1ea6084caa09b5d3ad691e2ba962a17a7c5096db845b5c1cc86d8e98b43a02f21790c7a57cd3cabbeefe44d2f", 0x7d}, {&(0x7f0000000540)="4a25a7ff26256646e96e1815951e904ba5ca252a0d398d1f80f05044d6146191062041cafb347beefe373d7c6f6131a41dc1d2274672a61b9e729d5addf89efc31d07cfea6ae2985354a9e8c5f521f5545c8eaa74d1ceadd41637548b262157086b63c66ae00d0b0527972ab150127120f20b7befb8d5a51d2093701e1f07a47cf56d620d29bb5acbe34ecffd94ac484161739e5b19dc0d249a7f445ef6cc61adcb614a9519d3abe8ecbcc44d1bc3827c18435b3aa0f76a21da703ab8e9831a4ec07b3e79705742c1f8504b2fabe2b2c53b1bac655eeac886a7b9ffe", 0xdc}, {&(0x7f0000000640)="84194a6ec7e87e4c9985adf5ea17447a2de7c691cffeeb6c623c88d81a1c45c30333ffd67ed57da891f508f23f1d4813b48391b29dcde4b2d156bfddba76ca41981f314e4c51a9b906de5924baebdaa8ac73f023636aae31ec95f491ceac15edabd492752b099f74e97469b0e0bbc04946c4df6b2609d2b3d04a5a876b90e0d0c0cf04f8b4cf7a1b7d0858ce58a6aad0fc380258261caf215718824f503c8e1bd0a8e8aa7bc667c3f2aabfeb9912dbb5949641d28e0840e5b9332d34289b9e373cd4ee1f749d18393c80a2485a2e27edff3215dd86d51cf55d1d317091293d83f0ca739eee394c", 0xe7}, {&(0x7f0000000740)="ca6eb85153f905842a5bc9d8cbc16f5fbad08a60ca", 0x15}], 0x9}}], 0x1, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) 21:01:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000100)={0x1ff, 0x2, 0x8}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000740)) getresgid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@initdev, @in6=@ipv4={[], [], @empty}}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000003a00)={0x150, 0x0, 0xeaf, [{{0x1, 0x1, 0x5, 0x4, 0x10000, 0x8, {0x0, 0x0, 0xffff, 0x8, 0x80, 0x7ff, 0x70, 0x9, 0x2, 0x8, 0x0, 0x0, r4, 0x0, 0x4}}, {0x5, 0x8, 0x2, 0x8, '&\x00'}}, {{0x2, 0x1, 0x4, 0x1, 0x233, 0x0, {0x2, 0x5, 0x0, 0x1, 0x0, 0x7, 0x0, 0x3, 0x0, 0x30, 0x0, 0x0, r4, 0x4, 0x2}}, {0x2, 0x0, 0x2, 0x2, '&\x00'}}]}, 0x150) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0}, 0xb) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000011c0)) getresuid(&(0x7f0000001200), &(0x7f0000001240), 0x0) [ 154.772664] ptrace attach of "/root/syz-executor.0"[8685] was attempted by "/root/syz-executor.0"[8687] 21:01:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40c001, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x0, 0x0, 0x0}) 21:01:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0xfffffffffffffffc) sendmmsg$inet6(r0, &(0x7f0000003f00)=[{{&(0x7f00000003c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f00000006c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000c00)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x2, 0x0) 21:01:35 executing program 4: mkdir(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffc000/0x1000)=nil) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0245720, &(0x7f00000003c0)={0x1, {0x0, 0x1c9c380}}) socket$inet(0x2, 0x6000000000000001, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x28000000, 0x102) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000400)={{0x6, 0x3, 0x8001, 0x4, 'syz1\x00', 0x2}, 0x1, [0x0, 0x7fffffff, 0x7, 0x1a1, 0x6, 0x8, 0x100000001, 0x7, 0xfcc, 0x3812, 0x101, 0x9, 0x926, 0x0, 0x6, 0xfffffffffffffc00, 0x1ff, 0x7, 0x205, 0x8000, 0x9, 0x8000, 0x5ac, 0x7, 0x80, 0x3, 0x10001, 0x9, 0x6, 0x872, 0x3, 0x9948, 0x3, 0x4, 0x2, 0x1d45, 0x0, 0x5f, 0x4, 0x7, 0x5, 0x5, 0x4d8, 0x0, 0x0, 0x400, 0x9, 0x100000000, 0x6e, 0x9aa, 0x10000, 0x0, 0x3, 0xd4, 0x7, 0x9, 0x0, 0x400, 0xfffffffffffffffc, 0x2, 0x0, 0x3, 0x3, 0xeea, 0x2, 0xffffffffffffff6f, 0x400, 0xf241, 0x8, 0x0, 0x810, 0x9d31, 0x7ff, 0x4, 0x9b, 0x0, 0xfffffffffffffffe, 0x1, 0x8, 0xffffffff00000001, 0x4, 0x3f, 0x2, 0x7, 0x9, 0xba3, 0x2, 0x7b89f272, 0x41, 0x6, 0x0, 0x4, 0x5, 0x3, 0x3, 0x988f, 0x6, 0x4, 0x7, 0x2, 0x8, 0x7, 0x8, 0x5, 0x20, 0x3f, 0x2, 0x6, 0x8, 0x800, 0x0, 0x9, 0x2, 0x7874, 0x1, 0x1, 0x5, 0x7, 0x9, 0x9, 0x8, 0x7, 0x9, 0xfffffffffffffffb, 0x6, 0x9f3, 0x3d, 0xe8], {0x77359400}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 154.955425] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 155.077510] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:01:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SVE_GET_VL(0x33, 0x1c77d) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000a000000240004000300070008000500020000001400010062726f6164636173742d6c696e6b000098e1a3aaf98aaca7e52177f12926651ac0e2c4044023380360a9470395b21e5d39723aa90ecc1bbe18c29436554e77951a00000000000089dc14575397861bb59b7b3977eac3f3b6cb90bd2aa51b606ee043e073713e7c580a78fbb9560ecfd53bee5ffba6ae33854f8a2a450dad538ad521cb4de48280e91b7a449f00ca4d6d4a6ead4e8fc4505a83701195283e245bbf9576ee49ed39ae978ecf22085dd72830835020fa945b8c5442a5b39269d97355f32f90d415e4bc3c49ae8fa08398571b4400"], 0x3}}, 0x0) 21:01:35 executing program 3: accept(0xffffffffffffffff, &(0x7f00000000c0)=@generic, &(0x7f0000000040)=0xd62b) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x20, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000480)=ANY=[@ANYBLOB="0100ffff000000000000000000000008000000000900"/46]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') chroot(&(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/230, 0xe6}, {&(0x7f0000000280)=""/220, 0xdc}], 0x2, 0x0) 21:01:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept(r0, 0x0, &(0x7f0000000080)) connect$l2tp(r1, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x0, 0x1, 0x1, {0xa, 0x4e20, 0x7fffffff, @rand_addr="ed1466c11d50168b97ca489414b6118a", 0x40}}}, 0x3a) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 21:01:35 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz0\x00'}, 0x45c) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)="0697733dea4170c4e81516f6756877c2a487d41f09f5d2f543b85b47c2e09cb66d1f1f0d0cef4e1a202cedcc13992600be3bedb4b96a8d97c04165385a54b026633f8ad8588f6a1c50cd61250a137a7efebf7ab1a00a56a83a5b044cf470e31aa798f02ad8beb28ae53b0986", 0x6c, 0xfffffffffffffffc) dup3(r0, r0, 0x80000) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="7d76b03fa7d965d7b7fd807115f327574097f62c1bac9c3ec2d587514f935f99c7d275964ed8019c28c9afabfdd101926521ef8729f64a7628b203d89c932e394e30702e079bc6bd4e9fe7e5", 0x4c, 0xfffffffffffffffc) r3 = add_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = open(&(0x7f0000000840)='./file0\x00', 0x50000, 0x8) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000000880)={0x5e7f, 0xff, 0xd9d, 0x3, 0x6, 0x7fff}) keyctl$dh_compute(0x17, &(0x7f0000000740)={r1, r2, r3}, &(0x7f0000000780)=""/44, 0x2c, &(0x7f0000000800)={&(0x7f00000007c0)={'md5\x00'}, &(0x7f0000000e00)="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", 0x1000}) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000900)=""/52) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f00000008c0)) 21:01:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 155.452523] input: syz0 as /devices/virtual/input/input5 21:01:36 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) write$P9_RWALK(r1, &(0x7f0000000200)={0x8b, 0x6f, 0x1, {0xa, [{0x0, 0x1, 0x5}, {0x1, 0x0, 0x2}, {0x20, 0x2, 0x6}, {0x21, 0x4, 0x4}, {0x10, 0x2, 0x1}, {0x20, 0x2, 0x7}, {0x10, 0x3, 0x3}, {0x4, 0x2, 0x8}, {0x0, 0x4, 0x4}, {0x0, 0x4}]}}, 0x8b) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000180)={0x0, 0x0, @stop_pts=0x5}) r2 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3, 0x1, 0x6, 0x1, 0x0, 0x5, 0x40182, 0x6, 0xfffffffffffeffff, 0x7, 0x400, 0x4, 0x200, 0x8001, 0x8000, 0x7ff80, 0xfffffffffffff789, 0x9, 0x4, 0x7, 0xeb, 0x1, 0xfffffffffffffffb, 0x4, 0x9, 0x10000, 0xa, 0x200, 0x4, 0x5, 0x40, 0xc007, 0x3, 0x7, 0x8, 0xff, 0x0, 0xfffffffffffffded, 0x4, @perf_config_ext={0x1, 0x8}, 0x100, 0x6, 0x7, 0x7, 0x7f, 0x1000, 0x33d8}, r2, 0x7, 0xffffffffffffffff, 0x1) ioprio_set$uid(0x3, 0x0, 0x0) [ 155.559474] input: syz0 as /devices/virtual/input/input6 [ 155.597862] loop4: p1 p3 21:01:36 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x4) mount$9p_rdma(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000580)={'trans=rdma,', {'port'}}) 21:01:36 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x80002, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000100)='lapb0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) vmsplice(r4, &(0x7f0000000040)=[{&(0x7f0000000500), 0x31624bd}], 0x1, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mknod(0x0, 0xa88, 0x0) r7 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="7400000024000b0500000000000000", @ANYRESOCT=r7, @ANYBLOB="0100ffffffffffffffff0800010073667100480210e104deccbbbde7350dae0000000000000000000000000033cc3598c9aa8178bdf1000000200000000000000000000000000c4e00003940ea0e363002e945ed19838f54825863fe646c248656cbafef20cdf2"], 0x3}, 0x1, 0x6000}, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r8 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001380)="0f0a4d15c179ec9b4f1550c3fb8f26f0a4586704e976d6ec69b4ffd6fb74553a36081b7ef8f3db8f6cfff9513c4b8a54f76d8b14bf1783478ea1574dfca9f8837c2a10dbd4de8ef9bdc40512180f505e448e7bdfdd9e5c47894faf4159cc1a7ed3d2596866ee4c5ca7f36ac2e96fc6b84eea34fdac8ac1bc0c3f17c031c9883f044d8a5912c252b3689ca6be43106a0d", 0x90}], 0x1, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r8, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) 21:01:36 executing program 5: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/150) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) 21:01:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="6e6f626172726965722c706172743d3078303030303030303030303083303030302c6769643d", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCCBRK(r1, 0x5428) 21:01:36 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) 21:01:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x20}, 0xc466}}, 0x1, 0x6}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x6, 0x6, [0x1, 0x3, 0xa54c, 0xfffffffffffffffd, 0x8000, 0x7]}, 0x14) mount$9p_fd(0x0, &(0x7f0000000840)='./file0\x00', &(0x7f0000000800)='9p\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,afid=0x0000000000000008,posixacl,access=client,version=9p2000']) 21:01:36 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x8, 0x4) ioctl$int_in(r0, 0x80000080044dfb, 0x0) [ 156.037217] hfsplus: unable to parse mount options 21:01:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x313200, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semop(0x0, 0x0, 0x0) [ 156.060539] 9pnet: Insufficient options for proto=fd [ 156.132696] hfsplus: unable to parse mount options 21:01:36 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x2, 0x20000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000300)={'HL\x00'}, &(0x7f0000000400)=0x1e) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x482200, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4dfba99c1b468ea9}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d590b0091d1a", @ANYRES16=r2, @ANYBLOB="3eb027bd7000fbdbdf2503000000100002000400040004000400040004000c0007000800010001000000"], 0x30}}, 0x8881) getpid() r3 = syz_open_procfs(r0, &(0x7f0000000600)='cgroup\x00') timer_create(0x3, &(0x7f0000000000)={0x0, 0x17, 0x1, @tid=r0}, &(0x7f0000000040)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000180)={'ipddp0\x00', {0x2, 0x4e24, @empty}}) timer_getoverrun(r4) preadv(r3, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/158, 0x9e}], 0x1, 0x0) 21:01:36 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x80000001, @mcast2, 0x7}}, 0x4, 0x80}, &(0x7f00000003c0)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000400)={r1, 0x9, 0x0, 0x2, 0x1}, &(0x7f0000000440)=0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) mq_timedreceive(r2, &(0x7f0000000000)=""/72, 0x48, 0xea, &(0x7f0000000140)={0x77359400}) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x31, 0x519, 0x0, 0x0, {0x2}, [@generic="ff"]}, 0x18}}, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x42, 0x200) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f00000001c0)={0x4, 0x9, {0x53, 0x0, 0x10001, {0x0, 0x7f}, {0x3, 0x5d00000000000000}, @rumble={0x4, 0x80000001}}, {0x53, 0x3, 0x5, {0x9, 0x6}, {0x7, 0x462}, @rumble={0x4, 0x6}}}) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000240)) [ 156.183015] loop4: p1 p3 21:01:36 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7fff, 0x2}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x80000001, 0x10}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000300)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) exit(0x0) fchown(r2, 0x0, 0x0) 21:01:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x21, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x0, 0x47f8, 0x8, 0x4, 0x6, 0x1}}, 0x8) 21:01:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x2c) write(r0, &(0x7f00000007c0)="1b0000005e000dd820ed1454dea853a3d35abf4c5c926fa35fb5a0", 0x1b) 21:01:37 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_triestat\x00') sendfile(r0, r1, 0x0, 0x80000001) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)) 21:01:37 executing program 3: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) r2 = request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='nodevtrustedsecurity&:trusted\x00', 0xfffffffffffffffa) keyctl$get_persistent(0x16, r1, r2) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000001c0)={{0x9, 0xf3a3231d2da3038b, 0x9, 0x1, 'syz1\x00', 0x3}, 0x2, 0x1, 0x400, r3, 0x9, 0x2, 'syz0\x00', &(0x7f0000000100)=['systemmime_type!cgroupsecurity\x00', '/selinux/enforce\x00', '/dev/video0\x00', '(wtrusted!\x00', '-\x00', '@*user+&selinux}\\bdev\\trusted([(!-cpusetwlan0security\x00', '/dev\xd0\x00\x00\x00\x00\x00\x00\x00', 'mime_typeppp1L\x00', 'cpuset\x00'], 0xa1, [], [0x1, 0x5, 0x79e, 0xd1]}) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 21:01:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:37 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x1f, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x00', 0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0xf83aba625b4f88bf, 0x3, {0x0, 0x100000000, 0x4, 0x10001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r3 = socket(0x840000000002, 0x3, 0x6) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r2, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x240000, 0x0) [ 156.637562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8291 sclass=netlink_route_socket pig=8828 comm=syz-executor.2 [ 156.658042] audit: type=1400 audit(1567112497.164:51): avc: denied { module_load } for pid=8821 comm="syz-executor.3" path="/selinux/enforce" dev="selinuxfs" ino=4 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=system permissive=1 21:01:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=@ipv6_getaddr={0x2c, 0x16, 0x403, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x22000) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x100, 0xd00) write$9p(r1, &(0x7f0000000040)="5ce3a65b04d444b23fff179a06cce877f68381a252", 0x15) 21:01:37 executing program 3: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) 21:01:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='\xfet\x12\x13 \xea', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80000, 0xffffffff) sendmmsg$sock(r0, &(0x7f0000001800)=[{{&(0x7f0000000140)=@l2={0x1f, 0x2, {0x0, 0x9f60, 0x5, 0x5}, 0x1f, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)="4d565c9e2f1602be22ab7304a5c32038da76c10e6d091fe9232cf686e897be6715178ddda7ebdabb1e9af98471c6da05", 0x30}], 0x1, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18}}], 0x60}}, {{&(0x7f0000000680)=@can, 0x80, 0x0}}], 0x2, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000001880)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) [ 156.809282] loop4: p1 p3 21:01:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:37 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000240)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x6, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x0, 0xfe03, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3819, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x2, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000040)={0x80000000, 0x9, 0x8, 'queue1\x00', 0x2}) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x7, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) [ 157.295834] loop4: p1 p3 21:01:37 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r1 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 21:01:37 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x801, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2dc629024d93948b, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r2}}, {@version_9p2000='version=9p2000'}, {@version_L='version=9p2000.L'}, {@noextend='noextend'}, {@posixacl='posixacl'}, {@access_user='access=user'}, {@cache_fscache='cache=fscache'}, {@cache_none='cache=none'}], [{@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}]}}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89e7, 0x0) 21:01:37 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001480)=0x14) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/mixer\x00', 0x80800, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1f, 0x2, 0x44, 0x10004, 0x0, 0xffffffffffffffff, 0x0, [], r0, r1, 0x0, 0xfffffffffffffffd}, 0x85) r3 = fcntl$dupfd(r2, 0x407, r2) arch_prctl$ARCH_SET_GS(0x1001, 0x5) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) r5 = semget(0x0, 0x0, 0x540) semtimedop(r5, &(0x7f0000000040)=[{0x1, 0x38b1, 0x800}, {0x1, 0x8, 0xcf8e9dec518dbbb5}, {0x4, 0x1, 0x1800}, {0x3, 0xff, 0x1800}], 0x4, &(0x7f00000000c0)) mq_notify(r3, &(0x7f0000000080)={0x0, 0x12, 0x2, @tid=r4}) 21:01:38 executing program 3: syz_mount_image$msdos(&(0x7f0000001540)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000001580)=[{&(0x7f0000010000)="eb28906d6b66732e66617400020401", 0xfffffffffffffede}], 0x0, 0x0) 21:01:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x500, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x200, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x800, 0x1f32}, &(0x7f0000000140)=0xc) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000400)={0xffffffff, 0x4, 0x1, 0x7f, 0xb379}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0x5}, &(0x7f0000000240)=0x8) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000f5e497088a98405f0f9e93d8fe00cd00"/112], 0xb8}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000001d0009000000000000000000"], 0x10}}, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x90080503}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, r5, 0x8fe413cb0a310a61, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x30}}, 0x80) 21:01:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:38 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x801, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2dc629024d93948b, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r2}}, {@version_9p2000='version=9p2000'}, {@version_L='version=9p2000.L'}, {@noextend='noextend'}, {@posixacl='posixacl'}, {@access_user='access=user'}, {@cache_fscache='cache=fscache'}, {@cache_none='cache=none'}], [{@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}]}}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89e7, 0x0) 21:01:38 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x68000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x1cc}}, {@rq={'rq', 0x3d, 0x6}}, {@timeout={'timeout', 0x3d, 0x1}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/selinux/avc/cache_stats\x00'}}, {@permit_directio='permit_directio'}]}}) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000008c0)={{0x2, 0x4, 0x9, 0x9, '\x00', 0x5}, 0x0, [0x0, 0x7, 0x3, 0x60a1, 0x7fff, 0x1, 0x0, 0xffff, 0xffff, 0x3, 0x2f, 0x5, 0x10000, 0x28, 0x8, 0xfffffffffffffaee, 0x4, 0x9d0, 0xffffffffffff32db, 0xfffffffffffffffd, 0x1ff, 0x0, 0x10000, 0xff, 0x3, 0x80000000, 0x9, 0x40, 0x7, 0x1, 0x81, 0x3, 0xfffffffffffffff7, 0x4, 0x9, 0xe0a, 0x404, 0x0, 0xfffffffffffff556, 0x8, 0x3f, 0x4, 0x2, 0x0, 0x4, 0x5, 0x7, 0x1e8, 0x2f86f20c, 0x8001, 0xff, 0x9d18, 0x6f0, 0x3, 0x7fffffff, 0x40, 0x1, 0x20, 0x978, 0x9e1, 0x800, 0x6, 0x1, 0x800, 0x81, 0x2, 0x8001, 0x5, 0x58126256, 0x2, 0x3ff, 0x2, 0x1, 0x170e, 0x8, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x3, 0x0, 0xc8, 0x3f, 0x0, 0x3, 0x1, 0x1, 0x8001, 0x1, 0xea20, 0x9, 0x8, 0x800, 0xfff, 0x8001, 0x20, 0x1fd, 0x24d, 0x6, 0x80, 0x1, 0xfff, 0x4, 0x4, 0x200, 0x5, 0x3f, 0xa0, 0x3, 0xfffffffffffffffc, 0x1, 0x0, 0x101, 0x6, 0x7, 0x3ff, 0xff, 0x0, 0x4, 0x7ff, 0x0, 0x7ff, 0x4, 0x3, 0x4, 0x80], {r1, r2+10000000}}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b9142372b75bfe1bdff97ac275cb63884eba7399f1217a2d2498cdd958121fabfbc64e485b23384d04a1dfd7519bb71ffd7d3ba5aaff070000e675253d4bd462a0230360c38da66b2ef7ec9b3ff0fec9758b5cb222308b8910f086ea95863807c5ba404648fc2b0d32450b818b3a94ed1ab354643ac4956d3b0a5f2d372c9a9a1accb8d8a1a5764ba9fd6ad8da9a169f111fb9bb19d88d7bc29900dff1154fee5c80a680d1d05279d0eb17ac"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000002c0)={{0xfffffffffffffff7, 0x80000000, 0x4, 0x0, 0x4, 0x100000000}, 0x8, 0x6, 0x8d, 0x800, 0xffff, "6b824491103461c0d9702e495ef5b7ca93aebc44e40fc1528d87eec0faa51ffff9ca4aa32eadee6b3ed6deef0ad1b8747b2a8c041bdcb550d8c38821c4b166e7bbd22499822d28c9ba7964bec5de230157d46098a18bf18d8f44b94be7b1549edfb2a7e277f469153394fd24781668e9a5a0ff11bb2a0d4182758e5b2f59277d"}) 21:01:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000100)}, 0x210) [ 157.752705] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:01:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101400, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_dev$swradio(0x0, 0x0, 0x2) getresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}]}, 0x34, 0x1) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x20000880) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) connect$can_bcm(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 157.823828] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 157.865188] loop4: p1 p3 [ 157.868134] loop4: partition table partially beyond EOD, truncated [ 157.898255] loop4: p1 start 2304 is beyond EOD, truncated 21:01:38 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4972, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000180)=0x4) r1 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5500000018007f1dfd0000b2a4a280930a80000000284308910000000e00080008000c00060000001940a30700000000000000001338d52f4400009bfb83de448daa7227c43ac9220000010cec4fab91d400000000", 0x55}], 0x1}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x30a, 0x0) [ 157.912799] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 157.918636] loop4: p3 size 10 extends beyond EOD, truncated [ 157.951546] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 157.981983] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:01:38 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x68000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x1cc}}, {@rq={'rq', 0x3d, 0x6}}, {@timeout={'timeout', 0x3d, 0x1}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/selinux/avc/cache_stats\x00'}}, {@permit_directio='permit_directio'}]}}) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000008c0)={{0x2, 0x4, 0x9, 0x9, '\x00', 0x5}, 0x0, [0x0, 0x7, 0x3, 0x60a1, 0x7fff, 0x1, 0x0, 0xffff, 0xffff, 0x3, 0x2f, 0x5, 0x10000, 0x28, 0x8, 0xfffffffffffffaee, 0x4, 0x9d0, 0xffffffffffff32db, 0xfffffffffffffffd, 0x1ff, 0x0, 0x10000, 0xff, 0x3, 0x80000000, 0x9, 0x40, 0x7, 0x1, 0x81, 0x3, 0xfffffffffffffff7, 0x4, 0x9, 0xe0a, 0x404, 0x0, 0xfffffffffffff556, 0x8, 0x3f, 0x4, 0x2, 0x0, 0x4, 0x5, 0x7, 0x1e8, 0x2f86f20c, 0x8001, 0xff, 0x9d18, 0x6f0, 0x3, 0x7fffffff, 0x40, 0x1, 0x20, 0x978, 0x9e1, 0x800, 0x6, 0x1, 0x800, 0x81, 0x2, 0x8001, 0x5, 0x58126256, 0x2, 0x3ff, 0x2, 0x1, 0x170e, 0x8, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x3, 0x0, 0xc8, 0x3f, 0x0, 0x3, 0x1, 0x1, 0x8001, 0x1, 0xea20, 0x9, 0x8, 0x800, 0xfff, 0x8001, 0x20, 0x1fd, 0x24d, 0x6, 0x80, 0x1, 0xfff, 0x4, 0x4, 0x200, 0x5, 0x3f, 0xa0, 0x3, 0xfffffffffffffffc, 0x1, 0x0, 0x101, 0x6, 0x7, 0x3ff, 0xff, 0x0, 0x4, 0x7ff, 0x0, 0x7ff, 0x4, 0x3, 0x4, 0x80], {r1, r2+10000000}}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b9142372b75bfe1bdff97ac275cb63884eba7399f1217a2d2498cdd958121fabfbc64e485b23384d04a1dfd7519bb71ffd7d3ba5aaff070000e675253d4bd462a0230360c38da66b2ef7ec9b3ff0fec9758b5cb222308b8910f086ea95863807c5ba404648fc2b0d32450b818b3a94ed1ab354643ac4956d3b0a5f2d372c9a9a1accb8d8a1a5764ba9fd6ad8da9a169f111fb9bb19d88d7bc29900dff1154fee5c80a680d1d05279d0eb17ac"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000002c0)={{0xfffffffffffffff7, 0x80000000, 0x4, 0x0, 0x4, 0x100000000}, 0x8, 0x6, 0x8d, 0x800, 0xffff, "6b824491103461c0d9702e495ef5b7ca93aebc44e40fc1528d87eec0faa51ffff9ca4aa32eadee6b3ed6deef0ad1b8747b2a8c041bdcb550d8c38821c4b166e7bbd22499822d28c9ba7964bec5de230157d46098a18bf18d8f44b94be7b1549edfb2a7e277f469153394fd24781668e9a5a0ff11bb2a0d4182758e5b2f59277d"}) [ 158.038249] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 158.056206] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000300)={r2, 0x1, 0x6, @random="7576be944ea6"}, 0x10) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x10002) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4d4d) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 21:01:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 158.154367] netlink: 41 bytes leftover after parsing attributes in process `syz-executor.5'. [ 158.168171] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 158.234189] FAT-fs (loop3): bogus number of FAT structure [ 158.238816] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 158.240159] FAT-fs (loop3): Can't find a valid FAT filesystem [ 158.269846] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:01:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) mount$9p_xen(&(0x7f0000000000)='cgroupwlan0eth0nodev\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x400, &(0x7f0000000300)={'trans=xen,', {[{@cache_none='cache=none'}, {@version_L='version=9p2000.L'}, {@privport='privport'}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/loop#\x00'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x18}}, {@fowner_lt={'fowner<', r2}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@uid_lt={'uid<', r4}}]}}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={r3, r4, r5}, 0xc) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cachefiles\x00', 0x82444, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000000440)={0xe8, 0x0, 0x10003, 0x10000}) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000000480)={0x100000001, r7}) ioctl$SG_GET_TIMEOUT(r6, 0x2202, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r8 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r0, r8, 0x0, 0x102000002) [ 158.414486] loop4: p1 p3 [ 158.418636] loop4: partition table partially beyond EOD, truncated [ 158.441418] loop4: p1 start 2304 is beyond EOD, truncated [ 158.471927] loop4: p3 size 10 extends beyond EOD, truncated 21:01:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/197, 0xc5}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0) r1 = gettid() sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4008000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x110, 0xb, 0x9, 0x420, 0x70bd2b, 0x25dfdbfd, {0x2, 0x0, 0xb867}, [@nested={0x5c, 0x42, [@generic="068456eeddd06d12fcc24ad7ea3bb595e9e7b847ac1040a22911381e134f4ffbdbeb1c72c8f8423f658106f83fccbbe84bcc0ed51352c67f64cc175c", @typed={0x8, 0x6e, @pid=r1}, @typed={0x14, 0x5e, @str='eth1:,)keyring\x00'}]}, @generic="83ead96599274a2eb1835f5106ed42e4e57b25449a2e951ef18d855810fd3ce1564657f3bf4e3b3119e097f0264c1cbd735b1ba8e6318a57ef8ae92efd9cc49ef706a3765c03527c3fb07ddbf38cb064b2ff891a6df69ace78783fff89c7ee16c3876d84a4e89938c3478bfa0e33c29b72b8f1cf3c30eb1c1787c870c17743a722b6331f0a10c20212e74e9560f9f79d758b110570cdb4bc2fe72ac374f2be32"]}, 0x110}, 0x1, 0x0, 0x0, 0x4084}, 0x4000010) 21:01:39 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x68000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x1cc}}, {@rq={'rq', 0x3d, 0x6}}, {@timeout={'timeout', 0x3d, 0x1}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/selinux/avc/cache_stats\x00'}}, {@permit_directio='permit_directio'}]}}) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000008c0)={{0x2, 0x4, 0x9, 0x9, '\x00', 0x5}, 0x0, [0x0, 0x7, 0x3, 0x60a1, 0x7fff, 0x1, 0x0, 0xffff, 0xffff, 0x3, 0x2f, 0x5, 0x10000, 0x28, 0x8, 0xfffffffffffffaee, 0x4, 0x9d0, 0xffffffffffff32db, 0xfffffffffffffffd, 0x1ff, 0x0, 0x10000, 0xff, 0x3, 0x80000000, 0x9, 0x40, 0x7, 0x1, 0x81, 0x3, 0xfffffffffffffff7, 0x4, 0x9, 0xe0a, 0x404, 0x0, 0xfffffffffffff556, 0x8, 0x3f, 0x4, 0x2, 0x0, 0x4, 0x5, 0x7, 0x1e8, 0x2f86f20c, 0x8001, 0xff, 0x9d18, 0x6f0, 0x3, 0x7fffffff, 0x40, 0x1, 0x20, 0x978, 0x9e1, 0x800, 0x6, 0x1, 0x800, 0x81, 0x2, 0x8001, 0x5, 0x58126256, 0x2, 0x3ff, 0x2, 0x1, 0x170e, 0x8, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x3, 0x0, 0xc8, 0x3f, 0x0, 0x3, 0x1, 0x1, 0x8001, 0x1, 0xea20, 0x9, 0x8, 0x800, 0xfff, 0x8001, 0x20, 0x1fd, 0x24d, 0x6, 0x80, 0x1, 0xfff, 0x4, 0x4, 0x200, 0x5, 0x3f, 0xa0, 0x3, 0xfffffffffffffffc, 0x1, 0x0, 0x101, 0x6, 0x7, 0x3ff, 0xff, 0x0, 0x4, 0x7ff, 0x0, 0x7ff, 0x4, 0x3, 0x4, 0x80], {r1, r2+10000000}}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b9142372b75bfe1bdff97ac275cb63884eba7399f1217a2d2498cdd958121fabfbc64e485b23384d04a1dfd7519bb71ffd7d3ba5aaff070000e675253d4bd462a0230360c38da66b2ef7ec9b3ff0fec9758b5cb222308b8910f086ea95863807c5ba404648fc2b0d32450b818b3a94ed1ab354643ac4956d3b0a5f2d372c9a9a1accb8d8a1a5764ba9fd6ad8da9a169f111fb9bb19d88d7bc29900dff1154fee5c80a680d1d05279d0eb17ac"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000002c0)={{0xfffffffffffffff7, 0x80000000, 0x4, 0x0, 0x4, 0x100000000}, 0x8, 0x6, 0x8d, 0x800, 0xffff, "6b824491103461c0d9702e495ef5b7ca93aebc44e40fc1528d87eec0faa51ffff9ca4aa32eadee6b3ed6deef0ad1b8747b2a8c041bdcb550d8c38821c4b166e7bbd22499822d28c9ba7964bec5de230157d46098a18bf18d8f44b94be7b1549edfb2a7e277f469153394fd24781668e9a5a0ff11bb2a0d4182758e5b2f59277d"}) 21:01:39 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') socket$tipc(0x1e, 0x2, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 21:01:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r0, 0x80000) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x7, 0xc000000000}) dup3(r0, r1, 0x80000) 21:01:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:39 executing program 2: syz_init_net_socket$ax25(0x3, 0x0, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x68000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@rq={'rq', 0x3d, 0x1cc}}, {@rq={'rq', 0x3d, 0x6}}, {@timeout={'timeout', 0x3d, 0x1}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/selinux/avc/cache_stats\x00'}}, {@permit_directio='permit_directio'}]}}) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000008c0)={{0x2, 0x4, 0x9, 0x9, '\x00', 0x5}, 0x0, [0x0, 0x7, 0x3, 0x60a1, 0x7fff, 0x1, 0x0, 0xffff, 0xffff, 0x3, 0x2f, 0x5, 0x10000, 0x28, 0x8, 0xfffffffffffffaee, 0x4, 0x9d0, 0xffffffffffff32db, 0xfffffffffffffffd, 0x1ff, 0x0, 0x10000, 0xff, 0x3, 0x80000000, 0x9, 0x40, 0x7, 0x1, 0x81, 0x3, 0xfffffffffffffff7, 0x4, 0x9, 0xe0a, 0x404, 0x0, 0xfffffffffffff556, 0x8, 0x3f, 0x4, 0x2, 0x0, 0x4, 0x5, 0x7, 0x1e8, 0x2f86f20c, 0x8001, 0xff, 0x9d18, 0x6f0, 0x3, 0x7fffffff, 0x40, 0x1, 0x20, 0x978, 0x9e1, 0x800, 0x6, 0x1, 0x800, 0x81, 0x2, 0x8001, 0x5, 0x58126256, 0x2, 0x3ff, 0x2, 0x1, 0x170e, 0x8, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x3, 0x0, 0xc8, 0x3f, 0x0, 0x3, 0x1, 0x1, 0x8001, 0x1, 0xea20, 0x9, 0x8, 0x800, 0xfff, 0x8001, 0x20, 0x1fd, 0x24d, 0x6, 0x80, 0x1, 0xfff, 0x4, 0x4, 0x200, 0x5, 0x3f, 0xa0, 0x3, 0xfffffffffffffffc, 0x1, 0x0, 0x101, 0x6, 0x7, 0x3ff, 0xff, 0x0, 0x4, 0x7ff, 0x0, 0x7ff, 0x4, 0x3, 0x4, 0x80], {r1, r2+10000000}}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b9142372b75bfe1bdff97ac275cb63884eba7399f1217a2d2498cdd958121fabfbc64e485b23384d04a1dfd7519bb71ffd7d3ba5aaff070000e675253d4bd462a0230360c38da66b2ef7ec9b3ff0fec9758b5cb222308b8910f086ea95863807c5ba404648fc2b0d32450b818b3a94ed1ab354643ac4956d3b0a5f2d372c9a9a1accb8d8a1a5764ba9fd6ad8da9a169f111fb9bb19d88d7bc29900dff1154fee5c80a680d1d05279d0eb17ac"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f00000002c0)={{0xfffffffffffffff7, 0x80000000, 0x4, 0x0, 0x4, 0x100000000}, 0x8, 0x6, 0x8d, 0x800, 0xffff, "6b824491103461c0d9702e495ef5b7ca93aebc44e40fc1528d87eec0faa51ffff9ca4aa32eadee6b3ed6deef0ad1b8747b2a8c041bdcb550d8c38821c4b166e7bbd22499822d28c9ba7964bec5de230157d46098a18bf18d8f44b94be7b1549edfb2a7e277f469153394fd24781668e9a5a0ff11bb2a0d4182758e5b2f59277d"}) [ 158.773054] overlayfs: filesystem on './file0' not supported as upperdir [ 158.984717] loop4: p1 p3 [ 158.987683] loop4: partition table partially beyond EOD, truncated [ 158.994702] loop4: p1 start 2304 is beyond EOD, truncated [ 159.000417] loop4: p3 size 10 extends beyond EOD, truncated 21:01:39 executing program 1: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000002c0)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000200), 0x4) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x82000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x80000001) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930x0}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="810001000c0000afbc0100f8afeca254afa50000"]) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000100)={r2, 0x6bf5e6997efda51c}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = getpid() sendmmsg$unix(r3, &(0x7f00000029c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)=[@cred={{0x1c, 0x1, 0x2, {r4, r0}}}], 0x20}], 0x1, 0x0) 21:01:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101400, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_dev$swradio(0x0, 0x0, 0x2) getresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}]}, 0x34, 0x1) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x20000880) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) connect$can_bcm(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:01:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:39 executing program 2: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@rose, @netrom, @bcast, @remote, @default, @rose, @default]}, &(0x7f0000000080)=0x48, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 21:01:39 executing program 3: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x80) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0xffffffffffffffd7, 0x4, [0x81, 0x4, 0x40000, 0x2]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x29c04b25, 0x6, 0x1, 0x8001, 0x5, 0x100000000, 0x400, 0x200, r3}, &(0x7f0000000180)=0x20) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES64=r1, @ANYRES64=r1], 0x12) ioctl$int_out(r1, 0x5462, &(0x7f00000001c0)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x3ff) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) [ 159.445923] loop4: p1 p3 [ 159.487263] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 21:01:40 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) sendmsg$rds(r0, &(0x7f0000000880)={&(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/157, 0x9d}, {&(0x7f00000002c0)=""/22, 0x16}, {&(0x7f0000000300)=""/185, 0xb9}, {&(0x7f00000003c0)=""/222, 0xde}], 0x4, &(0x7f0000000780)=[@mask_fadd={0x58, 0x114, 0x8, {{0x26d6, 0x101}, &(0x7f0000000500)=0x401, &(0x7f0000000540)=0x8, 0x1, 0x100, 0x72a, 0x0, 0x2, 0x800}}, @mask_cswp={0x58, 0x114, 0x9, {{0x1, 0x4}, &(0x7f0000000580)=0x33e, &(0x7f00000005c0), 0x0, 0x7ba5, 0x100000000, 0x9ae, 0xc705cad317edf921, 0x1ff}}, @rdma_args={0x48, 0x114, 0x1, {{0x401, 0x1}, {&(0x7f0000000640)=""/78, 0x4e}, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/127, 0x7f}], 0x1, 0x22, 0x1}}], 0xf8, 0x4008081}, 0x4008011) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, 0x0) 21:01:40 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101400, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_dev$swradio(0x0, 0x0, 0x2) getresgid(0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}]}, 0x34, 0x1) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x20000880) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) connect$can_bcm(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:01:40 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6gre0\x00', 0xffffffde) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x10) 21:01:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 159.684865] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) [ 159.998009] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 160.033398] loop4: p1 p3 21:01:40 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000080)={0xffff, 0x4, 0x82f, 0xfffffffffffffffa, 0xe, 0x80000001}) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x40) 21:01:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:40 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000240)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") io_submit(r2, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000080)) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a03}]) 21:01:40 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x8, 0xa823ce2d832dcc0c, "d5745d636ba2ba151bec6842f69e195f4f69d53cfb66a0e8163e25df545ae46b", 0xffffffffffffffff, 0x38c4, 0x7, 0x10000, 0x10}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xb97c, 0xd0000) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000080)={0xffffffff80000001, "ee430b441f9f06352eae1696ccfc819323bb8d8dcf8f7798e916784980930aad", 0x3, 0x1}) 21:01:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2141, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f00000002c0)) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000100)={0x2, 0x1000004e23, @local}, 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000019c0)=0x7, 0x4) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000001a00)={0x1384, 0x14, 0xf, 0x400, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x2}, [@typed={0x14, 0x5f, @ipv6=@mcast2}, @generic="01e3e97a96d090260c42f6fd5547ad77fd72a4b90752598304ed9922eef0a9933cf0c7f4e181f5b13de69bc342dbeaf8ce9eedc3d7f3efa48cb321ae6da22f5a7f3312c97229f8914bbec23c02303abe05889397c03bc89a35417efb2397a13eff75bcbc00914e", @generic="33212bd2d7c87e21ca25a2fcb9139b166e354bcd0f584bf69bb5cf1ec31f1080d4c45a29a9016519fc4348106c6c9e88315e0f3aa83a461774ea3577e092083af1db2d71ab0622d1f4ab13cc27a536bbea3ab4ebffef04b7f5df7d5d0617f793b7a7d33ac082c2d06e0a07c35ff817ec8669a9abee0efa03dd22816255a2fbf2964a48b71f69446940c72b11373787c8ec427499d78adfe4e4153db5cec4", @nested={0x1228, 0x73, [@generic="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", @generic="58f2a78b9d250d8819", @typed={0x8, 0x4a, @fd=r0}, @generic="35eb382dca45cd9da54d0f9ece593a183a177e51f2570e10a752bfe1037da447024cdc242a24e7fda28e6ae16a48a6893a7fd16cf4798bcb2c8eb4da4286d5f5283648806f61cf4476d0a299f078ebd211146c59db2f4bb3eb06195cfd9c68249f67d06daec8d1f2c476f269449dff8e59b9c00916b7d2c29542aff5aea33ebc5e4a6d73c470a6d2716dfe644ed219130cbf075da22eaf33aa156060951d0215d298453fbf89c3994bab918cf91fcbeaecaf7c025b134c358d7b894290d981e4f691fde3b89af7eef01805c11045b51b7034", @generic="fcf91e7dc4c0ed45908138b08e73bbdcb1e33fbeb72eba080d858ee40366c7a83da0dbb371820f28455d55b2df5c554bd85b5a44fac95af749d8d395fe6b27ab81b4914fd312d1afc847917620857c4ca9da09bb2bea75e93e0c38ca0a7fe72cfdeb05f08d3f098896218ed9185dd3b7a9671e10378ffca2caaa6ba25a3b95f20f3db53a43066fd1654660a0c7a825d4b98e627954d99bac016f4a005a56d4c7c03cee52ac28498f2695c803c2566b790965463b2a64d10530292a5a1841f0de43a73d02277bd8bbd0e0", @generic="b53726c21c580a3eb93b430e93a16ba2d8a9e4c3370b28a84ebf68611943f50e251228f6909fc5a45884809cddf8912aff1e4713baf7dcf59bf6266c9144cc35f3f750e904facabe20cffce965733a6890c555ae2635cdfc5da15423887aae8d7122818e616a19145847be0631acd4bf7dbeeba267b63a"]}, @generic="8e316686a95a15d6e7c066b7974a26e3e3453ed996f3f13a24310bc1c42b1eaa16e9d283b904735846db0644"]}, 0x1384}, 0x1, 0x0, 0x0, 0x80}, 0x6548681f0516c914) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4f}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000300)) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000340)={0x4480000000000000, 0x4000, 0x8, 0x2, 0xc}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000040)={0x289, 0x8, 0x7}) sendfile(r0, r2, 0x0, 0x10010000000002) [ 160.275817] kauditd_printk_skb: 8 callbacks suppressed [ 160.275832] audit: type=1804 audit(1567112500.784:52): pid=9056 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir695706283/syzkaller.k5cLeL/49/bus" dev="sda1" ino=16565 res=1 [ 160.361794] loop4: p1 p3 [ 160.397419] audit: type=1804 audit(1567112500.834:53): pid=9056 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir695706283/syzkaller.k5cLeL/49/bus" dev="sda1" ino=16565 res=1 21:01:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3f, 0x8001) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x3, 0x100000000, 0x9, 0x5, 0x0, 0xc53, 0x10, 0x2, 0x1ff, 0x1, 0x80000000, 0x1, 0xff, 0x7, 0x7, 0x101, 0x72, 0xf92, 0x0, 0x6, 0x9, 0x0, 0x3ff, 0x0, 0x1, 0x6, 0x1, 0x0, 0x5, 0x5, 0x7, 0x1, 0x100, 0xf3de, 0x8, 0x5, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000000), 0x1}, 0x3022, 0x1f, 0x3, 0x0, 0x3ff, 0x8000, 0x8000}, r2, 0x1, r0, 0x8) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) 21:01:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r3 = open(&(0x7f0000000080)='./file0\x00', 0x402, 0x30) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000100)={0xc0000000000, [0x301, 0x9, 0x6, 0x5, 0x6, 0x3, 0x40, 0x4, 0x1, 0x5, 0x5, 0x8, 0x20, 0x9, 0xffffffff, 0x9, 0x7fffffff, 0x3, 0x4, 0x7, 0x3, 0x28, 0x8, 0x2, 0x7ff, 0x8001, 0x8, 0x1, 0xffffffffffffffff, 0x0, 0xff, 0x2b65, 0x4, 0x0, 0x6, 0x6, 0x81, 0x7, 0x20, 0x2, 0x100000000, 0x5, 0x0, 0x9, 0x5, 0x9, 0x8, 0x8], 0xb}) pipe(&(0x7f0000000000)) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000080)=0xa36d) ioctl(r0, 0x10000089a0, &(0x7f0000000000)="11dca50d") 21:01:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") keyctl$set_reqkey_keyring(0xe, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40e00, 0x50) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) 21:01:41 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 160.551645] loop5: p1 p3 21:01:41 executing program 1: membarrier(0x1, 0x0) modify_ldt$write(0x1, &(0x7f0000000640), 0x10) modify_ldt$write(0x1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x2, 0x2, 0x40000000}, 0x10) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x10000, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000180)={0x1, 0xffffffffffffff00, 0x1000, 0xe1, &(0x7f0000000040)="dfe47c58386b73657eee670aaeceec0770c979f2e526b89c77b68620cb1c96e7b7bab57aa740238cebd11bac8059847e6b38514e17307d4f1f31dec10233878e50fcb6161b909e109df3a1fc9b654457ec8561a0ae1f1b2589137b16c4ab7ee4b3ae6cbcc71629b3c48ae9a5a9e7f44c23e6ca64eca7710247c7ac9d378bbf8f63c261141592d1970743b98894a54bf6d4ef5b38bf47b746f6328d5f0fd747aea408a8aa64a1b9f330f334532291453040f44f4646a03752eab25484ef7c07352ce753dfb314bba90c8215b90cb958425927edc96562c480a069dbe3298c148625", 0x0, 0x0, &(0x7f0000000140)}) [ 160.627771] print_req_error: I/O error, dev loop5, sector 0 [ 160.633124] print_req_error: I/O error, dev loop5, sector 2304 [ 160.633763] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 160.678041] print_req_error: I/O error, dev loop5, sector 2304 [ 160.684684] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 160.696161] print_req_error: I/O error, dev loop5, sector 2305 [ 160.702229] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 160.710731] print_req_error: I/O error, dev loop5, sector 0 [ 160.716532] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 160.723892] print_req_error: I/O error, dev loop5, sector 2 [ 160.730065] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 160.737507] print_req_error: I/O error, dev loop5, sector 4 [ 160.743226] Buffer I/O error on dev loop5p3, logical block 2, async page read [ 160.743271] print_req_error: I/O error, dev loop5, sector 6 [ 160.743280] Buffer I/O error on dev loop5p3, logical block 3, async page read [ 160.744468] print_req_error: I/O error, dev loop5, sector 2306 [ 160.773122] Buffer I/O error on dev loop5p1, logical block 2, async page read [ 160.780589] print_req_error: I/O error, dev loop5, sector 0 [ 160.786823] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 160.794276] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 160.801617] Buffer I/O error on dev loop5p3, logical block 2, async page read 21:01:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x2e1, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd104, 0x0, 0x60}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socket$netlink(0x10, 0x3, 0x2) 21:01:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3f, 0x8001) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x3, 0x100000000, 0x9, 0x5, 0x0, 0xc53, 0x10, 0x2, 0x1ff, 0x1, 0x80000000, 0x1, 0xff, 0x7, 0x7, 0x101, 0x72, 0xf92, 0x0, 0x6, 0x9, 0x0, 0x3ff, 0x0, 0x1, 0x6, 0x1, 0x0, 0x5, 0x5, 0x7, 0x1, 0x100, 0xf3de, 0x8, 0x5, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000000), 0x1}, 0x3022, 0x1f, 0x3, 0x0, 0x3ff, 0x8000, 0x8000}, r2, 0x1, r0, 0x8) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) [ 160.899140] loop4: p1 p3 21:01:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lookup_dcookie(0x2, &(0x7f0000000000)=""/63, 0x3f) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x400000, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000180)=0x5) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000200)=0x1000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)) 21:01:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x2e1, &(0x7f0000000040)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0xd104, 0x0, 0x60}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socket$netlink(0x10, 0x3, 0x2) 21:01:41 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0x54001d91, &(0x7f0000ff9000/0x4000)=nil) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffffffff}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x80) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x2, 0x0) r4 = getpgid(0x0) ptrace$peekuser(0x3, r4, 0xfff) 21:01:41 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x101, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000040)="a7", 0x1}], 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0xa0, 0x3a, &(0x7f0000000140)="ffd5dce933e79337c0974f18b0b0804ac508eea94317ef6e0a868528ab458599f6ac48ee14b5f750cbf8e9a3a8a2039863f30ee29ea234a2124b6c72670b42e9dd9e4f187e61d3231188152c8a289115d89800b88d0f0be00886048e21c6363df6d769c378c8649e07971ac215e455ee9d7b5ca34c55ed35412a8f533a8c144c04bb5e9cecf2e64a732bce4ab94a887f3d0ef6b2a9a5eb699a43ca81a78c2cc27c5aa74c5fba9b8a07b27deb4ffe2d464f98de3a7b7bef037fd92e3f3d49a655ffe79aa28beea044ef9be586ecd4c15314335311e438fe491f1ec4851f9c502d555a58b64051d3c5781a6de7387327f6e3a6317d779333cec4", {0x3, 0x6, 0xd24743903e512d55, 0x1, 0xfff, 0x800, 0x8, 0xffffffff}}) [ 161.293323] loop5: p1 p3 [ 161.503113] loop4: p1 p3 21:01:42 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x6, 0xa, 0x0, &(0x7f0000000200)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) 21:01:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x5) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000040)={0x0, 0x100, "60d8b98abf9482085d53d4513049539ccb975bbe3ca01fba", {0xffffffffffff0000, 0x8}, 0x3}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 21:01:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x0, 0x1, [{}]}) pipe2(&(0x7f0000000080), 0x84000) 21:01:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:42 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:42 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) mknodat(r0, 0x0, 0x0, 0xf0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000500)=' --*\x00', 0x4) openat(r0, &(0x7f0000000180)='./file0\x00', 0x88000, 0x80) r2 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000000)="ddaf0d7911f21e430e9631d180780b07cceae1166d1b27153a3e36d2f615c207c1878e7e458c31f02dbcbd864e736ec7c1122c26279d18d63f2c2156db1832b99a744d782729dff58b3f0ed5e33fee98272ffe0e17cbc61836306795a1515ecb9a71e8cb04daaaa1855d3dd67ca9", 0x6e}], 0x2, &(0x7f00000000c0)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18, 0x4000}], 0x1, 0x40000) 21:01:42 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x23c}}, 0x0, 0x1a}, 0x15) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000000)=[0x3, 0x3], 0x2) 21:01:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@nl, &(0x7f0000000000)=0x80) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x7fff, 0xfd00) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x440400, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000400)={r2, &(0x7f00000001c0)=""/214}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1f}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize'}}]}}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) 21:01:42 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14, 0x80800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000007c0)={@mcast2, 0x0}, &(0x7f0000000800)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @empty, @remote}, &(0x7f0000000cc0)=0xc) clock_gettime(0x0, &(0x7f0000006f80)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000006e40)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000d00)=""/161, 0xa1}, {&(0x7f0000000dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001e00)=""/198, 0xc6}, 0xfff}, {{&(0x7f0000001f00)=@rc, 0x80, &(0x7f0000001f80)}, 0x7}, {{&(0x7f0000001fc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003140)=[{&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/231, 0xe7}], 0x2}, 0x8}, {{&(0x7f0000003180)=@isdn, 0x80, &(0x7f0000005580)=[{&(0x7f0000003200)=""/233, 0xe9}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/124, 0x7c}, {&(0x7f0000004380)=""/16, 0x10}, {&(0x7f00000043c0)=""/78, 0x4e}, {&(0x7f0000004440)=""/166, 0xa6}, {&(0x7f0000004500)=""/72, 0x48}, {&(0x7f0000004580)=""/4096, 0x1000}], 0x8, &(0x7f0000005600)=""/175, 0xaf}, 0x5}, {{&(0x7f00000056c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006d00)=[{&(0x7f0000005740)=""/4096, 0x1000}, {&(0x7f0000006740)=""/209, 0xd1}, {&(0x7f0000006840)=""/15, 0xf}, {&(0x7f0000006880)=""/135, 0x87}, {&(0x7f0000006940)=""/249, 0xf9}, {&(0x7f0000006a40)=""/12, 0xc}, {&(0x7f0000006a80)=""/68, 0x44}, {&(0x7f0000006b00)=""/132, 0x84}, {&(0x7f0000006bc0)=""/241, 0xf1}, {&(0x7f0000006cc0)=""/33, 0x21}], 0xa, &(0x7f0000006dc0)=""/70, 0x46}, 0x77f3}], 0x5, 0x100, &(0x7f0000006fc0)={r7, r8+10000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007000)={{{@in=@dev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000007100)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000007140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007180)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000071c0)={@local, @loopback, 0x0}, &(0x7f0000007200)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007340)=0xffffffffffffffae) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000007440)={@local, @loopback, 0x0}, &(0x7f0000007480)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000074c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007500)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000007600)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000007640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000ab00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ab40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000b080)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4c2e4d290d1ab15c}, 0xc, &(0x7f000000b040)={&(0x7f000000ab80)=ANY=[@ANYBLOB="a4040000", @ANYRES16=r1, @ANYBLOB="00042cbd7000fbdbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="f400020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100010038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000100010040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f616463617374000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="8400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r5, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000900000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="7800020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400080000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="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", @ANYRES32=r12, @ANYBLOB, @ANYRES32=r13, @ANYBLOB="ec0002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400030000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff01000008000600", @ANYRES32=r18], 0x4a4}, 0x1, 0x0, 0x0, 0x4000}, 0xde24590fedc9cedf) prctl$PR_SET_SECUREBITS(0x1c, 0x11) r19 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r19, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3d400000000000}, &(0x7f0000000180)=0x8) listxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/73, 0x49) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r19, 0x84, 0x9, &(0x7f00000001c0)={r20, @in6={{0xa, 0x4e21, 0x400, @local, 0x6}}, 0x7, 0x20, 0x200, 0x4, 0x80}, 0x98) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="d772e7633804000019000300e60100006c000000000000260100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 21:01:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x95) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x10041, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="504d4cf0b94e71bf"], 0x0) [ 161.947201] loop5: p1 p3 21:01:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000040)=0x6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:01:42 executing program 2: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) [ 161.986119] loop4: p1 p3 21:01:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 162.048159] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 21:01:42 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r0, 0x12, 0x0, 0x8000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x454}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xa}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x200000c0) 21:01:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:42 executing program 2: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='Bodepage=none,\x00']) 21:01:42 executing program 3: futex(&(0x7f0000000280)=0x4, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7875f62f1bd42898d215c54c5cc0f19e9134fca95d84c50ce93492577a8d8b4612a83011c8e9b718a6de5b0e01ad2519ccb8b5cc8437f4a0bc79cd5e3dfd5a9e49f77854ea9b9fa5d1178ecfbe2a7bc48b4d3509950851d570897fff0cceac0f39db95086c00123ffb6d606033b5b6d44c11bb850a81c73faad33d23f110f1b135a74fc5be33252d3825e28f17f286ff00a86485828292439afd202f06df22c24ea96b8feaa98ebf6761db997e474ece3073aa8529b4cbad737f076cdcd32ff66bcb3b091192953aac433b2f586d77b8951c5e5cfdb5d7a832"], 0x13, 0x3) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2082, 0x0) 21:01:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2, {0x8000000001, @remote}}, 0x1e) close(r0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x1000000000}, 'syz1\x00', 0xa}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{0x1, 0x8, 0x4, 0x4}, 'syz1\x00', 0x23}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) r2 = dup2(r1, r0) fcntl$setflags(r2, 0x2, 0x1) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400) [ 162.485772] loop5: p1 p3 [ 162.491136] loop5: partition table partially beyond EOD, truncated [ 162.522563] loop5: p1 start 2304 is beyond EOD, truncated 21:01:43 executing program 3: gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x23c5a3b657292a0e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYBLOB="07978386fb1aef9f7d8640de27cf93908ff7969ed54ca557fff1d79a41587822d94b7ba668b179d529fb63d5323f89c93a7e"], &(0x7f0000000300)=0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x0, 0xffffffff, @rand_addr="45cda016b26cb77fd76ea8a468558381", 0x5}], 0x1c) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x38) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000380)="d7008a5a14319c3699f8e7dfba5670f74fbc7d85bbc8629ccff9a2bf0b3f5bb76600d0eb7f67619c956e06ddc8668ece4aaf543bbe9b3de3f5b7256c663946d54c2ecab49b646768d1c7bcf67818dd8f6f2941cce75c07fee7", 0x59) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x402000) clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x10, 0x4, 0x4}, 0x2c) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000140)={0x20, 0x843}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x4000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) [ 162.547914] loop5: p3 size 10 extends beyond EOD, truncated [ 162.567886] hfs: unable to parse mount options [ 162.582986] loop4: p1 p3 21:01:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x409, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000200)={0x5}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r1, 0x116}) timerfd_create(0x7, 0x80800) [ 162.738428] hfs: unable to parse mount options 21:01:43 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x42000, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x7, 0x70, 0x0, 0x931, 0x2, 0x1, 0x0, 0xa4, 0x2010, 0xf, 0x80, 0x8001, 0x0, 0xd3, 0x7, 0x7, 0xff, 0x8, 0x2, 0xfffffffffffffff8, 0x1, 0x8, 0x9, 0x2, 0x7, 0x4, 0x1000000000000, 0x4e14, 0x10000, 0xf49, 0xded, 0x100000000, 0x101, 0xe6eb, 0x3, 0x100, 0x6197, 0xfffffffffffffffb, 0x0, 0x800, 0x1, @perf_config_ext={0x6, 0x1f}, 0x8, 0x8, 0x357, 0x6, 0x2, 0x2, 0x3ff}, r0, 0xc, r1, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) r3 = socket$kcm(0x29, 0x80000000000005, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000180)=0x0) getpgid(r4) socketpair(0x8, 0x5, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000080)=0x10, 0x4) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, '\x03\x86\xdd'}]}, 0xfdef) [ 162.765047] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 21:01:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 162.942579] device nr0 entered promiscuous mode 21:01:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000140)="bb8cc8d69f06582fd4f6d5874da85471140784e081e57018b1373e10a8bec9c3b6babd74fc8c42ba93454b9abd18e183cc2156308d6ebd13bb8da2f9ce28b6facd05a5a9125b8f608475632e619a09de51d5c06905389e", 0x57) open(0x0, 0x0, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) write$nbd(r2, &(0x7f0000000240)={0x67446698, 0x1, 0x0, 0x0, 0x0, "6517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3202f99f16d060a35efd21affe238385d4de98c35d691bbbf35c5601687a77cfa847ae265"}, 0x4c) sendfile(r2, r2, &(0x7f0000000200), 0xa198) 21:01:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x87) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "2d68d9e853d14fda", "800c463ad0b08877125cd90ac9fc4327", "bcccafd2", "0d2e80caf5caf81f"}, 0x28) recvmmsg(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000480)=0x7fff, 0x4) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/87, 0x57}, {&(0x7f00000000c0)=""/93, 0x5d}, {&(0x7f0000000140)=""/112, 0x70}, {&(0x7f00000001c0)=""/82, 0x52}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000031c0)=""/4096, 0x1000}], 0x8, &(0x7f00000003c0)=""/182, 0xb6}, 0x20) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000000f00)=ANY=[@ANYBLOB="f8000000120001000000000000000000ff020000000000000000000000000001ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb00000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b7c83a46682865e30000000000000000000000000800"/176], 0xf8}}, 0x0) 21:01:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:43 executing program 1: r0 = socket$inet6(0xa, 0x100000000000003, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x220000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={r3, @empty, @broadcast}, 0xc) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) [ 163.090818] tls_set_device_offload_rx: netdev lo with no TLS offload [ 163.154751] loop5: p1 p3 [ 163.157667] loop5: partition table partially beyond EOD, truncated [ 163.185796] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. 21:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x9, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') [ 163.206143] loop5: p1 start 2304 is beyond EOD, truncated [ 163.264098] loop5: p3 size 10 extends beyond EOD, truncated [ 163.272944] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 163.300561] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. 21:01:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet(0x2, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000380)={0x2, r2, 0x1}) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl(r3, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000003c0)) recvfrom(r2, &(0x7f0000000500)=""/183, 0xb7, 0x20, &(0x7f00000005c0)=@l2={0x1f, 0x7, {0x2000000000, 0x4, 0x5, 0x56687357, 0xffffffffffff0000, 0x4}, 0x0, 0x4}, 0x80) setsockopt$inet6_dccp_int(r2, 0x21, 0x1f, &(0x7f00000004c0)=0x7fffffff, 0x4) futex(&(0x7f0000000080), 0x6, 0x0, 0x0, 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000000c0)=0xffffffffffffff01, 0x2) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000340), 0x8) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0xbde765d4, 0x0, 0x0, 0xfffffffffffffd4a) 21:01:44 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000100)=0x2, 0x8) capget(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) [ 163.599856] device nr0 entered promiscuous mode 21:01:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 163.712735] audit: type=1400 audit(1567112504.214:54): avc: denied { map } for pid=9314 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=34541 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 21:01:44 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x3}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {}, {}], {}, {0x20, 0x7}}, 0x5c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 163.935962] loop4: p1 p3 [ 164.055953] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 164.142352] overlayfs: filesystem on './file0' not supported as upperdir [ 164.240004] loop5: p1 p3 [ 164.242945] loop5: partition table partially beyond EOD, truncated [ 164.273553] loop5: p1 start 2304 is beyond EOD, truncated [ 164.311390] loop5: p3 size 10 extends beyond EOD, truncated 21:01:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4cb9f207c806a01a000000030000000a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x800039c, 0x0) 21:01:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000080)=""/236, 0x0, 0xec, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000280)=0xff, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x10000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000500)={&(0x7f0000000040), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x1b0, r3, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9a76}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x29}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe178}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1be5}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x20000091}, 0x4010) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20045000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 21:01:44 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) read$rfkill(r0, &(0x7f0000000200), 0x8) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000640)=0xe8) r2 = getuid() syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000100)="4402db21eb45a6499884a74cf6da055823c053a254a18fe448ad49b091b8db0bb2ca799d9a2b75727838002132fbab79824348227e15789113a6cfb20ce4864d62f2505812128545eaf660b07a5cd021fddee131942a9958db410095e5819390721b295d26cbe830f112c0c2f7d35455d5ad5f20c2ccfe4207a7289693754add194b3495c8c278e39820e6a76f134451f766ebbfe03d11c8639138705e2abd749e384f6c398dd260f8f5f54dbc1a88240d6a25d9174df8d9184b832fced566b7393a149e8d0f79299d761120b0c6c1704a39178cfa72908fe6e0526acf8512bf9f24c5df2cb9dd1272d5e0d2f037", 0xee, 0x2}, {&(0x7f0000000240)="aa3c6407df5dc3bd75358959341ca7b562486341e029f39c2ccf828b90d60efd7778752065b8d8809fc8696fee30eaf3a1229ebdc1664552617509482aba49bc59ef318bf6a3bca0cf93cd00a826f08c1128f053cbdce34b9199d8a14a4a8c76b2be9045cd385fabfbcac30bd4418ae07cf1c84d2f450a72304ec92d6381292c3c1839b1774e2b323c88e19eeffd494cf4827a832d9872a5eaafc99d8c38ae32e516d5abe89d564550073d95f936d8f897a8a93bb0bc598c7a40fed72fed66787c913254c81c7945ba1df7272586810d7b02a8ba39faa7c67ef30435813d2557729a", 0xe2, 0x100000001}, {&(0x7f0000000340)="ca4c8172c5d8e2b0047effbec0c7da822bfd021148a2243b591d7b6b644ea5185e0ba9caf80db07bc6939720c493bf8ff2dcd2269c5d12629d7078344e43680e74238e881253cacedfe309cf6d31038f717bb8bc2e078c45b1d03d9cecad95acd18b0507a89a1f4d8c25d5a54b1f96a36d7bba1d170eab4daed60d0bebe280dddb7d6c35d11dfc5615ec1a2e3ab054ed845e77962b6f61397597dfd6c34d3b0193a6011b55a2af9172b1988126deb50a24e6117c5fc585962052e0a5562c3811bceee54ac1b72a01", 0xc8, 0x6}, {&(0x7f0000000440)="051c772acb0292f084ea3c46a1db1f0ab21a018d133161ad8345158a134d9a10f2a58645494e0cbd0a50e2d08e1c115c0c50691705e8cf5533b74881b5d45331052eb50b61b0d6a145423def5ee97d3b79bb7a6a3b9f1a031d314e6a3785ed73b38384e5c017f0e7c8c74ac265f62a4af9", 0x71, 0x6}], 0x1400, &(0x7f0000000680)={[{@barrier='barrier'}, {@nobarrier='nobarrier'}], [{@context={'context', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fowner_gt={'fowner>', r1}}, {@euid_lt={'euid<', r2}}, {@context={'context', 0x3d, 'system_u'}}]}) 21:01:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:44 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x3}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {}, {}], {}, {0x20, 0x7}}, 0x5c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 164.432066] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:01:45 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 164.484021] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 21:01:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 164.642449] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 21:01:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x404000, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000080)=0xfffffffffffffa8c) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = syz_open_pts(0xffffffffffffffff, 0x2000) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x6, 0x7, 0x0, 0x5, 0x0, 0x2, 0x10001, 0x2, 0xffffffffffffff80, 0xfff, 0x7, 0x1}) 21:01:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x0, 0x80000) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/14, 0x34c}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x8031, 0xffffffffffffffff, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000982000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x0, &(0x7f00004f1000/0x2000)=nil) setsockopt(r0, 0x40, 0x4, &(0x7f0000000040)='\v', 0x1) [ 164.699603] loop4: p1 p3 21:01:45 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x3}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {}, {}], {}, {0x20, 0x7}}, 0x5c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 21:01:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 164.829393] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:01:45 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x111000, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000080)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0), 0x0) [ 164.927738] loop5: p1 p3 21:01:45 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\xff', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x80, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) [ 165.266872] loop4: p1 p3 21:01:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 165.358515] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 165.406023] loop5: p1 p3 [ 165.408975] loop5: partition table partially beyond EOD, truncated 21:01:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\xff', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x80, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) [ 165.449965] loop5: p1 start 2304 is beyond EOD, truncated [ 165.464405] loop5: p3 size 10 extends beyond EOD, truncated 21:01:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1}) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 21:01:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 165.867725] loop4: p1 p3 21:01:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) 21:01:46 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) listen(r0, 0xfffffffffffffff9) bind(r0, &(0x7f0000000000)=@llc={0x1a, 0x33d, 0x4, 0x6, 0x5, 0x3}, 0x80) 21:01:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\xff', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x80, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 21:01:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:46 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x40100) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x11, 0xa70, 0x0, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0}, 0xffffffffffffffc9) 21:01:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\xff', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x80, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 21:01:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x7ff}}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x28000) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') preadv(r3, &(0x7f0000000480), 0x10000000000001fc, 0x0) [ 166.279595] loop2: p1 p3 21:01:46 executing program 0: r0 = socket$inet6(0xa, 0x8000000000801, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x0, 0x0, 0x201}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000480)="11dca50d5c0bcfe47bf070") write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x1037b) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x480, 0x0) [ 166.375410] loop4: p1 p3 [ 166.382405] loop5: p1 p3 [ 166.386044] loop5: partition table partially beyond EOD, truncated 21:01:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 166.447509] loop5: p1 start 2304 is beyond EOD, truncated 21:01:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 166.501206] loop5: p3 size 10 extends beyond EOD, truncated [ 166.625621] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 166.625711] print_req_error: 1768 callbacks suppressed [ 166.625721] print_req_error: I/O error, dev loop5, sector 0 [ 166.672254] print_req_error: I/O error, dev loop5, sector 0 [ 166.678173] buffer_io_error: 1763 callbacks suppressed [ 166.678183] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.693562] print_req_error: I/O error, dev loop5, sector 0 [ 166.699450] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.707110] print_req_error: I/O error, dev loop5, sector 0 [ 166.712916] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.720743] print_req_error: I/O error, dev loop5, sector 0 [ 166.728738] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.736968] print_req_error: I/O error, dev loop5, sector 0 [ 166.742772] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.750495] print_req_error: I/O error, dev loop5, sector 0 [ 166.756733] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.764436] print_req_error: I/O error, dev loop5, sector 0 [ 166.771329] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.778957] print_req_error: I/O error, dev loop5, sector 0 [ 166.784806] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.792394] print_req_error: I/O error, dev loop5, sector 0 [ 166.798313] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.805990] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 166.873528] loop2: p1 p3 21:01:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000340)="730f1d4c42ccc8a08ce359aad523f01c278ed9bf81a0518d37524de686b3dbe1ddfd7b53c5", 0x25) 21:01:47 executing program 1: socket$kcm(0xa, 0x25, 0x11) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0x10, 0x26, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38f6e319be93e405947cc4ae2ff59cf4eb41fa91ca204ded86d90e0350eae336238561000000000000b4a6", @ANYRES16=r3, @ANYBLOB="000227bd7000fedbdf250100000008000800ac1414aa14000900fe8000000000000000000000000000bb080008007f000001"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40000) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000200)=0xdb15569d09b2df7f, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0xee8f, 0x8) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c04000aff0f11000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 21:01:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) 21:01:47 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 166.910790] loop4: p1 p3 [ 166.963428] audit: type=1400 audit(1567112507.464:55): avc: denied { map } for pid=9524 comm="syz-executor.0" path="/root/syzkaller-testdir695706283/syzkaller.k5cLeL/65/file0/mem" dev="devtmpfs" ino=1046 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file permissive=1 [ 166.968066] x86/PAT: syz-executor.0:9525 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:01:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) fcntl$getflags(r0, 0xb) [ 167.136961] loop5: p1 p3 [ 167.147000] loop5: partition table partially beyond EOD, truncated [ 167.184837] loop5: p1 start 2304 is beyond EOD, truncated [ 167.249311] loop5: p3 size 10 extends beyond EOD, truncated 21:01:47 executing program 1: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000001c0)={0x10000, 0x0, 0x40, 0x4, 0x1}, 0xc) perf_event_open(0x0, 0x0, 0x8000000000, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x0, 0xd78, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, 0x0, [0x8e3, 0x9, 0x9, 0x9389, 0x0, 0x0, 0x0, 0x2]}, 0x5c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0xf3, 0x0, 0xff, 0xb}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) r2 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @remote}, &(0x7f0000000380)=0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000b00)=ANY=[@ANYBLOB="200000000000000002004e24000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009905403b0500000002004e21ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23000001010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa00000000000000000000000000000000001f00"/582], 0x1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000ac0), 0x4) unlinkat(r1, &(0x7f0000000100)='./bus\x00', 0x200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x10000, 0x7e99}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc, 0x4002091, r2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) memfd_create(&(0x7f00000003c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f00000004c0)=""/253) 21:01:47 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000340)="730f1d4c42ccc8a08ce359aad523f01c278ed9bf81a0518d37524de686b3dbe1ddfd7b53c5", 0x25) 21:01:47 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 167.490879] loop4: p1 p3 [ 167.495482] loop2: p1 p3 [ 167.593207] audit: type=1804 audit(1567112508.094:56): pid=9573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir065870448/syzkaller.41CSxR/60/bus" dev="sda1" ino=16562 res=1 [ 167.599754] x86/PAT: syz-executor.0:9572 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 167.685309] audit: type=1804 audit(1567112508.144:57): pid=9575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir065870448/syzkaller.41CSxR/60/bus" dev="sda1" ino=16562 res=1 21:01:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 167.732508] audit: type=1400 audit(1567112508.234:58): avc: denied { create } for pid=9562 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 167.775412] loop5: p1 p3 21:01:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) accept$netrom(r1, &(0x7f0000000580)={{}, [@default, @bcast, @default, @default, @null, @remote, @bcast, @null]}, &(0x7f00000040c0)=0x48) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) 21:01:48 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 168.100621] loop4: p1 p3 21:01:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/packet\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 21:01:48 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000340)="730f1d4c42ccc8a08ce359aad523f01c278ed9bf81a0518d37524de686b3dbe1ddfd7b53c5", 0x25) [ 168.241247] loop2: p1 p3 [ 168.251922] loop2: partition table partially beyond EOD, truncated 21:01:48 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:01:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 168.333098] x86/PAT: syz-executor.0:9613 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 168.342388] loop2: p1 start 2304 is beyond EOD, truncated [ 168.370122] loop2: p3 size 10 extends beyond EOD, truncated 21:01:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x21}, {0x0}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 21:01:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:01:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 168.555866] loop4: p1 p3 21:01:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet6_buf(r1, 0x29, 0xd3, &(0x7f0000000340)="730f1d4c42ccc8a08ce359aad523f01c278ed9bf81a0518d37524de686b3dbe1ddfd7b53c5", 0x25) 21:01:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x21}, {0x0}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 168.764797] x86/PAT: syz-executor.0:9644 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:01:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x8000, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 168.895938] loop2: p1 p3 [ 168.899510] loop2: partition table partially beyond EOD, truncated 21:01:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='rdma.max\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000000)) write$9p(r1, &(0x7f0000000080)="7882540ad0b9af7ef44012fa68ae310428fa508079612ed9a110220d0b5a1c29a1bf17f6e43975151fcb7e5fc5f22fb5e2be88d1ece18305a113a6b44df53c69960d3651b9d72037", 0x48) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x410542) [ 168.969430] loop2: p1 start 2304 is beyond EOD, truncated 21:01:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 169.022221] loop2: p3 size 10 extends beyond EOD, truncated 21:01:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 169.095976] loop4: p1 p3 21:01:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x400) 21:01:49 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000000c0)={0x4, 0xfffffffffffffff7, 0x1, [], &(0x7f0000000080)={0x990903, 0x1, [], @value64=0x4f1}}) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @rand_addr=0xffffffff}, @in={0x2, 0x4e23, @rand_addr=0x4}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0xf4, @empty, 0x2cf20d80}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0x10001}, @in={0x2, 0x4e23, @broadcast}], 0xb8) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 21:01:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 169.369877] x86/PAT: syz-executor.0:9694 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 169.589992] loop4: p1 p3 21:01:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 169.684970] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 169.783510] loop2: p1 p3 21:01:50 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) 21:01:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 169.804941] loop2: partition table partially beyond EOD, truncated [ 169.814333] loop2: p1 start 2304 is beyond EOD, truncated [ 169.843801] loop2: p3 size 10 extends beyond EOD, truncated [ 169.876859] x86/PAT: syz-executor.0:9722 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:01:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 170.023276] Dev loop5: unable to read RDB block 1 [ 170.055758] loop5: unable to read partition table [ 170.081747] loop4: p1 p3 [ 170.084612] loop5: partition table beyond EOD, truncated [ 170.084633] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 170.114014] protocol 88fb is buggy, dev hsr_slave_0 [ 170.119204] protocol 88fb is buggy, dev hsr_slave_1 21:01:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:50 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) 21:01:50 executing program 1: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x800) write(r0, &(0x7f0000000080)="934289ea0fefaa8eedf605a950796c4ba54fc2783456ce57ad6657d7f7294adde3cb7f774650fd3c4582ab014555789924cd853d96aa73c08a5302ebc3298d4f22ff962e06c148da24950361c4deabc3d96f8cf8580cb4d6daf668e8fee2d85c31f445f1896ace91e2124196eb3c1f3117b18bbfc2118ffab6e373263d643f3ee9390c8739e1ab153a823eb619f5c1f4ab1a7fb88783cb497e3aa7ccc6c1bb74da984b6ac5bf52de023580647ecb995094ed89d573719e04fcbd30f90f01081196dcef0062d91ef4d0e6120b", 0xcc) syz_emit_ethernet(0x17, &(0x7f0000000240)={@empty, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty}}}}}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x8000) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000200)=0x6) 21:01:50 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 170.229892] loop2: p1 p3 21:01:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 170.375225] Dev loop5: unable to read RDB block 1 21:01:50 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 170.399179] loop4: p1 p3 [ 170.415339] loop5: unable to read partition table 21:01:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x3, 0x0, 0x3fe, 0x1c10a1}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xc3, &(0x7f0000000100)=""/195, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) 21:01:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 170.464073] loop5: partition table beyond EOD, truncated [ 170.518073] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000080)='trusted\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) socket$can_raw(0x1d, 0x3, 0x1) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 21:01:51 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) [ 170.699532] loop2: p1 p3 21:01:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:51 executing program 1: get_robust_list(0x0, &(0x7f00000002c0)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r0 = memfd_create(&(0x7f00000001c0)='\t\xa6D\x8d\xb1\xbf^', 0x0) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x204102) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x8) timer_create(0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) open(0x0, 0x1, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x0, 0x80}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x5) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r1, 0x0) ptrace$pokeuser(0x6, 0x0, 0x9c, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000), 0x0) setreuid(0x0, 0x0) getpriority(0x0, 0x0) 21:01:51 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 170.825649] loop4: p1 p3 [ 170.869731] Dev loop5: unable to read RDB block 1 [ 170.875565] loop5: unable to read partition table [ 170.881004] loop5: partition table beyond EOD, truncated [ 170.887747] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:51 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:01:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 171.156607] Dev loop5: unable to read RDB block 1 [ 171.168576] loop5: unable to read partition table [ 171.184231] loop5: partition table beyond EOD, truncated 21:01:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 171.219475] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:51 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 171.318917] loop2: p1 p3 [ 171.321739] loop2: partition table partially beyond EOD, truncated [ 171.348997] loop2: p1 start 2304 is beyond EOD, truncated [ 171.355654] loop2: p3 size 10 extends beyond EOD, truncated 21:01:51 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 171.422416] loop4: p1 p3 21:01:52 executing program 1: get_robust_list(0x0, &(0x7f00000002c0)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r0 = memfd_create(&(0x7f00000001c0)='\t\xa6D\x8d\xb1\xbf^', 0x0) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x204102) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x8) timer_create(0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) open(0x0, 0x1, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x0, 0x80}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x5) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r1, 0x0) ptrace$pokeuser(0x6, 0x0, 0x9c, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000), 0x0) setreuid(0x0, 0x0) getpriority(0x0, 0x0) 21:01:52 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 171.559957] Dev loop5: unable to read RDB block 1 [ 171.574979] loop5: unable to read partition table [ 171.584190] loop5: partition table beyond EOD, truncated [ 171.605213] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:52 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 171.940503] loop2: p1 p3 [ 171.950396] loop2: partition table partially beyond EOD, truncated [ 171.974350] loop2: p1 start 2304 is beyond EOD, truncated [ 171.987807] loop2: p3 size 10 extends beyond EOD, truncated [ 172.002420] loop4: p1 p3 [ 172.024948] Dev loop5: unable to read RDB block 1 [ 172.033624] loop5: unable to read partition table [ 172.047145] loop5: partition table beyond EOD, truncated [ 172.061381] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:52 executing program 1: get_robust_list(0x0, &(0x7f00000002c0)=&(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r0 = memfd_create(&(0x7f00000001c0)='\t\xa6D\x8d\xb1\xbf^', 0x0) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x204102) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x8) timer_create(0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) open(0x0, 0x1, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x0, 0x80}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x5) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r1, 0x0) ptrace$pokeuser(0x6, 0x0, 0x9c, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000008900)={0x0, 0x0, &(0x7f0000008840)=[{0x0}, {0x0}, {&(0x7f00000085c0)=""/214, 0xd6}], 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000), 0x0) setreuid(0x0, 0x0) getpriority(0x0, 0x0) 21:01:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:52 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:52 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:52 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) [ 172.515998] Dev loop5: unable to read RDB block 1 [ 172.521127] loop5: unable to read partition table [ 172.537709] loop5: partition table beyond EOD, truncated [ 172.559190] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:53 executing program 1: r0 = memfd_create(&(0x7f00000003c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:>\x00\xca\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xf9\xff\xa5$4\xd6\xfe7\x0f\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(4\xbc\xfc\xa2\x9a\x87m\x8e\xe6\x10\xad\xe70\xc0Cc\xfd)\x8e8B^\x8d\x92\x80,\xd9\xf7\x9b\x01 Q\x0e\xa9\x0f\xd9\x06k\x013\xb6\xda\xdc}\b\xee\x0f\xa7%c\xf2C\xd0\xa5P6\x9a\xb3\xa4\x05\xc9>k \x163p\xd2\x17\xf9\"o\x8602Cg=\x0f\xa1\xbd\xdb\xbcr\x92\x84', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r1) write(r0, &(0x7f0000000280)="b156d417452c8f6d46edb3b1077f2abaa85e3489c66107abcc617d9aeb42aa515f23c9150bfdba5fa1be4e0415cb2c2d4a4eaf25bd33658a370f9b9114833a2dc46e2437ff6871cbd7d001f6f377a21e5ae102d7", 0x54) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000140)={0x2}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000240)) 21:01:53 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:01:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 172.645589] loop4: p1 p3 [ 172.707620] loop2: p1 p3 [ 172.710435] loop2: partition table partially beyond EOD, truncated [ 172.752795] loop2: p1 start 2304 is beyond EOD, truncated [ 172.764177] Dev loop5: unable to read RDB block 1 [ 172.778524] loop5: unable to read partition table [ 172.787682] loop5: partition table beyond EOD, truncated 21:01:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x10000006, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff}) r4 = fcntl$getown(r0, 0x9) write$FUSE_LK(r2, &(0x7f0000000100)={0x28, 0xfffffffffffffffe, 0x2, {{0x6, 0x80, 0x1, r4}}}, 0x28) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000)={0x3, 0x1, 0x25d8, 0x9, 0x20005}, 0x14) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000002}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r5, 0x100, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000080)=0x2) [ 172.801983] loop2: p3 size 10 extends beyond EOD, truncated [ 172.812268] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 172.822522] print_req_error: 219 callbacks suppressed [ 172.822533] print_req_error: I/O error, dev loop4, sector 2304 [ 172.839706] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 172.860455] print_req_error: I/O error, dev loop4, sector 2304 [ 172.866633] buffer_io_error: 217 callbacks suppressed [ 172.866642] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 172.877042] print_req_error: I/O error, dev loop4, sector 2305 [ 172.885575] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 172.885740] print_req_error: I/O error, dev loop4, sector 2306 [ 172.899111] Buffer I/O error on dev loop4p1, logical block 2, async page read [ 172.906818] print_req_error: I/O error, dev loop4, sector 2307 [ 172.912824] Buffer I/O error on dev loop4p1, logical block 3, async page read [ 172.919869] print_req_error: I/O error, dev loop4, sector 2308 [ 172.926265] Buffer I/O error on dev loop4p1, logical block 4, async page read [ 172.933753] print_req_error: I/O error, dev loop4, sector 2309 [ 172.941353] Buffer I/O error on dev loop4p1, logical block 5, async page read [ 172.948891] print_req_error: I/O error, dev loop4, sector 2310 21:01:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 172.954956] Buffer I/O error on dev loop4p1, logical block 6, async page read [ 172.955008] print_req_error: I/O error, dev loop4, sector 2311 [ 172.968325] Buffer I/O error on dev loop4p1, logical block 7, async page read [ 172.976262] print_req_error: I/O error, dev loop4, sector 2304 [ 172.982287] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 172.989896] Buffer I/O error on dev loop4p1, logical block 1, async page read 21:01:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:53 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:01:53 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x1) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 173.268749] Dev loop5: unable to read RDB block 1 [ 173.299308] loop5: unable to read partition table 21:01:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 173.324093] loop5: partition table beyond EOD, truncated [ 173.349369] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 173.405999] loop2: p1 p3 21:01:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 173.481883] loop4: p1 p3 21:01:54 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:01:54 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:01:54 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 173.795235] Dev loop5: unable to read RDB block 1 [ 173.800184] loop5: unable to read partition table [ 173.845763] loop5: partition table beyond EOD, truncated [ 173.862108] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c8000000140029ce2abd7000fbdbdf25ac1414bb000000000000000000000000000000000000000000000000000000004e24ffff4e2100070a0080a026000000", @ANYRES32, @ANYRES32, @ANYBLOB="bb6b6e0003000000600002006362632d73657270656e742d61767832000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a8000000010100007ed62da05a9f388212c46fd1d00ef3f0be0000000c0015005a073500ff0f00000c0015005c073500090000007ed84c0fd3"], 0xc8}}, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000040)="8b33386707ab6e42d7edf1168d0659705f67b63e27ed0379a8e86cc9c2591ea442762b8a2a47fd36c8e912cf39", &(0x7f0000000080)=""/186}, 0x18) 21:01:54 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:54 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:01:54 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:01:54 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 174.039473] loop4: p1 p3 21:01:54 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x215) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x10000) getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f00000000c0), &(0x7f0000000180)=0x4) write$FUSE_INIT(r0, &(0x7f0000001500)={0x50, 0x0, 0x1}, 0x50) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0/file0\x00') 21:01:54 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) open(&(0x7f0000000480)='./file0\x00', 0x84200, 0x100) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 174.206172] Dev loop5: unable to read RDB block 1 [ 174.234113] loop5: unable to read partition table 21:01:54 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 174.263279] loop5: partition table beyond EOD, truncated [ 174.285182] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:54 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:54 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:01:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/251) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:55 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) 21:01:55 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401000259a55800fb", 0x16}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0xc0, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x4, {0x0, 0x15}}, 0x20) keyctl$set_reqkey_keyring(0xe, 0x3) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x800, 0x100, 0x4, 0x3, 0x1ff, 0x80000000}}, 0x50) [ 174.597512] Dev loop5: unable to read RDB block 1 [ 174.634216] loop5: unable to read partition table [ 174.641703] loop5: partition table beyond EOD, truncated [ 174.656457] loop4: p1 p3 [ 174.659383] loop4: partition table partially beyond EOD, truncated [ 174.677110] loop4: p1 start 2304 is beyond EOD, truncated [ 174.686794] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 174.696375] x86/PAT: syz-executor.0:10078 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 174.696778] loop4: p3 size 10 extends beyond EOD, 21:01:55 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 174.759874] truncated 21:01:55 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) 21:01:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r0, 0x14, 0x1, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x3}, 0x20) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:55 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) [ 174.876332] FAT-fs (loop1): bogus number of directory entries (42329) [ 174.908887] FAT-fs (loop1): Can't find a valid FAT filesystem 21:01:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:55 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(&(0x7f0000000380), 0x80000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 174.959669] x86/PAT: syz-executor.0:10099 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:01:55 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x94c, 0x80000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x50bfd9a5983ae83, &(0x7f00000001c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xee45, 0x0, 0x0, 0x0, 0x401}, @alu={0x7, 0x2b, 0xd, 0xb, 0x0, 0x4, 0x8}, @map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x7, 0x1, 0x0, r2}, @generic={0x2, 0x7, 0xc75, 0x401, 0x7ff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @jmp={0x5, 0x400, 0xd, 0x8, 0x4, 0xfffffffffffffff4, 0xfffffffffffffff4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x748}], &(0x7f0000000240)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19;f\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd\xe5\x1f\xf6\x9b\x1f\xaay\xe6vW\x16\xce\xce\x92u \xc3\x17\xd1\xc1%\xe9 8\xb5\x9e\\\x86\xb2\xca\x9c\xeb\x9e\xfb\xb3\xefwsdM\x0e\xc7\x06\x1d\xe3?\xc1I\xa3d\xc1\xf8\x83\xe8\x1d,7\x00K\x16\xf5\xac\x95\xbc\x00\x9aF\xca\x862\xd8\xb4\x1f\xc0\xc1z\xed*\x93n\x96H\xfd\xbc8\xdf\xfa\xc1\x17\f\xe9\x0f)\xe3\xd4_\x8dX\xe7\x81(\x00\x14\xd7\xea%\x94\x9d\xf8\x7f>\xf4\xc3\x90\x1b\xad\'\xa7\xda\xb6\xc0\x8d\x10\x9c\xb6\x8c\'\xa0Z\xcc\xa9\xa8\xfah<\xd2t\xdc\xf7q\xbf\x13=\x06a\xabr\'\f\xb6|i\x94\xd3\x85Z\xa5L?\x9bt\x06L\xec\xe0-_\x14Q\'*\xf2v\xa1>\x05Ijn0\x9c2(\xb1\'\x9b\x95t\xa3\xdc\x9dC\xe5\x87SQ7U\xad\x80\xff\xc5\xa1IzM\x0e\x16\x91\xc4\xf1\xe3|-\xf1\xd8\x96q\x97\xd7\x13\x85\xc8j\xd7{z\x81\xbeG\xfbI\x89\x97\xdaXK\xe4^\xe5/\xfc\xb6u\xb8I\xe6A\xa3\x1e\xc8\xb2\x90', 0x5, 0xffffff4b, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 175.081407] Dev loop5: unable to read RDB block 1 [ 175.132455] loop5: unable to read partition table 21:01:55 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 175.194544] loop5: partition table beyond EOD, truncated 21:01:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x113801, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x408000) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$TCXONC(r0, 0x540a, 0x3) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) [ 175.237545] x86/PAT: syz-executor.0:10126 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 175.261167] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 175.265180] loop4: p1 p3 21:01:55 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 175.310160] loop4: partition table partially beyond EOD, truncated [ 175.322998] loop4: p1 start 2304 is beyond EOD, truncated [ 175.337074] loop4: p3 size 10 extends beyond EOD, truncated 21:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:56 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) 21:01:56 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) [ 175.553309] x86/PAT: syz-executor.0:10149 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 175.695853] Dev loop2: unable to read RDB block 1 21:01:56 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000000)={0x3ff, 0x7, 0x7fff, 0x3, 0x101}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x0, 0x0, 0x0, {0xc, @sdr}}) [ 175.716530] loop2: unable to read partition table 21:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:56 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 175.736904] Dev loop5: unable to read RDB block 1 [ 175.742015] loop5: unable to read partition table [ 175.754617] loop2: partition table beyond EOD, truncated [ 175.798420] loop5: partition table beyond EOD, truncated [ 175.808215] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:01:56 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) [ 175.856085] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:56 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2400010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x600, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) r2 = socket$inet6(0xa, 0x3, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x541b, 0x3f) 21:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:56 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 176.003662] loop4: p1 p3 [ 176.007314] loop4: partition table partially beyond EOD, truncated 21:01:56 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) [ 176.067784] loop4: p1 start 2304 is beyond EOD, truncated [ 176.088460] loop4: p3 size 10 extends beyond EOD, truncated [ 176.095745] Dev loop2: unable to read RDB block 1 [ 176.105374] loop2: unable to read partition table [ 176.114649] loop2: partition table beyond EOD, truncated 21:01:56 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 176.141397] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:01:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:56 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) [ 176.289571] Dev loop5: unable to read RDB block 1 [ 176.302897] loop5: unable to read partition table [ 176.326959] loop5: partition table beyond EOD, truncated 21:01:56 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) 21:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 176.361721] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:56 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:57 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xf8, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x25, 0x33}}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2a, 0x8}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x79}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x4008010) ptrace$peek(0x3, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) 21:01:57 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) [ 176.518897] Dev loop2: unable to read RDB block 1 [ 176.534038] loop2: unable to read partition table [ 176.564297] loop2: partition table beyond EOD, truncated [ 176.579152] loop4: p1 p3 21:01:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 176.611465] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 176.675743] Dev loop5: unable to read RDB block 1 21:01:57 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 176.701722] loop5: unable to read partition table 21:01:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 21:01:57 executing program 1: syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x6}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0) 21:01:57 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 176.773732] loop5: partition table beyond EOD, truncated [ 176.800141] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:57 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:01:57 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:57 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x10001, 0x2, 0x10000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) timer_create(0x6, &(0x7f0000000100)={0x0, 0x2a}, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000200)={{0x0, 0x989680}, {r2, r3+10000000}}, &(0x7f0000000240)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x90000) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4004ae86, &(0x7f0000000040)={0x7b, 0x5, [0x0, 0x0, 0x1, 0x8], [0xc1]}) [ 177.004850] Dev loop2: unable to read RDB block 1 [ 177.035171] loop2: unable to read partition table 21:01:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 177.068305] loop2: partition table beyond EOD, truncated [ 177.088397] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 177.134894] Dev loop5: unable to read RDB block 1 [ 177.163043] loop5: unable to read partition table 21:01:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000180)={'sit0\x00', 0x2a}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3, 0x200) getsockname$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10) r2 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/ipc\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x9}, 0x1c) connect$l2tp(r4, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:01:57 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:01:57 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 177.244208] loop5: partition table beyond EOD, truncated [ 177.252787] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:57 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 177.507978] Dev loop2: unable to read RDB block 1 21:01:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:58 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x2, 0x70, 0x9, 0x1, 0x9, 0x4, 0x0, 0x9, 0x4000, 0x8, 0x0, 0x800, 0x1, 0x8e, 0x3, 0x6, 0x0, 0x7, 0x10000, 0x9, 0x1, 0x10000, 0x1, 0x101, 0x6, 0x401, 0x40, 0x6, 0x400, 0x4, 0x99a, 0x2, 0x7f, 0x8, 0x3f, 0xea, 0x5, 0x2, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x100, 0x0, 0x80000001, 0xc60fa1445c57ec54, 0x1, 0xa36, 0xffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/184) sendmmsg(r1, &(0x7f00000001c0), 0x400000000000150, 0x0) 21:01:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 177.544146] loop2: unable to read partition table [ 177.564125] loop2: partition table beyond EOD, truncated [ 177.577829] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 177.743178] Dev loop5: unable to read RDB block 1 21:01:58 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 177.766826] loop5: unable to read partition table 21:01:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 177.838008] loop5: partition table beyond EOD, truncated 21:01:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 177.886170] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:58 executing program 1: syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xd3f, 0x80) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200040, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/106, &(0x7f00000001c0)=0x6a) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x1) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000100)={0x2, 0x0, [{0x7, 0x0, 0x0, 0x3b5d}, {0x1, 0x0, 0x0, 0x30}]}) [ 177.930700] Dev loop2: unable to read RDB block 1 [ 177.939286] loop2: unable to read partition table 21:01:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 177.971093] loop2: partition table beyond EOD, truncated [ 177.990523] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:01:58 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:01:58 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:01:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) 21:01:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xab, 0x1, 0xb34, "990771fcb5c3eb69c31f023f7cb95327", "6fddd50964948c88de6c63f78dd33aa194f4a33be7a2a6b2795fbd351b8f7b599b4da1c76da7709357b0796ab7fe7fe7ce4c2045d6db20339f5d1c74458f55cd910e45e1194b3cab21633a202669bdf5cd492c04af69b337fec35ed8fd0f904e85ac8bf5807ef73a04acd71f3052cff9253ba2a8099a369109175a6be73203c80ed833e05a3d5f3d35af837ea2f849f74d4c177954d8"}, 0xab, 0x3) inotify_init() ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xf}}) r1 = add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="5edec1cf0c8ff2685e791f82b68efd9cde3b57", 0x13, 0xfffffffffffffffa) keyctl$read(0xb, r1, &(0x7f0000000240)=""/207, 0xcf) 21:01:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 178.281054] Dev loop2: unable to read RDB block 1 [ 178.300436] loop2: unable to read partition table [ 178.311116] loop2: partition table beyond EOD, truncated [ 178.327235] Dev loop5: unable to read RDB block 1 [ 178.332323] loop5: unable to read partition table [ 178.343242] loop5: partition table beyond EOD, truncated [ 178.357759] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000040)) [ 178.389871] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:59 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:01:59 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:59 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x4, 0x80000) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0xfffffffffffff14b) 21:01:59 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) [ 178.665375] Dev loop2: unable to read RDB block 1 [ 178.677141] loop2: unable to read partition table [ 178.696590] loop2: partition table beyond EOD, truncated [ 178.702494] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 178.720894] Dev loop5: unable to read RDB block 1 [ 178.731274] loop5: unable to read partition table [ 178.762498] loop5: partition table beyond EOD, truncated [ 178.770285] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:01:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:01:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x107000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x720, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, 0x0) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000300)={0x8, @raw_data="b1a60529582edd1412cf263b7c335f00f3b2d8f5f84a2863ecba1198c011c5e2a27a394231fcd86d6e3abbe217e9a2ee377eebe192ab29a9bf27e5f2b967051f8735b323bfcb262b4453317ee36077f3d0c49d181e037f6df6822f84e3816f84e0cc1d899cd49d24f54fc77420f0f1cfd5a0b78498a058daa5b9b96a0e5d5ef6dde98ca909c4e2d9e9baf4fd127475994c50302b8c1b8994792fd0d388f6c30bc6a6a22136d7c8a65cb7fa7c778a6317b7bdcaa5ab2986e624cc3743a825137081b754c0e06dd6d5"}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) 21:01:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) 21:01:59 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:01:59 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:01:59 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:01:59 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 179.034337] Dev loop2: unable to read RDB block 1 [ 179.039596] loop2: unable to read partition table [ 179.046811] loop2: partition table beyond EOD, truncated [ 179.055292] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 179.065992] Dev loop5: unable to read RDB block 1 [ 179.070922] loop5: unable to read partition table 21:01:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000000c0)={[0x3, 0xffff, 0x80000001, 0x4, 0x20, 0x1, 0x7, 0x2, 0x8, 0x2, 0x7, 0x6, 0x3f, 0xf775, 0xfffffffffffffffb, 0x6], 0x0, 0x60490}) r3 = fcntl$dupfd(r1, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) sendto$unix(r5, &(0x7f0000000240), 0xffffffffffffff8e, 0x0, 0x0, 0x15f) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r6, 0x4040ae9e, &(0x7f0000000080)={0x8080000000000000}) [ 179.082791] loop5: partition table beyond EOD, truncated [ 179.088894] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 179.167557] Dev loop4: unable to read RDB block 1 21:01:59 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) [ 179.205200] loop4: unable to read partition table [ 179.238586] loop4: partition table beyond EOD, truncated 21:01:59 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) [ 179.283124] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:01:59 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 179.391001] Dev loop2: unable to read RDB block 1 21:01:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) [ 179.413200] loop2: unable to read partition table [ 179.430126] loop2: partition table beyond EOD, truncated [ 179.441767] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 179.445229] Dev loop5: unable to read RDB block 1 [ 179.464660] loop5: unable to read partition table [ 179.481674] loop5: partition table beyond EOD, truncated [ 179.499768] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 179.602418] Dev loop4: unable to read RDB block 1 [ 179.613228] loop4: unable to read partition table [ 179.631867] loop4: partition table beyond EOD, truncated [ 179.649459] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0xb) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r2) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x156b) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) 21:02:00 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:02:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:00 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x1c0}]) 21:02:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:00 executing program 1: r0 = socket$inet6(0xa, 0xa, 0x8) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000100)=0x3, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) socket$inet_dccp(0x2, 0x6, 0x0) [ 179.958407] Dev loop2: unable to read RDB block 1 [ 179.975359] loop2: unable to read partition table [ 179.983517] loop2: partition table beyond EOD, truncated [ 179.989597] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 180.020696] Dev loop4: unable to read RDB block 1 [ 180.027075] loop4: unable to read partition table [ 180.036782] loop4: partition table beyond EOD, truncated [ 180.046634] Dev loop5: unable to read RDB block 1 [ 180.051677] loop5: unable to read partition table [ 180.060701] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:00 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) [ 180.071786] loop5: partition table beyond EOD, truncated [ 180.108617] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 21:02:00 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 21:02:00 executing program 1: syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x7a9054419d411878) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0x1}, 0x2) [ 180.255264] Dev loop2: unable to read RDB block 1 [ 180.296776] loop2: unable to read partition table [ 180.316917] loop2: partition table beyond EOD, truncated [ 180.333636] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 180.344146] Dev loop4: unable to read RDB block 1 [ 180.352838] loop4: unable to read partition table [ 180.365422] loop4: partition table beyond EOD, truncated [ 180.371508] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:01 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:01 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:01 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0xf0f041}) write$binfmt_aout(r0, 0x0, 0x3af) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) 21:02:01 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) 21:02:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 180.783162] vivid-002: disconnect 21:02:01 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 180.808897] vivid-002: reconnect [ 180.823222] vivid-002: disconnect [ 180.828475] vivid-002: reconnect 21:02:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x30, 0x6, 0x0, {0x1, 0x0, 0x7, 0x0, 'user_id'}}, 0x30) [ 180.863411] Dev loop2: unable to read RDB block 1 [ 180.870366] loop2: unable to read partition table [ 180.885328] Dev loop4: unable to read RDB block 1 [ 180.889205] loop2: partition table beyond EOD, [ 180.890443] loop4: unable to read partition table [ 180.891499] truncated [ 180.900149] loop4: partition table beyond EOD, [ 180.901548] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 180.902863] truncated [ 180.940103] Dev loop5: unable to read RDB block 1 [ 180.947259] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:01 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) [ 180.992624] loop5: unable to read partition table [ 181.018986] loop5: partition table beyond EOD, truncated 21:02:01 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00300000000000000153c0000000200"], 0x10) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 21:02:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) [ 181.066765] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 181.157003] Dev loop2: unable to read RDB block 1 [ 181.191934] loop2: unable to read partition table [ 181.211033] loop2: partition table beyond EOD, truncated [ 181.233216] Dev loop4: unable to read RDB block 1 [ 181.248259] loop4: unable to read partition table [ 181.256518] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 181.265789] loop4: partition table beyond EOD, truncated [ 181.285188] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:02 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:02 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:02 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) 21:02:02 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x9ff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:02:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 181.685543] Dev loop2: unable to read RDB block 1 [ 181.691150] loop2: unable to read partition table [ 181.699344] loop2: partition table beyond EOD, truncated [ 181.721300] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:02 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x9ff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:02 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) [ 181.824438] Dev loop4: unable to read RDB block 1 [ 181.834396] loop4: unable to read partition table [ 181.844461] loop4: partition table beyond EOD, truncated [ 181.852530] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:02:02 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:02:02 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 182.130944] Dev loop4: unable to read RDB block 1 [ 182.136493] loop4: unable to read partition table [ 182.145075] loop4: partition table beyond EOD, truncated [ 182.168609] Dev loop2: unable to read RDB block 1 [ 182.173541] loop2: unable to read partition table [ 182.181038] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 182.194972] loop2: partition table beyond EOD, truncated [ 182.200626] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:03 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x9ff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ff", 0x20, 0x1c0}]) 21:02:03 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:02:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x9ff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 182.575974] Dev loop2: unable to read RDB block 1 [ 182.583818] loop2: unable to read partition table [ 182.611285] loop2: partition table beyond EOD, truncated 21:02:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 182.624103] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 182.634752] Dev loop4: unable to read RDB block 1 [ 182.640316] loop4: unable to read partition table [ 182.648484] loop4: partition table beyond EOD, truncated [ 182.654662] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:02:03 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:02:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 183.015066] Dev loop4: unable to read RDB block 1 [ 183.028928] loop4: unable to read partition table [ 183.047719] loop4: partition table beyond EOD, truncated [ 183.057062] Dev loop2: unable to read RDB block 1 [ 183.063386] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 183.071145] loop2: unable to read partition table [ 183.083130] loop2: partition table beyond EOD, truncated [ 183.093693] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:02:03 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) [ 183.436369] Dev loop2: unable to read RDB block 1 [ 183.441676] loop2: unable to read partition table [ 183.461766] loop2: partition table beyond EOD, truncated [ 183.470751] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 183.484535] Dev loop4: unable to read RDB block 1 [ 183.489597] loop4: unable to read partition table [ 183.506371] loop4: partition table beyond EOD, truncated [ 183.512232] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:04 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:02:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000", 0x30, 0x1c0}]) 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 183.681745] Dev loop2: unable to read RDB block 1 [ 183.695062] loop2: unable to read partition table [ 183.714316] loop2: partition table beyond EOD, truncated [ 183.723783] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:04 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) [ 183.857065] Dev loop4: unable to read RDB block 1 [ 183.869895] loop4: unable to read partition table [ 183.887842] loop4: partition table beyond EOD, truncated [ 183.914228] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 184.004830] Dev loop2: unable to read RDB block 1 [ 184.017869] loop2: unable to read partition table [ 184.041680] loop2: partition table beyond EOD, truncated [ 184.052078] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:04 executing program 5 (fault-call:1 fault-nth:0): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:04 executing program 0 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) 21:02:04 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) [ 184.299017] x86/PAT: syz-executor.0:10784 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 184.320416] FAULT_INJECTION: forcing a failure. [ 184.320416] name failslab, interval 1, probability 0, space 0, times 1 [ 184.338401] CPU: 0 PID: 10791 Comm: syz-executor.5 Not tainted 4.19.69 #43 21:02:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 184.345472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.354841] Call Trace: [ 184.355047] FAULT_INJECTION: forcing a failure. [ 184.355047] name failslab, interval 1, probability 0, space 0, times 1 [ 184.357445] dump_stack+0x172/0x1f0 [ 184.357467] should_fail.cold+0xa/0x1b [ 184.376187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 184.381305] ? lock_downgrade+0x810/0x810 [ 184.385474] __should_failslab+0x121/0x190 [ 184.389715] should_failslab+0x9/0x14 [ 184.393517] __kmalloc+0x2e2/0x750 [ 184.397079] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 184.402637] ? fput+0x128/0x1a0 [ 184.405922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.411464] ? strnlen_user+0x15f/0x1e0 [ 184.415443] ? __x64_sys_memfd_create+0x13c/0x470 [ 184.420291] __x64_sys_memfd_create+0x13c/0x470 [ 184.424962] ? memfd_fcntl+0x1a50/0x1a50 [ 184.429024] ? do_syscall_64+0x26/0x620 [ 184.433002] ? lockdep_hardirqs_on+0x415/0x5d0 [ 184.437589] ? trace_hardirqs_on+0x67/0x220 [ 184.441924] do_syscall_64+0xfd/0x620 [ 184.445733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.450917] RIP: 0033:0x459879 [ 184.454110] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.473018] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 184.480735] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 184.488004] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 184.495276] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 184.502550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 184.509823] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 [ 184.517126] CPU: 1 PID: 10784 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 184.524159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.533532] Call Trace: [ 184.536152] dump_stack+0x172/0x1f0 [ 184.539810] should_fail.cold+0xa/0x1b [ 184.543709] ? fault_create_debugfs_attr+0x1e0/0x1e0 21:02:05 executing program 5 (fault-call:1 fault-nth:1): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 184.543724] ? lock_downgrade+0x810/0x810 [ 184.543752] __should_failslab+0x121/0x190 [ 184.552996] should_failslab+0x9/0x14 [ 184.553013] kmem_cache_alloc_node+0x26c/0x710 [ 184.553027] ? lockdep_hardirqs_on+0x415/0x5d0 [ 184.553047] ? trace_hardirqs_on+0x67/0x220 [ 184.574560] ? kasan_check_read+0x11/0x20 [ 184.578730] copy_process.part.0+0x1ce0/0x7a30 [ 184.583313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 184.588939] ? proc_fail_nth_write+0x9d/0x1e0 [ 184.593446] ? proc_cwd_link+0x1d0/0x1d0 [ 184.597500] ? __f_unlock_pos+0x19/0x20 [ 184.601554] ? find_held_lock+0x35/0x130 [ 184.605614] ? __cleanup_sighand+0x70/0x70 [ 184.609835] ? lock_downgrade+0x810/0x810 [ 184.613974] ? kasan_check_write+0x14/0x20 [ 184.618205] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 184.623042] _do_fork+0x257/0xfd0 [ 184.626522] ? fork_idle+0x1d0/0x1d0 [ 184.630225] ? fput+0x128/0x1a0 [ 184.633492] ? ksys_write+0x1f1/0x2d0 [ 184.637283] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.642022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.646766] ? do_syscall_64+0x26/0x620 [ 184.650731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.656217] ? do_syscall_64+0x26/0x620 [ 184.660183] __x64_sys_clone+0xbf/0x150 [ 184.664147] do_syscall_64+0xfd/0x620 [ 184.667936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.673117] RIP: 0033:0x459879 [ 184.676345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:05 executing program 0 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 184.695237] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 184.702963] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 184.710225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 184.717498] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.724771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 184.732027] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 184.800001] Dev loop2: unable to read RDB block 1 [ 184.805812] Dev loop4: unable to read RDB block 1 [ 184.810898] loop4: unable to read partition table [ 184.816251] loop2: unable to read partition table [ 184.832102] loop4: partition table beyond EOD, truncated [ 184.833112] FAULT_INJECTION: forcing a failure. [ 184.833112] name failslab, interval 1, probability 0, space 0, times 0 21:02:05 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 184.840044] loop2: partition table beyond EOD, [ 184.855984] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 184.881780] truncated [ 184.894047] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 184.899913] CPU: 0 PID: 10804 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 184.908406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.917783] Call Trace: [ 184.920405] dump_stack+0x172/0x1f0 [ 184.924073] should_fail.cold+0xa/0x1b [ 184.927988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 184.933112] ? lock_downgrade+0x810/0x810 [ 184.938101] __should_failslab+0x121/0x190 [ 184.942364] should_failslab+0x9/0x14 [ 184.946186] kmem_cache_alloc+0x2ae/0x700 [ 184.946765] x86/PAT: syz-executor.0:10809 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 184.950375] ? __alloc_fd+0x44d/0x560 [ 184.950397] ? shmem_destroy_callback+0xc0/0xc0 [ 184.950411] shmem_alloc_inode+0x1c/0x50 [ 184.950429] alloc_inode+0x64/0x190 [ 184.950442] new_inode_pseudo+0x19/0xf0 [ 184.950457] new_inode+0x1f/0x40 [ 184.961398] FAULT_INJECTION: forcing a failure. [ 184.961398] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 184.962921] shmem_get_inode+0x84/0x780 [ 184.962944] __shmem_file_setup.part.0+0x7e/0x2b0 [ 184.962965] shmem_file_setup+0x66/0x90 [ 184.962983] __x64_sys_memfd_create+0x2a2/0x470 [ 184.963001] ? memfd_fcntl+0x1a50/0x1a50 [ 185.015882] ? do_syscall_64+0x26/0x620 [ 185.019863] ? lockdep_hardirqs_on+0x415/0x5d0 [ 185.024452] ? trace_hardirqs_on+0x67/0x220 [ 185.028780] do_syscall_64+0xfd/0x620 [ 185.032595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.037790] RIP: 0033:0x459879 [ 185.040986] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.059886] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 185.067617] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 185.074906] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 185.082183] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 185.089463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 185.096748] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 21:02:05 executing program 5 (fault-call:1 fault-nth:2): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 185.104998] CPU: 1 PID: 10809 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 185.112044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.121394] Call Trace: [ 185.121416] dump_stack+0x172/0x1f0 [ 185.121433] should_fail.cold+0xa/0x1b [ 185.121448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.121464] ? __might_sleep+0x95/0x190 [ 185.121482] __alloc_pages_nodemask+0x1ee/0x750 [ 185.121498] ? __alloc_pages_slowpath+0x2870/0x2870 [ 185.121515] ? lockdep_hardirqs_on+0x415/0x5d0 [ 185.121532] ? trace_hardirqs_on+0x67/0x220 [ 185.121545] ? kasan_check_read+0x11/0x20 [ 185.121565] copy_process.part.0+0x3e0/0x7a30 [ 185.121587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.121600] ? proc_fail_nth_write+0x9d/0x1e0 [ 185.121613] ? proc_cwd_link+0x1d0/0x1d0 [ 185.121627] ? __f_unlock_pos+0x19/0x20 [ 185.121645] ? find_held_lock+0x35/0x130 [ 185.189991] ? __cleanup_sighand+0x70/0x70 [ 185.194215] ? lock_downgrade+0x810/0x810 [ 185.198359] ? kasan_check_write+0x14/0x20 [ 185.202588] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 185.207420] _do_fork+0x257/0xfd0 [ 185.210860] ? fork_idle+0x1d0/0x1d0 [ 185.214608] ? fput+0x128/0x1a0 [ 185.217886] ? ksys_write+0x1f1/0x2d0 [ 185.221686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.226428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.231183] ? do_syscall_64+0x26/0x620 [ 185.235166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.240516] ? do_syscall_64+0x26/0x620 [ 185.244488] __x64_sys_clone+0xbf/0x150 [ 185.248475] do_syscall_64+0xfd/0x620 [ 185.252277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.257452] RIP: 0033:0x459879 [ 185.260629] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.279534] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 185.287244] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 185.294500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 21:02:05 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:05 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 185.301754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.309008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 185.316282] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 185.366575] x86/PAT: syz-executor.0:10809 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:05 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:05 executing program 0 (fault-call:6 fault-nth:2): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) [ 185.430777] FAULT_INJECTION: forcing a failure. [ 185.430777] name failslab, interval 1, probability 0, space 0, times 0 [ 185.457108] CPU: 0 PID: 10818 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 185.464191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.473647] Call Trace: [ 185.476261] dump_stack+0x172/0x1f0 [ 185.479896] should_fail.cold+0xa/0x1b [ 185.483774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.488882] ? percpu_ref_put_many+0x94/0x190 [ 185.493371] __should_failslab+0x121/0x190 [ 185.497611] should_failslab+0x9/0x14 [ 185.501419] kmem_cache_alloc+0x2ae/0x700 [ 185.505560] ? map_id_range_down+0x1ee/0x370 [ 185.509960] ? __put_user_ns+0x70/0x70 [ 185.513862] selinux_inode_alloc_security+0xb6/0x2a0 [ 185.518979] security_inode_alloc+0x8a/0xd0 [ 185.523303] inode_init_always+0x56e/0xb40 [ 185.527579] alloc_inode+0x81/0x190 [ 185.531195] new_inode_pseudo+0x19/0xf0 [ 185.535167] new_inode+0x1f/0x40 [ 185.538545] shmem_get_inode+0x84/0x780 [ 185.542536] __shmem_file_setup.part.0+0x7e/0x2b0 [ 185.547366] shmem_file_setup+0x66/0x90 [ 185.551328] __x64_sys_memfd_create+0x2a2/0x470 [ 185.555995] ? memfd_fcntl+0x1a50/0x1a50 [ 185.560064] ? do_syscall_64+0x26/0x620 [ 185.564046] ? lockdep_hardirqs_on+0x415/0x5d0 [ 185.568616] ? trace_hardirqs_on+0x67/0x220 [ 185.572935] do_syscall_64+0xfd/0x620 [ 185.576745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.581947] RIP: 0033:0x459879 [ 185.585141] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.604041] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 185.611757] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 185.619020] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 185.626311] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 185.633572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 185.640839] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 21:02:06 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:06 executing program 5 (fault-call:1 fault-nth:3): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 185.745883] x86/PAT: syz-executor.0:10831 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 185.761554] FAULT_INJECTION: forcing a failure. [ 185.761554] name failslab, interval 1, probability 0, space 0, times 0 [ 185.776265] CPU: 1 PID: 10831 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 185.783333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.783345] Call Trace: [ 185.795317] dump_stack+0x172/0x1f0 [ 185.798970] should_fail.cold+0xa/0x1b [ 185.802880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.807988] ? lock_downgrade+0x810/0x810 [ 185.812148] __should_failslab+0x121/0x190 [ 185.816395] should_failslab+0x9/0x14 [ 185.820189] kmem_cache_alloc+0x2ae/0x700 [ 185.824329] ? creds_are_invalid+0x59/0x150 [ 185.828642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.834168] ? __validate_process_creds+0x1d9/0x300 [ 185.839175] prepare_creds+0x3e/0x400 [ 185.842968] copy_creds+0x7b/0x610 [ 185.846497] ? lockdep_init_map+0x9/0x10 [ 185.850552] copy_process.part.0+0xb54/0x7a30 [ 185.855041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 185.860655] ? proc_fail_nth_write+0x9d/0x1e0 [ 185.865140] ? proc_cwd_link+0x1d0/0x1d0 [ 185.869208] ? __f_unlock_pos+0x19/0x20 [ 185.873178] ? find_held_lock+0x35/0x130 [ 185.877237] ? __cleanup_sighand+0x70/0x70 [ 185.881476] ? lock_downgrade+0x810/0x810 [ 185.885622] ? kasan_check_write+0x14/0x20 [ 185.889845] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 185.894678] _do_fork+0x257/0xfd0 [ 185.898149] ? fork_idle+0x1d0/0x1d0 [ 185.901857] ? fput+0x128/0x1a0 [ 185.905211] ? ksys_write+0x1f1/0x2d0 [ 185.909016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.913759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.918506] ? do_syscall_64+0x26/0x620 [ 185.922471] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.927824] ? do_syscall_64+0x26/0x620 [ 185.931788] __x64_sys_clone+0xbf/0x150 [ 185.936215] do_syscall_64+0xfd/0x620 [ 185.940012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.945189] RIP: 0033:0x459879 [ 185.948372] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.967436] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 185.975133] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 185.982388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 185.989650] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.996908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 186.004183] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 186.036528] Dev loop4: unable to read RDB block 1 [ 186.041880] loop4: unable to read partition table 21:02:06 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 186.053639] x86/PAT: syz-executor.0:10831 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 186.062769] loop4: partition table beyond EOD, truncated [ 186.081406] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 186.115387] Dev loop2: unable to read RDB block 1 [ 186.120866] FAULT_INJECTION: forcing a failure. [ 186.120866] name failslab, interval 1, probability 0, space 0, times 0 [ 186.142569] loop2: unable to read partition table 21:02:06 executing program 0 (fault-call:6 fault-nth:3): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/56, 0x38, 0x1c0}]) [ 186.160824] loop2: partition table beyond EOD, truncated [ 186.166493] CPU: 0 PID: 10841 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 186.173532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.182902] Call Trace: [ 186.185520] dump_stack+0x172/0x1f0 [ 186.189170] should_fail.cold+0xa/0x1b [ 186.193087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.198220] ? lock_downgrade+0x810/0x810 [ 186.202414] __should_failslab+0x121/0x190 [ 186.206676] should_failslab+0x9/0x14 [ 186.209016] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 186.210490] kmem_cache_alloc+0x2ae/0x700 [ 186.210508] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 186.227030] ? lockdep_hardirqs_on+0x415/0x5d0 [ 186.231636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.237201] ? timespec64_trunc+0xf0/0x180 [ 186.241548] __d_alloc+0x2e/0x9c0 [ 186.245022] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 186.250232] d_alloc_pseudo+0x1e/0x70 [ 186.254055] alloc_file_pseudo+0xe2/0x280 [ 186.258216] ? __lockdep_init_map+0x10c/0x5b0 21:02:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 186.262727] ? alloc_file+0x4d0/0x4d0 [ 186.266551] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 186.272113] ? kasan_check_write+0x14/0x20 [ 186.276374] __shmem_file_setup.part.0+0x108/0x2b0 [ 186.281318] shmem_file_setup+0x66/0x90 [ 186.285302] __x64_sys_memfd_create+0x2a2/0x470 [ 186.289979] ? memfd_fcntl+0x1a50/0x1a50 [ 186.294030] ? do_syscall_64+0x26/0x620 [ 186.297991] ? lockdep_hardirqs_on+0x415/0x5d0 [ 186.302576] ? trace_hardirqs_on+0x67/0x220 [ 186.306921] do_syscall_64+0xfd/0x620 [ 186.310752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.315959] RIP: 0033:0x459879 [ 186.319152] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.338059] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.345771] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 186.353041] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 186.360301] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 186.367578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 186.374849] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 21:02:06 executing program 5 (fault-call:1 fault-nth:4): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:07 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:07 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 186.445614] Dev loop4: unable to read RDB block 1 [ 186.450691] loop4: unable to read partition table [ 186.478974] loop4: partition table beyond EOD, truncated [ 186.497079] x86/PAT: syz-executor.0:10858 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 186.545012] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 186.568506] FAULT_INJECTION: forcing a failure. [ 186.568506] name failslab, interval 1, probability 0, space 0, times 0 [ 186.579244] FAULT_INJECTION: forcing a failure. [ 186.579244] name failslab, interval 1, probability 0, space 0, times 0 [ 186.585340] CPU: 0 PID: 10863 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 186.597971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.607341] Call Trace: [ 186.609939] dump_stack+0x172/0x1f0 [ 186.613647] should_fail.cold+0xa/0x1b [ 186.617528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.622624] ? lock_downgrade+0x810/0x810 [ 186.626768] __should_failslab+0x121/0x190 [ 186.630996] should_failslab+0x9/0x14 [ 186.634784] kmem_cache_alloc+0x2ae/0x700 [ 186.638927] __alloc_file+0x27/0x330 [ 186.642633] alloc_empty_file+0x72/0x170 [ 186.646686] alloc_file+0x5e/0x4d0 [ 186.650244] alloc_file_pseudo+0x189/0x280 [ 186.654468] ? alloc_file+0x4d0/0x4d0 [ 186.658260] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 186.663794] ? kasan_check_write+0x14/0x20 [ 186.668022] __shmem_file_setup.part.0+0x108/0x2b0 [ 186.672945] shmem_file_setup+0x66/0x90 [ 186.676932] __x64_sys_memfd_create+0x2a2/0x470 [ 186.681600] ? memfd_fcntl+0x1a50/0x1a50 [ 186.685653] ? do_syscall_64+0x26/0x620 [ 186.689621] ? lockdep_hardirqs_on+0x415/0x5d0 [ 186.694195] ? trace_hardirqs_on+0x67/0x220 [ 186.698508] do_syscall_64+0xfd/0x620 [ 186.702301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.707478] RIP: 0033:0x459879 [ 186.710662] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.732849] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.740552] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 186.747813] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 186.755078] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 186.762342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 186.771168] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 [ 186.782818] CPU: 0 PID: 10865 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 186.789875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.789882] Call Trace: [ 186.789911] dump_stack+0x172/0x1f0 [ 186.789935] should_fail.cold+0xa/0x1b [ 186.789953] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.789967] ? lock_downgrade+0x810/0x810 [ 186.789991] __should_failslab+0x121/0x190 [ 186.805593] should_failslab+0x9/0x14 [ 186.805609] __kmalloc_track_caller+0x2de/0x750 [ 186.805631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.805649] ? selinux_cred_prepare+0x49/0xb0 [ 186.805668] kmemdup+0x27/0x60 [ 186.805687] selinux_cred_prepare+0x49/0xb0 [ 186.805702] security_prepare_creds+0x77/0xc0 [ 186.805720] prepare_creds+0x32a/0x400 [ 186.805735] copy_creds+0x7b/0x610 [ 186.805749] ? lockdep_init_map+0x9/0x10 [ 186.805772] copy_process.part.0+0xb54/0x7a30 21:02:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) [ 186.869804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.875367] ? proc_fail_nth_write+0x9d/0x1e0 [ 186.879976] ? proc_cwd_link+0x1d0/0x1d0 [ 186.884060] ? __f_unlock_pos+0x19/0x20 [ 186.888067] ? find_held_lock+0x35/0x130 [ 186.892159] ? __cleanup_sighand+0x70/0x70 [ 186.896417] ? lock_downgrade+0x810/0x810 [ 186.900600] ? kasan_check_write+0x14/0x20 [ 186.904854] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 186.904878] _do_fork+0x257/0xfd0 [ 186.904898] ? fork_idle+0x1d0/0x1d0 [ 186.904916] ? fput+0x128/0x1a0 [ 186.904932] ? ksys_write+0x1f1/0x2d0 [ 186.904950] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.904966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.913281] ? do_syscall_64+0x26/0x620 [ 186.938478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.943868] ? do_syscall_64+0x26/0x620 [ 186.947875] __x64_sys_clone+0xbf/0x150 [ 186.951878] do_syscall_64+0xfd/0x620 [ 186.955714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.960925] RIP: 0033:0x459879 21:02:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 186.964135] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.983058] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 186.990795] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 186.998086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 187.005373] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 187.012656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 21:02:07 executing program 5 (fault-call:1 fault-nth:5): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 187.012666] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:07 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) [ 187.065328] Dev loop4: unable to read RDB block 1 [ 187.079162] loop4: unable to read partition table [ 187.093781] loop4: partition table beyond EOD, truncated [ 187.102101] Dev loop2: unable to read RDB block 1 21:02:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}, {{&(0x7f0000004800)=@can, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004880)=""/36, 0x24}, {&(0x7f00000048c0)=""/41, 0x29}, {&(0x7f0000004900)=""/13, 0xd}, {&(0x7f0000004940)}, {&(0x7f0000004980)=""/246, 0xf6}, {&(0x7f0000004a80)=""/60, 0x3c}], 0x1000000000000276}, 0x9}], 0x9, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 187.112733] loop2: unable to read partition table [ 187.118803] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 187.128925] x86/PAT: syz-executor.0:10865 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:07 executing program 0 (fault-call:6 fault-nth:4): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 187.177133] loop2: partition table beyond EOD, truncated [ 187.191083] FAULT_INJECTION: forcing a failure. [ 187.191083] name failslab, interval 1, probability 0, space 0, times 0 [ 187.207489] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 21:02:07 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) [ 187.221915] CPU: 1 PID: 10883 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 187.228988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.238361] Call Trace: [ 187.240981] dump_stack+0x172/0x1f0 [ 187.244642] should_fail.cold+0xa/0x1b [ 187.248562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.253684] ? lock_downgrade+0x810/0x810 [ 187.257839] __should_failslab+0x121/0x190 [ 187.262070] should_failslab+0x9/0x14 [ 187.265861] kmem_cache_alloc+0x2ae/0x700 [ 187.270001] ? rcu_read_lock_sched_held+0x110/0x130 [ 187.275006] selinux_file_alloc_security+0xb4/0x190 [ 187.280018] security_file_alloc+0x63/0xa0 [ 187.284243] __alloc_file+0xcf/0x330 [ 187.287948] alloc_empty_file+0x72/0x170 [ 187.292002] alloc_file+0x5e/0x4d0 [ 187.295532] alloc_file_pseudo+0x189/0x280 [ 187.299760] ? alloc_file+0x4d0/0x4d0 [ 187.303649] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 187.309207] ? kasan_check_write+0x14/0x20 [ 187.313449] __shmem_file_setup.part.0+0x108/0x2b0 [ 187.318367] shmem_file_setup+0x66/0x90 [ 187.322334] __x64_sys_memfd_create+0x2a2/0x470 [ 187.327006] ? memfd_fcntl+0x1a50/0x1a50 [ 187.331064] ? do_syscall_64+0x26/0x620 [ 187.335026] ? lockdep_hardirqs_on+0x415/0x5d0 [ 187.339605] ? trace_hardirqs_on+0x67/0x220 [ 187.344096] do_syscall_64+0xfd/0x620 [ 187.347892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.353067] RIP: 0033:0x459879 [ 187.356247] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 187.375149] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 187.382862] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 187.390147] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 187.397407] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 187.404664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 187.411920] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 21:02:08 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:08 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) [ 187.570183] x86/PAT: syz-executor.0:10897 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 187.609307] FAULT_INJECTION: forcing a failure. [ 187.609307] name failslab, interval 1, probability 0, space 0, times 0 21:02:08 executing program 5 (fault-call:1 fault-nth:6): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 187.623159] CPU: 1 PID: 10897 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 187.630219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.639591] Call Trace: [ 187.642211] dump_stack+0x172/0x1f0 [ 187.645881] should_fail.cold+0xa/0x1b [ 187.649793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.654890] ? lock_downgrade+0x810/0x810 [ 187.659033] __should_failslab+0x121/0x190 [ 187.663253] should_failslab+0x9/0x14 [ 187.667054] __kmalloc_track_caller+0x2de/0x750 [ 187.671713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.677238] ? selinux_cred_prepare+0x49/0xb0 [ 187.681722] kmemdup+0x27/0x60 [ 187.684922] selinux_cred_prepare+0x49/0xb0 [ 187.689241] security_prepare_creds+0x77/0xc0 [ 187.693725] prepare_creds+0x32a/0x400 [ 187.697600] copy_creds+0x7b/0x610 [ 187.701125] ? lockdep_init_map+0x9/0x10 [ 187.705181] copy_process.part.0+0xb54/0x7a30 [ 187.709667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 187.715216] ? proc_fail_nth_write+0x9d/0x1e0 [ 187.719718] ? proc_cwd_link+0x1d0/0x1d0 [ 187.723769] ? __f_unlock_pos+0x19/0x20 [ 187.727732] ? find_held_lock+0x35/0x130 [ 187.731783] ? __cleanup_sighand+0x70/0x70 [ 187.736007] ? lock_downgrade+0x810/0x810 [ 187.740145] ? kasan_check_write+0x14/0x20 [ 187.744372] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 187.749205] _do_fork+0x257/0xfd0 [ 187.752643] ? fork_idle+0x1d0/0x1d0 [ 187.756343] ? fput+0x128/0x1a0 [ 187.759615] ? ksys_write+0x1f1/0x2d0 [ 187.763408] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.768149] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.772890] ? do_syscall_64+0x26/0x620 [ 187.776860] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.782209] ? do_syscall_64+0x26/0x620 [ 187.786186] __x64_sys_clone+0xbf/0x150 [ 187.790159] do_syscall_64+0xfd/0x620 [ 187.793946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.799121] RIP: 0033:0x459879 [ 187.802317] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:08 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 187.821208] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 187.828918] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 187.836173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 187.843425] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.850678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 187.857942] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:08 executing program 0 (fault-call:6 fault-nth:5): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 187.891497] x86/PAT: syz-executor.0:10897 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 187.970604] FAULT_INJECTION: forcing a failure. [ 187.970604] name failslab, interval 1, probability 0, space 0, times 0 [ 187.973635] Dev loop4: unable to read RDB block 1 [ 188.048600] CPU: 1 PID: 10918 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 188.054473] loop4: unable to read partition table [ 188.055664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.055671] Call Trace: [ 188.055698] dump_stack+0x172/0x1f0 [ 188.055720] should_fail.cold+0xa/0x1b [ 188.064713] loop4: partition table beyond EOD, [ 188.070021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.070039] ? lock_downgrade+0x810/0x810 [ 188.070064] __should_failslab+0x121/0x190 [ 188.072784] truncated [ 188.076257] should_failslab+0x9/0x14 [ 188.076273] kmem_cache_alloc+0x2ae/0x700 [ 188.076290] ? rcu_read_lock_sched_held+0x110/0x130 [ 188.076308] selinux_file_alloc_security+0xb4/0x190 [ 188.076322] security_file_alloc+0x63/0xa0 [ 188.076341] __alloc_file+0xcf/0x330 [ 188.083537] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 188.084930] alloc_empty_file+0x72/0x170 [ 188.084948] alloc_file+0x5e/0x4d0 [ 188.084968] alloc_file_pseudo+0x189/0x280 [ 188.084987] ? alloc_file+0x4d0/0x4d0 [ 188.130804] x86/PAT: syz-executor.0:10924 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 188.134096] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 188.134115] ? kasan_check_write+0x14/0x20 [ 188.134134] __shmem_file_setup.part.0+0x108/0x2b0 [ 188.134151] shmem_file_setup+0x66/0x90 [ 188.139812] FAULT_INJECTION: forcing a failure. [ 188.139812] name failslab, interval 1, probability 0, space 0, times 0 [ 188.141762] __x64_sys_memfd_create+0x2a2/0x470 [ 188.141780] ? memfd_fcntl+0x1a50/0x1a50 [ 188.196982] ? do_syscall_64+0x26/0x620 [ 188.200958] ? lockdep_hardirqs_on+0x415/0x5d0 [ 188.205545] ? trace_hardirqs_on+0x67/0x220 [ 188.209870] do_syscall_64+0xfd/0x620 [ 188.213683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.218874] RIP: 0033:0x459879 [ 188.222067] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.240965] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:02:08 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:08 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, 0x0, 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 188.248676] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 188.255946] RDX: 0000000020018050 RSI: 0000000000000000 RDI: 00000000004be4f2 [ 188.263215] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 188.270491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d3c7286d4 [ 188.277756] R13: 00000000004be4f2 R14: 00000000004dff10 R15: 0000000000000004 [ 188.285045] CPU: 0 PID: 10924 Comm: syz-executor.0 Not tainted 4.19.69 #43 21:02:08 executing program 5 (fault-call:1 fault-nth:7): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 188.292078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.301449] Call Trace: [ 188.304062] dump_stack+0x172/0x1f0 [ 188.307712] should_fail.cold+0xa/0x1b [ 188.311623] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.316723] ? lock_downgrade+0x810/0x810 [ 188.320909] __should_failslab+0x121/0x190 [ 188.325136] should_failslab+0x9/0x14 [ 188.328939] kmem_cache_alloc+0x2ae/0x700 [ 188.333073] ? creds_are_invalid+0x59/0x150 [ 188.337494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.343022] ? selinux_is_enabled+0x43/0x60 [ 188.347341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.352865] ? creds_are_invalid+0x59/0x150 [ 188.357188] __delayacct_tsk_init+0x20/0x80 [ 188.361498] copy_process.part.0+0x350b/0x7a30 [ 188.366090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 188.371616] ? proc_fail_nth_write+0x9d/0x1e0 [ 188.376116] ? proc_cwd_link+0x1d0/0x1d0 [ 188.380165] ? __f_unlock_pos+0x19/0x20 [ 188.384154] ? find_held_lock+0x35/0x130 [ 188.388229] ? __cleanup_sighand+0x70/0x70 [ 188.392452] ? lock_downgrade+0x810/0x810 [ 188.396592] ? kasan_check_write+0x14/0x20 [ 188.400834] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 188.405771] _do_fork+0x257/0xfd0 [ 188.409236] ? fork_idle+0x1d0/0x1d0 [ 188.412948] ? fput+0x128/0x1a0 [ 188.416215] ? ksys_write+0x1f1/0x2d0 [ 188.420006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.424744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.429505] ? do_syscall_64+0x26/0x620 [ 188.433466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.438812] ? do_syscall_64+0x26/0x620 [ 188.442781] __x64_sys_clone+0xbf/0x150 [ 188.446743] do_syscall_64+0xfd/0x620 [ 188.450530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.455702] RIP: 0033:0x459879 [ 188.458882] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.477780] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 188.485481] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 188.492734] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 188.499990] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.507247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 188.514512] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/60, 0x3c, 0x1c0}]) 21:02:09 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:09 executing program 0 (fault-call:6 fault-nth:6): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 188.678992] x86/PAT: syz-executor.0:10930 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}, {{&(0x7f0000004540)=@hci, 0x80, &(0x7f00000046c0)=[{&(0x7f00000045c0)=""/130, 0x82}, {&(0x7f0000004680)=""/19, 0x13}], 0x2, &(0x7f0000004700)=""/208, 0xd0}, 0x5}], 0x8, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 188.800021] Dev loop4: unable to read RDB block 1 21:02:09 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) [ 188.827923] loop4: unable to read partition table [ 188.854564] loop4: partition table beyond EOD, truncated [ 188.877810] FAULT_INJECTION: forcing a failure. [ 188.877810] name failslab, interval 1, probability 0, space 0, times 0 [ 188.879845] x86/PAT: syz-executor.0:10953 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 188.891914] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 188.924865] CPU: 1 PID: 10940 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 188.931936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.932669] FAULT_INJECTION: forcing a failure. [ 188.932669] name failslab, interval 1, probability 0, space 0, times 0 [ 188.942804] Call Trace: [ 188.942835] dump_stack+0x172/0x1f0 [ 188.942853] should_fail.cold+0xa/0x1b [ 188.942867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.942881] ? lock_downgrade+0x810/0x810 [ 188.942903] __should_failslab+0x121/0x190 [ 188.942917] should_failslab+0x9/0x14 [ 188.942940] kmem_cache_alloc+0x2ae/0x700 [ 188.985574] ? lock_downgrade+0x810/0x810 [ 188.989734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.995274] ? check_preemption_disabled+0x48/0x290 [ 189.000298] getname_flags+0xd6/0x5b0 [ 189.004102] getname+0x1a/0x20 [ 189.007294] do_sys_open+0x2c9/0x550 [ 189.011012] ? filp_open+0x80/0x80 [ 189.014560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.019316] ? do_syscall_64+0x26/0x620 [ 189.023290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.028651] ? do_syscall_64+0x26/0x620 [ 189.032658] __x64_sys_open+0x7e/0xc0 [ 189.036465] do_syscall_64+0xfd/0x620 [ 189.040273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.045460] RIP: 0033:0x413761 [ 189.048653] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 189.067555] RSP: 002b:00007f1d3c7279f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 189.075275] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 0000000000413761 [ 189.082547] RDX: 00007f1d3c727baa RSI: 0000000000000002 RDI: 00007f1d3c727ba0 [ 189.089815] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 189.097083] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 21:02:09 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 189.104349] R13: 0000000000000005 R14: 00007f1d3c7286d4 R15: 0000000000000004 [ 189.111640] CPU: 0 PID: 10960 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 189.118776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.128148] Call Trace: [ 189.130773] dump_stack+0x172/0x1f0 [ 189.134429] should_fail.cold+0xa/0x1b [ 189.138338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.143460] ? lock_downgrade+0x810/0x810 [ 189.147641] __should_failslab+0x121/0x190 [ 189.151903] should_failslab+0x9/0x14 21:02:09 executing program 5 (fault-call:1 fault-nth:8): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000002e00)=""/132, 0x84}, {&(0x7f0000002ec0)=""/118, 0x76}, {&(0x7f0000002f40)=""/188, 0xbc}, {&(0x7f0000003000)=""/183, 0xb7}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)}, {&(0x7f0000004100)=""/217, 0xd9}, {&(0x7f0000004200)=""/206, 0xce}, {&(0x7f0000004300)=""/79, 0x4f}], 0x9, &(0x7f0000004440)=""/217, 0xd9}, 0x400}], 0x7, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 189.155729] kmem_cache_alloc_trace+0x2cc/0x760 [ 189.160423] ? lock_downgrade+0x810/0x810 [ 189.164608] ? __lock_is_held+0xb6/0x140 [ 189.168693] ? perf_trace_btrfs_find_cluster+0x6d8/0x780 [ 189.174163] alloc_fdtable+0x86/0x290 [ 189.177982] dup_fd+0x743/0xb30 [ 189.181260] copy_process.part.0+0x1e6a/0x7a30 [ 189.185837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.191358] ? proc_fail_nth_write+0x9d/0x1e0 [ 189.195838] ? proc_cwd_link+0x1d0/0x1d0 [ 189.199885] ? __f_unlock_pos+0x19/0x20 [ 189.203852] ? __cleanup_sighand+0x70/0x70 [ 189.208078] ? lock_downgrade+0x810/0x810 [ 189.212237] ? kasan_check_write+0x14/0x20 [ 189.216469] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 189.221308] _do_fork+0x257/0xfd0 [ 189.224754] ? fork_idle+0x1d0/0x1d0 [ 189.228457] ? fput+0x128/0x1a0 [ 189.231726] ? ksys_write+0x1f1/0x2d0 [ 189.235543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.240291] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.245042] ? do_syscall_64+0x26/0x620 [ 189.249016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.254423] ? do_syscall_64+0x26/0x620 [ 189.258404] __x64_sys_clone+0xbf/0x150 [ 189.262372] do_syscall_64+0xfd/0x620 [ 189.266172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.271352] RIP: 0033:0x459879 [ 189.274532] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.293420] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 189.301119] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 189.308376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 189.315643] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 189.322912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 189.330180] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 189.343283] x86/PAT: syz-executor.0:10960 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:09 executing program 0 (fault-call:6 fault-nth:7): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:02:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 189.514813] x86/PAT: syz-executor.0:10974 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 189.592706] FAULT_INJECTION: forcing a failure. [ 189.592706] name failslab, interval 1, probability 0, space 0, times 0 [ 189.623128] FAULT_INJECTION: forcing a failure. [ 189.623128] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.634987] CPU: 0 PID: 10968 Comm: syz-executor.5 Not tainted 4.19.69 #43 21:02:10 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 189.642018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.651389] Call Trace: [ 189.654010] dump_stack+0x172/0x1f0 [ 189.657671] should_fail.cold+0xa/0x1b [ 189.661590] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.666724] ? mark_held_locks+0x100/0x100 [ 189.670995] __alloc_pages_nodemask+0x1ee/0x750 [ 189.675700] ? __alloc_pages_slowpath+0x2870/0x2870 [ 189.680745] ? find_held_lock+0x35/0x130 [ 189.684846] cache_grow_begin+0x91/0x8c0 [ 189.688935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.694500] ? check_preemption_disabled+0x48/0x290 [ 189.699555] kmem_cache_alloc+0x63b/0x700 [ 189.703732] ? lock_downgrade+0x810/0x810 [ 189.707905] getname_flags+0xd6/0x5b0 [ 189.711730] getname+0x1a/0x20 [ 189.714935] do_sys_open+0x2c9/0x550 [ 189.718655] ? filp_open+0x80/0x80 [ 189.722202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.726960] ? do_syscall_64+0x26/0x620 [ 189.730934] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.736300] ? do_syscall_64+0x26/0x620 21:02:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002c80)=""/135, 0x87}], 0x1, &(0x7f0000002d80)=""/109, 0x6d}, 0x96f}], 0x6, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 189.740287] __x64_sys_open+0x7e/0xc0 [ 189.744094] do_syscall_64+0xfd/0x620 [ 189.747907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.753101] RIP: 0033:0x413761 [ 189.756297] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 189.775204] RSP: 002b:00007f1d3c7279f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 189.775220] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 0000000000413761 21:02:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 189.775229] RDX: 00007f1d3c727baa RSI: 0000000000000002 RDI: 00007f1d3c727ba0 [ 189.775238] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 189.775245] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 189.775253] R13: 0000000000000005 R14: 00007f1d3c7286d4 R15: 0000000000000004 [ 189.829016] CPU: 1 PID: 10979 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 189.836088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.845472] Call Trace: [ 189.848086] dump_stack+0x172/0x1f0 [ 189.851732] should_fail.cold+0xa/0x1b [ 189.855643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.861370] ? lock_downgrade+0x810/0x810 [ 189.865540] __should_failslab+0x121/0x190 [ 189.869790] should_failslab+0x9/0x14 [ 189.873600] kmem_cache_alloc_trace+0x2cc/0x760 [ 189.878286] ? lock_downgrade+0x810/0x810 [ 189.882459] ? __lock_is_held+0xb6/0x140 [ 189.886568] alloc_fdtable+0x86/0x290 [ 189.890387] dup_fd+0x743/0xb30 [ 189.893688] copy_process.part.0+0x1e6a/0x7a30 [ 189.898295] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.903849] ? proc_fail_nth_write+0x9d/0x1e0 [ 189.908359] ? proc_cwd_link+0x1d0/0x1d0 [ 189.912431] ? __f_unlock_pos+0x19/0x20 [ 189.916432] ? __cleanup_sighand+0x70/0x70 [ 189.920681] ? lock_downgrade+0x810/0x810 [ 189.924853] ? kasan_check_write+0x14/0x20 [ 189.929566] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 189.934449] _do_fork+0x257/0xfd0 [ 189.937920] ? fork_idle+0x1d0/0x1d0 [ 189.941646] ? fput+0x128/0x1a0 [ 189.944945] ? ksys_write+0x1f1/0x2d0 [ 189.948763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.953533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.958302] ? do_syscall_64+0x26/0x620 [ 189.962289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.967667] ? do_syscall_64+0x26/0x620 [ 189.971678] __x64_sys_clone+0xbf/0x150 [ 189.975697] do_syscall_64+0xfd/0x620 [ 189.979539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.984748] RIP: 0033:0x459879 [ 189.987955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.006874] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 190.014615] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 190.021911] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 190.029187] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 190.036448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 21:02:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) [ 190.043707] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 190.077951] x86/PAT: syz-executor.0:10979 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:10 executing program 0 (fault-call:6 fault-nth:8): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 190.105231] Dev loop4: unable to read RDB block 1 [ 190.117503] loop4: unable to read partition table [ 190.130154] loop5: p1 p3 [ 190.153693] loop4: partition table beyond EOD, truncated 21:02:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/18, 0x12}, {&(0x7f0000002b00)=""/64, 0x40}], 0x4, &(0x7f0000002b80)=""/235, 0xeb}, 0x9}], 0x5, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:10 executing program 5 (fault-call:1 fault-nth:9): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 190.219866] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 190.346416] x86/PAT: syz-executor.0:11011 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/41, 0x29}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}, 0x2}], 0x4, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 190.398838] FAULT_INJECTION: forcing a failure. [ 190.398838] name failslab, interval 1, probability 0, space 0, times 0 21:02:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) 21:02:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:02:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 190.529799] CPU: 0 PID: 11018 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 190.536878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.546254] Call Trace: [ 190.548871] dump_stack+0x172/0x1f0 [ 190.552710] should_fail.cold+0xa/0x1b [ 190.556626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 190.561751] ? lock_downgrade+0x810/0x810 [ 190.565939] __should_failslab+0x121/0x190 [ 190.566819] FAULT_INJECTION: forcing a failure. [ 190.566819] name failslab, interval 1, probability 0, space 0, times 0 [ 190.570198] should_failslab+0x9/0x14 [ 190.570217] kmem_cache_alloc_node_trace+0x274/0x720 [ 190.570229] ? alloc_fdtable+0x86/0x290 [ 190.570250] ? kasan_unpoison_shadow+0x35/0x50 [ 190.598880] __kmalloc_node+0x3d/0x80 [ 190.602704] kvmalloc_node+0x68/0x100 [ 190.606527] alloc_fdtable+0x142/0x290 [ 190.610436] dup_fd+0x743/0xb30 [ 190.613738] copy_process.part.0+0x1e6a/0x7a30 [ 190.613760] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 190.613779] ? proc_fail_nth_write+0x9d/0x1e0 [ 190.623889] ? proc_cwd_link+0x1d0/0x1d0 [ 190.632435] ? __f_unlock_pos+0x19/0x20 [ 190.636433] ? __cleanup_sighand+0x70/0x70 [ 190.640678] ? lock_downgrade+0x810/0x810 [ 190.644843] ? kasan_check_write+0x14/0x20 [ 190.649086] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 190.653942] _do_fork+0x257/0xfd0 [ 190.657405] ? fork_idle+0x1d0/0x1d0 [ 190.665060] ? fput+0x128/0x1a0 [ 190.668367] ? ksys_write+0x1f1/0x2d0 [ 190.672188] ? trace_hardirqs_on_thunk+0x1a/0x1c 21:02:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}, {{&(0x7f0000000640)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/98, 0x62}], 0x2, &(0x7f0000000800)=""/62, 0x3e}, 0x8}], 0x3, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 190.676961] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.681737] ? do_syscall_64+0x26/0x620 [ 190.685726] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.691112] ? do_syscall_64+0x26/0x620 [ 190.695118] __x64_sys_clone+0xbf/0x150 [ 190.699122] do_syscall_64+0xfd/0x620 [ 190.702944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.708141] RIP: 0033:0x459879 [ 190.711344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.730267] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 190.737991] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 190.745278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 190.752562] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 190.759838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 190.768636] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 190.777894] CPU: 1 PID: 11012 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 190.784941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.794308] Call Trace: [ 190.796929] dump_stack+0x172/0x1f0 [ 190.800593] should_fail.cold+0xa/0x1b [ 190.804499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 190.809627] ? lock_downgrade+0x810/0x810 [ 190.813806] __should_failslab+0x121/0x190 [ 190.818079] should_failslab+0x9/0x14 [ 190.821909] kmem_cache_alloc+0x2ae/0x700 [ 190.826078] ? __save_stack_trace+0x99/0x100 [ 190.830515] __alloc_file+0x27/0x330 [ 190.834235] alloc_empty_file+0x72/0x170 [ 190.838290] path_openat+0xef/0x45e0 [ 190.841992] ? __lock_acquire+0x6ee/0x49c0 [ 190.846223] ? getname+0x1a/0x20 [ 190.849581] ? do_sys_open+0x2c9/0x550 [ 190.853453] ? __x64_sys_open+0x7e/0xc0 [ 190.857434] ? do_syscall_64+0xfd/0x620 [ 190.861396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.866755] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 190.871430] ? __lock_is_held+0xb6/0x140 [ 190.875481] ? __alloc_fd+0x44d/0x560 [ 190.879269] do_filp_open+0x1a1/0x280 [ 190.883060] ? may_open_dev+0x100/0x100 [ 190.887036] ? lock_downgrade+0x810/0x810 [ 190.891172] ? kasan_check_read+0x11/0x20 [ 190.895347] ? do_raw_spin_unlock+0x57/0x270 [ 190.899751] ? _raw_spin_unlock+0x2d/0x50 [ 190.903888] ? __alloc_fd+0x44d/0x560 [ 190.907698] do_sys_open+0x3fe/0x550 [ 190.911401] ? filp_open+0x80/0x80 [ 190.914933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 190.919683] ? do_syscall_64+0x26/0x620 [ 190.923662] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.929014] ? do_syscall_64+0x26/0x620 [ 190.933002] __x64_sys_open+0x7e/0xc0 [ 190.936792] do_syscall_64+0xfd/0x620 [ 190.940585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.945769] RIP: 0033:0x413761 [ 190.948949] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 190.968014] RSP: 002b:00007f1d3c7279f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 21:02:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000800)=[{&(0x7f0000000100)=""/72, 0x48}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe6c, 0x0, 0x0, 0x800e00791) shutdown(r0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)=""/166, 0xa6}, {0x0}], 0x2}, 0x0) shutdown(r1, 0x0) 21:02:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 190.975734] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 0000000000413761 [ 190.983002] RDX: 00007f1d3c727baa RSI: 0000000000000002 RDI: 00007f1d3c727ba0 [ 190.990267] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 190.997527] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 191.004784] R13: 0000000000000005 R14: 00007f1d3c7286d4 R15: 0000000000000004 [ 191.040567] Dev loop4: unable to read RDB block 1 [ 191.052976] x86/PAT: syz-executor.0:11011 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 191.073564] loop4: unable to read partition table 21:02:11 executing program 0 (fault-call:6 fault-nth:9): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:11 executing program 5 (fault-call:1 fault-nth:10): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 191.099244] loop4: partition table beyond EOD, truncated [ 191.109068] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}, {{&(0x7f00000004c0)=@caif=@dbg, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/57, 0x39}, 0x6}], 0x2, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a00"/62, 0x3e, 0x1c0}]) 21:02:11 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x20000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 191.274896] x86/PAT: syz-executor.0:11056 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 191.360416] FAULT_INJECTION: forcing a failure. [ 191.360416] name failslab, interval 1, probability 0, space 0, times 0 [ 191.372398] FAULT_INJECTION: forcing a failure. [ 191.372398] name failslab, interval 1, probability 0, space 0, times 0 [ 191.391637] CPU: 0 PID: 11056 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 191.398712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.408087] Call Trace: [ 191.410709] dump_stack+0x172/0x1f0 [ 191.414369] should_fail.cold+0xa/0x1b [ 191.418338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 191.423480] ? lock_downgrade+0x810/0x810 [ 191.427670] __should_failslab+0x121/0x190 [ 191.431936] should_failslab+0x9/0x14 [ 191.435748] kmem_cache_alloc+0x2ae/0x700 [ 191.439904] ? dup_fd+0x5c1/0xb30 [ 191.443381] copy_fs_struct+0x43/0x2d0 [ 191.447277] copy_process.part.0+0x377d/0x7a30 [ 191.451875] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 191.457417] ? proc_fail_nth_write+0x9d/0x1e0 [ 191.461918] ? proc_cwd_link+0x1d0/0x1d0 [ 191.465996] ? __f_unlock_pos+0x19/0x20 [ 191.470000] ? __cleanup_sighand+0x70/0x70 [ 191.474248] ? lock_downgrade+0x810/0x810 [ 191.478412] ? kasan_check_write+0x14/0x20 [ 191.482658] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 191.487516] _do_fork+0x257/0xfd0 [ 191.490979] ? fork_idle+0x1d0/0x1d0 [ 191.494694] ? fput+0x128/0x1a0 [ 191.497984] ? ksys_write+0x1f1/0x2d0 [ 191.501801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.506560] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.511321] ? do_syscall_64+0x26/0x620 [ 191.515313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.520689] ? do_syscall_64+0x26/0x620 [ 191.524674] __x64_sys_clone+0xbf/0x150 [ 191.528660] do_syscall_64+0xfd/0x620 [ 191.532469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.537659] RIP: 0033:0x459879 [ 191.540852] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.559757] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 191.567472] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 191.574744] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 191.582031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.589316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 191.596594] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 191.603889] CPU: 1 PID: 11053 Comm: syz-executor.5 Not tainted 4.19.69 #43 21:02:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 191.610931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.620299] Call Trace: [ 191.622892] dump_stack+0x172/0x1f0 [ 191.626538] should_fail.cold+0xa/0x1b [ 191.630437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 191.635535] ? lock_downgrade+0x810/0x810 [ 191.639709] __should_failslab+0x121/0x190 [ 191.643960] should_failslab+0x9/0x14 [ 191.647751] kmem_cache_alloc_trace+0x2cc/0x760 [ 191.652410] ? __lockdep_init_map+0x10c/0x5b0 [ 191.656894] ? loop_info64_to_compat+0x6d0/0x6d0 [ 191.661641] __kthread_create_on_node+0xf2/0x460 [ 191.666384] ? lock_acquire+0x16f/0x3f0 [ 191.670350] ? __kthread_parkme+0x1b0/0x1b0 [ 191.674664] ? lo_ioctl+0x1c4/0x20e0 [ 191.678366] ? lock_downgrade+0x810/0x810 [ 191.682526] ? mutex_trylock+0x1e0/0x1e0 [ 191.686596] ? loop_info64_to_compat+0x6d0/0x6d0 [ 191.691362] kthread_create_on_node+0xbb/0xf0 [ 191.695855] ? __kthread_create_on_node+0x460/0x460 [ 191.700860] ? __lockdep_init_map+0x10c/0x5b0 [ 191.705363] ? __lockdep_init_map+0x10c/0x5b0 [ 191.709857] lo_ioctl+0xaf2/0x20e0 [ 191.713388] ? lo_rw_aio+0x1470/0x1470 [ 191.717280] blkdev_ioctl+0xc38/0x1ab6 [ 191.728334] ? blkpg_ioctl+0xa90/0xa90 [ 191.732220] ? find_held_lock+0x35/0x130 [ 191.736271] ? debug_check_no_obj_freed+0x200/0x464 [ 191.741279] ? __fget+0x340/0x540 [ 191.744730] block_ioctl+0xee/0x130 [ 191.748345] ? blkdev_fallocate+0x410/0x410 [ 191.752658] do_vfs_ioctl+0xd5f/0x1380 [ 191.756533] ? selinux_file_ioctl+0x46f/0x5e0 [ 191.761014] ? selinux_file_ioctl+0x125/0x5e0 [ 191.765498] ? ioctl_preallocate+0x210/0x210 [ 191.769922] ? selinux_file_mprotect+0x620/0x620 [ 191.774671] ? iterate_fd+0x360/0x360 [ 191.778484] ? do_sys_open+0x31d/0x550 [ 191.782382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.787919] ? security_file_ioctl+0x8d/0xc0 [ 191.792332] ksys_ioctl+0xab/0xd0 [ 191.795776] __x64_sys_ioctl+0x73/0xb0 [ 191.799660] do_syscall_64+0xfd/0x620 [ 191.803454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.808631] RIP: 0033:0x4596e7 [ 191.811817] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.830715] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.838440] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 00000000004596e7 [ 191.845711] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 191.852977] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a 21:02:12 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x20000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 21:02:12 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 191.860237] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 191.867494] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000004 [ 191.888978] x86/PAT: syz-executor.0:11056 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 191.936772] Dev loop4: unable to read RDB block 1 21:02:12 executing program 0 (fault-call:6 fault-nth:10): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 191.957379] loop4: unable to read partition table 21:02:12 executing program 5 (fault-call:1 fault-nth:11): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 191.987769] loop4: partition table beyond EOD, truncated [ 191.999428] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:12 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x20000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 21:02:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40), 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:12 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 192.096131] x86/PAT: syz-executor.0:11088 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) [ 192.222051] FAULT_INJECTION: forcing a failure. [ 192.222051] name failslab, interval 1, probability 0, space 0, times 0 21:02:12 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x20000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 192.262576] FAULT_INJECTION: forcing a failure. [ 192.262576] name failslab, interval 1, probability 0, space 0, times 0 [ 192.275939] CPU: 0 PID: 11102 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 192.283007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.292378] Call Trace: [ 192.295003] dump_stack+0x172/0x1f0 [ 192.298923] should_fail.cold+0xa/0x1b [ 192.302844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.307973] ? lock_downgrade+0x810/0x810 [ 192.312147] __should_failslab+0x121/0x190 [ 192.316397] should_failslab+0x9/0x14 [ 192.320206] kmem_cache_alloc+0x2ae/0x700 [ 192.324361] ? do_raw_spin_unlock+0x57/0x270 [ 192.328780] ? _raw_spin_unlock+0x2d/0x50 [ 192.332951] copy_process.part.0+0x1fd7/0x7a30 [ 192.337545] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 192.343090] ? proc_fail_nth_write+0x9d/0x1e0 [ 192.347590] ? proc_cwd_link+0x1d0/0x1d0 [ 192.351680] ? __f_unlock_pos+0x19/0x20 [ 192.355670] ? __cleanup_sighand+0x70/0x70 [ 192.359911] ? lock_downgrade+0x810/0x810 [ 192.364078] ? kasan_check_write+0x14/0x20 [ 192.368345] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 192.373197] _do_fork+0x257/0xfd0 [ 192.376656] ? fork_idle+0x1d0/0x1d0 [ 192.380390] ? fput+0x128/0x1a0 [ 192.383670] ? ksys_write+0x1f1/0x2d0 [ 192.387478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.392235] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.396993] ? do_syscall_64+0x26/0x620 [ 192.400974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.406338] ? do_syscall_64+0x26/0x620 [ 192.410323] __x64_sys_clone+0xbf/0x150 [ 192.414303] do_syscall_64+0xfd/0x620 [ 192.418110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.423300] RIP: 0033:0x459879 [ 192.426492] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.445398] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 192.453117] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 21:02:12 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40), 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 192.460390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 192.467658] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 192.474926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 192.482199] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 192.489493] CPU: 1 PID: 11090 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 192.496531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.505890] Call Trace: [ 192.506719] x86/PAT: syz-executor.0:11102 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 192.508487] dump_stack+0x172/0x1f0 [ 192.508507] should_fail.cold+0xa/0x1b [ 192.524703] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.529822] ? lock_downgrade+0x810/0x810 [ 192.533984] __should_failslab+0x121/0x190 [ 192.538212] should_failslab+0x9/0x14 [ 192.542002] kmem_cache_alloc_trace+0x2cc/0x760 [ 192.546659] ? __lockdep_init_map+0x10c/0x5b0 [ 192.551143] ? loop_info64_to_compat+0x6d0/0x6d0 [ 192.555890] __kthread_create_on_node+0xf2/0x460 [ 192.560637] ? lock_acquire+0x16f/0x3f0 [ 192.564608] ? __kthread_parkme+0x1b0/0x1b0 [ 192.568948] ? lo_ioctl+0x1c4/0x20e0 [ 192.572653] ? lock_downgrade+0x810/0x810 [ 192.576811] ? mutex_trylock+0x1e0/0x1e0 [ 192.580871] ? loop_info64_to_compat+0x6d0/0x6d0 [ 192.585618] kthread_create_on_node+0xbb/0xf0 [ 192.590100] ? __kthread_create_on_node+0x460/0x460 [ 192.595125] ? __lockdep_init_map+0x10c/0x5b0 [ 192.599623] ? __lockdep_init_map+0x10c/0x5b0 [ 192.604111] lo_ioctl+0xaf2/0x20e0 [ 192.607638] ? lo_rw_aio+0x1470/0x1470 [ 192.611513] blkdev_ioctl+0xc38/0x1ab6 [ 192.615394] ? blkpg_ioctl+0xa90/0xa90 [ 192.619287] ? find_held_lock+0x35/0x130 [ 192.623347] ? debug_check_no_obj_freed+0x200/0x464 [ 192.628358] ? __fget+0x340/0x540 [ 192.631809] block_ioctl+0xee/0x130 [ 192.635437] ? blkdev_fallocate+0x410/0x410 [ 192.639746] do_vfs_ioctl+0xd5f/0x1380 [ 192.643618] ? selinux_file_ioctl+0x46f/0x5e0 [ 192.648101] ? selinux_file_ioctl+0x125/0x5e0 [ 192.652595] ? ioctl_preallocate+0x210/0x210 [ 192.656989] ? selinux_file_mprotect+0x620/0x620 [ 192.661754] ? iterate_fd+0x360/0x360 [ 192.665555] ? do_sys_open+0x31d/0x550 [ 192.669446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.674973] ? security_file_ioctl+0x8d/0xc0 [ 192.679370] ksys_ioctl+0xab/0xd0 [ 192.682810] __x64_sys_ioctl+0x73/0xb0 [ 192.686693] do_syscall_64+0xfd/0x620 [ 192.690484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.695660] RIP: 0033:0x4596e7 21:02:13 executing program 0 (fault-call:6 fault-nth:11): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 192.698849] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.717755] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.725453] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 00000000004596e7 [ 192.732718] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 192.739976] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 192.747231] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 192.754497] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000004 [ 192.815256] Dev loop4: unable to read RDB block 1 [ 192.831987] loop4: unable to read partition table [ 192.878449] loop4: partition table beyond EOD, truncated [ 192.895196] x86/PAT: syz-executor.0:11120 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 192.912604] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 21:02:13 executing program 5 (fault-call:1 fault-nth:12): openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:13 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x20000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 21:02:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40), 0x0, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 192.930168] FAULT_INJECTION: forcing a failure. [ 192.930168] name failslab, interval 1, probability 0, space 0, times 0 [ 192.956110] CPU: 0 PID: 11120 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 192.963167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.972520] Call Trace: [ 192.975125] dump_stack+0x172/0x1f0 [ 192.978760] should_fail.cold+0xa/0x1b [ 192.982642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.987739] ? lock_downgrade+0x810/0x810 [ 192.991882] __should_failslab+0x121/0x190 [ 192.996130] should_failslab+0x9/0x14 [ 192.999945] kmem_cache_alloc+0x2ae/0x700 [ 193.004112] ? trace_hardirqs_on+0x67/0x220 [ 193.008432] ? kasan_check_read+0x11/0x20 [ 193.012684] copy_process.part.0+0x2139/0x7a30 [ 193.017276] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 193.022806] ? proc_fail_nth_write+0x9d/0x1e0 [ 193.027288] ? proc_cwd_link+0x1d0/0x1d0 [ 193.031338] ? __f_unlock_pos+0x19/0x20 [ 193.035330] ? __cleanup_sighand+0x70/0x70 [ 193.039573] ? lock_downgrade+0x810/0x810 [ 193.043714] ? kasan_check_write+0x14/0x20 [ 193.047941] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 193.052859] _do_fork+0x257/0xfd0 [ 193.056322] ? fork_idle+0x1d0/0x1d0 [ 193.060034] ? fput+0x128/0x1a0 [ 193.063303] ? ksys_write+0x1f1/0x2d0 [ 193.067094] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.071859] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.076630] ? do_syscall_64+0x26/0x620 [ 193.080608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.085965] ? do_syscall_64+0x26/0x620 [ 193.089929] __x64_sys_clone+0xbf/0x150 [ 193.093921] do_syscall_64+0xfd/0x620 [ 193.097727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.102905] RIP: 0033:0x459879 [ 193.106100] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.125001] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 193.132713] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 193.139973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 193.147231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.154494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 193.161761] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 193.191552] x86/PAT: syz-executor.0:11120 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:13 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:13 executing program 0 (fault-call:6 fault-nth:12): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x80000000000002, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 21:02:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 193.405123] Dev loop4: unable to read RDB block 1 [ 193.411332] loop4: unable to read partition table [ 193.431906] loop4: partition table beyond EOD, truncated [ 193.447748] FAULT_INJECTION: forcing a failure. [ 193.447748] name failslab, interval 1, probability 0, space 0, times 0 21:02:14 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 193.476053] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 193.486564] CPU: 1 PID: 11128 Comm: syz-executor.5 Not tainted 4.19.69 #43 [ 193.493630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.503000] Call Trace: [ 193.505615] dump_stack+0x172/0x1f0 [ 193.509260] should_fail.cold+0xa/0x1b [ 193.513040] x86/PAT: syz-executor.0:11150 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 193.513158] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.524138] FAULT_INJECTION: forcing a failure. [ 193.524138] name failslab, interval 1, probability 0, space 0, times 0 [ 193.526920] ? lock_downgrade+0x810/0x810 [ 193.526946] __should_failslab+0x121/0x190 [ 193.526970] should_failslab+0x9/0x14 [ 193.550388] kmem_cache_alloc+0x2ae/0x700 [ 193.554540] ? __lock_acquire+0x6ee/0x49c0 [ 193.558789] __kernfs_new_node+0xef/0x680 [ 193.562968] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 193.567728] ? __lock_acquire+0x6ee/0x49c0 [ 193.571994] ? __lock_is_held+0xb6/0x140 [ 193.576067] kernfs_new_node+0x99/0x130 [ 193.580049] kernfs_create_dir_ns+0x52/0x160 [ 193.584471] internal_create_group+0x1cb/0xc30 [ 193.589055] ? bd_set_size+0x89/0xb0 [ 193.592776] ? remove_files.isra.0+0x190/0x190 [ 193.597377] sysfs_create_group+0x20/0x30 [ 193.601529] lo_ioctl+0xf8f/0x20e0 [ 193.605076] ? lo_rw_aio+0x1470/0x1470 [ 193.608969] blkdev_ioctl+0xc38/0x1ab6 [ 193.612856] ? blkpg_ioctl+0xa90/0xa90 [ 193.616745] ? find_held_lock+0x35/0x130 [ 193.620812] ? debug_check_no_obj_freed+0x200/0x464 [ 193.625830] ? __fget+0x340/0x540 [ 193.629293] block_ioctl+0xee/0x130 [ 193.632924] ? blkdev_fallocate+0x410/0x410 [ 193.637249] do_vfs_ioctl+0xd5f/0x1380 [ 193.641136] ? selinux_file_ioctl+0x46f/0x5e0 [ 193.645638] ? selinux_file_ioctl+0x125/0x5e0 [ 193.650144] ? ioctl_preallocate+0x210/0x210 [ 193.654562] ? selinux_file_mprotect+0x620/0x620 [ 193.659336] ? iterate_fd+0x360/0x360 [ 193.663141] ? do_sys_open+0x31d/0x550 [ 193.667038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.672581] ? security_file_ioctl+0x8d/0xc0 [ 193.677001] ksys_ioctl+0xab/0xd0 [ 193.680457] __x64_sys_ioctl+0x73/0xb0 [ 193.684350] do_syscall_64+0xfd/0x620 [ 193.688156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.693345] RIP: 0033:0x4596e7 [ 193.696545] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.715443] RSP: 002b:00007f1d3c7279f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.723153] RAX: ffffffffffffffda RBX: 00007f1d3c7286d4 RCX: 00000000004596e7 [ 193.730423] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 193.737692] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 193.744964] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 193.752230] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000004 [ 193.759526] CPU: 0 PID: 11150 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 193.766553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.766559] Call Trace: [ 193.766584] dump_stack+0x172/0x1f0 [ 193.766601] should_fail.cold+0xa/0x1b [ 193.766618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.766631] ? lock_downgrade+0x810/0x810 [ 193.766653] __should_failslab+0x121/0x190 [ 193.778578] should_failslab+0x9/0x14 [ 193.778593] kmem_cache_alloc+0x2ae/0x700 [ 193.778609] ? trace_hardirqs_on+0x67/0x220 [ 193.778625] ? kasan_check_read+0x11/0x20 [ 193.816793] copy_process.part.0+0x2139/0x7a30 [ 193.821417] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 193.826987] ? proc_fail_nth_write+0x9d/0x1e0 [ 193.831480] ? proc_cwd_link+0x1d0/0x1d0 [ 193.835558] ? __f_unlock_pos+0x19/0x20 [ 193.839530] ? __cleanup_sighand+0x70/0x70 [ 193.843770] ? lock_downgrade+0x810/0x810 [ 193.847935] ? kasan_check_write+0x14/0x20 [ 193.852165] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 193.857010] _do_fork+0x257/0xfd0 [ 193.860455] ? fork_idle+0x1d0/0x1d0 [ 193.864157] ? fput+0x128/0x1a0 [ 193.867425] ? ksys_write+0x1f1/0x2d0 [ 193.871215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.875959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.880703] ? do_syscall_64+0x26/0x620 [ 193.884667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.890024] ? do_syscall_64+0x26/0x620 [ 193.893998] __x64_sys_clone+0xbf/0x150 [ 193.897965] do_syscall_64+0xfd/0x620 [ 193.901761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.906944] RIP: 0033:0x459879 [ 193.910138] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.929030] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 193.936735] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 193.943997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 193.951273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.958541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 193.965820] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(&(0x7f0000000240)='user\x00', 0x0, &(0x7f00000002c0)="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", 0xf58, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000400)={'U+', 0x8}, 0x28, 0x0) fremovexattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="62747266732e637075736574726d30c26d696d655f747970655d23"]) 21:02:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 193.986205] x86/PAT: syz-executor.0:11150 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 194.015686] loop5: p1 p3 21:02:14 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:14 executing program 0 (fault-call:6 fault-nth:13): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055", 0x3f, 0x1c0}]) 21:02:14 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 194.208740] x86/PAT: syz-executor.0:11171 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 194.261108] FAULT_INJECTION: forcing a failure. [ 194.261108] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.281596] Dev loop4: unable to read RDB block 1 [ 194.317788] CPU: 0 PID: 11171 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 194.324896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.334270] Call Trace: [ 194.336888] dump_stack+0x172/0x1f0 [ 194.340547] should_fail.cold+0xa/0x1b [ 194.342638] loop4: unable to read partition table [ 194.344462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 194.344483] ? __might_sleep+0x95/0x190 [ 194.344505] __alloc_pages_nodemask+0x1ee/0x750 [ 194.344525] ? __alloc_pages_slowpath+0x2870/0x2870 [ 194.344549] ? find_held_lock+0x35/0x130 [ 194.344567] ? percpu_ref_put_many+0x94/0x190 [ 194.344580] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 194.344598] alloc_pages_current+0x107/0x210 [ 194.354119] loop4: partition table beyond EOD, [ 194.354641] __get_free_pages+0xc/0x40 [ 194.354664] pgd_alloc+0x8b/0x3f0 [ 194.387996] truncated [ 194.391466] ? pgd_page_get_mm+0x40/0x40 [ 194.391488] ? __lockdep_init_map+0x10c/0x5b0 [ 194.409818] ? __lockdep_init_map+0x10c/0x5b0 [ 194.414339] mm_init+0x59e/0x9d0 [ 194.416467] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 194.417714] copy_process.part.0+0x2b3d/0x7a30 [ 194.417739] ? proc_fail_nth_write+0x9d/0x1e0 [ 194.417771] ? __cleanup_sighand+0x70/0x70 [ 194.438341] ? lock_downgrade+0x810/0x810 [ 194.442528] ? kasan_check_write+0x14/0x20 [ 194.446793] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 194.451655] _do_fork+0x257/0xfd0 [ 194.451675] ? fork_idle+0x1d0/0x1d0 [ 194.451695] ? fput+0x128/0x1a0 [ 194.462127] ? ksys_write+0x1f1/0x2d0 [ 194.462150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.462168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.475467] ? do_syscall_64+0x26/0x620 [ 194.479463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.484854] ? do_syscall_64+0x26/0x620 [ 194.488840] __x64_sys_clone+0xbf/0x150 [ 194.492823] do_syscall_64+0xfd/0x620 [ 194.496633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.501822] RIP: 0033:0x459879 21:02:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/180, 0xb4}, {&(0x7f0000000300)=""/195, 0xc3}], 0x5, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 194.505014] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.523925] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 194.531667] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 194.538933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 194.546202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.553469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 194.560747] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 194.578670] x86/PAT: syz-executor.0:11171 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:15 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:15 executing program 0 (fault-call:6 fault-nth:14): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) [ 194.610919] audit: type=1400 audit(1567112535.114:59): avc: denied { setattr } for pid=11161 comm="syz-executor.2" name="pagemap" dev="proc" ino=41133 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 194.668347] loop5: p1 p3 21:02:15 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000480)=""/20, 0x14}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 194.805534] x86/PAT: syz-executor.0:11198 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:15 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 194.860398] FAULT_INJECTION: forcing a failure. [ 194.860398] name failslab, interval 1, probability 0, space 0, times 0 [ 194.879417] CPU: 0 PID: 11198 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 194.886481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.895966] Call Trace: [ 194.898586] dump_stack+0x172/0x1f0 [ 194.902423] should_fail.cold+0xa/0x1b [ 194.906341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 194.911459] ? lock_downgrade+0x810/0x810 [ 194.915614] __should_failslab+0x121/0x190 [ 194.919861] should_failslab+0x9/0x14 [ 194.923659] kmem_cache_alloc+0x2ae/0x700 [ 194.927802] ? get_mm_exe_file+0x289/0x3e0 [ 194.932039] ? trace_event_raw_event_task_newtask+0x440/0x440 [ 194.938971] __khugepaged_enter+0x3b/0x390 [ 194.943226] copy_process.part.0+0x7299/0x7a30 [ 194.947833] ? proc_fail_nth_write+0x9d/0x1e0 [ 194.952335] ? __cleanup_sighand+0x70/0x70 [ 194.956562] ? lock_downgrade+0x810/0x810 [ 194.960710] ? kasan_check_write+0x14/0x20 [ 194.964948] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 194.969805] _do_fork+0x257/0xfd0 [ 194.973265] ? fork_idle+0x1d0/0x1d0 [ 194.976978] ? fput+0x128/0x1a0 [ 194.980249] ? ksys_write+0x1f1/0x2d0 [ 194.984045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.988799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.993561] ? do_syscall_64+0x26/0x620 [ 194.997542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.002932] ? do_syscall_64+0x26/0x620 [ 195.006903] __x64_sys_clone+0xbf/0x150 [ 195.010889] do_syscall_64+0xfd/0x620 [ 195.014683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.019860] RIP: 0033:0x459879 [ 195.023043] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.041951] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 195.049655] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 21:02:15 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 195.056915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 195.064187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.071466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 195.078754] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 195.094921] x86/PAT: syz-executor.0:11198 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:15 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x2, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:15 executing program 0 (fault-call:6 fault-nth:15): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:15 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:15 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}, 0xfffffffffffffe01}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 195.387275] x86/PAT: syz-executor.0:11231 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40}]) 21:02:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:16 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 195.504757] FAULT_INJECTION: forcing a failure. [ 195.504757] name failslab, interval 1, probability 0, space 0, times 0 [ 195.517109] CPU: 1 PID: 11244 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 195.524176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.533550] Call Trace: [ 195.536175] dump_stack+0x172/0x1f0 [ 195.539835] should_fail.cold+0xa/0x1b [ 195.543757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 195.548892] ? lock_downgrade+0x810/0x810 [ 195.553074] __should_failslab+0x121/0x190 [ 195.553092] should_failslab+0x9/0x14 [ 195.553110] kmem_cache_alloc+0x2ae/0x700 [ 195.561141] ? lockdep_init_map+0x9/0x10 [ 195.561158] ? debug_mutex_init+0x2d/0x60 [ 195.561182] copy_process.part.0+0x2ad6/0x7a30 [ 195.578085] ? proc_fail_nth_write+0x9d/0x1e0 [ 195.582591] ? __cleanup_sighand+0x70/0x70 [ 195.586819] ? lock_downgrade+0x810/0x810 [ 195.590971] ? kasan_check_write+0x14/0x20 [ 195.595194] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 195.600031] _do_fork+0x257/0xfd0 [ 195.603474] ? fork_idle+0x1d0/0x1d0 [ 195.607181] ? fput+0x128/0x1a0 [ 195.610454] ? ksys_write+0x1f1/0x2d0 [ 195.614248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.618991] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.623748] ? do_syscall_64+0x26/0x620 [ 195.627713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.633076] ? do_syscall_64+0x26/0x620 [ 195.637044] __x64_sys_clone+0xbf/0x150 [ 195.641024] do_syscall_64+0xfd/0x620 [ 195.644816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.649997] RIP: 0033:0x459879 [ 195.653184] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.672082] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 195.679783] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 195.687049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 195.694304] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 195.701560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 195.708814] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:16 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 195.975044] loop5: p1 p3 [ 195.981954] x86/PAT: syz-executor.0:11244 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:16 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x3, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:16 executing program 4: 21:02:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:16 executing program 0 (fault-call:6 fault-nth:16): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:16 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:16 executing program 4: 21:02:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:16 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 196.202220] x86/PAT: syz-executor.0:11282 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:16 executing program 4: 21:02:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 196.288960] FAULT_INJECTION: forcing a failure. [ 196.288960] name failslab, interval 1, probability 0, space 0, times 0 [ 196.366794] CPU: 0 PID: 11291 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 196.373866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.383239] Call Trace: [ 196.385859] dump_stack+0x172/0x1f0 [ 196.389515] should_fail.cold+0xa/0x1b [ 196.393438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 196.398572] ? lock_downgrade+0x810/0x810 [ 196.402763] __should_failslab+0x121/0x190 [ 196.407123] should_failslab+0x9/0x14 [ 196.410973] kmem_cache_alloc+0x2ae/0x700 21:02:16 executing program 4: [ 196.415136] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 196.420162] ? __vm_enough_memory+0x324/0x5a0 [ 196.424677] vm_area_dup+0x21/0x170 [ 196.428315] copy_process.part.0+0x3407/0x7a30 [ 196.432937] ? __cleanup_sighand+0x70/0x70 [ 196.437177] ? lock_downgrade+0x810/0x810 [ 196.441353] ? kasan_check_write+0x14/0x20 [ 196.445621] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 196.450497] _do_fork+0x257/0xfd0 [ 196.453972] ? fork_idle+0x1d0/0x1d0 [ 196.457724] ? fput+0x128/0x1a0 [ 196.461034] ? ksys_write+0x1f1/0x2d0 [ 196.464864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 196.469646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 196.474413] ? do_syscall_64+0x26/0x620 [ 196.478403] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.483784] ? do_syscall_64+0x26/0x620 [ 196.487782] __x64_sys_clone+0xbf/0x150 [ 196.491783] do_syscall_64+0xfd/0x620 [ 196.495610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.501146] RIP: 0033:0x459879 [ 196.501164] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.501173] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 196.501190] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 196.538690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 196.545976] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 196.553265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 196.560713] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 196.594166] x86/PAT: syz-executor.0:11291 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 196.600061] loop5: p1 p3 21:02:17 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x4, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:17 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:17 executing program 4: 21:02:17 executing program 0 (fault-call:6 fault-nth:17): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:17 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:17 executing program 4: [ 196.781062] x86/PAT: syz-executor.0:11321 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 196.843181] FAULT_INJECTION: forcing a failure. [ 196.843181] name failslab, interval 1, probability 0, space 0, times 0 21:02:17 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:17 executing program 4: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2000) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e733) [ 196.985930] loop5: p1 p3 [ 197.001745] CPU: 1 PID: 11331 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 197.008985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.008993] Call Trace: [ 197.009025] dump_stack+0x172/0x1f0 [ 197.009054] should_fail.cold+0xa/0x1b [ 197.009074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 197.009091] ? lock_downgrade+0x810/0x810 [ 197.009114] __should_failslab+0x121/0x190 [ 197.009135] should_failslab+0x9/0x14 [ 197.045917] kmem_cache_alloc+0x2ae/0x700 [ 197.050150] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 197.055164] ? __vm_enough_memory+0x324/0x5a0 [ 197.059655] vm_area_dup+0x21/0x170 [ 197.063448] copy_process.part.0+0x3407/0x7a30 [ 197.068062] ? __cleanup_sighand+0x70/0x70 [ 197.072389] ? lock_downgrade+0x810/0x810 [ 197.076531] ? kasan_check_write+0x14/0x20 [ 197.080756] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 197.085593] _do_fork+0x257/0xfd0 [ 197.089047] ? fork_idle+0x1d0/0x1d0 [ 197.092747] ? fput+0x128/0x1a0 [ 197.096018] ? ksys_write+0x1f1/0x2d0 [ 197.099815] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.104561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.109303] ? do_syscall_64+0x26/0x620 [ 197.113278] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.118632] ? do_syscall_64+0x26/0x620 [ 197.122598] __x64_sys_clone+0xbf/0x150 [ 197.126568] do_syscall_64+0xfd/0x620 [ 197.130358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.135534] RIP: 0033:0x459879 [ 197.138717] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.157604] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 197.165309] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 197.172577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 197.179845] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 197.187109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 197.194375] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:17 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 197.265730] x86/PAT: syz-executor.0:11331 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:17 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x5, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:17 executing program 0 (fault-call:6 fault-nth:18): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:02:18 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 197.572606] x86/PAT: syz-executor.0:11365 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 197.595632] FAULT_INJECTION: forcing a failure. [ 197.595632] name failslab, interval 1, probability 0, space 0, times 0 [ 197.614120] CPU: 0 PID: 11365 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 197.621183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.630556] Call Trace: [ 197.633175] dump_stack+0x172/0x1f0 [ 197.636837] should_fail.cold+0xa/0x1b [ 197.640766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 197.645897] ? __lock_is_held+0xb6/0x140 [ 197.649981] ? __lock_is_held+0xb6/0x140 [ 197.654076] __should_failslab+0x121/0x190 [ 197.658333] should_failslab+0x9/0x14 [ 197.662152] kmem_cache_alloc+0x47/0x700 [ 197.666246] ? anon_vma_chain_link+0x154/0x1c0 [ 197.670855] anon_vma_clone+0xde/0x480 [ 197.674770] anon_vma_fork+0x8f/0x4a0 [ 197.678577] ? dup_userfaultfd+0x15e/0x6c0 [ 197.682819] ? memcpy+0x46/0x50 [ 197.686116] copy_process.part.0+0x34e5/0x7a30 [ 197.690723] ? __cleanup_sighand+0x70/0x70 [ 197.694960] ? lock_downgrade+0x810/0x810 [ 197.699129] ? kasan_check_write+0x14/0x20 [ 197.703373] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 197.708211] _do_fork+0x257/0xfd0 [ 197.711685] ? fork_idle+0x1d0/0x1d0 [ 197.715408] ? fput+0x128/0x1a0 [ 197.718685] ? ksys_write+0x1f1/0x2d0 [ 197.722476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.727240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.732012] ? do_syscall_64+0x26/0x620 [ 197.735999] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.741358] ? do_syscall_64+0x26/0x620 [ 197.745340] __x64_sys_clone+0xbf/0x150 [ 197.749315] do_syscall_64+0xfd/0x620 [ 197.753113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.758297] RIP: 0033:0x459879 [ 197.761487] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.780465] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 197.788194] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 197.795468] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 197.802742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.810001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 21:02:18 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 197.817258] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 197.848141] loop5: p1 p3 21:02:18 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x6, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x80000000000002, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) 21:02:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:18 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 198.005489] x86/PAT: syz-executor.0:11382 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:18 executing program 0 (fault-call:6 fault-nth:19): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) read$FUSE(r0, &(0x7f0000000280), 0x1000) 21:02:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 198.242275] x86/PAT: syz-executor.0:11407 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 198.272646] FAULT_INJECTION: forcing a failure. [ 198.272646] name failslab, interval 1, probability 0, space 0, times 0 [ 198.295679] CPU: 1 PID: 11407 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 198.302749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.312119] Call Trace: [ 198.314741] dump_stack+0x172/0x1f0 [ 198.318458] should_fail.cold+0xa/0x1b [ 198.322353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 198.327458] ? __lock_is_held+0xb6/0x140 [ 198.331537] __should_failslab+0x121/0x190 [ 198.335797] should_failslab+0x9/0x14 [ 198.339587] kmem_cache_alloc+0x47/0x700 [ 198.343681] ? anon_vma_chain_link+0x154/0x1c0 [ 198.348288] anon_vma_clone+0xde/0x480 [ 198.352175] anon_vma_fork+0x8f/0x4a0 [ 198.355964] ? dup_userfaultfd+0x15e/0x6c0 [ 198.360187] ? memcpy+0x46/0x50 [ 198.363536] copy_process.part.0+0x34e5/0x7a30 [ 198.368328] ? __cleanup_sighand+0x70/0x70 [ 198.372562] ? lock_downgrade+0x810/0x810 [ 198.376720] ? kasan_check_write+0x14/0x20 [ 198.380967] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 198.385801] _do_fork+0x257/0xfd0 [ 198.389244] ? fork_idle+0x1d0/0x1d0 [ 198.392948] ? fput+0x128/0x1a0 [ 198.396214] ? ksys_write+0x1f1/0x2d0 [ 198.400004] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.404749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.409498] ? do_syscall_64+0x26/0x620 [ 198.413459] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.418810] ? do_syscall_64+0x26/0x620 [ 198.422790] __x64_sys_clone+0xbf/0x150 [ 198.426769] do_syscall_64+0xfd/0x620 [ 198.430571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.435764] RIP: 0033:0x459879 [ 198.438947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.457848] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 198.465547] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 198.472812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 198.480069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.487350] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 198.494622] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 198.531373] x86/PAT: syz-executor.0:11407 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 198.552972] loop5: p1 p3 21:02:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:02:19 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000800)=[{&(0x7f0000000100)=""/72, 0x48}, {0x0, 0x178}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe6c, 0x0, 0x0, 0x800e0071a) shutdown(r0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000240)=""/98, 0x62}], 0x1) shutdown(r1, 0x0) 21:02:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:19 executing program 0 (fault-call:6 fault-nth:20): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:19 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x7, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 198.801465] x86/PAT: syz-executor.0:11430 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:19 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 198.854920] FAULT_INJECTION: forcing a failure. [ 198.854920] name failslab, interval 1, probability 0, space 0, times 0 [ 198.893723] CPU: 1 PID: 11439 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 198.900968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.910343] Call Trace: [ 198.912967] dump_stack+0x172/0x1f0 [ 198.916628] should_fail.cold+0xa/0x1b [ 198.920555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 198.925712] ? lock_downgrade+0x810/0x810 [ 198.929915] __should_failslab+0x121/0x190 [ 198.935712] should_failslab+0x9/0x14 [ 198.939541] kmem_cache_alloc+0x2ae/0x700 [ 198.943712] ? anon_vma_clone+0x320/0x480 [ 198.947890] anon_vma_fork+0xfc/0x4a0 [ 198.951706] ? dup_userfaultfd+0x15e/0x6c0 [ 198.955963] ? memcpy+0x46/0x50 [ 198.959270] copy_process.part.0+0x34e5/0x7a30 [ 198.963918] ? __cleanup_sighand+0x70/0x70 [ 198.968173] ? lock_downgrade+0x810/0x810 [ 198.972347] ? kasan_check_write+0x14/0x20 [ 198.976601] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 198.981455] _do_fork+0x257/0xfd0 [ 198.984908] ? fork_idle+0x1d0/0x1d0 [ 198.984923] ? fput+0x128/0x1a0 [ 198.984937] ? ksys_write+0x1f1/0x2d0 [ 198.984955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.984971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.005254] ? do_syscall_64+0x26/0x620 [ 199.009250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.014639] ? do_syscall_64+0x26/0x620 [ 199.018639] __x64_sys_clone+0xbf/0x150 [ 199.022641] do_syscall_64+0xfd/0x620 [ 199.026471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.031674] RIP: 0033:0x459879 [ 199.034886] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:19 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:19 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 199.053799] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 199.061528] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 199.068823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 199.076107] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 199.083412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 199.090692] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:19 executing program 4: r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 199.129483] loop5: p1 p3 [ 199.190366] x86/PAT: syz-executor.0:11439 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:02:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:20 executing program 0 (fault-call:6 fault-nth:21): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:20 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:20 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x8, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 199.749536] x86/PAT: syz-executor.0:11479 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:20 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:20 executing program 4: r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 199.823504] FAULT_INJECTION: forcing a failure. [ 199.823504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.835477] CPU: 0 PID: 11479 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 199.842519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.851901] Call Trace: [ 199.854529] dump_stack+0x172/0x1f0 [ 199.858189] should_fail.cold+0xa/0x1b [ 199.862109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 199.867227] ? mark_held_locks+0x100/0x100 [ 199.871474] __alloc_pages_nodemask+0x1ee/0x750 [ 199.876152] ? find_held_lock+0x35/0x130 [ 199.880211] ? __alloc_pages_slowpath+0x2870/0x2870 [ 199.885245] cache_grow_begin+0x91/0x8c0 [ 199.889325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.894994] ? check_preemption_disabled+0x48/0x290 [ 199.900026] kmem_cache_alloc+0x63b/0x700 [ 199.904180] ? anon_vma_clone+0x320/0x480 [ 199.908323] anon_vma_fork+0xfc/0x4a0 [ 199.912126] ? dup_userfaultfd+0x15e/0x6c0 [ 199.916359] ? memcpy+0x46/0x50 [ 199.919632] copy_process.part.0+0x34e5/0x7a30 [ 199.924215] ? __cleanup_sighand+0x70/0x70 [ 199.928447] ? lock_downgrade+0x810/0x810 [ 199.932586] ? kasan_check_write+0x14/0x20 [ 199.936811] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 199.941641] _do_fork+0x257/0xfd0 [ 199.945086] ? fork_idle+0x1d0/0x1d0 [ 199.948798] ? fput+0x128/0x1a0 [ 199.952088] ? ksys_write+0x1f1/0x2d0 [ 199.955899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.960646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.965395] ? do_syscall_64+0x26/0x620 [ 199.969368] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.974719] ? do_syscall_64+0x26/0x620 [ 199.978704] __x64_sys_clone+0xbf/0x150 [ 199.982680] do_syscall_64+0xfd/0x620 [ 199.986471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.991671] RIP: 0033:0x459879 [ 199.994852] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.013741] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 200.021547] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 200.028808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 200.036063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.043320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 200.050576] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 200.079892] loop5: p1 p3 21:02:20 executing program 0 (fault-call:6 fault-nth:22): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 200.116431] x86/PAT: syz-executor.0:11492 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:20 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x9, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:20 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 200.388893] x86/PAT: syz-executor.0:11512 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 200.447378] FAULT_INJECTION: forcing a failure. [ 200.447378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.489887] CPU: 1 PID: 11512 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 200.497082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.506464] Call Trace: [ 200.509091] dump_stack+0x172/0x1f0 [ 200.512758] should_fail.cold+0xa/0x1b [ 200.516681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 200.521816] ? __might_sleep+0x95/0x190 [ 200.525819] __alloc_pages_nodemask+0x1ee/0x750 [ 200.530516] ? __alloc_pages_slowpath+0x2870/0x2870 [ 200.535559] ? kasan_slab_alloc+0xf/0x20 [ 200.539639] ? kmem_cache_alloc+0x12e/0x700 [ 200.543977] ? anon_vma_fork+0x1ea/0x4a0 [ 200.548064] ? __lock_acquire+0x6ee/0x49c0 [ 200.552317] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 200.557881] alloc_pages_current+0x107/0x210 [ 200.562313] get_zeroed_page+0x14/0x50 [ 200.566219] __pud_alloc+0x3b/0x250 [ 200.569864] pud_alloc+0xde/0x150 [ 200.573340] copy_page_range+0x37a/0x1f90 [ 200.577500] ? anon_vma_fork+0x371/0x4a0 [ 200.581582] ? find_held_lock+0x35/0x130 [ 200.585659] ? anon_vma_fork+0x371/0x4a0 [ 200.589737] ? copy_process.part.0+0x30f9/0x7a30 [ 200.594523] ? copy_process.part.0+0x30f9/0x7a30 [ 200.599311] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 200.604349] ? pmd_alloc+0x180/0x180 [ 200.608082] ? __vma_link_rb+0x279/0x370 [ 200.612168] copy_process.part.0+0x543d/0x7a30 [ 200.617232] ? __cleanup_sighand+0x70/0x70 [ 200.621482] ? lock_downgrade+0x810/0x810 [ 200.625657] ? kasan_check_write+0x14/0x20 [ 200.629914] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 200.634793] _do_fork+0x257/0xfd0 [ 200.638269] ? fork_idle+0x1d0/0x1d0 [ 200.641998] ? fput+0x128/0x1a0 [ 200.645295] ? ksys_write+0x1f1/0x2d0 [ 200.649111] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.653968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.658743] ? do_syscall_64+0x26/0x620 [ 200.662739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.668132] ? do_syscall_64+0x26/0x620 [ 200.672133] __x64_sys_clone+0xbf/0x150 [ 200.676130] do_syscall_64+0xfd/0x620 [ 200.679962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.685163] RIP: 0033:0x459879 [ 200.688453] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.707369] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 200.715102] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 200.722390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 200.729677] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:02:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:02:21 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:21 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 200.736967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 200.744344] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 200.772021] x86/PAT: syz-executor.0:11512 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 200.813702] loop5: p1 p3 21:02:21 executing program 0 (fault-call:6 fault-nth:23): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:21 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:21 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:21 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xa, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 201.016820] x86/PAT: syz-executor.0:11536 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 201.059225] FAULT_INJECTION: forcing a failure. [ 201.059225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.122911] CPU: 1 PID: 11536 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 201.129975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.139348] Call Trace: [ 201.141977] dump_stack+0x172/0x1f0 [ 201.145636] should_fail.cold+0xa/0x1b [ 201.149546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 201.154774] ? __might_sleep+0x95/0x190 [ 201.158782] __alloc_pages_nodemask+0x1ee/0x750 [ 201.163481] ? __pud_alloc+0x1d3/0x250 [ 201.167391] ? __alloc_pages_slowpath+0x2870/0x2870 [ 201.172422] ? __pud_alloc+0x1d3/0x250 [ 201.176335] ? lock_downgrade+0x810/0x810 [ 201.180501] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 201.186069] alloc_pages_current+0x107/0x210 [ 201.190492] ? do_raw_spin_unlock+0x57/0x270 [ 201.194920] __pmd_alloc+0x41/0x460 [ 201.198563] ? pmd_val+0x100/0x100 [ 201.202122] pmd_alloc+0x10c/0x180 [ 201.205674] copy_page_range+0x633/0x1f90 [ 201.209909] ? anon_vma_fork+0x371/0x4a0 [ 201.213982] ? find_held_lock+0x35/0x130 [ 201.218058] ? anon_vma_fork+0x371/0x4a0 [ 201.222145] ? copy_process.part.0+0x30f9/0x7a30 [ 201.227200] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 201.232237] ? pmd_alloc+0x180/0x180 [ 201.235980] ? __vma_link_rb+0x279/0x370 [ 201.240061] copy_process.part.0+0x543d/0x7a30 [ 201.244692] ? __cleanup_sighand+0x70/0x70 [ 201.248930] ? lock_downgrade+0x810/0x810 [ 201.253100] ? kasan_check_write+0x14/0x20 [ 201.257361] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 201.262225] _do_fork+0x257/0xfd0 [ 201.265705] ? fork_idle+0x1d0/0x1d0 [ 201.269434] ? fput+0x128/0x1a0 21:02:21 executing program 4: r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:02:21 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:21 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:21 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 201.272736] ? ksys_write+0x1f1/0x2d0 [ 201.276554] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.281326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.286097] ? do_syscall_64+0x26/0x620 [ 201.290094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.295478] ? do_syscall_64+0x26/0x620 [ 201.299486] __x64_sys_clone+0xbf/0x150 [ 201.303480] do_syscall_64+0xfd/0x620 [ 201.307292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.312497] RIP: 0033:0x459879 [ 201.315709] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.334622] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 201.334641] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 201.334649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 201.334655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.334662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 21:02:21 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 201.334673] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 201.370512] x86/PAT: syz-executor.0:11536 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 201.442705] loop5: p1 p3 21:02:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 21:02:22 executing program 0 (fault-call:6 fault-nth:24): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:22 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:22 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xc, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:22 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) [ 201.744018] x86/PAT: syz-executor.0:11574 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:22 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) 21:02:22 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) [ 201.803061] FAULT_INJECTION: forcing a failure. [ 201.803061] name failslab, interval 1, probability 0, space 0, times 0 [ 201.881278] CPU: 1 PID: 11580 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 201.888351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.897728] Call Trace: [ 201.900382] dump_stack+0x172/0x1f0 [ 201.904212] should_fail.cold+0xa/0x1b [ 201.908173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 201.913308] ? lock_downgrade+0x810/0x810 [ 201.917500] __should_failslab+0x121/0x190 [ 201.921762] should_failslab+0x9/0x14 [ 201.925585] kmem_cache_alloc+0x2ae/0x700 [ 201.929756] ? alloc_pages_current+0x10f/0x210 [ 201.929774] ? do_raw_spin_unlock+0x57/0x270 [ 201.929793] __pmd_alloc+0xc9/0x460 [ 201.929802] ? pmd_val+0x100/0x100 [ 201.929816] pmd_alloc+0x10c/0x180 [ 201.929831] copy_page_range+0x633/0x1f90 [ 201.929842] ? anon_vma_fork+0x371/0x4a0 [ 201.929860] ? find_held_lock+0x35/0x130 [ 201.929873] ? anon_vma_fork+0x371/0x4a0 [ 201.929893] ? copy_process.part.0+0x30f9/0x7a30 [ 201.929910] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 201.929925] ? pmd_alloc+0x180/0x180 [ 201.929941] ? __vma_link_rb+0x279/0x370 [ 201.949613] copy_process.part.0+0x543d/0x7a30 [ 201.988022] ? __cleanup_sighand+0x70/0x70 [ 201.992277] ? lock_downgrade+0x810/0x810 [ 201.996460] ? kasan_check_write+0x14/0x20 [ 202.000720] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 202.005581] _do_fork+0x257/0xfd0 [ 202.009145] ? fork_idle+0x1d0/0x1d0 [ 202.012893] ? fput+0x128/0x1a0 [ 202.016186] ? ksys_write+0x1f1/0x2d0 [ 202.020012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.024798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.029579] ? do_syscall_64+0x26/0x620 [ 202.033594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.038987] ? do_syscall_64+0x26/0x620 [ 202.042994] __x64_sys_clone+0xbf/0x150 [ 202.046985] do_syscall_64+0xfd/0x620 [ 202.050802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.056000] RIP: 0033:0x459879 [ 202.059199] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.078200] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 202.086023] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 202.093307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 202.100593] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 202.107888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 202.115170] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 202.130255] x86/PAT: syz-executor.0:11580 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 202.169308] loop5: p1 p3 21:02:22 executing program 4: r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000004080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7b970729, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:02:22 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) 21:02:22 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:22 executing program 0 (fault-call:6 fault-nth:25): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:22 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x10, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 202.398180] x86/PAT: syz-executor.0:11597 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 202.468399] FAULT_INJECTION: forcing a failure. [ 202.468399] name failslab, interval 1, probability 0, space 0, times 0 [ 202.492906] CPU: 1 PID: 11608 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 202.499978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.509348] Call Trace: [ 202.511974] dump_stack+0x172/0x1f0 [ 202.515641] should_fail.cold+0xa/0x1b [ 202.519571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 202.524707] ? lock_downgrade+0x810/0x810 [ 202.528888] __should_failslab+0x121/0x190 [ 202.533151] should_failslab+0x9/0x14 [ 202.536961] kmem_cache_alloc+0x2ae/0x700 [ 202.536980] ? alloc_pages_current+0x10f/0x210 [ 202.536994] ? do_raw_spin_unlock+0x57/0x270 [ 202.537009] __pmd_alloc+0xc9/0x460 [ 202.537019] ? pmd_val+0x100/0x100 [ 202.537033] pmd_alloc+0x10c/0x180 [ 202.537049] copy_page_range+0x633/0x1f90 [ 202.545789] ? anon_vma_fork+0x371/0x4a0 [ 202.545804] ? find_held_lock+0x35/0x130 [ 202.545818] ? anon_vma_fork+0x371/0x4a0 [ 202.545837] ? copy_process.part.0+0x30f9/0x7a30 [ 202.545854] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 202.545872] ? pmd_alloc+0x180/0x180 [ 202.545889] ? __vma_link_rb+0x279/0x370 [ 202.545906] copy_process.part.0+0x543d/0x7a30 [ 202.545944] ? __cleanup_sighand+0x70/0x70 [ 202.557468] ? lock_downgrade+0x810/0x810 [ 202.557495] ? kasan_check_write+0x14/0x20 [ 202.565195] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 202.565213] _do_fork+0x257/0xfd0 [ 202.565231] ? fork_idle+0x1d0/0x1d0 [ 202.565244] ? fput+0x128/0x1a0 [ 202.565256] ? ksys_write+0x1f1/0x2d0 [ 202.565275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.565287] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.565300] ? do_syscall_64+0x26/0x620 [ 202.565312] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.565323] ? do_syscall_64+0x26/0x620 [ 202.565340] __x64_sys_clone+0xbf/0x150 [ 202.565357] do_syscall_64+0xfd/0x620 [ 202.565374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.667038] RIP: 0033:0x459879 [ 202.670251] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.689159] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 202.689176] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 202.689184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 202.689192] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 21:02:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 21:02:23 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:23 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) [ 202.689198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 202.689205] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 202.750843] x86/PAT: syz-executor.0:11608 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 202.792091] loop5: p1 p3 21:02:23 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) 21:02:23 executing program 0 (fault-call:6 fault-nth:26): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:23 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x12, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:23 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 203.203799] x86/PAT: syz-executor.0:11634 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:23 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:23 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) [ 203.303408] FAULT_INJECTION: forcing a failure. [ 203.303408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:02:23 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 203.374578] CPU: 1 PID: 11637 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 203.381648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.391071] Call Trace: [ 203.393712] dump_stack+0x172/0x1f0 [ 203.397367] should_fail.cold+0xa/0x1b [ 203.401285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 203.406547] ? __might_sleep+0x95/0x190 [ 203.410550] __alloc_pages_nodemask+0x1ee/0x750 [ 203.415243] ? find_held_lock+0x35/0x130 [ 203.419326] ? __alloc_pages_slowpath+0x2870/0x2870 21:02:23 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:23 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) [ 203.424369] ? lock_downgrade+0x810/0x810 [ 203.428539] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 203.434114] alloc_pages_current+0x107/0x210 [ 203.438543] pte_alloc_one+0x1b/0x1a0 [ 203.442363] __pte_alloc+0x2a/0x360 [ 203.446009] copy_page_range+0x151f/0x1f90 [ 203.450254] ? anon_vma_fork+0x371/0x4a0 [ 203.454333] ? find_held_lock+0x35/0x130 [ 203.458419] ? anon_vma_fork+0x371/0x4a0 [ 203.462509] ? copy_process.part.0+0x30f9/0x7a30 [ 203.467305] ? pmd_alloc+0x180/0x180 [ 203.471047] ? __vma_link_rb+0x279/0x370 [ 203.475132] copy_process.part.0+0x543d/0x7a30 [ 203.479766] ? __cleanup_sighand+0x70/0x70 [ 203.484018] ? lock_downgrade+0x810/0x810 [ 203.488173] ? kasan_check_write+0x14/0x20 [ 203.492405] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 203.497249] _do_fork+0x257/0xfd0 [ 203.500697] ? fork_idle+0x1d0/0x1d0 [ 203.504434] ? fput+0x128/0x1a0 [ 203.507715] ? ksys_write+0x1f1/0x2d0 [ 203.511510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.516253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.520997] ? do_syscall_64+0x26/0x620 [ 203.524960] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.530325] ? do_syscall_64+0x26/0x620 [ 203.534305] __x64_sys_clone+0xbf/0x150 [ 203.538269] do_syscall_64+0xfd/0x620 [ 203.542058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.547235] RIP: 0033:0x459879 [ 203.550421] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.569307] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 203.577006] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 203.584262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 203.591518] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 203.598774] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 203.606028] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 203.637104] x86/PAT: syz-executor.0:11637 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 203.696656] loop5: p1 p3 21:02:24 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:24 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) 21:02:24 executing program 0 (fault-call:6 fault-nth:27): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:24 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:24 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x14, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 203.908101] x86/PAT: syz-executor.0:11671 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:24 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:24 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) [ 203.984519] FAULT_INJECTION: forcing a failure. [ 203.984519] name failslab, interval 1, probability 0, space 0, times 0 21:02:24 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x80fe, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.061680] CPU: 1 PID: 11671 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 204.068758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.078133] Call Trace: [ 204.080755] dump_stack+0x172/0x1f0 [ 204.084419] should_fail.cold+0xa/0x1b [ 204.088348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.093485] ? lock_downgrade+0x810/0x810 [ 204.097682] __should_failslab+0x121/0x190 [ 204.102033] should_failslab+0x9/0x14 [ 204.105865] kmem_cache_alloc+0x2ae/0x700 21:02:24 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 204.110038] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 204.115082] ? __vm_enough_memory+0x324/0x5a0 [ 204.119611] vm_area_dup+0x21/0x170 [ 204.123262] copy_process.part.0+0x3407/0x7a30 [ 204.127897] ? __cleanup_sighand+0x70/0x70 [ 204.132186] ? lock_downgrade+0x810/0x810 [ 204.136362] ? kasan_check_write+0x14/0x20 [ 204.140618] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 204.145471] _do_fork+0x257/0xfd0 [ 204.145492] ? fork_idle+0x1d0/0x1d0 [ 204.145508] ? fput+0x128/0x1a0 [ 204.145524] ? ksys_write+0x1f1/0x2d0 21:02:24 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xc0fe, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.145542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.145555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.145568] ? do_syscall_64+0x26/0x620 [ 204.145587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.152748] ? do_syscall_64+0x26/0x620 [ 204.152771] __x64_sys_clone+0xbf/0x150 [ 204.152791] do_syscall_64+0xfd/0x620 [ 204.152811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.173430] RIP: 0033:0x459879 [ 204.173447] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.173455] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 204.173475] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 204.182805] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 204.182814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.182826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 204.217937] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:24 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc00, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.238537] x86/PAT: syz-executor.0:11671 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 204.297771] loop5: p1 p3 21:02:25 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1c, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:25 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) 21:02:25 executing program 0 (fault-call:6 fault-nth:28): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:25 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:25 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfe80, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:25 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.651237] x86/PAT: syz-executor.0:11716 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:25 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:25 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) [ 204.701636] FAULT_INJECTION: forcing a failure. [ 204.701636] name failslab, interval 1, probability 0, space 0, times 0 21:02:25 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfec0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.742072] CPU: 1 PID: 11722 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 204.749143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.758514] Call Trace: [ 204.761134] dump_stack+0x172/0x1f0 [ 204.765921] should_fail.cold+0xa/0x1b [ 204.769848] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.774985] ? find_held_lock+0x35/0x130 [ 204.779074] ? percpu_ref_put_many+0x94/0x190 [ 204.783598] __should_failslab+0x121/0x190 [ 204.787861] should_failslab+0x9/0x14 21:02:25 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 204.791675] kmem_cache_alloc+0x47/0x700 [ 204.795756] ? __lock_is_held+0xb6/0x140 [ 204.799841] anon_vma_clone+0xde/0x480 [ 204.803741] anon_vma_fork+0x8f/0x4a0 [ 204.807554] ? dup_userfaultfd+0x15e/0x6c0 [ 204.811772] ? memcpy+0x46/0x50 [ 204.815059] copy_process.part.0+0x34e5/0x7a30 [ 204.819645] ? __cleanup_sighand+0x70/0x70 [ 204.823880] ? lock_downgrade+0x810/0x810 [ 204.828027] ? kasan_check_write+0x14/0x20 [ 204.832248] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 204.837079] _do_fork+0x257/0xfd0 [ 204.840522] ? fork_idle+0x1d0/0x1d0 [ 204.844231] ? fput+0x128/0x1a0 [ 204.847539] ? ksys_write+0x1f1/0x2d0 [ 204.851329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.856069] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.860811] ? do_syscall_64+0x26/0x620 [ 204.864774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.870125] ? do_syscall_64+0x26/0x620 [ 204.874089] __x64_sys_clone+0xbf/0x150 [ 204.878054] do_syscall_64+0xfd/0x620 [ 204.881844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.888351] RIP: 0033:0x459879 [ 204.891577] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.910480] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 204.918187] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 204.925448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 204.932706] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 21:02:25 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 204.939967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 204.947234] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 204.973790] x86/PAT: syz-executor.0:11714 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:25 executing program 0 (fault-call:6 fault-nth:29): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 205.019524] loop5: p1 p3 21:02:25 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x23, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:25 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff00, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:25 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:25 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 205.190952] x86/PAT: syz-executor.0:11745 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:25 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) [ 205.290552] FAULT_INJECTION: forcing a failure. [ 205.290552] name failslab, interval 1, probability 0, space 0, times 0 21:02:25 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:25 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 205.402617] CPU: 1 PID: 11745 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 205.409692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.419068] Call Trace: [ 205.421684] dump_stack+0x172/0x1f0 [ 205.425454] should_fail.cold+0xa/0x1b [ 205.429374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 205.434506] ? __lock_is_held+0xb6/0x140 [ 205.438592] ? __lock_is_held+0xb6/0x140 [ 205.442683] __should_failslab+0x121/0x190 [ 205.446942] should_failslab+0x9/0x14 [ 205.450759] kmem_cache_alloc+0x47/0x700 [ 205.454845] ? anon_vma_chain_link+0x154/0x1c0 [ 205.459447] anon_vma_clone+0xde/0x480 [ 205.463361] anon_vma_fork+0x8f/0x4a0 [ 205.467181] ? dup_userfaultfd+0x15e/0x6c0 [ 205.471434] ? memcpy+0x46/0x50 [ 205.474731] copy_process.part.0+0x34e5/0x7a30 [ 205.479357] ? __cleanup_sighand+0x70/0x70 [ 205.483604] ? lock_downgrade+0x810/0x810 [ 205.487778] ? kasan_check_write+0x14/0x20 [ 205.492034] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 205.496903] _do_fork+0x257/0xfd0 21:02:26 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 205.500375] ? fork_idle+0x1d0/0x1d0 [ 205.504099] ? fput+0x128/0x1a0 [ 205.507395] ? ksys_write+0x1f1/0x2d0 [ 205.511233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.516006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.520777] ? do_syscall_64+0x26/0x620 [ 205.524762] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.524856] ? do_syscall_64+0x26/0x620 [ 205.524874] __x64_sys_clone+0xbf/0x150 [ 205.534194] do_syscall_64+0xfd/0x620 [ 205.534212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.534224] RIP: 0033:0x459879 [ 205.534239] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.534246] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 205.534262] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 205.534270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 205.534278] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:02:26 executing program 1 (fault-call:5 fault-nth:0): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:26 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfe800000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 205.534289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 205.576994] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 205.625858] loop5: p1 p3 [ 205.659483] x86/PAT: syz-executor.0:11745 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 205.698985] FAULT_INJECTION: forcing a failure. [ 205.698985] name failslab, interval 1, probability 0, space 0, times 0 [ 205.824851] CPU: 0 PID: 11776 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 205.831929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.841299] Call Trace: [ 205.843918] dump_stack+0x172/0x1f0 [ 205.847662] should_fail.cold+0xa/0x1b [ 205.851584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 205.856713] ? lock_downgrade+0x810/0x810 [ 205.860897] __should_failslab+0x121/0x190 [ 205.865162] should_failslab+0x9/0x14 [ 205.868985] kmem_cache_alloc+0x2ae/0x700 [ 205.873165] ext4_init_io_end+0x29/0x120 [ 205.877246] ext4_writepages+0x1170/0x3450 [ 205.881502] ? mark_held_locks+0x100/0x100 [ 205.885754] ? mark_held_locks+0x100/0x100 [ 205.890037] ? ext4_mark_inode_dirty+0x940/0x940 [ 205.894831] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 205.900130] ? find_held_lock+0x35/0x130 [ 205.904215] ? ext4_mark_inode_dirty+0x940/0x940 [ 205.908991] do_writepages+0xf3/0x2a0 [ 205.912824] ? do_writepages+0xf3/0x2a0 [ 205.916832] ? page_writeback_cpu_online+0x20/0x20 [ 205.921785] ? kasan_check_read+0x11/0x20 [ 205.925953] ? do_raw_spin_unlock+0x57/0x270 [ 205.930380] ? _raw_spin_unlock+0x2d/0x50 [ 205.934551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.940130] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 205.945438] __filemap_fdatawrite_range+0x26d/0x340 [ 205.950480] ? delete_from_page_cache_batch+0xec0/0xec0 [ 205.955864] ? proc_cwd_link+0x1d0/0x1d0 [ 205.959959] ? __lock_is_held+0xb6/0x140 [ 205.964049] filemap_write_and_wait_range+0x4b/0xd0 [ 205.969083] ext4_punch_hole+0x13d/0x11b0 [ 205.973266] ? __lock_is_held+0xb6/0x140 [ 205.977352] ? ext4_insert_range+0x12d0/0x12d0 [ 205.981936] ext4_fallocate+0x445/0x2070 [ 205.986009] ? rcu_read_lock_sched_held+0x110/0x130 [ 205.991040] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 205.995828] ? ext4_insert_range+0x12d0/0x12d0 [ 206.000434] vfs_fallocate+0x4aa/0x9d0 [ 206.004351] ksys_fallocate+0x58/0xa0 [ 206.008174] __x64_sys_fallocate+0x97/0xf0 [ 206.012431] do_syscall_64+0xfd/0x620 [ 206.016264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.021470] RIP: 0033:0x459879 [ 206.024675] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.043593] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 206.051324] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 206.058610] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 206.065923] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:02:26 executing program 0 (fault-call:6 fault-nth:30): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:26 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x28, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:26 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfec00000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:26 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 206.073194] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 206.080473] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:26 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:26 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:26 executing program 1 (fault-call:5 fault-nth:1): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 206.218863] loop5: p1 p3 [ 206.235033] x86/PAT: syz-executor.0:11812 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:26 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfc00000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 206.345931] FAULT_INJECTION: forcing a failure. [ 206.345931] name failslab, interval 1, probability 0, space 0, times 0 [ 206.402929] FAULT_INJECTION: forcing a failure. [ 206.402929] name failslab, interval 1, probability 0, space 0, times 0 [ 206.408918] CPU: 1 PID: 11812 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 206.421196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.430570] Call Trace: [ 206.433279] dump_stack+0x172/0x1f0 [ 206.436928] should_fail.cold+0xa/0x1b [ 206.440828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 206.445945] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 206.452275] __should_failslab+0x121/0x190 [ 206.456542] should_failslab+0x9/0x14 [ 206.460353] kmem_cache_alloc+0x47/0x700 [ 206.464428] ? anon_vma_chain_link+0x154/0x1c0 [ 206.469030] anon_vma_clone+0xde/0x480 [ 206.472927] anon_vma_fork+0x8f/0x4a0 [ 206.476726] ? dup_userfaultfd+0x15e/0x6c0 [ 206.480964] ? memcpy+0x46/0x50 [ 206.484260] copy_process.part.0+0x34e5/0x7a30 [ 206.488871] ? __cleanup_sighand+0x70/0x70 [ 206.493104] ? lock_downgrade+0x810/0x810 [ 206.497268] ? kasan_check_write+0x14/0x20 [ 206.501511] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 206.506372] _do_fork+0x257/0xfd0 [ 206.509851] ? fork_idle+0x1d0/0x1d0 [ 206.513580] ? fput+0x128/0x1a0 [ 206.516880] ? ksys_write+0x1f1/0x2d0 [ 206.520707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.525483] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.530256] ? do_syscall_64+0x26/0x620 [ 206.534248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.539622] ? do_syscall_64+0x26/0x620 [ 206.543610] __x64_sys_clone+0xbf/0x150 [ 206.547591] do_syscall_64+0xfd/0x620 [ 206.551398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.556586] RIP: 0033:0x459879 [ 206.559778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.578680] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 206.586395] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 206.593685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 206.600961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.608234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 206.615505] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 206.622799] CPU: 0 PID: 11826 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 206.629829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.639190] Call Trace: [ 206.641980] dump_stack+0x172/0x1f0 [ 206.645636] should_fail.cold+0xa/0x1b [ 206.649548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 206.654677] ? lock_downgrade+0x810/0x810 [ 206.658850] __should_failslab+0x121/0x190 [ 206.663078] should_failslab+0x9/0x14 [ 206.666867] kmem_cache_alloc+0x2ae/0x700 [ 206.671005] ? ext4_release_io_end+0x12e/0x180 [ 206.675581] ext4_init_io_end+0x29/0x120 [ 206.679630] ext4_writepages+0x1230/0x3450 [ 206.683852] ? mark_held_locks+0x100/0x100 [ 206.688074] ? mark_held_locks+0x100/0x100 [ 206.692310] ? ext4_mark_inode_dirty+0x940/0x940 [ 206.697067] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 206.702331] ? find_held_lock+0x35/0x130 [ 206.706383] ? ext4_mark_inode_dirty+0x940/0x940 [ 206.711132] do_writepages+0xf3/0x2a0 [ 206.714920] ? do_writepages+0xf3/0x2a0 [ 206.718884] ? page_writeback_cpu_online+0x20/0x20 [ 206.723816] ? kasan_check_read+0x11/0x20 [ 206.727953] ? do_raw_spin_unlock+0x57/0x270 [ 206.732350] ? _raw_spin_unlock+0x2d/0x50 [ 206.736486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 206.742011] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 206.747280] __filemap_fdatawrite_range+0x26d/0x340 [ 206.752284] ? delete_from_page_cache_batch+0xec0/0xec0 [ 206.757645] ? proc_cwd_link+0x1d0/0x1d0 [ 206.761721] ? __lock_is_held+0xb6/0x140 [ 206.767270] filemap_write_and_wait_range+0x4b/0xd0 [ 206.772282] ext4_punch_hole+0x13d/0x11b0 [ 206.776426] ? __lock_is_held+0xb6/0x140 [ 206.780478] ? ext4_insert_range+0x12d0/0x12d0 [ 206.785045] ext4_fallocate+0x445/0x2070 [ 206.789094] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.794113] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 206.798861] ? ext4_insert_range+0x12d0/0x12d0 [ 206.803433] vfs_fallocate+0x4aa/0x9d0 [ 206.807317] ksys_fallocate+0x58/0xa0 [ 206.811105] __x64_sys_fallocate+0x97/0xf0 [ 206.815331] do_syscall_64+0xfd/0x620 [ 206.819126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.824300] RIP: 0033:0x459879 [ 206.827483] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.846371] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 206.854067] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 206.861324] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 206.868576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.875829] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 206.883083] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:27 executing program 0 (fault-call:6 fault-nth:31): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:27 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:27 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfe80000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:27 executing program 1 (fault-call:5 fault-nth:2): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:27 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:27 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x42, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 206.960139] x86/PAT: syz-executor.0:11811 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:27 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfec0000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 207.081613] FAULT_INJECTION: forcing a failure. [ 207.081613] name failslab, interval 1, probability 0, space 0, times 0 [ 207.107143] CPU: 1 PID: 11851 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 207.114211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.123565] Call Trace: [ 207.126178] dump_stack+0x172/0x1f0 21:02:27 executing program 2: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) [ 207.129826] should_fail.cold+0xa/0x1b [ 207.133742] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.138868] ? kasan_check_read+0x11/0x20 [ 207.143038] __should_failslab+0x121/0x190 [ 207.147293] should_failslab+0x9/0x14 [ 207.151108] __kmalloc+0x2e2/0x750 [ 207.154661] ? ext4_find_extent+0x76e/0x9d0 [ 207.159000] ext4_find_extent+0x76e/0x9d0 [ 207.163240] ext4_ext_map_blocks+0x1c3/0x55c0 [ 207.167762] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 207.172833] ? __lock_is_held+0xb6/0x140 [ 207.176922] ? lock_acquire+0x16f/0x3f0 [ 207.180908] ? ext4_map_blocks+0x928/0x1b20 [ 207.185254] ext4_map_blocks+0x990/0x1b20 [ 207.189426] ? ext4_issue_zeroout+0x170/0x170 [ 207.193936] ? __lock_is_held+0xb6/0x140 [ 207.198018] ext4_writepages+0x1e5b/0x3450 [ 207.202264] ? mark_held_locks+0x100/0x100 [ 207.206540] ? ext4_mark_inode_dirty+0x940/0x940 [ 207.211343] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 207.216641] ? find_held_lock+0x35/0x130 [ 207.220720] ? ext4_mark_inode_dirty+0x940/0x940 [ 207.223406] FAULT_INJECTION: forcing a failure. [ 207.223406] name failslab, interval 1, probability 0, space 0, times 0 [ 207.225482] do_writepages+0xf3/0x2a0 [ 207.225569] ? do_writepages+0xf3/0x2a0 [ 207.225597] ? page_writeback_cpu_online+0x20/0x20 [ 207.249493] ? kasan_check_read+0x11/0x20 [ 207.253657] ? do_raw_spin_unlock+0x57/0x270 [ 207.258082] ? _raw_spin_unlock+0x2d/0x50 [ 207.262247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.267797] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 207.273089] __filemap_fdatawrite_range+0x26d/0x340 21:02:27 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xff00000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:27 executing program 2: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) [ 207.273105] ? delete_from_page_cache_batch+0xec0/0xec0 [ 207.283468] ? proc_cwd_link+0x1d0/0x1d0 [ 207.287546] ? __lock_is_held+0xb6/0x140 [ 207.291623] filemap_write_and_wait_range+0x4b/0xd0 [ 207.296660] ext4_punch_hole+0x13d/0x11b0 [ 207.300839] ? __lock_is_held+0xb6/0x140 [ 207.304910] ? ext4_insert_range+0x12d0/0x12d0 [ 207.304925] ext4_fallocate+0x445/0x2070 [ 207.304942] ? rcu_read_lock_sched_held+0x110/0x130 [ 207.304954] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 207.304972] ? ext4_insert_range+0x12d0/0x12d0 [ 207.304987] vfs_fallocate+0x4aa/0x9d0 [ 207.305004] ksys_fallocate+0x58/0xa0 [ 207.305019] __x64_sys_fallocate+0x97/0xf0 [ 207.305039] do_syscall_64+0xfd/0x620 [ 207.305058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.305073] RIP: 0033:0x459879 [ 207.352684] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.371613] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 21:02:27 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 207.379338] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 207.386611] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 207.393880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.401161] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 207.408443] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 207.421444] CPU: 0 PID: 11860 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 207.428505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.437871] Call Trace: [ 207.440475] dump_stack+0x172/0x1f0 [ 207.444094] should_fail.cold+0xa/0x1b [ 207.447968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.453061] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 207.459411] __should_failslab+0x121/0x190 [ 207.463636] should_failslab+0x9/0x14 [ 207.467426] kmem_cache_alloc+0x47/0x700 [ 207.471473] ? anon_vma_chain_link+0x154/0x1c0 [ 207.476040] anon_vma_clone+0xde/0x480 [ 207.479917] anon_vma_fork+0x8f/0x4a0 [ 207.483702] ? dup_userfaultfd+0x15e/0x6c0 [ 207.487922] ? memcpy+0x46/0x50 [ 207.491202] copy_process.part.0+0x34e5/0x7a30 [ 207.495795] ? __cleanup_sighand+0x70/0x70 [ 207.500026] ? lock_downgrade+0x810/0x810 [ 207.504255] ? kasan_check_write+0x14/0x20 [ 207.508478] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 207.513355] _do_fork+0x257/0xfd0 [ 207.516809] ? fork_idle+0x1d0/0x1d0 [ 207.520508] ? fput+0x128/0x1a0 [ 207.523776] ? ksys_write+0x1f1/0x2d0 [ 207.527585] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 207.532339] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 207.537080] ? do_syscall_64+0x26/0x620 [ 207.541040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.546386] ? do_syscall_64+0x26/0x620 [ 207.550348] __x64_sys_clone+0xbf/0x150 [ 207.554311] do_syscall_64+0xfd/0x620 [ 207.558100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.563274] RIP: 0033:0x459879 21:02:28 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 207.566455] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.585427] RSP: 002b:00007f5c8b1d9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 207.593126] RAX: ffffffffffffffda RBX: 00007f5c8b1d9c90 RCX: 0000000000459879 [ 207.600382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 207.607641] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 207.614897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1da6d4 [ 207.622172] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 207.654469] loop5: p1 p3 21:02:28 executing program 0 (fault-call:6 fault-nth:32): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:28 executing program 2: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:28 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x48, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:28 executing program 1 (fault-call:5 fault-nth:3): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:28 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x80fe, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 207.879218] FAULT_INJECTION: forcing a failure. [ 207.879218] name failslab, interval 1, probability 0, space 0, times 0 [ 207.943800] x86/PAT: syz-executor.0:11893 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 207.953681] CPU: 1 PID: 11886 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 207.963551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.972922] Call Trace: [ 207.975537] dump_stack+0x172/0x1f0 [ 207.979189] should_fail.cold+0xa/0x1b [ 207.983104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.988237] ? mempool_alloc+0x380/0x380 [ 207.988777] FAULT_INJECTION: forcing a failure. 21:02:28 executing program 2: r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 207.988777] name failslab, interval 1, probability 0, space 0, times 0 [ 207.992316] __should_failslab+0x121/0x190 [ 208.007726] should_failslab+0x9/0x14 [ 208.011554] kmem_cache_alloc+0x47/0x700 [ 208.015646] ? mempool_alloc+0x380/0x380 [ 208.019729] mempool_alloc_slab+0x47/0x60 [ 208.023897] mempool_alloc+0x169/0x380 [ 208.027788] ? __unlock_page_memcg+0x53/0x100 [ 208.027809] ? mempool_destroy+0x40/0x40 [ 208.027829] ? lock_downgrade+0x810/0x810 [ 208.040620] bio_alloc_bioset+0x3cd/0x690 21:02:28 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 208.040637] ? unlock_page_memcg+0x2c/0x40 [ 208.040653] ? bvec_alloc+0x2f0/0x2f0 [ 208.052832] ext4_bio_write_page+0xbb8/0x133a [ 208.057357] mpage_submit_page+0x15a/0x270 [ 208.061727] mpage_map_and_submit_buffers+0x4d8/0x840 [ 208.066947] ? mpage_process_page_bufs+0x610/0x610 [ 208.071907] ? __lock_is_held+0xb6/0x140 [ 208.075999] ext4_writepages+0x1f7a/0x3450 [ 208.080255] ? mark_held_locks+0x100/0x100 [ 208.084528] ? ext4_mark_inode_dirty+0x940/0x940 [ 208.089319] ? wbc_attach_and_unlock_inode+0x51a/0x930 21:02:28 executing program 2: r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 208.094613] ? find_held_lock+0x35/0x130 [ 208.098695] ? ext4_mark_inode_dirty+0x940/0x940 [ 208.103471] do_writepages+0xf3/0x2a0 [ 208.107291] ? do_writepages+0xf3/0x2a0 [ 208.111286] ? page_writeback_cpu_online+0x20/0x20 [ 208.116233] ? kasan_check_read+0x11/0x20 [ 208.120395] ? do_raw_spin_unlock+0x57/0x270 [ 208.124821] ? _raw_spin_unlock+0x2d/0x50 [ 208.128982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.134527] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 208.139812] __filemap_fdatawrite_range+0x26d/0x340 [ 208.144831] ? delete_from_page_cache_batch+0xec0/0xec0 [ 208.150196] ? proc_cwd_link+0x1d0/0x1d0 [ 208.154274] ? __lock_is_held+0xb6/0x140 [ 208.158358] filemap_write_and_wait_range+0x4b/0xd0 [ 208.163385] ext4_punch_hole+0x13d/0x11b0 [ 208.167542] ? __lock_is_held+0xb6/0x140 [ 208.171646] ? ext4_insert_range+0x12d0/0x12d0 [ 208.176227] ext4_fallocate+0x445/0x2070 [ 208.180294] ? rcu_read_lock_sched_held+0x110/0x130 [ 208.185314] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 208.190075] ? ext4_insert_range+0x12d0/0x12d0 [ 208.194677] vfs_fallocate+0x4aa/0x9d0 21:02:28 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xc0fe, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 208.198572] ksys_fallocate+0x58/0xa0 [ 208.202374] __x64_sys_fallocate+0x97/0xf0 [ 208.206622] do_syscall_64+0xfd/0x620 [ 208.210434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.215626] RIP: 0033:0x459879 [ 208.218818] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.237728] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 208.245460] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 208.252746] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 208.260027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.267294] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 208.274563] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 208.281893] CPU: 0 PID: 11893 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 208.288927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.298287] Call Trace: [ 208.300879] dump_stack+0x172/0x1f0 [ 208.304497] should_fail.cold+0xa/0x1b [ 208.308374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 208.313481] ? lock_downgrade+0x810/0x810 [ 208.317715] __should_failslab+0x121/0x190 [ 208.321949] should_failslab+0x9/0x14 [ 208.325745] kmem_cache_alloc+0x2ae/0x700 [ 208.329877] ? anon_vma_clone+0x320/0x480 [ 208.334017] anon_vma_fork+0x1ea/0x4a0 [ 208.337890] ? dup_userfaultfd+0x15e/0x6c0 [ 208.342111] copy_process.part.0+0x34e5/0x7a30 [ 208.346693] ? __cleanup_sighand+0x70/0x70 [ 208.350911] ? lock_downgrade+0x810/0x810 [ 208.355061] ? kasan_check_write+0x14/0x20 [ 208.359290] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 208.364120] _do_fork+0x257/0xfd0 [ 208.367562] ? fork_idle+0x1d0/0x1d0 [ 208.371266] ? fput+0x128/0x1a0 [ 208.374530] ? ksys_write+0x1f1/0x2d0 [ 208.378321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 208.383061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 208.387802] ? do_syscall_64+0x26/0x620 [ 208.391776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.397159] ? do_syscall_64+0x26/0x620 [ 208.401132] __x64_sys_clone+0xbf/0x150 [ 208.405111] do_syscall_64+0xfd/0x620 [ 208.408925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.414120] RIP: 0033:0x459879 [ 208.417312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.436222] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 208.443935] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 208.451202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 208.458465] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.465743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 208.473000] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 208.507109] loop5: p1 p3 [ 208.512729] x86/PAT: syz-executor.0:11893 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:29 executing program 0 (fault-call:6 fault-nth:33): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:29 executing program 1 (fault-call:5 fault-nth:4): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:29 executing program 2: r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:29 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc00, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:29 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x4c, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:29 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 208.787717] FAULT_INJECTION: forcing a failure. [ 208.787717] name failslab, interval 1, probability 0, space 0, times 0 [ 208.805108] x86/PAT: syz-executor.0:11927 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 208.831202] CPU: 0 PID: 11924 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 208.838273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.847645] Call Trace: [ 208.850259] dump_stack+0x172/0x1f0 [ 208.853914] should_fail.cold+0xa/0x1b [ 208.857829] ? __save_stack_trace+0x99/0x100 [ 208.862277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 208.867403] ? should_fail+0x14d/0x85c [ 208.871313] ? __lock_acquire+0x6ee/0x49c0 [ 208.875573] ? mempool_alloc+0x380/0x380 [ 208.879656] __should_failslab+0x121/0x190 [ 208.883916] should_failslab+0x9/0x14 [ 208.887733] kmem_cache_alloc+0x47/0x700 [ 208.891826] ? mempool_alloc+0x380/0x380 [ 208.895920] mempool_alloc_slab+0x47/0x60 [ 208.900091] mempool_alloc+0x169/0x380 [ 208.904013] ? mempool_destroy+0x40/0x40 [ 208.908186] ? mempool_destroy+0x40/0x40 [ 208.912275] bvec_alloc+0xe0/0x2f0 [ 208.915846] bio_alloc_bioset+0x47c/0x690 [ 208.920017] ? unlock_page_memcg+0x2c/0x40 [ 208.924275] ? bvec_alloc+0x2f0/0x2f0 [ 208.928118] ext4_bio_write_page+0xbb8/0x133a [ 208.933441] mpage_submit_page+0x15a/0x270 [ 208.934503] FAULT_INJECTION: forcing a failure. [ 208.934503] name failslab, interval 1, probability 0, space 0, times 0 [ 208.937692] mpage_map_and_submit_buffers+0x4d8/0x840 [ 208.937722] ? mpage_process_page_bufs+0x610/0x610 [ 208.937760] ? __lock_is_held+0xb6/0x140 [ 208.963124] ext4_writepages+0x1f7a/0x3450 [ 208.967377] ? mark_held_locks+0x100/0x100 [ 208.971642] ? ext4_mark_inode_dirty+0x940/0x940 [ 208.976416] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 208.981695] ? find_held_lock+0x35/0x130 [ 208.985762] ? ext4_mark_inode_dirty+0x940/0x940 [ 208.990531] do_writepages+0xf3/0x2a0 [ 208.994336] ? do_writepages+0xf3/0x2a0 [ 208.998319] ? page_writeback_cpu_online+0x20/0x20 [ 209.003249] ? kasan_check_read+0x11/0x20 [ 209.007403] ? do_raw_spin_unlock+0x57/0x270 [ 209.011820] ? _raw_spin_unlock+0x2d/0x50 [ 209.015971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.021519] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 209.026821] __filemap_fdatawrite_range+0x26d/0x340 [ 209.031844] ? delete_from_page_cache_batch+0xec0/0xec0 [ 209.037208] ? proc_cwd_link+0x1d0/0x1d0 [ 209.041280] ? __lock_is_held+0xb6/0x140 [ 209.045352] filemap_write_and_wait_range+0x4b/0xd0 [ 209.050377] ext4_punch_hole+0x13d/0x11b0 [ 209.054541] ? __lock_is_held+0xb6/0x140 [ 209.058608] ? ext4_insert_range+0x12d0/0x12d0 [ 209.063191] ext4_fallocate+0x445/0x2070 [ 209.067257] ? rcu_read_lock_sched_held+0x110/0x130 [ 209.072271] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 209.077053] ? ext4_insert_range+0x12d0/0x12d0 [ 209.081640] vfs_fallocate+0x4aa/0x9d0 [ 209.085540] ksys_fallocate+0x58/0xa0 [ 209.089344] __x64_sys_fallocate+0x97/0xf0 [ 209.093593] do_syscall_64+0xfd/0x620 [ 209.097488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.102709] RIP: 0033:0x459879 [ 209.105902] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.124804] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d 21:02:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:29 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe80, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:29 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 209.132523] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 209.139794] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 209.147061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.154331] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 209.161599] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 209.169059] CPU: 1 PID: 11927 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 209.176089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.176095] Call Trace: [ 209.176118] dump_stack+0x172/0x1f0 [ 209.176137] should_fail.cold+0xa/0x1b [ 209.176154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.191735] ? lock_downgrade+0x810/0x810 [ 209.191761] __should_failslab+0x121/0x190 [ 209.200730] should_failslab+0x9/0x14 [ 209.200745] kmem_cache_alloc+0x2ae/0x700 [ 209.200762] ? pmd_alloc+0x180/0x180 [ 209.209145] vm_area_dup+0x21/0x170 [ 209.209163] copy_process.part.0+0x3407/0x7a30 [ 209.229066] ? __cleanup_sighand+0x70/0x70 [ 209.233333] ? lock_downgrade+0x810/0x810 [ 209.237520] ? kasan_check_write+0x14/0x20 [ 209.241777] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 209.246645] _do_fork+0x257/0xfd0 [ 209.250124] ? fork_idle+0x1d0/0x1d0 [ 209.253860] ? fput+0x128/0x1a0 [ 209.257164] ? ksys_write+0x1f1/0x2d0 [ 209.260983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.265757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.270548] ? do_syscall_64+0x26/0x620 [ 209.274549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.279937] ? do_syscall_64+0x26/0x620 [ 209.283934] __x64_sys_clone+0xbf/0x150 [ 209.287937] do_syscall_64+0xfd/0x620 [ 209.291766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.296970] RIP: 0033:0x459879 [ 209.300179] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.300186] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 209.326790] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 21:02:29 executing program 1 (fault-call:5 fault-nth:5): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:29 executing program 0 (fault-call:6 fault-nth:34): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:29 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:29 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff00, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 209.326799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 209.326807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.326814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 209.326822] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 209.370351] x86/PAT: syz-executor.0:11925 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 209.465000] loop5: p1 p3 [ 209.532850] FAULT_INJECTION: forcing a failure. [ 209.532850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.544705] CPU: 1 PID: 11955 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 209.551745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.561119] Call Trace: [ 209.563733] dump_stack+0x172/0x1f0 [ 209.567385] should_fail.cold+0xa/0x1b [ 209.571404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.576542] ? bio_alloc_bioset+0x3cd/0x690 [ 209.580885] ? ext4_bio_write_page+0xbb8/0x133a [ 209.581323] x86/PAT: syz-executor.0:11963 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 209.585566] ? mpage_submit_page+0x15a/0x270 [ 209.585581] ? mpage_map_and_submit_buffers+0x4d8/0x840 [ 209.585593] ? ext4_writepages+0x1f7a/0x3450 [ 209.585605] ? do_writepages+0xf3/0x2a0 [ 209.585617] ? __filemap_fdatawrite_range+0x26d/0x340 [ 209.585629] ? filemap_write_and_wait_range+0x4b/0xd0 [ 209.585644] __alloc_pages_nodemask+0x1ee/0x750 [ 209.585660] ? is_bpf_text_address+0xd3/0x170 [ 209.585676] ? __alloc_pages_slowpath+0x2870/0x2870 [ 209.585690] ? __kernel_text_address+0xd/0x40 [ 209.585709] ? __save_stack_trace+0x99/0x100 [ 209.646007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.650146] FAULT_INJECTION: forcing a failure. [ 209.650146] name failslab, interval 1, probability 0, space 0, times 0 [ 209.651120] ? should_fail+0x14d/0x85c [ 209.651141] cache_grow_begin+0x91/0x8c0 [ 209.651165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.675827] ? check_preemption_disabled+0x48/0x290 21:02:30 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x60, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:30 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:30 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 209.680868] kmem_cache_alloc+0x63b/0x700 [ 209.685047] ? mempool_alloc+0x380/0x380 [ 209.689117] mempool_alloc_slab+0x47/0x60 [ 209.693271] mempool_alloc+0x169/0x380 [ 209.697168] ? mempool_destroy+0x40/0x40 [ 209.701236] ? mempool_destroy+0x40/0x40 [ 209.705310] bvec_alloc+0xe0/0x2f0 [ 209.708862] bio_alloc_bioset+0x47c/0x690 [ 209.713023] ? unlock_page_memcg+0x2c/0x40 [ 209.717273] ? bvec_alloc+0x2f0/0x2f0 [ 209.721089] ext4_bio_write_page+0xbb8/0x133a [ 209.725601] mpage_submit_page+0x15a/0x270 [ 209.729846] mpage_map_and_submit_buffers+0x4d8/0x840 [ 209.735051] ? mpage_process_page_bufs+0x610/0x610 [ 209.739996] ? __lock_is_held+0xb6/0x140 [ 209.744076] ext4_writepages+0x1f7a/0x3450 [ 209.748313] ? mark_held_locks+0x100/0x100 [ 209.752570] ? ext4_mark_inode_dirty+0x940/0x940 [ 209.757352] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 209.762632] ? find_held_lock+0x35/0x130 [ 209.766703] ? ext4_mark_inode_dirty+0x940/0x940 [ 209.771463] do_writepages+0xf3/0x2a0 [ 209.775265] ? do_writepages+0xf3/0x2a0 [ 209.779247] ? page_writeback_cpu_online+0x20/0x20 [ 209.784180] ? kasan_check_read+0x11/0x20 [ 209.788335] ? do_raw_spin_unlock+0x57/0x270 [ 209.792925] ? _raw_spin_unlock+0x2d/0x50 [ 209.797078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.802618] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 209.807909] __filemap_fdatawrite_range+0x26d/0x340 [ 209.812943] ? delete_from_page_cache_batch+0xec0/0xec0 [ 209.818313] ? proc_cwd_link+0x1d0/0x1d0 [ 209.822410] ? __lock_is_held+0xb6/0x140 [ 209.826483] filemap_write_and_wait_range+0x4b/0xd0 21:02:30 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 209.831598] ext4_punch_hole+0x13d/0x11b0 [ 209.835756] ? __lock_is_held+0xb6/0x140 [ 209.839821] ? ext4_insert_range+0x12d0/0x12d0 [ 209.844405] ext4_fallocate+0x445/0x2070 [ 209.848481] ? rcu_read_lock_sched_held+0x110/0x130 [ 209.853514] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 209.858294] ? ext4_insert_range+0x12d0/0x12d0 [ 209.862892] vfs_fallocate+0x4aa/0x9d0 [ 209.866794] ksys_fallocate+0x58/0xa0 [ 209.870612] __x64_sys_fallocate+0x97/0xf0 [ 209.874862] do_syscall_64+0xfd/0x620 [ 209.878679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.883875] RIP: 0033:0x459879 [ 209.887080] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.905994] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 209.913713] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 209.920991] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 209.928260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.935643] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 209.943001] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 209.950298] CPU: 0 PID: 11966 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 209.957336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.966729] Call Trace: [ 209.969324] dump_stack+0x172/0x1f0 [ 209.972946] should_fail.cold+0xa/0x1b [ 209.976847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.981941] ? lock_downgrade+0x810/0x810 [ 209.986083] __should_failslab+0x121/0x190 [ 209.990323] should_failslab+0x9/0x14 [ 209.994112] kmem_cache_alloc+0x2ae/0x700 [ 209.998263] ? anon_vma_clone+0x320/0x480 [ 210.002403] anon_vma_fork+0x1ea/0x4a0 [ 210.006279] ? dup_userfaultfd+0x15e/0x6c0 [ 210.010504] copy_process.part.0+0x34e5/0x7a30 [ 210.015090] ? __cleanup_sighand+0x70/0x70 [ 210.019307] ? lock_downgrade+0x810/0x810 [ 210.023446] ? kasan_check_write+0x14/0x20 [ 210.027690] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 210.032530] _do_fork+0x257/0xfd0 [ 210.036024] ? fork_idle+0x1d0/0x1d0 [ 210.039725] ? fput+0x128/0x1a0 [ 210.042989] ? ksys_write+0x1f1/0x2d0 [ 210.046778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.051530] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.056274] ? do_syscall_64+0x26/0x620 [ 210.060251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.065603] ? do_syscall_64+0x26/0x620 [ 210.069564] __x64_sys_clone+0xbf/0x150 [ 210.073526] do_syscall_64+0xfd/0x620 [ 210.077315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.082488] RIP: 0033:0x459879 [ 210.085677] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.104576] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 210.112273] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 210.119531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 210.126784] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 210.134051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 210.149523] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:30 executing program 1 (fault-call:5 fault-nth:6): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 210.220348] x86/PAT: syz-executor.0:11966 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:30 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:30 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe800000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:30 executing program 0 (fault-call:6 fault-nth:35): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:30 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 210.406914] FAULT_INJECTION: forcing a failure. [ 210.406914] name failslab, interval 1, probability 0, space 0, times 0 [ 210.444293] CPU: 1 PID: 11987 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 210.451368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.460741] Call Trace: [ 210.463360] dump_stack+0x172/0x1f0 [ 210.467019] should_fail.cold+0xa/0x1b [ 210.470943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.476508] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.481642] ? mempool_alloc+0x380/0x380 [ 210.481663] __should_failslab+0x121/0x190 [ 210.481678] should_failslab+0x9/0x14 [ 210.481689] kmem_cache_alloc+0x47/0x700 [ 210.481709] ? mempool_alloc+0x380/0x380 [ 210.481722] mempool_alloc_slab+0x47/0x60 21:02:31 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec00000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:31 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 210.481737] mempool_alloc+0x169/0x380 [ 210.481751] ? __unlock_page_memcg+0x53/0x100 [ 210.481770] ? mempool_destroy+0x40/0x40 [ 210.481791] ? lock_downgrade+0x810/0x810 [ 210.481814] bio_alloc_bioset+0x3cd/0x690 [ 210.481828] ? unlock_page_memcg+0x2c/0x40 [ 210.481847] ? bvec_alloc+0x2f0/0x2f0 [ 210.497993] ext4_bio_write_page+0xbb8/0x133a [ 210.498019] mpage_submit_page+0x15a/0x270 [ 210.498036] mpage_process_page_bufs+0x517/0x610 [ 210.548449] mpage_prepare_extent_to_map+0xa86/0x1110 [ 210.553677] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 210.559439] ? __lock_is_held+0xb6/0x140 [ 210.563535] ext4_writepages+0x166a/0x3450 [ 210.567792] ? mark_held_locks+0x100/0x100 [ 210.572075] ? ext4_mark_inode_dirty+0x940/0x940 [ 210.576880] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 210.582170] ? find_held_lock+0x35/0x130 [ 210.586253] ? ext4_mark_inode_dirty+0x940/0x940 [ 210.591048] do_writepages+0xf3/0x2a0 [ 210.594852] ? do_writepages+0xf3/0x2a0 [ 210.598850] ? page_writeback_cpu_online+0x20/0x20 [ 210.603793] ? kasan_check_read+0x11/0x20 [ 210.607996] ? do_raw_spin_unlock+0x57/0x270 [ 210.612399] ? _raw_spin_unlock+0x2d/0x50 [ 210.616547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.622078] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 210.627356] __filemap_fdatawrite_range+0x26d/0x340 [ 210.632383] ? delete_from_page_cache_batch+0xec0/0xec0 [ 210.637750] ? proc_cwd_link+0x1d0/0x1d0 [ 210.641829] ? __lock_is_held+0xb6/0x140 [ 210.645920] filemap_write_and_wait_range+0x4b/0xd0 [ 210.650944] ext4_punch_hole+0x13d/0x11b0 [ 210.655105] ? __lock_is_held+0xb6/0x140 [ 210.659167] ? ext4_insert_range+0x12d0/0x12d0 [ 210.663747] ext4_fallocate+0x445/0x2070 [ 210.667819] ? rcu_read_lock_sched_held+0x110/0x130 [ 210.672834] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 210.677585] ? ext4_insert_range+0x12d0/0x12d0 [ 210.682188] vfs_fallocate+0x4aa/0x9d0 [ 210.686095] ksys_fallocate+0x58/0xa0 [ 210.689902] __x64_sys_fallocate+0x97/0xf0 [ 210.694143] do_syscall_64+0xfd/0x620 [ 210.697951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.703153] RIP: 0033:0x459879 [ 210.706338] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.725233] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 210.732932] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 210.740190] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 210.747455] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.754729] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 210.761999] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 210.822120] loop5: p1 p3 [ 210.885441] x86/PAT: syz-executor.0:12009 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:31 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x68, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:31 executing program 1 (fault-call:5 fault-nth:7): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:31 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:31 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 210.988274] FAULT_INJECTION: forcing a failure. [ 210.988274] name failslab, interval 1, probability 0, space 0, times 0 [ 211.030714] FAULT_INJECTION: forcing a failure. [ 211.030714] name failslab, interval 1, probability 0, space 0, times 0 [ 211.068375] CPU: 0 PID: 12014 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 211.075452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.084824] Call Trace: [ 211.087484] dump_stack+0x172/0x1f0 [ 211.091145] should_fail.cold+0xa/0x1b [ 211.095065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 211.100200] ? lock_downgrade+0x810/0x810 [ 211.104438] __should_failslab+0x121/0x190 [ 211.108697] should_failslab+0x9/0x14 [ 211.112538] kmem_cache_alloc+0x2ae/0x700 [ 211.116708] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 211.121744] ? __vm_enough_memory+0x324/0x5a0 [ 211.126307] vm_area_dup+0x21/0x170 [ 211.129974] copy_process.part.0+0x3407/0x7a30 [ 211.134613] ? __cleanup_sighand+0x70/0x70 [ 211.138873] ? lock_downgrade+0x810/0x810 [ 211.143068] ? kasan_check_write+0x14/0x20 [ 211.147376] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 211.152244] _do_fork+0x257/0xfd0 [ 211.155725] ? fork_idle+0x1d0/0x1d0 [ 211.159460] ? fput+0x128/0x1a0 [ 211.162756] ? ksys_write+0x1f1/0x2d0 [ 211.166594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.171368] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.176141] ? do_syscall_64+0x26/0x620 21:02:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfc00000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfe80000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 211.180131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.185516] ? do_syscall_64+0x26/0x620 [ 211.189513] __x64_sys_clone+0xbf/0x150 [ 211.193521] do_syscall_64+0xfd/0x620 [ 211.197355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.202565] RIP: 0033:0x459879 [ 211.205772] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.224686] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 211.232508] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 211.239803] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 211.247095] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 211.254382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 211.261669] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 211.269031] CPU: 1 PID: 12013 Comm: syz-executor.1 Not tainted 4.19.69 #43 [ 211.276070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.276075] Call Trace: [ 211.276099] dump_stack+0x172/0x1f0 [ 211.276117] should_fail.cold+0xa/0x1b [ 211.276132] ? __sanitizer_cov_trace_const_cmp8+0x10/0x20 [ 211.276148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 211.291731] ? mempool_alloc+0x380/0x380 [ 211.291752] __should_failslab+0x121/0x190 [ 211.313161] x86/PAT: syz-executor.0:12014 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 211.314573] should_failslab+0x9/0x14 [ 211.314589] kmem_cache_alloc+0x47/0x700 [ 211.314611] ? mempool_alloc+0x380/0x380 [ 211.314622] mempool_alloc_slab+0x47/0x60 [ 211.314638] mempool_alloc+0x169/0x380 [ 211.339363] ? __unlock_page_memcg+0x53/0x100 [ 211.347776] ? mempool_destroy+0x40/0x40 [ 211.347794] ? lock_downgrade+0x810/0x810 [ 211.347819] bio_alloc_bioset+0x3cd/0x690 [ 211.347834] ? unlock_page_memcg+0x2c/0x40 [ 211.347847] ? bvec_alloc+0x2f0/0x2f0 [ 211.347868] ext4_bio_write_page+0xbb8/0x133a [ 211.347893] mpage_submit_page+0x15a/0x270 [ 211.347910] mpage_process_page_bufs+0x517/0x610 [ 211.347933] mpage_prepare_extent_to_map+0xa86/0x1110 [ 211.347958] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 211.347984] ? __lock_is_held+0xb6/0x140 [ 211.396866] ext4_writepages+0x166a/0x3450 [ 211.401105] ? mark_held_locks+0x100/0x100 [ 211.405355] ? ext4_mark_inode_dirty+0x940/0x940 [ 211.410265] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 211.415580] ? find_held_lock+0x35/0x130 [ 211.419645] ? ext4_mark_inode_dirty+0x940/0x940 [ 211.424401] do_writepages+0xf3/0x2a0 [ 211.428200] ? do_writepages+0xf3/0x2a0 [ 211.432442] ? page_writeback_cpu_online+0x20/0x20 [ 211.437370] ? kasan_check_read+0x11/0x20 [ 211.441513] ? do_raw_spin_unlock+0x57/0x270 [ 211.445920] ? _raw_spin_unlock+0x2d/0x50 [ 211.450072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.455623] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 211.460902] __filemap_fdatawrite_range+0x26d/0x340 [ 211.465920] ? delete_from_page_cache_batch+0xec0/0xec0 [ 211.471283] ? proc_cwd_link+0x1d0/0x1d0 [ 211.475354] ? __lock_is_held+0xb6/0x140 [ 211.479570] filemap_write_and_wait_range+0x4b/0xd0 [ 211.484589] ext4_punch_hole+0x13d/0x11b0 [ 211.488750] ? __lock_is_held+0xb6/0x140 [ 211.492866] ? ext4_insert_range+0x12d0/0x12d0 [ 211.497456] ext4_fallocate+0x445/0x2070 [ 211.501519] ? rcu_read_lock_sched_held+0x110/0x130 [ 211.506534] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 211.511338] ? ext4_insert_range+0x12d0/0x12d0 [ 211.515967] vfs_fallocate+0x4aa/0x9d0 [ 211.519857] ksys_fallocate+0x58/0xa0 [ 211.523662] __x64_sys_fallocate+0x97/0xf0 [ 211.527897] do_syscall_64+0xfd/0x620 [ 211.531696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.536881] RIP: 0033:0x459879 [ 211.540069] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.559019] RSP: 002b:00007fb548f21c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 211.566866] RAX: ffffffffffffffda RBX: 00007fb548f21c90 RCX: 0000000000459879 [ 211.574291] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 21:02:32 executing program 0 (fault-call:6 fault-nth:36): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfec0000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 211.581606] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.588963] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fb548f226d4 [ 211.596310] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 211.635760] loop5: p1 p3 21:02:32 executing program 1 (fault-call:5 fault-nth:8): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:32 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x6c, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 211.715908] x86/PAT: syz-executor.0:12040 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xff00000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 211.808414] FAULT_INJECTION: forcing a failure. [ 211.808414] name failslab, interval 1, probability 0, space 0, times 0 [ 211.875409] CPU: 0 PID: 12051 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 211.882625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.892098] Call Trace: [ 211.894935] dump_stack+0x172/0x1f0 [ 211.898603] should_fail.cold+0xa/0x1b [ 211.902619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 211.907784] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 211.914156] __should_failslab+0x121/0x190 [ 211.918423] should_failslab+0x9/0x14 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 211.922254] kmem_cache_alloc+0x47/0x700 [ 211.926435] ? anon_vma_chain_link+0x154/0x1c0 [ 211.931043] anon_vma_clone+0xde/0x480 [ 211.934967] anon_vma_fork+0x8f/0x4a0 [ 211.938797] ? dup_userfaultfd+0x15e/0x6c0 [ 211.943063] ? memcpy+0x46/0x50 [ 211.946511] copy_process.part.0+0x34e5/0x7a30 [ 211.951145] ? __cleanup_sighand+0x70/0x70 [ 211.955409] ? lock_downgrade+0x810/0x810 [ 211.959592] ? kasan_check_write+0x14/0x20 [ 211.964075] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 211.968949] _do_fork+0x257/0xfd0 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 211.972437] ? fork_idle+0x1d0/0x1d0 [ 211.976180] ? fput+0x128/0x1a0 [ 211.979747] ? ksys_write+0x1f1/0x2d0 [ 211.983578] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.988359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.993225] ? do_syscall_64+0x26/0x620 [ 211.997221] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.002605] ? do_syscall_64+0x26/0x620 [ 212.006610] __x64_sys_clone+0xbf/0x150 [ 212.010620] do_syscall_64+0xfd/0x620 [ 212.014451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.019658] RIP: 0033:0x459879 [ 212.022876] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.041887] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 212.049720] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 212.057138] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 212.064432] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 212.071722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 212.079015] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 212.139263] x86/PAT: syz-executor.0:12075 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:32 executing program 0 (fault-call:6 fault-nth:37): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x80fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 212.181960] loop5: p1 p3 21:02:32 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x74, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:32 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xc0fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 212.346137] x86/PAT: syz-executor.0:12092 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 212.396591] FAULT_INJECTION: forcing a failure. [ 212.396591] name failslab, interval 1, probability 0, space 0, times 0 21:02:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x2, 0x5e89, 0xfff9) [ 212.505910] CPU: 0 PID: 12092 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 212.513258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.522633] Call Trace: [ 212.525347] dump_stack+0x172/0x1f0 [ 212.529010] should_fail.cold+0xa/0x1b [ 212.533136] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 212.538288] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 212.544669] __should_failslab+0x121/0x190 [ 212.549081] should_failslab+0x9/0x14 21:02:33 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) [ 212.552906] kmem_cache_alloc+0x47/0x700 [ 212.557123] ? anon_vma_chain_link+0x154/0x1c0 [ 212.561843] anon_vma_clone+0xde/0x480 [ 212.565755] anon_vma_fork+0x8f/0x4a0 [ 212.565770] ? dup_userfaultfd+0x15e/0x6c0 [ 212.565788] ? memcpy+0x46/0x50 [ 212.577318] copy_process.part.0+0x34e5/0x7a30 [ 212.577361] ? __cleanup_sighand+0x70/0x70 [ 212.577374] ? lock_downgrade+0x810/0x810 [ 212.577400] ? kasan_check_write+0x14/0x20 [ 212.577418] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 212.577437] _do_fork+0x257/0xfd0 21:02:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfc00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 212.577456] ? fork_idle+0x1d0/0x1d0 [ 212.577471] ? fput+0x128/0x1a0 [ 212.577486] ? ksys_write+0x1f1/0x2d0 [ 212.577507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.577522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.577536] ? do_syscall_64+0x26/0x620 [ 212.577549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.577562] ? do_syscall_64+0x26/0x620 [ 212.577579] __x64_sys_clone+0xbf/0x150 [ 212.577598] do_syscall_64+0xfd/0x620 [ 212.577618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.577631] RIP: 0033:0x459879 [ 212.577645] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.577653] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 212.577669] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 212.577677] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 212.577685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.577693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 212.577702] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 212.642723] x86/PAT: syz-executor.0:12112 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:33 executing program 0 (fault-call:6 fault-nth:38): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:33 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) 21:02:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x8, 0x5e89, 0xfff9) 21:02:33 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 212.810528] loop5: p1 p3 21:02:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfe80], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:33 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x7a, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:33 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, 0x0, 0x0) [ 212.937590] x86/PAT: syz-executor.0:12133 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:33 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x9, 0x5e89, 0xfff9) 21:02:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfec0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 213.061587] FAULT_INJECTION: forcing a failure. [ 213.061587] name failslab, interval 1, probability 0, space 0, times 0 [ 213.151008] CPU: 1 PID: 12144 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 213.158196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.167754] Call Trace: [ 213.170380] dump_stack+0x172/0x1f0 [ 213.174053] should_fail.cold+0xa/0x1b [ 213.178176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 213.183315] ? lock_downgrade+0x810/0x810 [ 213.187613] __should_failslab+0x121/0x190 [ 213.191872] should_failslab+0x9/0x14 [ 213.195696] kmem_cache_alloc+0x2ae/0x700 21:02:33 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 213.199965] ? anon_vma_clone+0x320/0x480 [ 213.204231] anon_vma_fork+0xfc/0x4a0 [ 213.208054] ? dup_userfaultfd+0x15e/0x6c0 [ 213.212311] ? memcpy+0x46/0x50 [ 213.215609] copy_process.part.0+0x34e5/0x7a30 [ 213.215655] ? __cleanup_sighand+0x70/0x70 [ 213.215667] ? lock_downgrade+0x810/0x810 [ 213.215689] ? kasan_check_write+0x14/0x20 [ 213.215710] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 213.224530] _do_fork+0x257/0xfd0 [ 213.224551] ? fork_idle+0x1d0/0x1d0 [ 213.224565] ? fput+0x128/0x1a0 21:02:33 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x68, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 213.224579] ? ksys_write+0x1f1/0x2d0 [ 213.224597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.224614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.224628] ? do_syscall_64+0x26/0x620 [ 213.224641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.224656] ? do_syscall_64+0x26/0x620 [ 213.224672] __x64_sys_clone+0xbf/0x150 [ 213.237981] do_syscall_64+0xfd/0x620 [ 213.238002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.245168] RIP: 0033:0x459879 [ 213.245182] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.245189] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 213.245203] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 213.245210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 213.245216] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 213.245224] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 213.245231] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 213.371525] x86/PAT: syz-executor.0:12144 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 213.396586] loop3: p1 p3 21:02:33 executing program 0 (fault-call:6 fault-nth:39): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xa, 0x5e89, 0xfff9) 21:02:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xff00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:33 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 213.429304] loop5: p1 p3 21:02:34 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xf0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:34 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0x0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 213.631619] x86/PAT: syz-executor.0:12185 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:34 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xd, 0x5e89, 0xfff9) 21:02:34 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfc000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 213.680432] FAULT_INJECTION: forcing a failure. [ 213.680432] name failslab, interval 1, probability 0, space 0, times 0 [ 213.719301] CPU: 1 PID: 12190 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 213.726376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.735928] Call Trace: [ 213.738561] dump_stack+0x172/0x1f0 [ 213.742234] should_fail.cold+0xa/0x1b [ 213.746164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 213.751302] ? lock_downgrade+0x810/0x810 [ 213.755493] __should_failslab+0x121/0x190 [ 213.759804] should_failslab+0x9/0x14 [ 213.763631] kmem_cache_alloc+0x2ae/0x700 [ 213.763647] ? anon_vma_clone+0x320/0x480 [ 213.763670] anon_vma_fork+0x1ea/0x4a0 [ 213.776067] ? dup_userfaultfd+0x15e/0x6c0 [ 213.776090] copy_process.part.0+0x34e5/0x7a30 [ 213.776127] ? __cleanup_sighand+0x70/0x70 [ 213.776140] ? lock_downgrade+0x810/0x810 [ 213.776161] ? kasan_check_write+0x14/0x20 [ 213.776177] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 213.776196] _do_fork+0x257/0xfd0 [ 213.776214] ? fork_idle+0x1d0/0x1d0 [ 213.776227] ? fput+0x128/0x1a0 [ 213.776242] ? ksys_write+0x1f1/0x2d0 [ 213.793568] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.793586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.827125] ? do_syscall_64+0x26/0x620 21:02:34 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xf, 0x5e89, 0xfff9) [ 213.831481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.836880] ? do_syscall_64+0x26/0x620 [ 213.840893] __x64_sys_clone+0xbf/0x150 [ 213.844985] do_syscall_64+0xfd/0x620 [ 213.848819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.854025] RIP: 0033:0x459879 [ 213.857236] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:34 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 213.876314] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 213.884175] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 213.891470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 213.898844] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 213.906117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 213.906125] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:34 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 214.046755] x86/PAT: syz-executor.0:12190 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:34 executing program 0 (fault-call:6 fault-nth:40): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfe800000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:34 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x10, 0x5e89, 0xfff9) 21:02:34 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x3, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 214.119869] loop5: p1 p3 [ 214.275291] x86/PAT: syz-executor.0:12235 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:34 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:34 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x126, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfec00000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 214.320345] FAULT_INJECTION: forcing a failure. [ 214.320345] name failslab, interval 1, probability 0, space 0, times 0 [ 214.403714] CPU: 1 PID: 12235 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 214.411131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.420740] Call Trace: [ 214.423372] dump_stack+0x172/0x1f0 [ 214.427041] should_fail.cold+0xa/0x1b [ 214.430968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 214.436104] ? lock_downgrade+0x810/0x810 [ 214.440408] __should_failslab+0x121/0x190 [ 214.444674] should_failslab+0x9/0x14 [ 214.448501] kmem_cache_alloc+0x2ae/0x700 [ 214.452743] ? anon_vma_clone+0x320/0x480 [ 214.456923] anon_vma_fork+0x1ea/0x4a0 [ 214.460841] ? dup_userfaultfd+0x15e/0x6c0 [ 214.465109] copy_process.part.0+0x34e5/0x7a30 [ 214.469745] ? __cleanup_sighand+0x70/0x70 [ 214.473999] ? lock_downgrade+0x810/0x810 [ 214.478328] ? kasan_check_write+0x14/0x20 [ 214.482584] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 214.487448] _do_fork+0x257/0xfd0 [ 214.491016] ? fork_idle+0x1d0/0x1d0 [ 214.494750] ? fput+0x128/0x1a0 [ 214.498118] ? ksys_write+0x1f1/0x2d0 [ 214.502113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 214.506919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 214.511701] ? do_syscall_64+0x26/0x620 [ 214.515693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.521078] ? do_syscall_64+0x26/0x620 [ 214.525065] __x64_sys_clone+0xbf/0x150 [ 214.525082] do_syscall_64+0xfd/0x620 [ 214.525100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.525111] RIP: 0033:0x459879 21:02:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xff000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xf0, 0x5e89, 0xfff9) 21:02:35 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x5, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 214.525126] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.560626] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 214.568439] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 214.568447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 214.568455] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 214.568462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 214.568470] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 214.590091] x86/PAT: syz-executor.0:12235 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 214.643145] loop5: p1 p3 21:02:35 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfc00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:35 executing program 0 (fault-call:6 fault-nth:41): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:35 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1c0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:35 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x4, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xf000, 0x5e89, 0xfff9) 21:02:35 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfe80000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 214.951415] x86/PAT: syz-executor.0:12288 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:35 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x18, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 215.086146] FAULT_INJECTION: forcing a failure. [ 215.086146] name failslab, interval 1, probability 0, space 0, times 0 [ 215.099598] loop5: p1 p3 [ 215.128255] CPU: 0 PID: 12301 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 215.135362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.144748] Call Trace: [ 215.147387] dump_stack+0x172/0x1f0 [ 215.151153] should_fail.cold+0xa/0x1b [ 215.155086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 215.160466] ? lock_downgrade+0x810/0x810 [ 215.164663] __should_failslab+0x121/0x190 [ 215.168935] should_failslab+0x9/0x14 [ 215.172764] kmem_cache_alloc+0x2ae/0x700 21:02:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xfff0, 0x5e89, 0xfff9) 21:02:35 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 215.176942] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 215.182641] ptlock_alloc+0x20/0x70 [ 215.186295] pte_alloc_one+0x6d/0x1a0 [ 215.190114] __pte_alloc+0x2a/0x360 [ 215.193763] copy_page_range+0x151f/0x1f90 [ 215.198140] ? anon_vma_fork+0x371/0x4a0 [ 215.202209] ? find_held_lock+0x35/0x130 [ 215.206267] ? anon_vma_fork+0x371/0x4a0 [ 215.210474] ? vma_compute_subtree_gap+0x158/0x230 [ 215.215545] ? vma_gap_callbacks_rotate+0x62/0x80 [ 215.220387] ? pmd_alloc+0x180/0x180 [ 215.224120] ? __vma_link_rb+0x279/0x370 [ 215.228185] copy_process.part.0+0x543d/0x7a30 [ 215.232933] ? __cleanup_sighand+0x70/0x70 [ 215.237305] ? lock_downgrade+0x810/0x810 [ 215.241472] ? kasan_check_write+0x14/0x20 [ 215.245857] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 215.250794] _do_fork+0x257/0xfd0 [ 215.254377] ? fork_idle+0x1d0/0x1d0 [ 215.258136] ? fput+0x128/0x1a0 [ 215.261504] ? ksys_write+0x1f1/0x2d0 [ 215.265420] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.270296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.275060] ? do_syscall_64+0x26/0x620 [ 215.279181] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.284545] ? do_syscall_64+0x26/0x620 [ 215.288524] __x64_sys_clone+0xbf/0x150 [ 215.292512] do_syscall_64+0xfd/0x620 [ 215.296410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.301700] RIP: 0033:0x459879 [ 215.305016] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfec0000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 215.324038] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 215.331850] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 215.339419] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 215.346686] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 215.354086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 215.361355] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:35 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xe0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 215.400768] x86/PAT: syz-executor.0:12301 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:36 executing program 0 (fault-call:6 fault-nth:42): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:36 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:36 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1e2, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xff00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x1800, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xfffff000, 0x5e89, 0xfff9) [ 215.742866] x86/PAT: syz-executor.0:12341 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:36 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xe000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 215.813787] FAULT_INJECTION: forcing a failure. [ 215.813787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:02:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xfffffff0, 0x5e89, 0xfff9) [ 215.901647] loop5: p1 p3 [ 215.964142] CPU: 1 PID: 12341 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 215.971508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.981026] Call Trace: [ 215.983660] dump_stack+0x172/0x1f0 [ 215.987337] should_fail.cold+0xa/0x1b [ 215.991268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 215.996449] ? __might_sleep+0x95/0x190 [ 216.000469] __alloc_pages_nodemask+0x1ee/0x750 [ 216.005174] ? __lock_is_held+0xb6/0x140 [ 216.009355] ? __alloc_pages_slowpath+0x2870/0x2870 [ 216.014491] ? find_held_lock+0x35/0x130 [ 216.018598] ? find_held_lock+0x35/0x130 [ 216.022690] ? copy_page_range+0x124f/0x1f90 [ 216.027130] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 216.032710] alloc_pages_current+0x107/0x210 [ 216.037156] pte_alloc_one+0x1b/0x1a0 [ 216.041205] __pte_alloc+0x2a/0x360 [ 216.044856] copy_page_range+0x151f/0x1f90 [ 216.049199] ? anon_vma_fork+0x371/0x4a0 [ 216.053451] ? pmd_alloc+0x180/0x180 [ 216.057192] ? __vma_link_rb+0x279/0x370 21:02:36 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x1000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xfffffffffffff000, 0x5e89, 0xfff9) [ 216.061281] copy_process.part.0+0x543d/0x7a30 [ 216.065912] ? __cleanup_sighand+0x70/0x70 [ 216.070178] ? lock_downgrade+0x810/0x810 [ 216.074355] ? kasan_check_write+0x14/0x20 [ 216.078613] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 216.083577] _do_fork+0x257/0xfd0 [ 216.087063] ? fork_idle+0x1d0/0x1d0 [ 216.090801] ? fput+0x128/0x1a0 [ 216.094113] ? ksys_write+0x1f1/0x2d0 [ 216.097962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 216.102744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 216.107621] ? do_syscall_64+0x26/0x620 [ 216.111636] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.117020] ? do_syscall_64+0x26/0x620 [ 216.121001] __x64_sys_clone+0xbf/0x150 [ 216.124989] do_syscall_64+0xfd/0x620 [ 216.128805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.133993] RIP: 0033:0x459879 [ 216.137188] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.156088] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 216.163864] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 216.171130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 216.178402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 216.185667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 216.193106] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 216.213806] print_req_error: 985 callbacks suppressed [ 216.213817] print_req_error: I/O error, dev loop5, sector 0 [ 216.229425] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 216.229724] print_req_error: I/O error, dev loop5, sector 2304 [ 216.246618] x86/PAT: syz-executor.0:12341 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 216.269537] print_req_error: I/O error, dev loop5, sector 0 [ 216.275385] buffer_io_error: 983 callbacks suppressed [ 216.275395] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 216.289065] print_req_error: I/O error, dev loop5, sector 2 [ 216.295293] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 216.303333] print_req_error: I/O error, dev loop5, sector 4 [ 216.309190] Buffer I/O error on dev loop5p3, logical block 2, async page read [ 216.317050] print_req_error: I/O error, dev loop5, sector 6 [ 216.322962] Buffer I/O error on dev loop5p3, logical block 3, async page read [ 216.331719] print_req_error: I/O error, dev loop5, sector 0 [ 216.337780] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 216.347704] print_req_error: I/O error, dev loop5, sector 2 [ 216.353702] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 216.361768] print_req_error: I/O error, dev loop5, sector 4 21:02:36 executing program 0 (fault-call:6 fault-nth:43): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x80fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:36 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x300, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:36 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x4000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xfffffffffffffff0, 0x5e89, 0xfff9) [ 216.367625] Buffer I/O error on dev loop5p3, logical block 2, async page read [ 216.384000] print_req_error: I/O error, dev loop5, sector 6 [ 216.389778] Buffer I/O error on dev loop5p3, logical block 3, async page read [ 216.397405] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 216.405027] Buffer I/O error on dev loop5p1, logical block 1, async page read 21:02:37 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0x0, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xc0fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x18000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x15e81, 0xfff9) [ 216.595966] x86/PAT: syz-executor.0:12394 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:37 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xe0000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 216.743595] FAULT_INJECTION: forcing a failure. [ 216.743595] name failslab, interval 1, probability 0, space 0, times 0 [ 216.779489] loop5: p1 p3 [ 216.810820] CPU: 0 PID: 12409 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 216.817905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.817913] Call Trace: [ 216.817948] dump_stack+0x172/0x1f0 [ 216.817969] should_fail.cold+0xa/0x1b [ 216.817988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 216.818005] ? lock_downgrade+0x810/0x810 [ 216.818028] __should_failslab+0x121/0x190 [ 216.818048] should_failslab+0x9/0x14 [ 216.818064] kmem_cache_alloc+0x2ae/0x700 [ 216.818079] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 216.818099] ptlock_alloc+0x20/0x70 [ 216.842693] pte_alloc_one+0x6d/0x1a0 [ 216.851085] __pte_alloc+0x2a/0x360 [ 216.859544] copy_page_range+0x151f/0x1f90 [ 216.868691] ? anon_vma_fork+0x371/0x4a0 [ 216.876254] ? pmd_alloc+0x180/0x180 [ 216.876271] ? __vma_link_rb+0x279/0x370 [ 216.876290] copy_process.part.0+0x543d/0x7a30 [ 216.884613] ? __cleanup_sighand+0x70/0x70 [ 216.884628] ? lock_downgrade+0x810/0x810 [ 216.892530] ? kasan_check_write+0x14/0x20 [ 216.901445] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 216.909817] _do_fork+0x257/0xfd0 [ 216.918153] ? fork_idle+0x1d0/0x1d0 [ 216.921869] ? fput+0x128/0x1a0 [ 216.925469] ? ksys_write+0x1f1/0x2d0 [ 216.925488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 216.925501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 216.925516] ? do_syscall_64+0x26/0x620 [ 216.934888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.934902] ? do_syscall_64+0x26/0x620 [ 216.934919] __x64_sys_clone+0xbf/0x150 [ 216.934936] do_syscall_64+0xfd/0x620 [ 216.934953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.966143] RIP: 0033:0x459879 [ 216.969359] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.988425] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 216.996169] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 217.003550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 21:02:37 executing program 0 (fault-call:6 fault-nth:44): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x4003fd, 0xfff9) 21:02:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfe80], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 217.010858] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 217.018261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 217.025557] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 217.046521] x86/PAT: syz-executor.0:12409 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:37 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x328, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:37 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:37 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xfeffffff, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfec0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 217.279564] FAULT_INJECTION: forcing a failure. [ 217.279564] name failslab, interval 1, probability 0, space 0, times 0 [ 217.314181] CPU: 1 PID: 12433 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 217.321265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.330745] Call Trace: [ 217.333382] dump_stack+0x172/0x1f0 [ 217.337156] should_fail.cold+0xa/0x1b [ 217.341088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 217.346230] ? lock_downgrade+0x810/0x810 [ 217.350421] __should_failslab+0x121/0x190 [ 217.354693] should_failslab+0x9/0x14 [ 217.358670] kmem_cache_alloc+0x2ae/0x700 [ 217.362941] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 217.367990] ? __vm_enough_memory+0x324/0x5a0 [ 217.372528] vm_area_dup+0x21/0x170 [ 217.376188] copy_process.part.0+0x3407/0x7a30 [ 217.380937] ? __cleanup_sighand+0x70/0x70 [ 217.385206] ? lock_downgrade+0x810/0x810 [ 217.389398] ? kasan_check_write+0x14/0x20 [ 217.393676] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 217.398661] _do_fork+0x257/0xfd0 [ 217.402152] ? fork_idle+0x1d0/0x1d0 [ 217.406042] ? fput+0x128/0x1a0 [ 217.409349] ? ksys_write+0x1f1/0x2d0 [ 217.413166] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 217.417932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 217.417944] ? do_syscall_64+0x26/0x620 [ 217.417957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.417969] ? do_syscall_64+0x26/0x620 [ 217.417986] __x64_sys_clone+0xbf/0x150 [ 217.418001] do_syscall_64+0xfd/0x620 [ 217.418015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.418025] RIP: 0033:0x459879 [ 217.418039] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.418046] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 21:02:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xff00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xfffffffe, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x10) 21:02:37 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 217.418060] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 217.418067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 217.418075] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 217.418081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 217.418093] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 217.589501] loop5: p1 p3 21:02:38 executing program 0 (fault-call:6 fault-nth:45): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:38 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x100000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:38 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:38 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xff10) 21:02:38 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x3da, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:38 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfe800000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:38 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x400000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 217.914313] x86/PAT: syz-executor.0:12492 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:38 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff0) [ 217.972293] FAULT_INJECTION: forcing a failure. [ 217.972293] name failslab, interval 1, probability 0, space 0, times 0 [ 218.008890] CPU: 1 PID: 12496 Comm: syz-executor.0 Not tainted 4.19.69 #43 21:02:38 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfec00000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 218.015967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.025432] Call Trace: [ 218.028052] dump_stack+0x172/0x1f0 [ 218.031735] should_fail.cold+0xa/0x1b [ 218.035670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 218.040942] ? find_held_lock+0x35/0x130 [ 218.045050] ? percpu_ref_put_many+0x94/0x190 [ 218.049587] __should_failslab+0x121/0x190 [ 218.053854] should_failslab+0x9/0x14 [ 218.057804] kmem_cache_alloc+0x47/0x700 [ 218.061888] ? __lock_is_held+0xb6/0x140 [ 218.065965] anon_vma_clone+0xde/0x480 [ 218.065985] anon_vma_fork+0x8f/0x4a0 [ 218.065998] ? dup_userfaultfd+0x15e/0x6c0 [ 218.066011] ? memcpy+0x46/0x50 [ 218.066029] copy_process.part.0+0x34e5/0x7a30 [ 218.066064] ? __cleanup_sighand+0x70/0x70 [ 218.090077] ? lock_downgrade+0x810/0x810 [ 218.094255] ? kasan_check_write+0x14/0x20 [ 218.094273] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 218.094293] _do_fork+0x257/0xfd0 [ 218.094310] ? fork_idle+0x1d0/0x1d0 [ 218.094323] ? fput+0x128/0x1a0 [ 218.094338] ? ksys_write+0x1f1/0x2d0 [ 218.103529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.107644] loop5: p1 p3 [ 218.110687] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.130074] ? do_syscall_64+0x26/0x620 [ 218.134064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.134080] ? do_syscall_64+0x26/0x620 [ 218.134097] __x64_sys_clone+0xbf/0x150 [ 218.134113] do_syscall_64+0xfd/0x620 [ 218.134130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.134140] RIP: 0033:0x459879 [ 218.134154] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.134167] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 [ 218.143648] ORIG_RAX: 0000000000000038 [ 218.143658] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 218.143667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 218.143676] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 218.143683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 21:02:38 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000000040)={0x7, "0df7cfc68ceca654e97b32f3671a410208349744ea93781338c4fea36a808d45", 0x1}) [ 218.143695] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 218.268919] x86/PAT: syz-executor.0:12512 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:38 executing program 0 (fault-call:6 fault-nth:46): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:38 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x1800000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:38 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xff000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) 21:02:39 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x480, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:39 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) read(r0, &(0x7f0000000040)=""/98, 0x62) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:39 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xe000000000000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) 21:02:39 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x80) [ 218.675410] x86/PAT: syz-executor.0:12548 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:39 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0xfeffffff00000000, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 218.752978] FAULT_INJECTION: forcing a failure. [ 218.752978] name failslab, interval 1, probability 0, space 0, times 0 [ 218.786681] CPU: 0 PID: 12560 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 218.793913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.803297] Call Trace: [ 218.805926] dump_stack+0x172/0x1f0 [ 218.809581] should_fail.cold+0xa/0x1b [ 218.813596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 218.818738] ? __lock_is_held+0xb6/0x140 [ 218.822905] ? __lock_is_held+0xb6/0x140 [ 218.826998] __should_failslab+0x121/0x190 [ 218.831274] should_failslab+0x9/0x14 [ 218.835107] kmem_cache_alloc+0x47/0x700 [ 218.839323] ? anon_vma_chain_link+0x154/0x1c0 [ 218.843935] anon_vma_clone+0xde/0x480 [ 218.847893] anon_vma_fork+0x8f/0x4a0 [ 218.851741] ? dup_userfaultfd+0x15e/0x6c0 [ 218.856095] ? memcpy+0x46/0x50 [ 218.859408] copy_process.part.0+0x34e5/0x7a30 [ 218.864050] ? __cleanup_sighand+0x70/0x70 [ 218.868304] ? lock_downgrade+0x810/0x810 [ 218.872485] ? kasan_check_write+0x14/0x20 [ 218.876754] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 218.881746] _do_fork+0x257/0xfd0 [ 218.885227] ? fork_idle+0x1d0/0x1d0 [ 218.888972] ? fput+0x128/0x1a0 [ 218.892300] ? ksys_write+0x1f1/0x2d0 [ 218.896120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.901035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.905932] ? do_syscall_64+0x26/0x620 [ 218.910169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.915711] ? do_syscall_64+0x26/0x620 [ 218.919722] __x64_sys_clone+0xbf/0x150 [ 218.923750] do_syscall_64+0xfd/0x620 [ 218.927674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.927686] RIP: 0033:0x459879 21:02:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfe80000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 218.927702] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.956792] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 218.956809] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 218.956818] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 218.956827] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 218.956835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 218.956843] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 218.965960] loop5: p1 p3 [ 219.090375] x86/PAT: syz-executor.0:12560 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:39 executing program 0 (fault-call:6 fault-nth:47): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:39 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) 21:02:39 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfec0000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(0xffffffffffffffff, 0x40, 0x0, 0x4003fd) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(0xffffffffffffffff, 0x3, 0xd9bd, 0x7fff) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0xfff9) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x3f) 21:02:39 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x500, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0xff00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x18, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:39 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x0, 0x5e89, 0xfff9) 21:02:39 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x8, @local, 0x9}}, 0x1, 0x27, 0x101, 0x8, 0x4c}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r1}, &(0x7f0000000180)=0x8) [ 219.308351] x86/PAT: syz-executor.0:12596 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 219.399624] FAULT_INJECTION: forcing a failure. [ 219.399624] name failslab, interval 1, probability 0, space 0, times 0 21:02:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x5, 0x8}, {0x3, 0x82f}, 0x5, 0x4, 0x2800000000}) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 219.461705] CPU: 0 PID: 12610 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 219.468788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.478394] Call Trace: [ 219.481028] dump_stack+0x172/0x1f0 [ 219.484695] should_fail.cold+0xa/0x1b [ 219.488621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 219.494122] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 219.500560] __should_failslab+0x121/0x190 [ 219.504911] should_failslab+0x9/0x14 [ 219.508713] kmem_cache_alloc+0x47/0x700 [ 219.512792] ? anon_vma_chain_link+0x154/0x1c0 [ 219.517377] anon_vma_clone+0xde/0x480 [ 219.521267] anon_vma_fork+0x8f/0x4a0 [ 219.525228] ? dup_userfaultfd+0x15e/0x6c0 [ 219.529526] ? memcpy+0x46/0x50 [ 219.532810] copy_process.part.0+0x34e5/0x7a30 [ 219.537475] ? __cleanup_sighand+0x70/0x70 [ 219.541711] ? lock_downgrade+0x810/0x810 [ 219.545864] ? kasan_check_write+0x14/0x20 [ 219.550251] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 219.555158] _do_fork+0x257/0xfd0 [ 219.558625] ? fork_idle+0x1d0/0x1d0 [ 219.562341] ? fput+0x128/0x1a0 [ 219.565623] ? ksys_write+0x1f1/0x2d0 [ 219.569422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.574258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.579013] ? do_syscall_64+0x26/0x620 [ 219.583078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.588528] ? do_syscall_64+0x26/0x620 [ 219.592529] __x64_sys_clone+0xbf/0x150 [ 219.596582] do_syscall_64+0xfd/0x620 [ 219.600414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.605613] RIP: 0033:0x459879 [ 219.608806] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.627942] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 219.635794] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 219.643058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 219.650472] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 219.657780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 219.665135] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 219.690247] x86/PAT: syz-executor.0:12617 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 219.708736] loop5: p1 p3 21:02:40 executing program 0 (fault-call:6 fault-nth:48): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:40 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xe0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:40 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) 21:02:40 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) 21:02:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x80fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:40 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x600, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:40 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x1800, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="ac"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) readahead(r0, 0x8, 0x100000001) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) [ 220.027676] x86/PAT: syz-executor.0:12641 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xc0fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:40 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xe000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 220.088524] FAULT_INJECTION: forcing a failure. [ 220.088524] name failslab, interval 1, probability 0, space 0, times 0 21:02:40 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x0, 0xfff9) 21:02:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB='j'], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) dup2(r0, r0) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 220.242859] CPU: 1 PID: 12657 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 220.250217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.259706] Call Trace: [ 220.262332] dump_stack+0x172/0x1f0 [ 220.265997] should_fail.cold+0xa/0x1b [ 220.270012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 220.275157] ? lock_downgrade+0x810/0x810 [ 220.279461] __should_failslab+0x121/0x190 [ 220.283736] should_failslab+0x9/0x14 [ 220.287571] kmem_cache_alloc+0x2ae/0x700 [ 220.291745] ? anon_vma_clone+0x320/0x480 [ 220.295924] anon_vma_fork+0xfc/0x4a0 [ 220.299959] ? dup_userfaultfd+0x15e/0x6c0 [ 220.304219] ? memcpy+0x46/0x50 [ 220.307523] copy_process.part.0+0x34e5/0x7a30 [ 220.312133] ? __cleanup_sighand+0x70/0x70 [ 220.316560] ? lock_downgrade+0x810/0x810 [ 220.320716] ? kasan_check_write+0x14/0x20 [ 220.324952] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 220.329795] _do_fork+0x257/0xfd0 [ 220.333358] ? fork_idle+0x1d0/0x1d0 [ 220.337354] ? fput+0x128/0x1a0 [ 220.340639] ? ksys_write+0x1f1/0x2d0 [ 220.344443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.349193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.354235] ? do_syscall_64+0x26/0x620 [ 220.358331] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.363702] ? do_syscall_64+0x26/0x620 [ 220.367767] __x64_sys_clone+0xbf/0x150 [ 220.371741] do_syscall_64+0xfd/0x620 [ 220.375562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.380744] RIP: 0033:0x459879 [ 220.383939] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.403075] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 220.410857] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 220.418128] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 220.425486] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 220.432752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 220.440017] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 220.455632] x86/PAT: syz-executor.0:12641 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 220.471724] loop5: p1 p3 21:02:41 executing program 0 (fault-call:6 fault-nth:49): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) 21:02:41 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x1000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x700, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfe80], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) 21:02:41 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x4000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 220.698600] x86/PAT: syz-executor.0:12693 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000780), 0x4) fallocate(r0, 0x3, 0xd9bd, 0x7fff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x528, 0x3d0, 0x0, 0x0, 0xf0, 0xf0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3, 0x8a8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @remote, 0xffffff00, 0xff000000, 'vxcan1\x00', 'team0\x00', {0xde6108f1740bdde8}, {}, 0x84, 0x3, 0x8}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x1f}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x38}}}, {{@ip={@local, @local, 0xffffffff, 0xffffff00, 'batadv0\x00', 'tunl0\x00', {0xff}, {0xff}, 0x62, 0x1, 0x62}, 0x0, 0x98, 0xc0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x5}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x334}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x588) fallocate(r0, 0x3, 0x5e89, 0xfff9) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000700)={0x0, 0x6}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000008c0)={r1, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x5b}}, 0x5, 0x200}, &(0x7f0000000980)=0xffffffffffffffd1) [ 220.780931] FAULT_INJECTION: forcing a failure. [ 220.780931] name failslab, interval 1, probability 0, space 0, times 0 [ 220.840574] CPU: 0 PID: 12704 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 220.847656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.857121] Call Trace: [ 220.859855] dump_stack+0x172/0x1f0 [ 220.863610] should_fail.cold+0xa/0x1b [ 220.867564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 220.872786] ? lock_downgrade+0x810/0x810 [ 220.877325] __should_failslab+0x121/0x190 [ 220.881606] should_failslab+0x9/0x14 [ 220.885535] kmem_cache_alloc+0x2ae/0x700 [ 220.889679] ? anon_vma_clone+0x320/0x480 [ 220.893981] anon_vma_fork+0xfc/0x4a0 [ 220.897783] ? dup_userfaultfd+0x15e/0x6c0 [ 220.902168] ? memcpy+0x46/0x50 [ 220.905462] copy_process.part.0+0x34e5/0x7a30 [ 220.910072] ? __cleanup_sighand+0x70/0x70 [ 220.914579] ? lock_downgrade+0x810/0x810 [ 220.918944] ? kasan_check_write+0x14/0x20 [ 220.923185] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 220.928033] _do_fork+0x257/0xfd0 [ 220.932548] ? fork_idle+0x1d0/0x1d0 [ 220.936554] ? fput+0x128/0x1a0 [ 220.939967] ? ksys_write+0x1f1/0x2d0 [ 220.943773] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.948542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.953400] ? do_syscall_64+0x26/0x620 [ 220.957373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.962812] ? do_syscall_64+0x26/0x620 [ 220.966799] __x64_sys_clone+0xbf/0x150 [ 220.970778] do_syscall_64+0xfd/0x620 [ 220.974582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.979914] RIP: 0033:0x459879 [ 220.983111] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.002158] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 221.009880] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 221.017355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 221.024631] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 221.032104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 21:02:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfec0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x18000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 221.039463] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 221.072675] x86/PAT: syz-executor.0:12688 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0x0) [ 221.095789] loop5: p1 p3 21:02:41 executing program 0 (fault-call:6 fault-nth:50): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) write$9p(r0, &(0x7f0000000080)="dd745bf7f95b0fe9960b5b4be324951b5ca16909fa381bbbd86a7c27064effd13f299aade924799d79b8118dc51ab0525060fbe5cc9c37dfe9517f205b602b014fca6d8fa1dc1b818b6414ade034ea51b7f3f0ac68368a818a2d08092557904470bc9bc8b11bd2b79611ab58fc6995a366767ba1ad302cc913a7a9b932e96157989756f2c06a6731f9576f4a96db8438154b0de9c77417dab5eb765e49996ed4b25c29619a43", 0xa6) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xe0000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:41 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x900, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 221.340692] x86/PAT: syz-executor.0:12735 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 21:02:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x0, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 221.438058] FAULT_INJECTION: forcing a failure. [ 221.438058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:02:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:42 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xfeffffff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:42 executing program 2 (fault-call:4 fault-nth:0): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 221.664754] CPU: 1 PID: 12746 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 221.671835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.681214] Call Trace: [ 221.683844] dump_stack+0x172/0x1f0 [ 221.687545] should_fail.cold+0xa/0x1b [ 221.691475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 221.696618] ? __might_sleep+0x95/0x190 [ 221.700617] __alloc_pages_nodemask+0x1ee/0x750 [ 221.705313] ? save_stack+0xa9/0xd0 [ 221.708984] ? __alloc_pages_slowpath+0x2870/0x2870 21:02:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) fcntl$setsig(r0, 0xa, 0x14) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 221.714024] ? copy_process.part.0+0x34e5/0x7a30 [ 221.719106] ? mark_held_locks+0x100/0x100 [ 221.725376] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 221.730954] alloc_pages_current+0x107/0x210 [ 221.734851] FAULT_INJECTION: forcing a failure. [ 221.734851] name failslab, interval 1, probability 0, space 0, times 0 [ 221.735416] pte_alloc_one+0x1b/0x1a0 [ 221.735432] __pte_alloc+0x2a/0x360 [ 221.735449] copy_page_range+0x151f/0x1f90 [ 221.735470] ? anon_vma_fork+0x371/0x4a0 [ 221.762387] ? find_held_lock+0x35/0x130 [ 221.766455] ? anon_vma_fork+0x371/0x4a0 [ 221.770543] ? lock_downgrade+0x810/0x810 [ 221.774718] ? pmd_alloc+0x180/0x180 [ 221.778465] ? __vma_link_rb+0x279/0x370 [ 221.782549] copy_process.part.0+0x543d/0x7a30 [ 221.787182] ? __cleanup_sighand+0x70/0x70 [ 221.791436] ? lock_downgrade+0x810/0x810 [ 221.795613] ? kasan_check_write+0x14/0x20 [ 221.799894] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 221.804776] _do_fork+0x257/0xfd0 [ 221.808329] ? fork_idle+0x1d0/0x1d0 [ 221.812046] ? fput+0x128/0x1a0 [ 221.815329] ? ksys_write+0x1f1/0x2d0 [ 221.819135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.823895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.828657] ? do_syscall_64+0x26/0x620 [ 221.832635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.838014] ? do_syscall_64+0x26/0x620 [ 221.842002] __x64_sys_clone+0xbf/0x150 [ 221.845994] do_syscall_64+0xfd/0x620 [ 221.849804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.854986] RIP: 0033:0x459879 [ 221.855003] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.855012] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 221.855025] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 221.855032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 221.855038] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 221.855045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 221.855053] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 221.855860] CPU: 1 PID: 12772 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 221.877207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.877213] Call Trace: [ 221.877237] dump_stack+0x172/0x1f0 [ 221.877255] should_fail.cold+0xa/0x1b [ 221.877271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 221.877286] ? lock_downgrade+0x810/0x810 [ 221.877307] __should_failslab+0x121/0x190 [ 221.877340] should_failslab+0x9/0x14 21:02:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:42 executing program 0 (fault-call:6 fault-nth:51): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:42 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xfffffffe, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 221.877351] kmem_cache_alloc+0x2ae/0x700 [ 221.877375] ext4_init_io_end+0x29/0x120 [ 221.906920] ext4_writepages+0x1170/0x3450 [ 221.906934] ? mark_held_locks+0x100/0x100 [ 221.906946] ? mark_held_locks+0x100/0x100 [ 221.906975] ? ext4_mark_inode_dirty+0x940/0x940 [ 221.907005] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 221.907020] ? find_held_lock+0x35/0x130 [ 221.907038] ? ext4_mark_inode_dirty+0x940/0x940 [ 221.907053] do_writepages+0xf3/0x2a0 [ 221.907065] ? do_writepages+0xf3/0x2a0 21:02:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfe800000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 221.907082] ? page_writeback_cpu_online+0x20/0x20 [ 221.907098] ? kasan_check_read+0x11/0x20 [ 221.907111] ? do_raw_spin_unlock+0x57/0x270 [ 221.907126] ? _raw_spin_unlock+0x2d/0x50 [ 221.907140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.907153] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 221.907171] __filemap_fdatawrite_range+0x26d/0x340 [ 221.907185] ? delete_from_page_cache_batch+0xec0/0xec0 [ 221.907195] ? proc_cwd_link+0x1d0/0x1d0 [ 221.907216] ? __lock_is_held+0xb6/0x140 [ 221.926664] x86/PAT: syz-executor.0:12746 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 221.928790] filemap_write_and_wait_range+0x4b/0xd0 [ 221.928809] ext4_punch_hole+0x13d/0x11b0 [ 222.077751] ? __lock_is_held+0xb6/0x140 [ 222.081805] ? ext4_insert_range+0x12d0/0x12d0 [ 222.086388] ext4_fallocate+0x445/0x2070 [ 222.090446] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.095466] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 222.100227] ? ext4_insert_range+0x12d0/0x12d0 [ 222.104806] vfs_fallocate+0x4aa/0x9d0 [ 222.108694] ksys_fallocate+0x58/0xa0 [ 222.112483] __x64_sys_fallocate+0x97/0xf0 [ 222.116811] do_syscall_64+0xfd/0x620 [ 222.120614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.125787] RIP: 0033:0x459879 [ 222.128974] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.147903] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 222.155611] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 222.162884] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 222.170142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.177408] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 222.184731] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:42 executing program 2 (fault-call:4 fault-nth:1): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 222.239432] loop5: p1 p3 [ 222.325229] FAULT_INJECTION: forcing a failure. [ 222.325229] name failslab, interval 1, probability 0, space 0, times 0 [ 222.358700] CPU: 0 PID: 12792 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 222.365803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.375175] Call Trace: [ 222.377792] dump_stack+0x172/0x1f0 [ 222.379202] x86/PAT: syz-executor.0:12796 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 222.381449] should_fail.cold+0xa/0x1b [ 222.381471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.381490] ? lock_downgrade+0x810/0x810 [ 222.395736] FAULT_INJECTION: forcing a failure. [ 222.395736] name failslab, interval 1, probability 0, space 0, times 0 [ 222.399157] __should_failslab+0x121/0x190 [ 222.399177] should_failslab+0x9/0x14 [ 222.399189] kmem_cache_alloc+0x2ae/0x700 [ 222.399210] ? ext4_release_io_end+0x12e/0x180 [ 222.431258] ext4_init_io_end+0x29/0x120 [ 222.435325] ext4_writepages+0x1230/0x3450 [ 222.439564] ? mark_held_locks+0x100/0x100 [ 222.443797] ? mark_held_locks+0x100/0x100 [ 222.448050] ? ext4_mark_inode_dirty+0x940/0x940 [ 222.452828] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 222.458106] ? find_held_lock+0x35/0x130 [ 222.462173] ? ext4_mark_inode_dirty+0x940/0x940 [ 222.466944] do_writepages+0xf3/0x2a0 [ 222.470745] ? do_writepages+0xf3/0x2a0 [ 222.474722] ? page_writeback_cpu_online+0x20/0x20 [ 222.479743] ? kasan_check_read+0x11/0x20 [ 222.483895] ? do_raw_spin_unlock+0x57/0x270 [ 222.488307] ? _raw_spin_unlock+0x2d/0x50 [ 222.492456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.497995] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 222.503279] __filemap_fdatawrite_range+0x26d/0x340 [ 222.508317] ? delete_from_page_cache_batch+0xec0/0xec0 [ 222.513685] ? proc_cwd_link+0x1d0/0x1d0 [ 222.517765] ? __lock_is_held+0xb6/0x140 [ 222.521832] filemap_write_and_wait_range+0x4b/0xd0 [ 222.526853] ext4_punch_hole+0x13d/0x11b0 [ 222.531008] ? __lock_is_held+0xb6/0x140 [ 222.535081] ? ext4_insert_range+0x12d0/0x12d0 [ 222.539664] ext4_fallocate+0x445/0x2070 [ 222.543729] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.548745] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 222.553502] ? ext4_insert_range+0x12d0/0x12d0 [ 222.558081] vfs_fallocate+0x4aa/0x9d0 [ 222.561973] ksys_fallocate+0x58/0xa0 [ 222.565775] __x64_sys_fallocate+0x97/0xf0 [ 222.570016] do_syscall_64+0xfd/0x620 [ 222.573853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.579042] RIP: 0033:0x459879 [ 222.582238] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.601134] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 222.608844] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 222.616114] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 222.623398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.630665] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 222.637932] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 222.645234] CPU: 1 PID: 12796 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 222.652267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.661633] Call Trace: [ 222.664243] dump_stack+0x172/0x1f0 [ 222.667887] should_fail.cold+0xa/0x1b [ 222.671794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.676920] ? lock_downgrade+0x810/0x810 [ 222.681101] __should_failslab+0x121/0x190 [ 222.685351] should_failslab+0x9/0x14 [ 222.689173] kmem_cache_alloc+0x2ae/0x700 [ 222.693333] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 222.698882] ptlock_alloc+0x20/0x70 [ 222.702531] pte_alloc_one+0x6d/0x1a0 [ 222.706356] __pte_alloc+0x2a/0x360 [ 222.710008] copy_page_range+0x151f/0x1f90 [ 222.714256] ? anon_vma_fork+0x371/0x4a0 [ 222.718337] ? find_held_lock+0x35/0x130 [ 222.722410] ? anon_vma_fork+0x371/0x4a0 [ 222.726496] ? lock_downgrade+0x810/0x810 [ 222.730640] ? pmd_alloc+0x180/0x180 [ 222.734374] ? __vma_link_rb+0x279/0x370 [ 222.738428] copy_process.part.0+0x543d/0x7a30 [ 222.743017] ? __cleanup_sighand+0x70/0x70 [ 222.747240] ? lock_downgrade+0x810/0x810 [ 222.751384] ? kasan_check_write+0x14/0x20 [ 222.755627] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 222.760475] _do_fork+0x257/0xfd0 [ 222.765016] ? fork_idle+0x1d0/0x1d0 [ 222.768721] ? fput+0x128/0x1a0 [ 222.771996] ? ksys_write+0x1f1/0x2d0 [ 222.775790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.780534] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.785290] ? do_syscall_64+0x26/0x620 [ 222.789269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.794633] ? do_syscall_64+0x26/0x620 [ 222.798596] __x64_sys_clone+0xbf/0x150 [ 222.802562] do_syscall_64+0xfd/0x620 [ 222.806356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.811531] RIP: 0033:0x459879 21:02:43 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xa00, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:43 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x100000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfec00000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r0, @ANYBLOB="3614edd8004a8cc1cda50543d32fe48d91ce0fce29b9b7c63a27a22b7b632195530ac27829382d5c2713ec65f3770553e04799596f50d904fb1c824c63d2e27b0c11e0c42d328e849808723cbb4533f519041d3996af3bed0d6aa4d4905226faa1d46d7dafcdc84058b3c8d02c4bf910d2a5fdf80f2d60665e8f576c72febfe27a993ac95b4262cedab2df4db0cb5902b5729ff058706b8ed25dc7283eca2ccf477228"], 0xce) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 222.814720] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.833607] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 222.841304] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 222.848562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 222.855833] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.863091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 222.870361] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:43 executing program 2 (fault-call:4 fault-nth:2): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 222.992928] FAULT_INJECTION: forcing a failure. [ 222.992928] name failslab, interval 1, probability 0, space 0, times 0 [ 223.008743] x86/PAT: syz-executor.0:12796 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 223.016920] CPU: 1 PID: 12810 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 223.024473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.033845] Call Trace: [ 223.036475] dump_stack+0x172/0x1f0 21:02:43 executing program 0 (fault-call:6 fault-nth:52): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:43 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x400000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 223.040137] should_fail.cold+0xa/0x1b [ 223.044047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 223.049187] ? kasan_check_read+0x11/0x20 [ 223.053351] __should_failslab+0x121/0x190 [ 223.057593] should_failslab+0x9/0x14 [ 223.061424] __kmalloc+0x2e2/0x750 [ 223.064984] ? ext4_find_extent+0x76e/0x9d0 [ 223.069331] ext4_find_extent+0x76e/0x9d0 [ 223.073491] ext4_ext_map_blocks+0x1c3/0x55c0 [ 223.077982] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 223.082985] ? __lock_is_held+0xb6/0x140 [ 223.087037] ? lock_acquire+0x16f/0x3f0 [ 223.090992] ? ext4_map_blocks+0x928/0x1b20 [ 223.095306] ext4_map_blocks+0x990/0x1b20 [ 223.099441] ? ext4_issue_zeroout+0x170/0x170 [ 223.103928] ? __lock_is_held+0xb6/0x140 [ 223.107989] ext4_writepages+0x1e5b/0x3450 [ 223.112206] ? mark_held_locks+0x100/0x100 [ 223.116439] ? ext4_mark_inode_dirty+0x940/0x940 [ 223.121206] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 223.126467] ? find_held_lock+0x35/0x130 [ 223.130515] ? ext4_mark_inode_dirty+0x940/0x940 [ 223.135254] do_writepages+0xf3/0x2a0 [ 223.139049] ? do_writepages+0xf3/0x2a0 [ 223.143010] ? page_writeback_cpu_online+0x20/0x20 [ 223.147944] ? kasan_check_read+0x11/0x20 [ 223.152082] ? do_raw_spin_unlock+0x57/0x270 [ 223.156477] ? _raw_spin_unlock+0x2d/0x50 [ 223.160610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.166144] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 223.171423] __filemap_fdatawrite_range+0x26d/0x340 [ 223.176428] ? delete_from_page_cache_batch+0xec0/0xec0 [ 223.181774] ? proc_cwd_link+0x1d0/0x1d0 [ 223.185829] ? __lock_is_held+0xb6/0x140 [ 223.189891] filemap_write_and_wait_range+0x4b/0xd0 [ 223.194893] ext4_punch_hole+0x13d/0x11b0 [ 223.199028] ? __lock_is_held+0xb6/0x140 [ 223.203074] ? ext4_insert_range+0x12d0/0x12d0 [ 223.207649] ext4_fallocate+0x445/0x2070 [ 223.211705] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.216712] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 223.221456] ? ext4_insert_range+0x12d0/0x12d0 [ 223.226025] vfs_fallocate+0x4aa/0x9d0 [ 223.229905] ksys_fallocate+0x58/0xa0 [ 223.233689] __x64_sys_fallocate+0x97/0xf0 [ 223.237924] do_syscall_64+0xfd/0x620 [ 223.241720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.246895] RIP: 0033:0x459879 [ 223.250070] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.268965] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 223.276662] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 223.283920] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 21:02:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="00591134a506af2fae9a896466df867789302a303377003f1969b46b65297c3a79ed47ee5ecafd26e256d1d053c510507ef93579c4b47b16f1ad2404209d56f014d9edd805"], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x3, 0x3, 0x5000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fallocate(r0, 0x0, 0x0, 0x4003fd) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x7) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x331c) fallocate(r0, 0x3, 0xd9bd, 0x1) connect$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0xb0ebb855c7d5e790, 0x6bfe, 0x1, "93d9986c0a93beb05c7961082f35cc46e3ea6bdaec07fe16f7398dc253bd82403c91afa415e7d1eb48549a6acbfb57b2c22167b1b59ef4112f5da0a600", 0x22}, 0x60) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x100, 0x0) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 223.291186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 223.298457] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 223.305722] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:43 executing program 2 (fault-call:4 fault-nth:3): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:44 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 223.465850] x86/PAT: syz-executor.0:12822 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:44 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x1800000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 223.544207] FAULT_INJECTION: forcing a failure. [ 223.544207] name failslab, interval 1, probability 0, space 0, times 0 [ 223.562648] FAULT_INJECTION: forcing a failure. [ 223.562648] name failslab, interval 1, probability 0, space 0, times 0 [ 223.610965] CPU: 1 PID: 12837 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 223.618037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.627413] Call Trace: [ 223.630029] dump_stack+0x172/0x1f0 [ 223.633690] should_fail.cold+0xa/0x1b [ 223.637614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 223.642739] ? lock_downgrade+0x810/0x810 [ 223.646934] __should_failslab+0x121/0x190 [ 223.651190] should_failslab+0x9/0x14 [ 223.655001] kmem_cache_alloc+0x2ae/0x700 [ 223.659157] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 223.664173] ? __vm_enough_memory+0x324/0x5a0 [ 223.668671] vm_area_dup+0x21/0x170 [ 223.672300] copy_process.part.0+0x3407/0x7a30 [ 223.676924] ? __cleanup_sighand+0x70/0x70 [ 223.681179] ? lock_downgrade+0x810/0x810 [ 223.685355] ? kasan_check_write+0x14/0x20 [ 223.689608] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 223.694471] _do_fork+0x257/0xfd0 [ 223.697931] ? fork_idle+0x1d0/0x1d0 [ 223.701644] ? fput+0x128/0x1a0 [ 223.704924] ? ksys_write+0x1f1/0x2d0 [ 223.708728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.713485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.718244] ? do_syscall_64+0x26/0x620 [ 223.722220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.727581] ? do_syscall_64+0x26/0x620 [ 223.731559] __x64_sys_clone+0xbf/0x150 [ 223.735537] do_syscall_64+0xfd/0x620 [ 223.739343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.744534] RIP: 0033:0x459879 [ 223.747735] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.766656] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 223.774391] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 223.781679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 223.788956] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 223.796226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 223.803494] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 223.810790] CPU: 0 PID: 12836 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 223.818009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.827372] Call Trace: [ 223.829989] dump_stack+0x172/0x1f0 [ 223.833639] should_fail.cold+0xa/0x1b [ 223.837553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 223.838725] x86/PAT: syz-executor.0:12837 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 223.842679] ? mempool_alloc+0x380/0x380 [ 223.842699] __should_failslab+0x121/0x190 [ 223.859641] should_failslab+0x9/0x14 [ 223.863460] kmem_cache_alloc+0x47/0x700 [ 223.867543] ? mempool_alloc+0x380/0x380 [ 223.871608] mempool_alloc_slab+0x47/0x60 [ 223.875772] mempool_alloc+0x169/0x380 [ 223.879656] ? __unlock_page_memcg+0x53/0x100 [ 223.884150] ? mempool_destroy+0x40/0x40 [ 223.888203] ? lock_downgrade+0x810/0x810 [ 223.892342] bio_alloc_bioset+0x3cd/0x690 [ 223.896482] ? unlock_page_memcg+0x2c/0x40 [ 223.900704] ? bvec_alloc+0x2f0/0x2f0 [ 223.904498] ext4_bio_write_page+0xbb8/0x133a [ 223.908984] mpage_submit_page+0x15a/0x270 [ 223.913206] mpage_map_and_submit_buffers+0x4d8/0x840 [ 223.918390] ? mpage_process_page_bufs+0x610/0x610 [ 223.923314] ? __lock_is_held+0xb6/0x140 [ 223.927368] ext4_writepages+0x1f7a/0x3450 [ 223.931606] ? calibrate_delay.cold+0x42e/0x4a7 [ 223.936314] ? ext4_mark_inode_dirty+0x940/0x940 [ 223.941087] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 223.946375] ? find_held_lock+0x35/0x130 [ 223.950439] ? ext4_mark_inode_dirty+0x940/0x940 [ 223.955181] do_writepages+0xf3/0x2a0 [ 223.958966] ? do_writepages+0xf3/0x2a0 [ 223.962937] ? page_writeback_cpu_online+0x20/0x20 [ 223.967858] ? kasan_check_read+0x11/0x20 [ 223.972005] ? do_raw_spin_unlock+0x57/0x270 [ 223.976403] ? _raw_spin_unlock+0x2d/0x50 [ 223.980539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.986081] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 223.991364] __filemap_fdatawrite_range+0x26d/0x340 [ 223.996387] ? delete_from_page_cache_batch+0xec0/0xec0 [ 224.001744] ? proc_cwd_link+0x1d0/0x1d0 [ 224.005805] ? __lock_is_held+0xb6/0x140 [ 224.009945] filemap_write_and_wait_range+0x4b/0xd0 [ 224.014950] ext4_punch_hole+0x13d/0x11b0 [ 224.019090] ? __lock_is_held+0xb6/0x140 [ 224.023139] ? ext4_insert_range+0x12d0/0x12d0 [ 224.027707] ext4_fallocate+0x445/0x2070 [ 224.031783] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.036799] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 224.041570] ? ext4_insert_range+0x12d0/0x12d0 [ 224.046154] vfs_fallocate+0x4aa/0x9d0 [ 224.050037] ksys_fallocate+0x58/0xa0 [ 224.053832] __x64_sys_fallocate+0x97/0xf0 [ 224.058056] do_syscall_64+0xfd/0x620 [ 224.061845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.067016] RIP: 0033:0x459879 [ 224.070201] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.089116] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 224.096834] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 224.104088] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 224.111343] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 224.118611] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 224.125867] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 224.163273] loop5: p1 p3 21:02:44 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xc00, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x4, 0xffffffffffffffff, 0xffffffff) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:44 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xe000000000000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:44 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfe80000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:44 executing program 0 (fault-call:6 fault-nth:53): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:44 executing program 2 (fault-call:4 fault-nth:4): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 224.245868] x86/PAT: syz-executor.0:12856 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 224.306310] FAULT_INJECTION: forcing a failure. [ 224.306310] name failslab, interval 1, probability 0, space 0, times 0 [ 224.328697] CPU: 0 PID: 12863 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 224.335765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.345142] Call Trace: [ 224.347759] dump_stack+0x172/0x1f0 [ 224.351421] should_fail.cold+0xa/0x1b [ 224.355344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 224.360476] ? find_held_lock+0x35/0x130 [ 224.364562] ? percpu_ref_put_many+0x94/0x190 [ 224.369090] __should_failslab+0x121/0x190 [ 224.373353] should_failslab+0x9/0x14 [ 224.377179] kmem_cache_alloc+0x47/0x700 [ 224.381267] ? __lock_is_held+0xb6/0x140 [ 224.385369] anon_vma_clone+0xde/0x480 [ 224.389281] anon_vma_fork+0x8f/0x4a0 [ 224.393103] ? dup_userfaultfd+0x15e/0x6c0 [ 224.397374] ? memcpy+0x46/0x50 [ 224.400684] copy_process.part.0+0x34e5/0x7a30 [ 224.405303] ? __cleanup_sighand+0x70/0x70 [ 224.409547] ? lock_downgrade+0x810/0x810 [ 224.413713] ? kasan_check_write+0x14/0x20 [ 224.417963] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 224.422820] _do_fork+0x257/0xfd0 [ 224.426275] ? fork_idle+0x1d0/0x1d0 [ 224.426290] ? fput+0x128/0x1a0 [ 224.426304] ? ksys_write+0x1f1/0x2d0 [ 224.426324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.426336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.426348] ? do_syscall_64+0x26/0x620 [ 224.426366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:02:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="86a62f99096a7f67d407e4c4418443ae02a61c2fb06ee14c30bdf0cc252c732b662ae16da42895962a36e9a55e597934534c5c309daf9a9fcd2936e64344e5d082b81653eece71fd7cc403f39892e20f18f95c99ae5e543e0f6a15b5e4e0b8ea1d8738"], 0x1) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/104) fallocate(r0, 0x40, 0x2, 0x4003f9) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x9}}}, 0x369) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x1) fallocate(r0, 0x3, 0xd9bd, 0x7fff) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000140)={0x0, 0x1b89}, 0x2) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 224.455974] ? do_syscall_64+0x26/0x620 [ 224.459974] __x64_sys_clone+0xbf/0x150 [ 224.463966] do_syscall_64+0xfd/0x620 [ 224.463989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.464000] RIP: 0033:0x459879 [ 224.464014] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.464025] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 [ 224.472991] ORIG_RAX: 0000000000000038 [ 224.473002] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 224.473011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 224.473019] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 224.473028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 224.473037] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 224.524253] x86/PAT: syz-executor.0:12878 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 224.530133] FAULT_INJECTION: forcing a failure. 21:02:45 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0xfeffffff00000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:45 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfec0000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:45 executing program 0 (fault-call:6 fault-nth:54): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 224.530133] name failslab, interval 1, probability 0, space 0, times 0 [ 224.572437] CPU: 1 PID: 12877 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 224.579724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.589073] Call Trace: [ 224.591660] dump_stack+0x172/0x1f0 [ 224.595296] should_fail.cold+0xa/0x1b [ 224.599175] ? __save_stack_trace+0x99/0x100 [ 224.603575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 224.608705] ? should_fail+0x14d/0x85c [ 224.612584] ? __lock_acquire+0x6ee/0x49c0 [ 224.616845] ? mempool_alloc+0x380/0x380 [ 224.621194] __should_failslab+0x121/0x190 [ 224.625509] should_failslab+0x9/0x14 [ 224.629327] kmem_cache_alloc+0x47/0x700 [ 224.633381] ? mempool_alloc+0x380/0x380 [ 224.637522] mempool_alloc_slab+0x47/0x60 [ 224.641658] mempool_alloc+0x169/0x380 [ 224.645541] ? mempool_destroy+0x40/0x40 [ 224.649593] ? mempool_destroy+0x40/0x40 [ 224.653643] bvec_alloc+0xe0/0x2f0 [ 224.657191] bio_alloc_bioset+0x47c/0x690 [ 224.661366] ? unlock_page_memcg+0x2c/0x40 [ 224.665589] ? bvec_alloc+0x2f0/0x2f0 [ 224.669390] ext4_bio_write_page+0xbb8/0x133a [ 224.673880] mpage_submit_page+0x15a/0x270 [ 224.678127] mpage_map_and_submit_buffers+0x4d8/0x840 [ 224.683336] ? mpage_process_page_bufs+0x610/0x610 [ 224.688280] ? __lock_is_held+0xb6/0x140 [ 224.692362] ext4_writepages+0x1f7a/0x3450 [ 224.696592] ? mark_held_locks+0x100/0x100 [ 224.700828] ? ext4_mark_inode_dirty+0x940/0x940 [ 224.705600] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 224.710868] ? find_held_lock+0x35/0x130 [ 224.714925] ? ext4_mark_inode_dirty+0x940/0x940 [ 224.719674] do_writepages+0xf3/0x2a0 [ 224.723481] ? do_writepages+0xf3/0x2a0 [ 224.727456] ? page_writeback_cpu_online+0x20/0x20 [ 224.732372] ? kasan_check_read+0x11/0x20 [ 224.736512] ? do_raw_spin_unlock+0x57/0x270 [ 224.740910] ? _raw_spin_unlock+0x2d/0x50 [ 224.745063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.750591] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 224.755885] __filemap_fdatawrite_range+0x26d/0x340 [ 224.760917] ? delete_from_page_cache_batch+0xec0/0xec0 [ 224.767541] ? proc_cwd_link+0x1d0/0x1d0 [ 224.771601] ? __lock_is_held+0xb6/0x140 [ 224.775687] filemap_write_and_wait_range+0x4b/0xd0 [ 224.780717] ext4_punch_hole+0x13d/0x11b0 [ 224.784873] ? __lock_is_held+0xb6/0x140 [ 224.788929] ? ext4_insert_range+0x12d0/0x12d0 [ 224.793501] ext4_fallocate+0x445/0x2070 [ 224.797584] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.802629] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 224.807505] ? ext4_insert_range+0x12d0/0x12d0 [ 224.812097] vfs_fallocate+0x4aa/0x9d0 [ 224.815974] ksys_fallocate+0x58/0xa0 [ 224.819789] __x64_sys_fallocate+0x97/0xf0 [ 224.824016] do_syscall_64+0xfd/0x620 [ 224.827820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.833006] RIP: 0033:0x459879 [ 224.836216] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:02:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="77f67782bc7f387a2f060c5bbd0dfeb400ab4d40da4f55211eaca24b6171deec8c2dac0be9be4af21d983e0ff8a584a4de392ce07a6ac6b9f8deec"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x103, 0x5e89, 0x8000000000fff9) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000500)={0x8, 0x0, [{0xd000, 0x39, &(0x7f00000000c0)=""/57}, {0x100000, 0x63, &(0x7f0000000100)=""/99}, {0x6000, 0x2f, &(0x7f0000000180)=""/47}, {0xf000, 0x6b, &(0x7f00000001c0)=""/107}, {0xf000, 0xc2, &(0x7f0000000240)=""/194}, {0x100000, 0xbd, &(0x7f0000000340)=""/189}, {0x9fc1d1031a0d2c06, 0xa8, &(0x7f0000000400)=""/168}, {0x4, 0x18, &(0x7f00000004c0)=""/24}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000800)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) fstat(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000cc0)=[0xee01, 0xee01]) lstat(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000ec0)={0x0, 0x3, 0x5}, &(0x7f0000000f00)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f40)={r10, 0xf5, "09cae362d18100d2aeb19c9202f3f3620bdfb37c6b53bb1e6347926408065ac0374fd4c273fa75099f9361b6414f6c3d4ed6443cf2751071c3df9b931bad2d9a1035472cd02d5b5edf5121f36ee64b983e8930cf1b6d46bc3403ebc61788ad3c2c3c12de6ea0969bfc52927bb02583dff36c988d66b3e6adcaf81d0292a8ee5c507f6f803f564acfa74a87c7a7aac2d4ea74f1929f6504f4acbd075ce5373080cb6ea632a9f51858014403ed3e86493d48e2bbca2b78ba1643bda997951d1df6959372fec2066403c96a97df8ee0136136928aa3d493b44dfe0ec8dd212baf524fcb881330607cf8a1f32ef10a1ec8a1258a3ced91"}, &(0x7f0000001040)=0xfd) r11 = syz_open_dev$media(&(0x7f0000001080)='/dev/media#\x00', 0x100, 0x400000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0, 0x0}, &(0x7f0000000e00)=0xc) r13 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000e40)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}, {0x2, 0x2, r3}, {0x2, 0x6, r4}], {0x4, 0x6}, [{0x8, 0xc29c7b57f842bc10, r5}, {0x8, 0x4, r6}, {0x8, 0x4, r7}, {0x8, 0xcf71df6a0dc91d72, r8}, {0x8, 0x1, r9}, {0x8, 0x2, r12}, {0x8, 0x2, r13}], {0x10, 0x4}, {0x20, 0x4}}, 0x7c, 0x1) accept4$bt_l2cap(r0, 0x0, &(0x7f0000000040), 0x80800) bind$llc(r11, &(0x7f00000010c0)={0x1a, 0x303, 0x100000001, 0x7fffffff, 0x3, 0x0, @dev={[], 0x1e}}, 0x10) [ 224.855147] RSP: 002b:00007fbd1ff05c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 224.862883] RAX: ffffffffffffffda RBX: 00007fbd1ff05c90 RCX: 0000000000459879 [ 224.870193] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 224.877463] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 224.884740] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff066d4 [ 224.892010] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 224.940492] loop5: p1 p3 21:02:45 executing program 2 (fault-call:4 fault-nth:5): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:45 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0xe10, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 225.045946] x86/PAT: syz-executor.0:12892 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:45 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x4], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:45 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xff00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.121573] FAULT_INJECTION: forcing a failure. [ 225.121573] name failslab, interval 1, probability 0, space 0, times 0 [ 225.142967] FAULT_INJECTION: forcing a failure. [ 225.142967] name failslab, interval 1, probability 0, space 0, times 0 [ 225.200586] CPU: 1 PID: 12897 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 225.207664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.217053] Call Trace: [ 225.219673] dump_stack+0x172/0x1f0 [ 225.223332] should_fail.cold+0xa/0x1b [ 225.227252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 225.232370] ? lock_downgrade+0x810/0x810 [ 225.236547] __should_failslab+0x121/0x190 [ 225.240794] should_failslab+0x9/0x14 [ 225.244591] kmem_cache_alloc+0x2ae/0x700 21:02:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000040)={0x9, @sdr={0x968a49c291e680ae, 0xfff}}) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 225.244606] ? __lock_is_held+0xb6/0x140 [ 225.244630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 225.244649] ext4_init_io_end+0x29/0x120 [ 225.244665] ext4_writepages+0x1230/0x3450 [ 225.266737] ? mark_held_locks+0x100/0x100 [ 225.271015] ? ext4_mark_inode_dirty+0x940/0x940 [ 225.275811] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 225.281112] ? find_held_lock+0x35/0x130 [ 225.285194] ? ext4_mark_inode_dirty+0x940/0x940 [ 225.289968] do_writepages+0xf3/0x2a0 [ 225.293786] ? do_writepages+0xf3/0x2a0 21:02:45 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x18], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.297788] ? page_writeback_cpu_online+0x20/0x20 [ 225.302732] ? kasan_check_read+0x11/0x20 [ 225.306902] ? do_raw_spin_unlock+0x57/0x270 [ 225.311319] ? _raw_spin_unlock+0x2d/0x50 [ 225.315482] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.321033] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 225.326333] __filemap_fdatawrite_range+0x26d/0x340 [ 225.331377] ? delete_from_page_cache_batch+0xec0/0xec0 [ 225.336757] ? proc_cwd_link+0x1d0/0x1d0 [ 225.340850] ? __lock_is_held+0xb6/0x140 [ 225.344928] filemap_write_and_wait_range+0x4b/0xd0 [ 225.349974] ext4_punch_hole+0x13d/0x11b0 [ 225.354159] ? __lock_is_held+0xb6/0x140 [ 225.358259] ? ext4_insert_range+0x12d0/0x12d0 [ 225.362860] ext4_fallocate+0x445/0x2070 [ 225.366938] ? rcu_read_lock_sched_held+0x110/0x130 [ 225.372015] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 225.376789] ? ext4_insert_range+0x12d0/0x12d0 [ 225.381381] vfs_fallocate+0x4aa/0x9d0 [ 225.385283] ksys_fallocate+0x58/0xa0 [ 225.389100] __x64_sys_fallocate+0x97/0xf0 [ 225.393358] do_syscall_64+0xfd/0x620 21:02:45 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.397177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.402378] RIP: 0033:0x459879 [ 225.405582] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.424493] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 225.424507] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 225.424515] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 21:02:45 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xe0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRES64=0x0], 0x100cb) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 225.424522] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.424530] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 225.424537] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 225.473652] CPU: 1 PID: 12899 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 225.480708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.490094] Call Trace: [ 225.490120] dump_stack+0x172/0x1f0 [ 225.490141] should_fail.cold+0xa/0x1b [ 225.500259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 225.505384] ? lock_downgrade+0x810/0x810 [ 225.509567] __should_failslab+0x121/0x190 [ 225.513837] should_failslab+0x9/0x14 [ 225.517665] kmem_cache_alloc+0x2ae/0x700 [ 225.521825] ? anon_vma_clone+0x320/0x480 [ 225.526012] anon_vma_fork+0xfc/0x4a0 [ 225.529830] ? dup_userfaultfd+0x15e/0x6c0 [ 225.534084] ? memcpy+0x46/0x50 [ 225.537365] copy_process.part.0+0x34e5/0x7a30 [ 225.541945] ? __cleanup_sighand+0x70/0x70 [ 225.546181] ? lock_downgrade+0x810/0x810 [ 225.550322] ? kasan_check_write+0x14/0x20 [ 225.554549] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 225.559379] _do_fork+0x257/0xfd0 [ 225.562821] ? fork_idle+0x1d0/0x1d0 [ 225.566521] ? fput+0x128/0x1a0 [ 225.569783] ? ksys_write+0x1f1/0x2d0 [ 225.573571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.578314] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.583060] ? do_syscall_64+0x26/0x620 [ 225.587029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.592377] ? do_syscall_64+0x26/0x620 [ 225.596338] __x64_sys_clone+0xbf/0x150 [ 225.600297] do_syscall_64+0xfd/0x620 [ 225.604087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.609262] RIP: 0033:0x459879 [ 225.612441] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.631327] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 225.639021] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 225.646275] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 225.653533] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 225.660790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 225.668048] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:46 executing program 2 (fault-call:4 fault-nth:6): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:46 executing program 0 (fault-call:6 fault-nth:55): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 225.701102] x86/PAT: syz-executor.0:12899 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 225.739494] loop5: p1 p3 21:02:46 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x100e, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:46 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x1800], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.866241] FAULT_INJECTION: forcing a failure. [ 225.866241] name failslab, interval 1, probability 0, space 0, times 0 [ 225.895247] x86/PAT: syz-executor.0:12937 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:46 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x80fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.921508] FAULT_INJECTION: forcing a failure. [ 225.921508] name failslab, interval 1, probability 0, space 0, times 0 [ 225.950570] CPU: 1 PID: 12934 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 225.957633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.957641] Call Trace: [ 225.957668] dump_stack+0x172/0x1f0 [ 225.957688] should_fail.cold+0xa/0x1b [ 225.957708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 225.977393] ? lock_downgrade+0x810/0x810 [ 225.977420] __should_failslab+0x121/0x190 [ 225.977438] should_failslab+0x9/0x14 [ 225.986677] kmem_cache_alloc+0x2ae/0x700 [ 225.986689] ? __lock_is_held+0xb6/0x140 [ 225.986707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 225.986727] ext4_init_io_end+0x29/0x120 [ 225.986741] ext4_writepages+0x1230/0x3450 [ 225.986752] ? mark_held_locks+0x100/0x100 21:02:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000040)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xc, 0x1f, 0x0, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) tee(r0, r0, 0xffffffff, 0x8) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:46 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xc0fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 225.986787] ? ext4_mark_inode_dirty+0x940/0x940 [ 226.025906] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 226.031206] ? find_held_lock+0x35/0x130 [ 226.035298] ? ext4_mark_inode_dirty+0x940/0x940 [ 226.040080] do_writepages+0xf3/0x2a0 [ 226.043905] ? do_writepages+0xf3/0x2a0 [ 226.047902] ? page_writeback_cpu_online+0x20/0x20 [ 226.052846] ? kasan_check_read+0x11/0x20 [ 226.056991] ? do_raw_spin_unlock+0x57/0x270 [ 226.057007] ? _raw_spin_unlock+0x2d/0x50 [ 226.057021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.057038] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 226.057056] __filemap_fdatawrite_range+0x26d/0x340 [ 226.057070] ? delete_from_page_cache_batch+0xec0/0xec0 [ 226.057085] ? proc_cwd_link+0x1d0/0x1d0 [ 226.090864] ? __lock_is_held+0xb6/0x140 [ 226.094955] filemap_write_and_wait_range+0x4b/0xd0 [ 226.099995] ext4_punch_hole+0x13d/0x11b0 [ 226.104170] ? __lock_is_held+0xb6/0x140 [ 226.108255] ? ext4_insert_range+0x12d0/0x12d0 [ 226.112860] ext4_fallocate+0x445/0x2070 [ 226.116945] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.121999] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 226.126777] ? ext4_insert_range+0x12d0/0x12d0 [ 226.131376] vfs_fallocate+0x4aa/0x9d0 [ 226.135283] ksys_fallocate+0x58/0xa0 [ 226.139115] __x64_sys_fallocate+0x97/0xf0 [ 226.143382] do_syscall_64+0xfd/0x620 [ 226.147201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.152407] RIP: 0033:0x459879 [ 226.155618] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.174530] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 226.182270] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 226.189566] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 226.196851] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.204144] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 226.211436] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 226.230417] CPU: 0 PID: 12937 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 226.237482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.246852] Call Trace: [ 226.249467] dump_stack+0x172/0x1f0 [ 226.253125] should_fail.cold+0xa/0x1b [ 226.257050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 226.262174] ? lock_downgrade+0x810/0x810 [ 226.266358] __should_failslab+0x121/0x190 [ 226.270708] should_failslab+0x9/0x14 [ 226.274533] kmem_cache_alloc+0x2ae/0x700 [ 226.278697] ? anon_vma_clone+0x320/0x480 [ 226.282872] anon_vma_fork+0x1ea/0x4a0 [ 226.286772] ? dup_userfaultfd+0x15e/0x6c0 [ 226.291017] copy_process.part.0+0x34e5/0x7a30 [ 226.291057] ? __cleanup_sighand+0x70/0x70 [ 226.299831] ? lock_downgrade+0x810/0x810 [ 226.299856] ? kasan_check_write+0x14/0x20 [ 226.299877] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 226.313348] _do_fork+0x257/0xfd0 [ 226.316813] ? fork_idle+0x1d0/0x1d0 [ 226.320539] ? fput+0x128/0x1a0 [ 226.323830] ? ksys_write+0x1f1/0x2d0 21:02:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="176f57b5199751db9f088b10150e5b"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:46 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.327637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.332401] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.337169] ? do_syscall_64+0x26/0x620 [ 226.341172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.346554] ? do_syscall_64+0x26/0x620 [ 226.350554] __x64_sys_clone+0xbf/0x150 [ 226.354554] do_syscall_64+0xfd/0x620 [ 226.358381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.363580] RIP: 0033:0x459879 21:02:46 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xe000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.366780] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.385684] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 226.393387] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 226.400642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 226.407900] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.415175] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 226.422444] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:46 executing program 2 (fault-call:4 fault-nth:7): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 226.443118] x86/PAT: syz-executor.0:12936 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 226.493519] loop5: p1 p3 21:02:47 executing program 0 (fault-call:6 fault-nth:56): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:47 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1200, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:47 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfe80], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.629947] FAULT_INJECTION: forcing a failure. [ 226.629947] name failslab, interval 1, probability 0, space 0, times 0 21:02:47 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x1000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.686652] x86/PAT: syz-executor.0:12983 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 226.694775] CPU: 0 PID: 12980 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 226.702388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.711758] Call Trace: [ 226.714401] dump_stack+0x172/0x1f0 [ 226.726666] should_fail.cold+0xa/0x1b [ 226.730595] ? __sanitizer_cov_trace_const_cmp8+0x10/0x20 [ 226.736161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 226.741298] ? mempool_alloc+0x380/0x380 [ 226.745385] __should_failslab+0x121/0x190 [ 226.749646] should_failslab+0x9/0x14 [ 226.753471] kmem_cache_alloc+0x47/0x700 [ 226.757559] ? mempool_alloc+0x380/0x380 [ 226.761647] mempool_alloc_slab+0x47/0x60 [ 226.763830] FAULT_INJECTION: forcing a failure. [ 226.763830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 226.767293] mempool_alloc+0x169/0x380 21:02:47 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:47 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x4000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.767307] ? __unlock_page_memcg+0x53/0x100 [ 226.767327] ? mempool_destroy+0x40/0x40 [ 226.767347] ? lock_downgrade+0x810/0x810 [ 226.767374] bio_alloc_bioset+0x3cd/0x690 [ 226.799887] ? unlock_page_memcg+0x2c/0x40 [ 226.804157] ? bvec_alloc+0x2f0/0x2f0 [ 226.808027] ext4_bio_write_page+0xbb8/0x133a [ 226.812553] mpage_submit_page+0x15a/0x270 [ 226.816818] mpage_process_page_bufs+0x517/0x610 [ 226.821611] mpage_prepare_extent_to_map+0xa86/0x1110 [ 226.826843] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 226.832593] ? __lock_is_held+0xb6/0x140 [ 226.836695] ext4_writepages+0x166a/0x3450 [ 226.840953] ? mark_held_locks+0x100/0x100 [ 226.845239] ? ext4_mark_inode_dirty+0x940/0x940 [ 226.850046] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 226.855347] ? find_held_lock+0x35/0x130 [ 226.855369] ? ext4_mark_inode_dirty+0x940/0x940 [ 226.855385] do_writepages+0xf3/0x2a0 [ 226.855399] ? do_writepages+0xf3/0x2a0 [ 226.855418] ? page_writeback_cpu_online+0x20/0x20 [ 226.855436] ? kasan_check_read+0x11/0x20 [ 226.868053] ? do_raw_spin_unlock+0x57/0x270 21:02:47 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:47 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x18000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 226.885497] ? _raw_spin_unlock+0x2d/0x50 [ 226.889681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.895257] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 226.900565] __filemap_fdatawrite_range+0x26d/0x340 [ 226.905602] ? delete_from_page_cache_batch+0xec0/0xec0 [ 226.910982] ? proc_cwd_link+0x1d0/0x1d0 [ 226.915067] ? __lock_is_held+0xb6/0x140 [ 226.919153] filemap_write_and_wait_range+0x4b/0xd0 [ 226.924192] ext4_punch_hole+0x13d/0x11b0 [ 226.928396] ? __lock_is_held+0xb6/0x140 [ 226.933346] ? ext4_insert_range+0x12d0/0x12d0 [ 226.938060] ext4_fallocate+0x445/0x2070 [ 226.942140] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.947161] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 226.951927] ? ext4_insert_range+0x12d0/0x12d0 [ 226.956510] vfs_fallocate+0x4aa/0x9d0 [ 226.960401] ksys_fallocate+0x58/0xa0 [ 226.964202] __x64_sys_fallocate+0x97/0xf0 [ 226.968443] do_syscall_64+0xfd/0x620 [ 226.972252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.977437] RIP: 0033:0x459879 [ 226.980630] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.999531] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 227.007240] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 227.014509] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 227.021775] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.029044] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 227.036311] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 227.043604] CPU: 1 PID: 12993 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 227.050626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.050636] Call Trace: [ 227.062571] dump_stack+0x172/0x1f0 [ 227.066214] should_fail.cold+0xa/0x1b [ 227.070114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 227.075244] ? __might_sleep+0x95/0x190 [ 227.079246] __alloc_pages_nodemask+0x1ee/0x750 [ 227.083933] ? __alloc_pages_slowpath+0x2870/0x2870 [ 227.083947] ? save_stack+0x45/0xd0 [ 227.083959] ? kasan_kmalloc+0xce/0xf0 [ 227.083971] ? kasan_slab_alloc+0xf/0x20 [ 227.083989] ? __lock_acquire+0x6ee/0x49c0 [ 227.084004] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 227.084024] alloc_pages_current+0x107/0x210 [ 227.084044] pte_alloc_one+0x1b/0x1a0 [ 227.084060] copy_huge_pmd+0x7d/0x620 [ 227.122397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.127945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.133487] copy_page_range+0x7a1/0x1f90 [ 227.137628] ? anon_vma_fork+0x371/0x4a0 [ 227.141681] ? find_held_lock+0x35/0x130 [ 227.145747] ? anon_vma_fork+0x371/0x4a0 [ 227.149811] ? vma_compute_subtree_gap+0x158/0x230 [ 227.154741] ? vma_gap_callbacks_rotate+0x62/0x80 [ 227.159583] ? pmd_alloc+0x180/0x180 [ 227.163285] ? __vma_link_rb+0x279/0x370 [ 227.167354] copy_process.part.0+0x543d/0x7a30 [ 227.171952] ? __cleanup_sighand+0x70/0x70 [ 227.176175] ? lock_downgrade+0x810/0x810 [ 227.180374] ? kasan_check_write+0x14/0x20 [ 227.184607] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 227.189454] _do_fork+0x257/0xfd0 [ 227.192902] ? fork_idle+0x1d0/0x1d0 [ 227.196603] ? fput+0x128/0x1a0 [ 227.199870] ? ksys_write+0x1f1/0x2d0 [ 227.203680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.208435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.213183] ? do_syscall_64+0x26/0x620 [ 227.217158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.222510] ? do_syscall_64+0x26/0x620 [ 227.226487] __x64_sys_clone+0xbf/0x150 [ 227.230464] do_syscall_64+0xfd/0x620 [ 227.234266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.239462] RIP: 0033:0x459879 [ 227.242650] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.261546] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 227.269249] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 227.276512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 21:02:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000002740)={0x1, 0x0, 0x2080, {0x2, 0x100000, 0x2}, [], "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", "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"}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x7, 0x5e89, 0x2) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000006c0)={0x1, 0x0, 0x2080, {0x2, 0x4000, 0x3}, [], "d73c6daf587b469fb966b2879e50d9314260d2cb116accd31d9e3cd81b05237c18678e0b653225be7ef2b3cbbbe589435306100384584f1e48b194b43c59dbbbd91e770aa0cbc6d1671278d9fbefd098716ed5af648d8ba25fbb2bcd49ede74a7f72c5bcebff3164d47d21dd8f66b8d37a24d72d778dc78254a0a9239ce4b5432972e24031803b28dfbb6ce1b0b0b48f1356f9dc16a57d9445316f99b642c3e601a9938fc61e82a9ab54b760119c1ecd7f8ad709f83c73629ff2574ff1bdf5cdd666c91ddf2b1b6fce0d23ddaf316d7e89682b6b53b4ff40b810eb59cca7ab37b6df94b4491871f366bd6aac37b1e5ac75c81c5e1165e98e2b6b8b51f4695c8dee53533c30222dc979473068276432a2e63b403619ef5bd580cdc7e81a29f4adc5f6add0dad948eefeccf18ca4a31853dd955f2fff93232fdc4794d955f7d31a0dbdbcef5aac811a938d918b7ccdb54b4fbf282d1589bf11441a0911c1fefe12e45e366156f4153b8efc459542220a8fb1c6b0123249c281a614a86715e39e5f25452da9fc8102780ccc785299ae9615f746c1f8cc88d9dbabaeeb774f789f22931409ead5b711455d089ba904956e7a8e5a4d005c21eba50a51944856701ccd9b0c6e041a3941a7ce74b8f7c94271573f52b8afc5ec5da9419f888c656e176919862eaff57913e517133dfe4d973a0d0e11a2c770db3b186e9a92f4eb9590d9e8836fc656c3df580688f1b0b95b8cdca9413a62560d484c900576f156669750feaa456c6eb2fda9ecef247d01b17acf4dce82bee6e909d5d7df95fc40a724c8173a62c22c4e38457ee658426bb76d6b57062f36868e08aa54662183be5cad8c88bc6e80a95b287977f6a2a7629b304172b62a47cb22c832d9cbd5619a669f23f63fd215445707417459e0644d9f27f1653548b1014ca04a29a081b5ab756a6f346f5062c3925a40ee2388e7671f10119169c36e776159700189d5e597ecdfeded541639008e85bf232c2e23ae0f4396f2723ae592e1bc9548779754dc7e859bca2292e92f01153c64ad81393c1afd2ac012634554730d581786acf440107d3cb7a2a168e5f385e76c25faa39009620f64c08c6702c9257f4b5dd8e36dae296243735e1a8d727d175ab3e32622c3e421b9291598206df3b6bad848f124ade830afe283ccd657dc7092428bcdad25549a913499742716dd64b109384dacc7445cbfab436059b35781f184ce48e8f0ff93c8c8f388700530a9463fdfbcd15748f538208705211410c7ffcb587905b3b97cb8566fd1a86887e4880832355b20ba35ae2225a35d836633d7ba2cfd8261c1b92e5c9d65eb82a49e5bf73549e56631f570c7ca19638d9ce86c471e1807a17c90b49d664983c20f2bd4cc9444074c6e69dc1f1c3667945ac862c1c9310272947de18c1a5e7209dcc0eb5024d0b2dc3d903ec9fd38fc66b86b61b330b189ae8b0b9605a3fd8ad0989038016d5114acd7fd1cd2c5a7a14371f4f40355a125de0569b5fb222406eb1bbeb6e33f48943a2dfda7e7d90b1233530ac9f8d696885fbaf74252a9f4a812704b0b243677623dff3c1d00faef37076ee3eda3b9f1a938a4ee9efa0d996da200e887687624ae8041fd3d0d35613b6dae1d986bbce06e4b2696c4badf6dee2ae9e8a694c79820297bd1b71b189b20e1ae05cbe14b9dedc98c113cde59ab32662ebb99f93eeb5a2fed49759ddd46c114fb1b95fe9f97e416a7a4ab9a0f963c2bc076b341a8b87ea7c472d087b3aba08b048385b430e1e32f3dd49e24d11e8207df8368e37675a76ce1c9ed32eeddf1cc4acae473378cefc2edcef90237749a56d6baf43698c79e699c795fad3fa38c0f90bcbd66241b615843ca7056b757885dd9b96b8b58321fab7acf8b47e452251c277f6b371d7c629164ed0f0a2c2e7e1f8c6a9176ec16a6059b7199e3ba8ee72df9dd7005c8c681c54d63fda968fdb95d87b941c586279fd29be861fc149b0beab95b9c6a8e99e893a1fa2753a655ce2e2369f5e15ce08d577bd6784787b6c5cb9a7b2a316274be74c30d06508f40b1fd465f0e032ff76532264cbc7f3eb25f8ae81f40684226dc59c3b61269264d4cf1bd415a74ba70ef2d0bdfc533a030aa4df2bf410bbbae6c38237dc940595c1427708d8cb7ea8c029d64ecf7c4c82ea1e93bb73e94e1f9d6682610268a97d95f956ba6c219bd1df220b85e96c41b9a01363e4301134fa0681afa5117c6f6c2669b3b658851aa2c68cfc11fea8d8d1fece2253b7a35bd5ba4b4295c5ba5a6575c02dd12cf9008cf589f22a3b60d432894378bed1dc12776c5321132773ce1445f80be31dede57dd7258c36a35c35109412a517bbd9666ac06a53c50e384201a8627a9703edcb323d3159048e1005eb9892139ed62cb77e540484ebd28223b2fc83516a5a060a8c5b2bdb1e00d0040c64820e13302c8f4d82f0a20c446c919ab5460726f88b68cf1a61d5701c447ca61bbfa0f56ac175529bc16c4d09aa4a18e5b9335995409a3dcd7e70ada98e1db7a3ec22d3b6ed755d8568eafa1ca506ffa95d0a5d4b17c7f3b28c4b19bae03d158ed5bb101a562b1a23399c564f9a55a57c6c2adf285aacbce472d8ccbd8ca71974e6a1fc01ab9338e5ba5a46044bbab1026cc668e1ff1ab64c8867d168e49839823a7cdc186071cf792466e1ca5ee81dd7e6af17f24b688c5e062ab70dfb6e06d54f03c7c9802fab835b52333c1ed1ad9671ae4bd0715c986588074c798c8d64636ada614a85b5815b53803a0530e2edcd8168ccb634fe21eebdbbae8a1e3b0235dc11286ab6927298a0020af8a75fef924d0da22f889ef94abcbf282c15a6525960ebb0eda1750758447177e546b9d9990df64043709f7e38037ec3c17215b6759f50f60cab67e61519bf5102b27228d7884213c3e9dcebb0a7cda6c210802cf857defe53df3a35b95ec7bc304d4511d4aab9c0c765fd3a1d03f788a9799d504a4b981effd405838076baa550b322686bfbef7ac780445352cc0919b240cea4dfa6184a52300ea82ccee96a3a02623e32e8f4d90db43240e184aa404e0c0898314bdadf2927356f1e0dab3c236d67846098f55c5cd432f6288f7d50dc14e0c06bc8c565ff3c4716d3a81ddd06d3f1f324813c076a5b02bb0b5d7dbbaad9636c2136403aa8c8bc5a851fc0d3125822810a31bf3f165034699824e6a5672db7f4024754b97b95f35f639e71bd606e275eb4c3f7efaea8d3a238b1490f97eb32426bbc9cdc6d0afef372ccef5155f5350239c709bb0c1737b301f037c02116bee6bae59b724043376fec62b4120363ab3572ff7ed789ccae44979eded3f0acf350c1859014923cc898fb7940f122f39283097da52d5f8a11c302011464237e6ac6448ecfa6684cddc9bc3db615ceb94077f1e9f363522a33c13477d8a44a6727f113ee091f2f28de557a8ddae9da93a185045c1af329c5e429e1e6ca58c8ca86dc7b028506f7e00d18a082c5819c96d5e33d3231b76509e2939f3b8976b1af0d743d916d5467dc1a7bdf623f481a92e73b52d04e327601551a60bfc6dede705ef7d00e0988bf35fbb7c4fa6822b438db5e65a083353ad82e58d76aeafb49fdd29ab98f354265642a3ef5b8eb4e307ad8ffd3c48943015b3ceda13e7b796f90f76ade4aff74719e89d06313fb207780f65123b887bb0aef4c721c9b9ae037b9b604a65ea06c78fed3f6891916b42aba868c5ec7d5e39531baf09c7a3d126338aa08226a73b1d8c76036dcb1521716a5a7424e96a2838045389e7189e478264ee648cfd0d857328c5fed2ffc2418e19f790c9bcdaed0752c62eb596206845377e3fbd09c7b1ad72f4964909c9c2b1beb32e2c85a8d5c874c436fd4a9ac77d26b4bb589457c93e773b20f5288a5b38913dd306d327a6b18aa1d0bf079b27d54132b28872daf7769bb7063181bfbfa4c3604bf80d56a665ce23c1437424b4437a50947272b16726181ef0200e537f1cf3bf1071bf596af9d781f358c7374961793e6fa36140f221bcdb5c1fd72118dc18212019c9d8a15c4a608220559b9625e3f74f8988861f350fe3ea0108e58fb5e5f086ad89e4e5f155ca10cb7c228beaf5cfce248fb9432fe94253dcd7bdb9307983ae3df2c257fc9108a72270481732dd58c5227da08f2d6c7a524f135abf7dbc18459384ea86223e0c0f78bfed024c5e4e04a823be2410d3db56e54aa633987f5fafd7985c9da94e8f25b75a4f0cfa986b187719800f59965160fad8abf6b3122e34d9f8cb8cebe1b34e6873b2cf02ab104e11e6641a993e6ff9789db539d10f5a83f849220d93d5de56259e274b4c4c3027fc215dc62466a0adca70cc3e7db0d98367968e27b8c54158e3d8a6bf990dcb02e987959fe7ba7e3eea7bbcb8f290edf39ca8456853360e81671c440e00e1089f21fa616394bb06ddd1c6d7c7dab299ddaa92bbdacdb7f57161afb7992f920e9c1fa1dd0b3b34f8ba6c5a3105929884cd0b6c24ea59e2b71d66c38e54b240ef3193ece90971e52e0fd862234f9042426b00aaf9513d22349b1b08c15d3a181d62aa7e8ab1160f7d74a1092b2fadf4c714f02682f7782c83e51d891bcc66231fe1d57ed37a292052fcf0cc7cc076540c8f01e142b913ac1f387998202e5aa176ba31e77d3fb4b1e0864e2ab441e8f93bda0becd36b6c5f6d258f9906fb704f4f178cbffbcf80886c275fef61d80aff7b5dada5f6263ae99c9df864384965326c3218be5fcc9ef3e636806e34de51d7e0d1d6112e4629898b3e4685a391fa24437566779fbc030b3d3f0226dce9d1612d00ac77a0c732b77d4a51f67a1b412a460c505cfae2f2eba71680b52ed48ceea2805b780bd6e2bc275082a3a3927fd108282e4c5e46a6343ed7f588dc6b6dd46009fb6b8d4554d1674f6474f948338792ccf387ca2e60200d35a4019876432b9ecaec8e637b06e11f49f1c49416247dc3eba4a969b1e0bb7f60bcdb424b46ead15cd498d5d00b32c7756d39e4af9ecf1a2f0da2706f258efe6f4cd3589deb73e6093f1c6d9f7dc1c158453b2c009f37fee4fec911e43f48b6527035cc9f7ad0ff26b0e95ca41e0fad2382affb5b707518f3772db44fbc8c499676a45aeb5b9366452ae34b4aae52424ea9323d368a6226f2b83a2bc784998204dcfcbe74a154a83bbf88843292e16162de2972283602892921093ec52ed26547ba1d35f7cc1aaeaea2de84b2a733448bee2675c8e158f18c08f117f29161fb12cc3e5c95236dc4a5d074b4b27cb4b6a6f43a96dd4d757382045cce22015aae39153c3bd3fbcc653c5eaf6197e556926fe55b9bc70852c7be6bc99a9eafff9b8ca322c927aea94acf57c993c39398d9e6234b2ff58c361c6449bda147b53a41a0d8908974f1e03a1bda06f3ad92592a1a770d3093b508d59188cace83affb366362716bdaf4664cee0a80c18911c32dd3dc8b0233c29ab1d5a4836486c5700b9eeffe7072b07c0519d4b9e7c8fcdcc5c22f96d2b58cd14e972ca82300fc8ed890785e732630c53c31df8ca69827f1bf129de3f82fc4f06c35faba5705bafe09c1513f027d28b16037cf172f78aecb705eacf2679a2a384cc66c01ab22a68d69c4f92205c69fc229c79d3637417c1da0429770d056ba66e32a1c6f30b8bdb9f4b9ccd023683f7a761ffaa42400da7fa5002f8f577cfe42d8b699589153838d6c1224133027b5abd2233676a07c5bd7501e3046b549f8b6d2781bb60f3af8d270ce6f00b79ccaec4017cfd703f6191c89a614d1d9bcfc", "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"}) sync_file_range(r0, 0x7, 0x3ff, 0x2) [ 227.283771] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 227.291030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 227.298288] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 227.334316] loop5: p1 p3 21:02:47 executing program 2 (fault-call:4 fault-nth:8): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 227.384506] x86/PAT: syz-executor.0:12993 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:47 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1400, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 227.489535] FAULT_INJECTION: forcing a failure. [ 227.489535] name failslab, interval 1, probability 0, space 0, times 0 [ 227.523414] CPU: 1 PID: 13017 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 227.530503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:02:48 executing program 0 (fault-call:6 fault-nth:57): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:48 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xe0000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.539877] Call Trace: [ 227.542496] dump_stack+0x172/0x1f0 [ 227.546143] should_fail.cold+0xa/0x1b [ 227.550049] ? __lock_acquire+0x6ee/0x49c0 [ 227.554318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 227.559459] ? should_fail+0x14d/0x85c [ 227.563371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.568937] ? mempool_alloc+0x380/0x380 [ 227.573021] __should_failslab+0x121/0x190 [ 227.577280] should_failslab+0x9/0x14 [ 227.581100] kmem_cache_alloc+0x47/0x700 [ 227.585187] ? mempool_alloc+0x380/0x380 21:02:48 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xfeffffff], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.589264] mempool_alloc_slab+0x47/0x60 [ 227.593440] mempool_alloc+0x169/0x380 [ 227.597355] ? mempool_destroy+0x40/0x40 [ 227.601439] ? mempool_destroy+0x40/0x40 [ 227.605529] bvec_alloc+0xe0/0x2f0 [ 227.609094] bio_alloc_bioset+0x47c/0x690 [ 227.613267] ? unlock_page_memcg+0x2c/0x40 [ 227.617518] ? bvec_alloc+0x2f0/0x2f0 [ 227.621343] ext4_bio_write_page+0xbb8/0x133a [ 227.625867] mpage_submit_page+0x15a/0x270 [ 227.630115] mpage_process_page_bufs+0x517/0x610 [ 227.634892] mpage_prepare_extent_to_map+0xa86/0x1110 21:02:48 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xfffffffe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.640117] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 227.645853] ? __lock_is_held+0xb6/0x140 [ 227.649942] ext4_writepages+0x166a/0x3450 [ 227.654186] ? mark_held_locks+0x100/0x100 [ 227.658801] ? ext4_mark_inode_dirty+0x940/0x940 [ 227.663589] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 227.668888] ? find_held_lock+0x35/0x130 [ 227.672972] ? ext4_mark_inode_dirty+0x940/0x940 [ 227.677740] do_writepages+0xf3/0x2a0 [ 227.681555] ? do_writepages+0xf3/0x2a0 [ 227.685543] ? page_writeback_cpu_online+0x20/0x20 21:02:48 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x100000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.690490] ? kasan_check_read+0x11/0x20 [ 227.694655] ? do_raw_spin_unlock+0x57/0x270 [ 227.699079] ? _raw_spin_unlock+0x2d/0x50 [ 227.703236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.708785] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 227.714089] __filemap_fdatawrite_range+0x26d/0x340 [ 227.714106] ? delete_from_page_cache_batch+0xec0/0xec0 [ 227.714118] ? proc_cwd_link+0x1d0/0x1d0 [ 227.714143] ? __lock_is_held+0xb6/0x140 [ 227.714164] filemap_write_and_wait_range+0x4b/0xd0 [ 227.714181] ext4_punch_hole+0x13d/0x11b0 [ 227.714201] ? __lock_is_held+0xb6/0x140 [ 227.714220] ? ext4_insert_range+0x12d0/0x12d0 [ 227.728639] ext4_fallocate+0x445/0x2070 [ 227.754528] ? rcu_read_lock_sched_held+0x110/0x130 [ 227.759564] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 227.764338] ? ext4_insert_range+0x12d0/0x12d0 [ 227.764355] vfs_fallocate+0x4aa/0x9d0 [ 227.764372] ksys_fallocate+0x58/0xa0 [ 227.764387] __x64_sys_fallocate+0x97/0xf0 [ 227.764411] do_syscall_64+0xfd/0x620 [ 227.764433] entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:02:48 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x87b, 0x181200) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x1f, 0x7, 0x0, 0x5}]}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000100)=""/117, 0x75}, {&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000380)=""/73, 0x49}], 0x6, 0x0) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r1, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r1, 0x3, 0xd9bd, 0x7fff) fallocate(r1, 0x3, 0x5e89, 0xfff9) 21:02:48 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.764444] RIP: 0033:0x459879 [ 227.764456] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.764468] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 [ 227.776702] ORIG_RAX: 000000000000011d [ 227.776710] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 227.776718] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 21:02:48 executing program 2 (fault-call:4 fault-nth:9): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 227.776724] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.776732] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 227.776740] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:48 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x400000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 227.911353] loop5: p1 p3 [ 228.016236] FAULT_INJECTION: forcing a failure. [ 228.016236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.028089] CPU: 1 PID: 13047 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 228.028100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.028105] Call Trace: [ 228.028131] dump_stack+0x172/0x1f0 [ 228.028152] should_fail.cold+0xa/0x1b [ 228.028170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.028190] ? bio_alloc_bioset+0x3cd/0x690 [ 228.047225] x86/PAT: syz-executor.0:13051 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 228.050764] ? ext4_bio_write_page+0xbb8/0x133a [ 228.050777] ? mpage_submit_page+0x15a/0x270 [ 228.050793] ? mpage_process_page_bufs+0x517/0x610 [ 228.068806] FAULT_INJECTION: forcing a failure. [ 228.068806] name failslab, interval 1, probability 0, space 0, times 0 [ 228.072752] ? mpage_prepare_extent_to_map+0xa86/0x1110 [ 228.072764] ? ext4_writepages+0x166a/0x3450 [ 228.072783] ? do_writepages+0xf3/0x2a0 [ 228.097955] ? __filemap_fdatawrite_range+0x26d/0x340 21:02:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000000c0)={0xfffffffffffffff7, 0x24, "64fc763d419430cd7ea0c956fdc07724d6c1588501d75bae62b7e38e4e642a12d20a53e3"}) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7, 0x81, 0x5, 0xfffffffffffff2b2}, {0x4b64b36e, 0x4e, 0x4, 0x5}, {0x3, 0xffffffffffffffe1, 0x6, 0x6}]}) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:48 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfe800000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 228.097973] __alloc_pages_nodemask+0x1ee/0x750 [ 228.097990] ? blk_mq_stop_hw_queues+0x150/0x150 [ 228.098006] ? __alloc_pages_slowpath+0x2870/0x2870 [ 228.126322] ? __lock_acquire+0x6ee/0x49c0 [ 228.135554] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.135564] ? should_fail+0x14d/0x85c [ 228.135583] cache_grow_begin+0x91/0x8c0 [ 228.135597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.135610] ? check_preemption_disabled+0x48/0x290 [ 228.135629] kmem_cache_alloc+0x63b/0x700 [ 228.163339] ? mempool_alloc+0x380/0x380 [ 228.167420] mempool_alloc_slab+0x47/0x60 [ 228.171581] mempool_alloc+0x169/0x380 [ 228.175496] ? mempool_destroy+0x40/0x40 [ 228.179577] ? mempool_destroy+0x40/0x40 [ 228.183650] bvec_alloc+0xe0/0x2f0 [ 228.187267] bio_alloc_bioset+0x47c/0x690 [ 228.187283] ? unlock_page_memcg+0x2c/0x40 [ 228.187296] ? bvec_alloc+0x2f0/0x2f0 [ 228.187318] ext4_bio_write_page+0xbb8/0x133a [ 228.187342] mpage_submit_page+0x15a/0x270 [ 228.187363] mpage_process_page_bufs+0x517/0x610 [ 228.187382] mpage_prepare_extent_to_map+0xa86/0x1110 [ 228.187405] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 228.199572] ? __lock_is_held+0xb6/0x140 [ 228.199599] ext4_writepages+0x166a/0x3450 [ 228.232243] ? mark_held_locks+0x100/0x100 [ 228.236501] ? ext4_mark_inode_dirty+0x940/0x940 [ 228.236536] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 228.236551] ? find_held_lock+0x35/0x130 [ 228.236569] ? ext4_mark_inode_dirty+0x940/0x940 [ 228.236584] do_writepages+0xf3/0x2a0 [ 228.236600] ? do_writepages+0xf3/0x2a0 [ 228.246631] ? page_writeback_cpu_online+0x20/0x20 [ 228.246648] ? kasan_check_read+0x11/0x20 [ 228.246663] ? do_raw_spin_unlock+0x57/0x270 [ 228.246679] ? _raw_spin_unlock+0x2d/0x50 [ 228.246695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.246712] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 228.246731] __filemap_fdatawrite_range+0x26d/0x340 [ 228.246745] ? delete_from_page_cache_batch+0xec0/0xec0 [ 228.246756] ? proc_cwd_link+0x1d0/0x1d0 [ 228.246779] ? __lock_is_held+0xb6/0x140 [ 228.268283] filemap_write_and_wait_range+0x4b/0xd0 [ 228.268302] ext4_punch_hole+0x13d/0x11b0 [ 228.302177] ? __lock_is_held+0xb6/0x140 [ 228.323480] ? ext4_insert_range+0x12d0/0x12d0 [ 228.328073] ext4_fallocate+0x445/0x2070 [ 228.332156] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.337185] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 228.341967] ? ext4_insert_range+0x12d0/0x12d0 [ 228.346572] vfs_fallocate+0x4aa/0x9d0 [ 228.350494] ksys_fallocate+0x58/0xa0 [ 228.354322] __x64_sys_fallocate+0x97/0xf0 [ 228.358575] do_syscall_64+0xfd/0x620 [ 228.362396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.367604] RIP: 0033:0x459879 [ 228.370809] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.389723] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 228.397459] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 228.404743] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 228.412028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.419315] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 228.426616] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 21:02:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1c00, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 228.472429] CPU: 1 PID: 13051 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 228.479499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.488872] Call Trace: [ 228.491497] dump_stack+0x172/0x1f0 [ 228.495193] should_fail.cold+0xa/0x1b [ 228.499097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.504226] ? lock_downgrade+0x810/0x810 [ 228.508404] __should_failslab+0x121/0x190 [ 228.512663] should_failslab+0x9/0x14 [ 228.516483] kmem_cache_alloc+0x2ae/0x700 [ 228.520652] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 228.526215] ptlock_alloc+0x20/0x70 [ 228.529875] pte_alloc_one+0x6d/0x1a0 [ 228.533712] copy_huge_pmd+0x7d/0x620 [ 228.537541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.543105] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.548664] copy_page_range+0x7a1/0x1f90 [ 228.552825] ? anon_vma_fork+0x371/0x4a0 [ 228.556899] ? find_held_lock+0x35/0x130 [ 228.560976] ? anon_vma_fork+0x371/0x4a0 [ 228.565065] ? vma_compute_subtree_gap+0x158/0x230 [ 228.570018] ? vma_gap_callbacks_rotate+0x62/0x80 [ 228.574894] ? pmd_alloc+0x180/0x180 [ 228.578627] ? __vma_link_rb+0x279/0x370 [ 228.582703] copy_process.part.0+0x543d/0x7a30 [ 228.587305] ? __cleanup_sighand+0x70/0x70 [ 228.591543] ? lock_downgrade+0x810/0x810 [ 228.591571] ? kasan_check_write+0x14/0x20 [ 228.591590] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 228.591608] _do_fork+0x257/0xfd0 [ 228.591626] ? fork_idle+0x1d0/0x1d0 [ 228.608313] ? fput+0x128/0x1a0 [ 228.608335] ? ksys_write+0x1f1/0x2d0 [ 228.608356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.608372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.623908] ? do_syscall_64+0x26/0x620 [ 228.623923] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.623935] ? do_syscall_64+0x26/0x620 [ 228.623955] __x64_sys_clone+0xbf/0x150 [ 228.623973] do_syscall_64+0xfd/0x620 [ 228.623992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.624003] RIP: 0033:0x459879 [ 228.624018] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.624026] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 228.624040] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 228.624052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 228.632774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.632783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 228.632792] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:49 executing program 0 (fault-call:6 fault-nth:58): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:49 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x1800000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:49 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x7ff}, &(0x7f0000000180)=0x8) fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:49 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec00000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:49 executing program 2 (fault-call:4 fault-nth:10): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 228.692924] x86/PAT: syz-executor.0:13051 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:49 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 228.767045] loop5: p1 p3 21:02:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x1f00, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 228.890879] FAULT_INJECTION: forcing a failure. [ 228.890879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.902741] CPU: 0 PID: 13087 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 228.905800] x86/PAT: syz-executor.0:13089 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 228.910896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.910903] Call Trace: [ 228.910934] dump_stack+0x172/0x1f0 [ 228.910960] should_fail.cold+0xa/0x1b [ 228.940088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.945212] ? bio_alloc_bioset+0x3cd/0x690 [ 228.947538] FAULT_INJECTION: forcing a failure. [ 228.947538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.949545] ? ext4_bio_write_page+0xbb8/0x133a [ 228.949560] ? mpage_submit_page+0x15a/0x270 [ 228.949572] ? mpage_process_page_bufs+0x517/0x610 [ 228.949595] ? mpage_prepare_extent_to_map+0xa86/0x1110 [ 228.980836] ? ext4_writepages+0x166a/0x3450 [ 228.985296] ? do_writepages+0xf3/0x2a0 [ 228.989282] ? __filemap_fdatawrite_range+0x26d/0x340 [ 228.994482] __alloc_pages_nodemask+0x1ee/0x750 [ 228.999158] ? blk_mq_stop_hw_queues+0x150/0x150 [ 229.003920] ? __alloc_pages_slowpath+0x2870/0x2870 [ 229.008942] ? __lock_acquire+0x6ee/0x49c0 [ 229.013179] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.018280] ? should_fail+0x14d/0x85c [ 229.022175] cache_grow_begin+0x91/0x8c0 [ 229.026249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.031791] ? check_preemption_disabled+0x48/0x290 [ 229.036816] kmem_cache_alloc+0x63b/0x700 [ 229.040978] ? mempool_alloc+0x380/0x380 [ 229.045042] mempool_alloc_slab+0x47/0x60 [ 229.049193] mempool_alloc+0x169/0x380 [ 229.053091] ? mempool_destroy+0x40/0x40 [ 229.057158] ? mempool_destroy+0x40/0x40 [ 229.061230] bvec_alloc+0xe0/0x2f0 [ 229.064773] bio_alloc_bioset+0x47c/0x690 [ 229.068928] ? unlock_page_memcg+0x2c/0x40 [ 229.073168] ? bvec_alloc+0x2f0/0x2f0 [ 229.076981] ext4_bio_write_page+0xbb8/0x133a [ 229.081490] mpage_submit_page+0x15a/0x270 [ 229.085731] mpage_process_page_bufs+0x517/0x610 [ 229.090497] mpage_prepare_extent_to_map+0xa86/0x1110 [ 229.095703] ? ext4_journalled_zero_new_buffers+0x410/0x410 [ 229.101430] ? __lock_is_held+0xb6/0x140 [ 229.105505] ext4_writepages+0x166a/0x3450 [ 229.109742] ? mark_held_locks+0x100/0x100 [ 229.114000] ? ext4_mark_inode_dirty+0x940/0x940 [ 229.118787] ? wbc_attach_and_unlock_inode+0x51a/0x930 [ 229.124065] ? find_held_lock+0x35/0x130 [ 229.128132] ? ext4_mark_inode_dirty+0x940/0x940 [ 229.132896] do_writepages+0xf3/0x2a0 [ 229.136711] ? do_writepages+0xf3/0x2a0 [ 229.140690] ? page_writeback_cpu_online+0x20/0x20 [ 229.145625] ? kasan_check_read+0x11/0x20 [ 229.149785] ? do_raw_spin_unlock+0x57/0x270 [ 229.154201] ? _raw_spin_unlock+0x2d/0x50 [ 229.158349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.163908] ? wbc_attach_and_unlock_inode+0x5c4/0x930 [ 229.169208] __filemap_fdatawrite_range+0x26d/0x340 [ 229.174232] ? delete_from_page_cache_batch+0xec0/0xec0 [ 229.179597] ? proc_cwd_link+0x1d0/0x1d0 [ 229.183669] ? __lock_is_held+0xb6/0x140 [ 229.187740] filemap_write_and_wait_range+0x4b/0xd0 [ 229.192763] ext4_punch_hole+0x13d/0x11b0 [ 229.196924] ? __lock_is_held+0xb6/0x140 [ 229.200992] ? ext4_insert_range+0x12d0/0x12d0 [ 229.205586] ext4_fallocate+0x445/0x2070 [ 229.209659] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.214676] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 229.219439] ? ext4_insert_range+0x12d0/0x12d0 [ 229.224032] vfs_fallocate+0x4aa/0x9d0 [ 229.227926] ksys_fallocate+0x58/0xa0 [ 229.231736] __x64_sys_fallocate+0x97/0xf0 [ 229.235980] do_syscall_64+0xfd/0x620 [ 229.239803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.244988] RIP: 0033:0x459879 [ 229.248193] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.267093] RSP: 002b:00007fbd1ff26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 229.274805] RAX: ffffffffffffffda RBX: 00007fbd1ff26c90 RCX: 0000000000459879 [ 229.282076] RDX: 0000000000005e89 RSI: 0000000000000003 RDI: 0000000000000003 [ 229.289340] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.296614] R10: 000000000000fff9 R11: 0000000000000246 R12: 00007fbd1ff276d4 [ 229.304584] R13: 00000000004bffbd R14: 00000000004d1fc0 R15: 0000000000000004 [ 229.311918] CPU: 1 PID: 13089 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 229.318958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.328323] Call Trace: [ 229.330935] dump_stack+0x172/0x1f0 [ 229.334580] should_fail.cold+0xa/0x1b 21:02:49 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x81, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080), 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r1, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r1, 0x3, 0xd9bd, 0x7fff) fallocate(r1, 0x3, 0x5e89, 0xfff9) [ 229.338485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.343616] ? __might_sleep+0x95/0x190 [ 229.347615] __alloc_pages_nodemask+0x1ee/0x750 [ 229.352300] ? copy_huge_pmd+0x415/0x620 [ 229.356373] ? __alloc_pages_slowpath+0x2870/0x2870 [ 229.361409] ? lock_downgrade+0x810/0x810 [ 229.365570] ? pmd_pfn+0x12e/0x1d0 [ 229.369117] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 229.374672] alloc_pages_current+0x107/0x210 [ 229.379111] pte_alloc_one+0x1b/0x1a0 [ 229.382923] __pte_alloc+0x2a/0x360 [ 229.386555] copy_page_range+0x151f/0x1f90 [ 229.390785] ? anon_vma_fork+0x371/0x4a0 [ 229.394847] ? find_held_lock+0x35/0x130 [ 229.394859] ? anon_vma_fork+0x371/0x4a0 [ 229.394880] ? vma_compute_subtree_gap+0x158/0x230 [ 229.394896] ? vma_gap_callbacks_rotate+0x62/0x80 [ 229.394915] ? pmd_alloc+0x180/0x180 [ 229.394931] ? __vma_link_rb+0x279/0x370 [ 229.394951] copy_process.part.0+0x543d/0x7a30 [ 229.394986] ? __cleanup_sighand+0x70/0x70 [ 229.412866] ? lock_downgrade+0x810/0x810 [ 229.433585] ? kasan_check_write+0x14/0x20 [ 229.433601] ? __mutex_unlock_slowpath+0xf8/0x6b0 21:02:49 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 229.433621] _do_fork+0x257/0xfd0 [ 229.446158] ? fork_idle+0x1d0/0x1d0 [ 229.449895] ? fput+0x128/0x1a0 [ 229.453190] ? ksys_write+0x1f1/0x2d0 [ 229.457365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.462580] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.467440] ? do_syscall_64+0x26/0x620 [ 229.471433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.476815] ? do_syscall_64+0x26/0x620 [ 229.480815] __x64_sys_clone+0xbf/0x150 [ 229.484813] do_syscall_64+0xfd/0x620 21:02:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) fallocate(r0, 0x10, 0x1, 0x4003fe) getpeername$ax25(r0, &(0x7f0000000240)={{0x3, @netrom}, [@netrom, @default, @null, @bcast, @rose, @remote, @netrom, @bcast]}, &(0x7f0000000380)=0x1e1) fsetxattr$security_smack_entry(r0, &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10) [ 229.488632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.493830] RIP: 0033:0x459879 [ 229.497058] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.515975] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 229.523715] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 229.531020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 21:02:50 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xe000000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:50 executing program 2 (fault-call:4 fault-nth:11): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 229.538308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.545599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 229.552870] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 229.570999] x86/PAT: syz-executor.0:13089 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 229.586994] loop5: p1 p3 21:02:50 executing program 0 (fault-call:6 fault-nth:59): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 229.709190] print_req_error: 985 callbacks suppressed [ 229.709199] print_req_error: I/O error, dev loop5, sector 2304 [ 229.714819] print_req_error: I/O error, dev loop5, sector 0 [ 229.721516] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 21:02:50 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0xfeffffff00000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 229.755767] print_req_error: I/O error, dev loop5, sector 2304 [ 229.762051] buffer_io_error: 983 callbacks suppressed [ 229.762062] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 229.775242] print_req_error: I/O error, dev loop5, sector 0 [ 229.780994] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 229.788553] print_req_error: I/O error, dev loop5, sector 2 [ 229.794645] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 229.802172] print_req_error: I/O error, dev loop5, sector 4 [ 229.808003] Buffer I/O error on dev loop5p3, logical block 2, async page read [ 229.815485] print_req_error: I/O error, dev loop5, sector 6 [ 229.821227] Buffer I/O error on dev loop5p3, logical block 3, async page read [ 229.828667] print_req_error: I/O error, dev loop5, sector 2305 [ 229.835483] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 229.842830] print_req_error: I/O error, dev loop5, sector 2306 21:02:50 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfe80000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:50 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x2000, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 229.848890] Buffer I/O error on dev loop5p1, logical block 2, async page read [ 229.856758] print_req_error: I/O error, dev loop5, sector 2307 [ 229.862757] Buffer I/O error on dev loop5p1, logical block 3, async page read [ 229.870194] Buffer I/O error on dev loop5p1, logical block 4, async page read [ 229.877962] Buffer I/O error on dev loop5p1, logical block 5, async page read 21:02:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) chdir(&(0x7f0000000040)='./file1\x00') fallocate(r0, 0x3, 0x5e89, 0xfff9) 21:02:50 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 229.925688] x86/PAT: syz-executor.0:13120 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 229.972580] FAULT_INJECTION: forcing a failure. [ 229.972580] name failslab, interval 1, probability 0, space 0, times 0 [ 229.993966] CPU: 1 PID: 13120 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 229.994747] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 230.001026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.001033] Call Trace: 21:02:50 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0x4], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 230.001065] dump_stack+0x172/0x1f0 [ 230.001087] should_fail.cold+0xa/0x1b [ 230.028052] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 230.033159] ? lock_downgrade+0x810/0x810 [ 230.037306] __should_failslab+0x121/0x190 [ 230.041543] should_failslab+0x9/0x14 [ 230.045332] kmem_cache_alloc+0x2ae/0x700 [ 230.049487] ? pmd_pfn+0x12e/0x1d0 [ 230.053017] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 230.058549] ptlock_alloc+0x20/0x70 [ 230.062173] pte_alloc_one+0x6d/0x1a0 [ 230.065980] __pte_alloc+0x2a/0x360 [ 230.069600] copy_page_range+0x151f/0x1f90 [ 230.073823] ? anon_vma_fork+0x371/0x4a0 [ 230.077892] ? find_held_lock+0x35/0x130 [ 230.081945] ? anon_vma_fork+0x371/0x4a0 [ 230.086002] ? vma_compute_subtree_gap+0x158/0x230 [ 230.090921] ? vma_gap_callbacks_rotate+0x62/0x80 [ 230.095759] ? pmd_alloc+0x180/0x180 [ 230.099463] ? __vma_link_rb+0x279/0x370 [ 230.103517] copy_process.part.0+0x543d/0x7a30 [ 230.108111] ? __cleanup_sighand+0x70/0x70 [ 230.112336] ? lock_downgrade+0x810/0x810 [ 230.116499] ? kasan_check_write+0x14/0x20 [ 230.120727] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 230.125563] _do_fork+0x257/0xfd0 [ 230.129007] ? fork_idle+0x1d0/0x1d0 [ 230.132711] ? fput+0x128/0x1a0 [ 230.135982] ? ksys_write+0x1f1/0x2d0 [ 230.139778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.144522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.149370] ? do_syscall_64+0x26/0x620 [ 230.153333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.158686] ? do_syscall_64+0x26/0x620 [ 230.162665] __x64_sys_clone+0xbf/0x150 [ 230.166635] do_syscall_64+0xfd/0x620 [ 230.170432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.175622] RIP: 0033:0x459879 [ 230.178815] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.197705] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 230.205403] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 230.212670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 230.219926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.227190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 230.234453] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 21:02:50 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:50 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x2300, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:50 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x2, 0x5e89, 0xfff9) 21:02:50 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0x18], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f37ee63657177fb01000000cb29a58ac06b1ba6f709ca448f7a072f931871d34d"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) epoll_create(0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000180)={0x10000}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x0) fallocate(r0, 0x0, 0xd9bd, 0x8) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 230.402268] x86/PAT: syz-executor.0:13120 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:51 executing program 0 (fault-call:6 fault-nth:60): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00000000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x8, 0x5e89, 0xfff9) 21:02:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0xe0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x3, 0x4, 0x1, 0x3, 0x3, [{0x200, 0x2, 0x81, 0x0, 0x0, 0x1}, {0x3, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x82}, {0x3, 0x400, 0xfff, 0x0, 0x0, 0x880}]}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r1, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r1, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) write$P9_RLINK(r1, &(0x7f0000000080)={0x7, 0x47, 0x1}, 0x7) fallocate(r1, 0x3, 0xd9bd, 0x7fff) fallocate(r1, 0x3, 0x5e89, 0xfff9) ioctl$int_out(r1, 0x5460, &(0x7f0000000040)) [ 230.702435] x86/PAT: syz-executor.0:13173 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 230.726985] FAULT_INJECTION: forcing a failure. [ 230.726985] name failslab, interval 1, probability 0, space 0, times 0 21:02:51 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0x1800], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x80fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 230.759157] CPU: 1 PID: 13173 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 230.767318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.776694] Call Trace: [ 230.779337] dump_stack+0x172/0x1f0 [ 230.782991] should_fail.cold+0xa/0x1b [ 230.786903] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 230.792019] ? lock_downgrade+0x810/0x810 [ 230.796205] __should_failslab+0x121/0x190 [ 230.800557] should_failslab+0x9/0x14 [ 230.804373] kmem_cache_alloc+0x2ae/0x700 [ 230.808511] ? pmd_alloc+0x180/0x180 [ 230.812216] vm_area_dup+0x21/0x170 [ 230.815864] copy_process.part.0+0x3407/0x7a30 [ 230.820460] ? __cleanup_sighand+0x70/0x70 [ 230.824707] ? lock_downgrade+0x810/0x810 [ 230.828873] ? kasan_check_write+0x14/0x20 [ 230.833126] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 230.837985] _do_fork+0x257/0xfd0 [ 230.841437] ? fork_idle+0x1d0/0x1d0 [ 230.845143] ? fput+0x128/0x1a0 [ 230.848409] ? ksys_write+0x1f1/0x2d0 [ 230.852200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.856957] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.861728] ? do_syscall_64+0x26/0x620 [ 230.865699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.871066] ? do_syscall_64+0x26/0x620 [ 230.875049] __x64_sys_clone+0xbf/0x150 [ 230.879033] do_syscall_64+0xfd/0x620 [ 230.882862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.888065] RIP: 0033:0x459879 [ 230.891267] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.910173] RSP: 002b:00007f5c8b21bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 230.917890] RAX: ffffffffffffffda RBX: 00007f5c8b21bc90 RCX: 0000000000459879 [ 230.925176] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 230.932435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.939704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b21c6d4 [ 230.946982] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 230.988985] loop5: p1 p3 [ 230.999552] x86/PAT: syz-executor.0:13173 freeing invalid memtype [mem 0x00000000-0x00000fff] 21:02:51 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0xe000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x9, 0x5e89, 0xfff9) 21:02:51 executing program 0 (fault-call:6 fault-nth:61): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:02:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xc0fe], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_read_part_table(0x2601, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a607000000090000ff0700000000000000000000000000000000000000ffffff81000000000000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 21:02:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0xfffffffffffffc9a) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 231.275987] x86/PAT: syz-executor.0:13209 freeing invalid memtype [mem 0x00001000-0x00001fff] 21:02:51 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0x1000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc00], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 231.326711] FAULT_INJECTION: forcing a failure. [ 231.326711] name failslab, interval 1, probability 0, space 0, times 0 21:02:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 231.414805] CPU: 1 PID: 13221 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 231.421881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.431253] Call Trace: [ 231.433871] dump_stack+0x172/0x1f0 [ 231.437524] should_fail.cold+0xa/0x1b [ 231.441443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 231.446572] ? lock_downgrade+0x810/0x810 [ 231.450754] __should_failslab+0x121/0x190 [ 231.455014] should_failslab+0x9/0x14 [ 231.458840] kmem_cache_alloc_trace+0x2cc/0x760 [ 231.463541] ? __init_cache_modes+0x260/0x260 [ 231.468063] ? follow_phys+0x276/0x360 [ 231.471984] reserve_memtype+0x1e1/0x880 [ 231.476068] ? lock_downgrade+0x810/0x810 [ 231.480245] ? pat_init+0x4b0/0x4b0 [ 231.483889] ? __init_cache_modes+0x260/0x260 [ 231.488406] ? do_raw_spin_unlock+0x57/0x270 [ 231.492840] reserve_pfn_range+0x1b3/0x500 [ 231.497103] ? arch_io_reserve_memtype_wc+0xa0/0xa0 [ 231.502137] ? save_stack+0x45/0xd0 [ 231.505783] ? kasan_slab_alloc+0xf/0x20 [ 231.509862] ? kmem_cache_alloc+0x12e/0x700 21:02:52 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfe80], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 231.514197] ? vm_area_dup+0x21/0x170 [ 231.518012] ? copy_process.part.0+0x3407/0x7a30 [ 231.522781] ? _do_fork+0x257/0xfd0 [ 231.526423] ? __x64_sys_clone+0xbf/0x150 [ 231.530616] track_pfn_copy+0x196/0x1e0 [ 231.534609] ? reserve_pfn_range+0x500/0x500 [ 231.539046] ? get_mem_cgroup_from_mm+0x139/0x320 [ 231.543929] copy_page_range+0x15f6/0x1f90 [ 231.548192] ? copy_process.part.0+0x30f9/0x7a30 [ 231.552972] ? find_held_lock+0x35/0x130 [ 231.557060] ? vma_compute_subtree_gap+0x158/0x230 [ 231.562017] ? vma_gap_callbacks_rotate+0x62/0x80 [ 231.566873] ? pmd_alloc+0x180/0x180 [ 231.566891] ? __vma_link_rb+0x279/0x370 [ 231.566911] copy_process.part.0+0x543d/0x7a30 [ 231.566947] ? __cleanup_sighand+0x70/0x70 [ 231.566958] ? lock_downgrade+0x810/0x810 [ 231.566980] ? kasan_check_write+0x14/0x20 [ 231.592104] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 231.592124] _do_fork+0x257/0xfd0 [ 231.592141] ? fork_idle+0x1d0/0x1d0 [ 231.592155] ? fput+0x128/0x1a0 [ 231.592172] ? ksys_write+0x1f1/0x2d0 [ 231.592192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.592205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.592234] ? do_syscall_64+0x26/0x620 [ 231.592250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.592264] ? do_syscall_64+0x26/0x620 [ 231.592281] __x64_sys_clone+0xbf/0x150 [ 231.592299] do_syscall_64+0xfd/0x620 [ 231.592317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.592329] RIP: 0033:0x459879 21:02:52 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) fallocate(r0, 0xd, 0x5e89, 0xfff9) [ 231.592344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.592355] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 [ 231.634209] ORIG_RAX: 0000000000000038 [ 231.634218] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 231.634224] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 231.634231] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 231.634239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 21:02:52 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[@ANYRESDEC], 0x100be) fallocate(r0, 0x3, 0xd9bd, 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000140)={0x1, 0x1, 0x1000, 0x80, &(0x7f0000000040)="dbb4052dcac3f86e689a3cd3acace769cde54e6c1dfd5c7f144edee779e49dce6d71822b96af0e3d542c129edf8df30458e03a2529e41cefdb77fb14d11bd56202f7aac3619bcedcab4d64bc6109c9af8e7b0bd6d76bea461defb71ea9cc4694fa4451b4131bd1bec16ede38db6cc0fb6847429209e81064880082a050ebb6c1", 0x54, 0x0, &(0x7f00000000c0)="26e54733968828e01028ac1596354adfc86363c6df1c39eaf0d44e7c1e803e9ba86050f25ca585a2579586896489413bb1df075f50b88677b2d1ffc8f64c6a3e7d293f86a3cce90337b20d66c5a0c3dd57dcd376"}) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 231.634246] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 231.685582] WARNING: CPU: 1 PID: 13221 at arch/x86/mm/pat.c:1064 untrack_pfn+0x25c/0x2a0 [ 231.709740] kobject: 'loop4' (000000003abf36c5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 231.718061] Kernel panic - not syncing: panic_on_warn set ... [ 231.718061] [ 231.718079] CPU: 1 PID: 13221 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 231.718087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.718092] Call Trace: [ 231.718117] dump_stack+0x172/0x1f0 [ 231.718135] panic+0x263/0x507 [ 231.718147] ? __warn_printk+0xf3/0xf3 [ 231.718167] ? untrack_pfn+0x25c/0x2a0 [ 231.718181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.718193] ? __warn.cold+0x5/0x4a [ 231.718213] ? untrack_pfn+0x25c/0x2a0 [ 231.749813] kobject: 'loop2' (000000004dc1a607): kobject_uevent_env [ 231.754863] __warn.cold+0x20/0x4a [ 231.754883] ? untrack_pfn+0x25c/0x2a0 [ 231.754903] report_bug+0x263/0x2b0 [ 231.754921] do_error_trap+0x204/0x360 21:02:52 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x0, 0x0, @ipv4={[0x0, 0x4000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 21:02:52 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfec0], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 231.754935] ? math_error+0x340/0x340 [ 231.754952] ? kasan_check_read+0x11/0x20 [ 231.754967] ? do_raw_spin_unlock+0x57/0x270 [ 231.754980] ? error_entry+0x7c/0xe0 [ 231.755001] ? trace_hardirqs_off_caller+0x65/0x220 [ 231.772905] kobject: 'loop2' (000000004dc1a607): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 231.773954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.773978] do_invalid_op+0x1b/0x20 [ 231.773991] invalid_op+0x14/0x20 [ 231.774007] RIP: 0010:untrack_pfn+0x25c/0x2a0 [ 231.774020] Code: 00 00 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 75 28 48 81 c4 88 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 74 9b 3a 00 <0f> 0b eb b3 48 89 df e8 e8 2e 71 00 e9 b0 fe ff ff e8 5e 20 0e 00 [ 231.774033] RSP: 0018:ffff8880627b78a0 EFLAGS: 00010246 [ 231.887409] RAX: 0000000000040000 RBX: ffff888082b16528 RCX: ffffc90006080000 [ 231.894691] RDX: 0000000000040000 RSI: ffffffff8130b9dc RDI: 0000000000000005 [ 231.901997] RBP: ffff8880627b7950 R08: ffff88805eb0e480 R09: ffffed10129b4ebc [ 231.909273] R10: ffffed10129b4ebb R11: ffff888094da75db R12: 1ffff1100c4f6f15 [ 231.916562] R13: 00000000ffffffea R14: 0000000000000000 R15: ffff8880627b7928 [ 231.923844] ? untrack_pfn+0x25c/0x2a0 [ 231.927729] ? track_pfn_insert+0x180/0x180 [ 231.932113] ? vm_normal_page_pmd+0x400/0x400 [ 231.936610] ? kasan_check_read+0x11/0x20 [ 231.940757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.946316] ? uprobe_munmap+0xad/0x2b0 [ 231.950300] unmap_single_vma+0x1c2/0x300 [ 231.954710] unmap_vmas+0xae/0x180 [ 231.958255] exit_mmap+0x2c2/0x530 [ 231.961804] ? __ia32_sys_munmap+0x80/0x80 [ 231.966080] ? __khugepaged_exit+0x2da/0x400 [ 231.970479] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.975485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.981009] ? __khugepaged_exit+0xcf/0x400 [ 231.985343] mmput+0x15f/0x4c0 [ 231.988539] copy_process.part.0+0x5aaf/0x7a30 [ 231.993123] ? __cleanup_sighand+0x70/0x70 [ 231.997371] ? lock_downgrade+0x810/0x810 [ 232.001518] ? kasan_check_write+0x14/0x20 [ 232.005755] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 232.010591] _do_fork+0x257/0xfd0 [ 232.014079] ? fork_idle+0x1d0/0x1d0 [ 232.017786] ? fput+0x128/0x1a0 [ 232.021067] ? ksys_write+0x1f1/0x2d0 [ 232.024868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.029627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.034384] ? do_syscall_64+0x26/0x620 [ 232.038360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.043735] ? do_syscall_64+0x26/0x620 [ 232.047700] __x64_sys_clone+0xbf/0x150 [ 232.051672] do_syscall_64+0xfd/0x620 [ 232.055485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.060663] RIP: 0033:0x459879 [ 232.063844] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.082746] RSP: 002b:00007f5c8b1fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 232.090445] RAX: ffffffffffffffda RBX: 00007f5c8b1fac90 RCX: 0000000000459879 [ 232.097699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 232.104974] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 232.112235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c8b1fb6d4 [ 232.119508] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 232.128332] Kernel Offset: disabled [ 232.131974] Rebooting in 86400 seconds..