0x630 [ 562.458300][T27777] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.464547][T27777] ? vsnprintf+0x58b/0x1af0 [ 562.469060][T27777] ? pointer+0xa30/0xa30 [ 562.473313][T27777] ? snprintf+0xbb/0xf0 [ 562.477472][T27777] ? vsprintf+0x40/0x40 [ 562.481633][T27777] ? wait_for_completion+0x440/0x440 [ 562.486924][T27777] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.492642][T27777] ? set_blocksize+0x2bf/0x340 [ 562.497417][T27777] mount_bdev+0x307/0x3c0 [ 562.501761][T27777] ? hfs_show_options+0x630/0x630 [ 562.506802][T27777] hfs_mount+0x35/0x40 [ 562.510874][T27777] ? hfs_statfs+0x4b0/0x4b0 [ 562.515385][T27777] legacy_get_tree+0xf2/0x200 [ 562.520065][T27777] vfs_get_tree+0x123/0x450 [ 562.524578][T27777] do_mount+0x1436/0x2c40 [ 562.528914][T27777] ? copy_mount_string+0x40/0x40 [ 562.533856][T27777] ? copy_mount_options+0x1ea/0x3a0 [ 562.539055][T27777] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 562.544606][T27777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.550844][T27777] ? copy_mount_options+0x280/0x3a0 [ 562.556053][T27777] ksys_mount+0xdb/0x150 [ 562.560302][T27777] __x64_sys_mount+0xbe/0x150 [ 562.564990][T27777] do_syscall_64+0x103/0x610 [ 562.569585][T27777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.575476][T27777] RIP: 0033:0x45ad2a [ 562.579374][T27777] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 562.598980][T27777] RSP: 002b:00007ff04d372a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 562.607396][T27777] RAX: ffffffffffffffda RBX: 00007ff04d372b40 RCX: 000000000045ad2a [ 562.615365][T27777] RDX: 00007ff04d372ae0 RSI: 0000000020000100 RDI: 00007ff04d372b00 [ 562.623333][T27777] RBP: 0000000000000000 R08: 00007ff04d372b40 R09: 00007ff04d372ae0 14:46:54 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffffffffdfe}]) io_destroy(r1) 14:46:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 562.631304][T27777] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 562.639272][T27777] R13: 00000000004c6b6c R14: 00000000004dc530 R15: 0000000000000003 14:46:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:54 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 14:46:54 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) socket(0x1000000000000010, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x28e, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 563.206696][T27777] hfs: gid requires an argument [ 563.211721][T27777] hfs: unable to parse mount options 14:46:54 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:54 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) socket(0x1000000000000010, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x28e, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 563.490356][T27811] hfs: invalid gid -1 [ 563.502343][T27811] hfs: unable to parse mount options 14:46:55 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xfffffffffffffe00}]) io_destroy(r1) 14:46:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:55 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ppoll(&(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 14:46:55 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:55 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:55 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) socket(0x1000000000000010, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x28e, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0), 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:55 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='h\ns\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:56 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='h%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:56 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) io_destroy(r1) 14:46:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @dev}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/48, 0x30}], 0x1) 14:46:56 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='h.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) add_key(0x0, 0x0, &(0x7f0000000240)="12e09b8d639d03d8d7", 0x9, 0xfffffffffffffffb) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x2ab, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x4, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 14:46:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x8000}, {r1, 0x400}, {r1, 0x8000}, {r0}], 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={0x3b2778e2}, 0x8) 14:46:56 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='h/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:56 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) shutdown(r1, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 14:46:56 executing program 5: r0 = socket$inet(0x2, 0x3, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") 14:46:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:56 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:57 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:57 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4}]) io_destroy(r1) 14:46:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc5f123c123f319bd070") r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040), 0x117) 14:46:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:46:57 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:57 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc5f123c123f319bd070") r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x14, &(0x7f0000000040), 0x117) 14:46:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @initdev}, 0x84, 0x0, 0x0, 0x0, 0xffffffffffffffe0}) 14:46:57 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000407000/0x4000)=nil, 0x4000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 14:46:57 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:57 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000080)={0x105, 0x0}) 14:46:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:57 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000680)=0xc) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'lapb0\x00', {0x2, 0x4e22, @multicast1}}) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:57 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000407000/0x4000)=nil, 0x4000, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 14:46:58 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfe}]) io_destroy(r1) 14:46:58 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:58 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8100000008b0f, &(0x7f0000000040)={'veth0\x00', @ifru_hwaddr=@random="fb6c8e69d2fc"}) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) 14:46:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:46:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:58 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:58 executing program 1: syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) 14:46:58 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) 14:46:58 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:59 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000680)) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:59 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:59 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4000}]) io_destroy(r1) 14:46:59 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:46:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:46:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:46:59 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000680)) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:46:59 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:47:00 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:00 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:00 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:47:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:47:00 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:01 executing program 0: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) io_setup(0x9, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xeffd}]) io_destroy(r1) 14:47:01 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000680)) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:47:01 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:47:01 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:01 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:47:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x8390, 0x4) bind$inet6(r0, &(0x7f0000000080), 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 14:47:01 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:01 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000680)) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:47:01 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'ic\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\xc6%@\x99'}, &(0x7f0000000180)=0x1e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 14:47:02 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 14:47:02 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) [ 728.203526][ T1042] INFO: task syz-executor.0:28109 blocked for more than 143 seconds. [ 728.211643][ T1042] Not tainted 5.1.0-rc3+ #50 [ 728.223129][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 728.232084][ T1042] syz-executor.0 D29880 28109 7677 0x00000004 [ 728.249480][ T1042] Call Trace: [ 728.252827][ T1042] __schedule+0x817/0x1cc0 [ 728.262266][ T1042] ? trace_hardirqs_off+0x62/0x220 [ 728.268651][ T1042] ? kasan_check_read+0x11/0x20 [ 728.278485][ T1042] ? __sched_text_start+0x8/0x8 [ 728.284662][ T1042] ? __lock_acquire+0x548/0x3fb0 [ 728.289619][ T1042] schedule+0x92/0x180 [ 728.298816][ T1042] schedule_timeout+0x8ca/0xfd0 [ 728.305742][ T1042] ? wait_for_completion+0x294/0x440 [ 728.311054][ T1042] ? find_held_lock+0x35/0x130 [ 728.320825][ T1042] ? usleep_range+0x170/0x170 [ 728.326853][ T1042] ? kasan_check_write+0x14/0x20 [ 728.331813][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 728.342040][ T1042] ? wait_for_completion+0x294/0x440 [ 728.348566][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 728.358674][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.365234][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 728.370272][ T1042] ? kasan_check_read+0x11/0x20 [ 728.380039][ T1042] wait_for_completion+0x29c/0x440 [ 728.386394][ T1042] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 728.392908][ T1042] ? wake_up_q+0xf0/0xf0 [ 728.402070][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.409551][ T1042] ? kasan_check_read+0x11/0x20 [ 728.419316][ T1042] __x64_sys_io_destroy+0x373/0x420 [ 728.425749][ T1042] ? __x32_compat_sys_io_setup+0x410/0x410 [ 728.431586][ T1042] ? do_syscall_64+0x26/0x610 [ 728.442061][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.448693][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 728.458698][ T1042] do_syscall_64+0x103/0x610 [ 728.463596][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.469522][ T1042] RIP: 0033:0x4582b9 [ 728.479330][ T1042] Code: Bad RIP value. [ 728.483675][ T1042] RSP: 002b:00007f842ff00c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000cf [ 728.492090][ T1042] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00000000004582b9 [ 728.506014][ T1042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f842fee0000 [ 728.517121][ T1042] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 728.528180][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f842ff016d4 [ 728.539209][ T1042] R13: 00000000004bf3f1 R14: 00000000004d1148 R15: 00000000ffffffff [ 728.550337][ T1042] [ 728.550337][ T1042] Showing all locks held in the system: [ 728.561131][ T1042] 1 lock held by khungtaskd/1042: [ 728.570035][ T1042] #0: 0000000097d57fea (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 728.582452][ T1042] 1 lock held by udevd/3876: [ 728.590109][ T1042] 1 lock held by rsyslogd/7549: [ 728.598027][ T1042] #0: 00000000ee1058f9 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 728.609809][ T1042] 2 locks held by getty/7640: [ 728.617539][ T1042] #0: 00000000d727cd51 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.629584][ T1042] #1: 0000000048f03044 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.642301][ T1042] 2 locks held by getty/7641: [ 728.650036][ T1042] #0: 0000000080d46c3a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.662144][ T1042] #1: 000000004ae8d3b6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.675048][ T1042] 2 locks held by getty/7642: [ 728.679724][ T1042] #0: 00000000677f26ce (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.694761][ T1042] #1: 00000000a90dd277 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.710109][ T1042] 2 locks held by getty/7643: [ 728.716027][ T1042] #0: 0000000034f9152c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.730336][ T1042] #1: 00000000f0d24ce1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.741143][ T1042] 2 locks held by getty/7644: [ 728.750705][ T1042] #0: 00000000374311e9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.760991][ T1042] #1: 000000008c7c0d5a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.775492][ T1042] 2 locks held by getty/7645: [ 728.780167][ T1042] #0: 00000000b2a4f1b5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.793011][ T1042] #1: 0000000009484b20 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.806673][ T1042] 2 locks held by getty/7646: [ 728.811427][ T1042] #0: 000000001844a4af (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 728.823502][ T1042] #1: 000000000302e5d5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 728.833087][ T1042] [ 728.841150][ T1042] ============================================= [ 728.841150][ T1042] [ 728.850858][ T1042] NMI backtrace for cpu 0 [ 728.855307][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #50 [ 728.862845][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.872893][ T1042] Call Trace: [ 728.876184][ T1042] dump_stack+0x172/0x1f0 [ 728.880520][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 728.885723][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 728.891351][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 728.897358][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 728.903248][ T1042] watchdog+0x9b7/0xec0 [ 728.907420][ T1042] kthread+0x357/0x430 [ 728.911486][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 728.917027][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 728.923268][ T1042] ret_from_fork+0x3a/0x50 [ 728.927756][ T1042] Sending NMI from CPU 0 to CPUs 1: [ 728.933498][ C1] NMI backtrace for cpu 1 [ 728.933504][ C1] CPU: 1 PID: 3876 Comm: udevd Not tainted 5.1.0-rc3+ #50 [ 728.933511][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.933515][ C1] RIP: 0010:__lock_acquire+0x291/0x3fb0 [ 728.933526][ C1] Code: 89 42 20 48 b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 f8 28 00 00 48 8b 45 18 49 8d 7a 10 48 89 fa 48 c1 ea 03 49 89 42 08 <48> b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 5e 29 00 00 49 8d [ 728.933530][ C1] RSP: 0018:ffff88809873f9e0 EFLAGS: 00000806 [ 728.933539][ C1] RAX: ffffffff81b6bcb4 RBX: 0000000000000000 RCX: 0000000000000002 [ 728.933544][ C1] RDX: 1ffff110130e6db2 RSI: 0000000000000039 RDI: ffff888098736d90 [ 728.933549][ C1] RBP: ffff88809873fb18 R08: 0000000000000039 R09: 0000000000000001 [ 728.933554][ C1] R10: ffff888098736d80 R11: ffff888098736500 R12: 0000000000000000 [ 728.933559][ C1] R13: ffffffff889b3fc8 R14: 0000000000000001 R15: 0000000000000001 [ 728.933565][ C1] FS: 00007f029112a7a0(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 728.933569][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 728.933575][ C1] CR2: ffffffffff600400 CR3: 0000000099377000 CR4: 00000000001406e0 [ 728.933580][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 728.933585][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 728.933588][ C1] Call Trace: [ 728.933591][ C1] ? ep_scan_ready_list+0x79c/0xb20 [ 728.933595][ C1] ? find_held_lock+0x35/0x130 [ 728.933598][ C1] ? mark_held_locks+0xf0/0xf0 [ 728.933602][ C1] ? __lock_acquire+0x548/0x3fb0 [ 728.933606][ C1] ? lock_downgrade+0x880/0x880 [ 728.933609][ C1] ? find_held_lock+0x35/0x130 [ 728.933613][ C1] lock_acquire+0x16f/0x3f0 [ 728.933617][ C1] ? select_estimate_accuracy+0xd4/0x330 [ 728.933621][ C1] ktime_get_ts64+0xe2/0x3f0 [ 728.933624][ C1] ? select_estimate_accuracy+0xd4/0x330 [ 728.933628][ C1] ? trace_hardirqs_on+0x67/0x230 [ 728.933632][ C1] select_estimate_accuracy+0xd4/0x330 [ 728.933636][ C1] ? timespec64_add_safe+0x189/0x210 [ 728.933640][ C1] ? compat_get_fd_set+0x80/0x80 [ 728.933644][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.933647][ C1] ep_poll+0x3b3/0xe50 [ 728.933650][ C1] ? ep_modify+0x8e0/0x8e0 [ 728.933654][ C1] ? _raw_spin_unlock_irq+0x28/0x90 [ 728.933658][ C1] ? trace_hardirqs_on+0x67/0x230 [ 728.933661][ C1] ? kasan_check_read+0x11/0x20 [ 728.933665][ C1] ? __schedule+0x1387/0x1cc0 [ 728.933669][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.933673][ C1] ? __fget_light+0x1a9/0x230 [ 728.933676][ C1] do_epoll_wait+0x1b3/0x200 [ 728.933680][ C1] __x64_sys_epoll_wait+0x97/0xf0 [ 728.933683][ C1] do_syscall_64+0x103/0x610 [ 728.933687][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.933691][ C1] RIP: 0033:0x7f029083e943 [ 728.933702][ C1] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 728.933706][ C1] RSP: 002b:00007ffe80a33708 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 728.933715][ C1] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f029083e943 [ 728.933720][ C1] RDX: 0000000000000008 RSI: 00007ffe80a33800 RDI: 000000000000000a [ 728.933725][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 728.933730][ C1] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 728.933736][ C1] R13: 0000000000000000 R14: 0000000000934cc0 R15: 000000000092f250 [ 728.936402][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 729.287842][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3+ #50 [ 729.295372][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.305420][ T1042] Call Trace: [ 729.308713][ T1042] dump_stack+0x172/0x1f0 [ 729.313046][ T1042] panic+0x2cb/0x65c [ 729.316942][ T1042] ? __warn_printk+0xf3/0xf3 [ 729.321535][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 729.327171][ T1042] ? ___preempt_schedule+0x16/0x18 [ 729.332282][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 729.338433][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 729.344583][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 729.350732][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 729.356893][ T1042] watchdog+0x9c8/0xec0 [ 729.361064][ T1042] kthread+0x357/0x430 [ 729.365135][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 729.370676][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 729.376916][ T1042] ret_from_fork+0x3a/0x50 [ 729.382271][ T1042] Kernel Offset: disabled [ 729.386599][ T1042] Rebooting in 86400 seconds..