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", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfcffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:09 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1274.864524][T21646] FAT-fs (loop4): Unrecognized mount option "fsmagic=0x0000000000000001" or missing value 03:50:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r1]], 0x1) 03:50:09 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000bd, 0x10400003) 03:50:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:10 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="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", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1275.162890][T22021] FAT-fs (loop4): Unrecognized mount option "fsmagic=0x0000000000000001" or missing value 03:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000be, 0x10400003) 03:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73656c662f617400000000000000052aae2ce999b4e677c7f0ef81becb131b6afd2f63c395c991badd3f63544d05e899a5587d2dcc4e505e0d65f57834030e77adaef61813fd5269f6f1a77f49ba27d1baa3a1fe2d47fc511f284fbb842838558cee17426d96668ae9d1f74dc9e2f062cac60d2e02008c0c77af0b461cd66cfbad9a251293be33e0087873cf4cd4ecc283f7c699692693036c74e529cd7ee83a08e5eca91f48ed21850cbcfa7bdfa140bb81712a0d5d9b027b7ea04d3d2291a9eab50d8eabd107794e3c0168cd5ce7f65e9ec127c84494b0f02747ce54ebd79e1757a9cbf4546fe035a5c60dec048fbbec8bbe9346ad6673aac68ad0056fbfd6ff5b5fb20196243d44251dc37910d8524e59db3b94655f079bda3a151e30adadf32045c6d1f1c985e8c717c931c5a67aaf5e9ed710cce4d2634206a7f817d29d04b55599613efd5a734c5a643c8a065f70ebde02c2fe7cb88ce0a34334ecc4087babcf7bf383037d46eac8faf9e49ee002a21853be35d2e83f62ff096c7a11ac4d9f5fd60313e0356d996ad913d441bc377405eb7a46d0128957c51d6d3171218fa991f44cf7faafaf16da2b67710f4d8ea667767fa5323e1b6fe210895207ab089d6955693814dd19560e7e334ea599237bafc9d233424a2f8101febb0a1db7de5bbec6460ffe5ec7ec93127a56de1ba50686fee3c47a"], 0x22) r2 = semget$private(0x0, 0x6, 0x1) semctl$GETPID(r2, 0x4, 0xb, &(0x7f0000000080)=""/109) 03:50:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1275.400100][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 1275.400115][ T26] audit: type=1400 audit(2000001010.272:706): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/at" pid=22182 comm="syz-executor.3" 03:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1275.452000][T22175] FAT-fs (loop4): bogus number of reserved sectors 03:50:10 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="be9797091ef9919371a2b5c99d7877c3794ed107266f144ff9b3b71a298dfd51d7b45e3e118db9fca30db2d1dafbbdaed6efdf33e3d0e8913c45a44e905a2dbbd97be33d97695bc0c70b7cac815d62e43aad9bb6bb5b0489887f1ffabbc9eaf729239eda5be5792444206830b623af86a8123cff21835ccf54b9cfeb10593b42914e12b135c590e0c6003d487004a40c7e454450d04cce21de949de9a8f48df56ee10f4d66f8daf3b2826d182f8a4ba125622b1b6e2bfcfd6093676e1c27a059c1a11c5668bf9040df805fc622b6ce35338e93a3f72559a47b94c2bcf30ea9e3e82cda9528f43fdb60a699f28a32746c5edce4c438142016863cbb85f7c7c6c3a7779fb1866eb05dacc29f6db71253422fff17eb3c76565fea66d993e3267ac2f773db7b3b0031d2a7763d9390802835f576dc49bbfb4bf76d747f78fef8b6dbacce1e9fd2ad8a1d0c840092c3968ef747a223b4932928e845061b66140abf784b491e80afdfe157b5722eaa5001866a14ea88e8540c75029859c04094ee627a2171658761b0d14f34509b985190e61029400af05f25cbc07d1cc4feb19ed8ce530d70d9d3145196eb6ef73ec6d1852db38eb99d6ecae45f4715cd8a0b70604c5ccce6a08c2c143572b03efbb51be727341ce70603c3d9daf65ddecda876053a3f3072bd23cf5ab1f23e7e5d06af74a8d6f49190ebc9230faf377677691140943a895181ce52726e3b80670a5bfd45778832bf72af845991f339a7f6ec94c93f9ab931542d7c1fd64b5253ce72c728b01e5252881c106740e8b69698fdbe549ae2eac9a30909f55fe01bfd52e91d73d159c9e762e2f7aad5689b17a3babfd74d8fdeac41ad25bc998bfbcfb8de8bce39c61c5145efc42fdb0b6d8c58384e525d1e73299a760d0919104a2a9a3c529d386a00a448584a420e95d99f2cf27f4cbf8c0c7ea159bae693ccfac8465b1382137ceec42c34d79dd9160b68b308b1c9ae5052681583e7ee287faf4683adbaf6095f98cc0824e9fb68ef419b4f55f15e797547ce1ccb94a4a0da33a64fd14d83847f84814309f1f138469027275294a5e389e542f889c6bcd5911d50a502b5b266f765a5c0accb50d201a2ef8431fb570718a48928313fc5391153ffcaadbbc9fccd2d5d297987219a6b0d0f46dd1caa10ddf8e77b7c5bebc8e681a921cb712bb276c6af02b729207b9b9ba0f51aafe11a48f97b6ed0925456970709ceb60e02064ca6cae9b80484a6ff658fb3df594dc5aca2978d452097d75148011dd9618348d3fabde495c104768d8fc32993f32d490788a077f5e3674f92966b63c381769362afc112ca81a22b99e760dc501b8cce5d9a6e740c152f534c45b6b9b48e1bde99d93abc21f9ea87823ff0db721035177bc5202eb8f63830b98bdaede03b0187b980372d42975521bc9f3157edaa1bd692f05d54575b88dca63dcfeef9d8c258714383b1c26e2504eb5fa75b1663010e32dd0632ecc000c2833f9ea4a019228c2300ab8cec0b19bb97f020a741b3f5092d40ea80f8d33913d9ea6b15f652c481056f89d3449f6b9b005df912320b06653cc7487d5429975bfc03a6fbf36027694d086b2af32924488f3ffef6627f4d9cc07dfbf865d7dacff95233017a080a6c17ff2ab49dad617f8de8e1fedc2dfb66329d9ec6ee8b20e5918be2ac4706c48613eeea826fa0b8cfeaa93926229ace06720ff16f37871a2e2769a03f681f5453eaaedf5e383bf03ac1d89def0807eb3951c374b0ca2a12fbd2adda2d2d0f49a0181f0e7878fa04ce0958b7cd6d2cfb8d93382190e7282a211b84e58d6b70bd98c5561c912cf5359fe80ff0d7a0c28713aada580799b197a5b432e355160d6c61a7ffe62a1be829ef041f8ff395fe9298d3f11d772090abf4ef3d3ff2f4c438758dae83f472e90b7fa40111bdaa9b354e664867139a0175fdb85003fbc8e471fdcae188f548a4fc98fdeb87d8f74a67400ed6319c6ab862359c8f0aacb12c7c1bca1da6747f867246dd0899111e2519e765ff7aa710897648013609ac7007e0712de19f56f00e07bc803280fc5c28200c808e5dbb15c4f64fd7f378f03525a11bac3cf8a973bb2d1a93b61c7f98b6e401f5823b257fd0134283c2f677508c4fbf340fa80a71cfa1a08a95d66d205a595028b897045be049966475bb7a4ee3bf5d3d554aec128a54c3097c6136a8f83e1b3233cb28a75b4981e49ec8a566bba020ece5967a00843819e5a40d55654c25e726c72d9e205419e27ade0d6f2f97854c180a1e5f0e76b1679320952d9d109bca65ea02db4ffbc6b2bc73f00a956cf4a792eafa2981c005615c60ab195ecaf3a3dbd01474b6486780d89c9027f119d68b41b9621da88374f926bd374b5fa635a95cb59e9f48b89a4c31481e9063e3a61f57eed3bf477b2476a5fa493bb8776d1c39755ef480876903c0272e735d84926d14ebb950e4390d868fd5eada7083c16199a8355e814e8b276dc7b89787a322fc002037d8d3e04fa02a65c1d2a44cf2825cd2d6969692b4332b6c421d73e4e16c3e133b06a414af34409e9cde151de9316d2ec482732cb97b2da9bbca55fd4b29c91291046498960a59828dd1ac51f5f2e4619661a5127f0ac6c0d23a65aeec3d073540a5992523223a32ab7a9b2a2519843a9b06883897cdec79ae019d5ba86021827c2fd0849aaec1ad4b90cd1c7f9f81ebf193da1866b9933fb5c226cb2b9aa3c2fb305ddf386b9f6790252583b2a97d5e3183ad5378633766af2c10971bc258e0a9108853373f4e4205c82b98310d67be026ec0bd78ddc6a8f61120297537fec16ba7997c2067ef47ff25bdc4c4a04345882309476fa91599819b07ec9e8c7f401cb4e5f494682f06d8d6bda08b87fc7bc84762492851d7341232da84be1f63fc29c6a59d4f3565ac689e4694f161fa9cce50cb9b648727b88ed103b639966e65d8373da1474c314a29548039fe41ab053811d477db1acd50f9de5dfc112a028c6c083046b309a09d2df395befe15f69e399b86e3bb8798f6adfa5e5b88626ecf26ad91dcfca1494eaf57f9dc76db94ecaa248b1a057f4d8a53b14c6e3d6c851865f21713324b5ea1951a0e4bb25262d0601c8476c2b34aadd7bfbdabd0cab49cbe3ff95ebb0c84cd934d3cac6281ad5abbf90b4e06f4b23e4d9b342040c4f861e8842ec61ed53d72c255db13cd5108133621f000fdf8047f6ff03f944f055aa66231a77e4195664de5e1423c96fb411ddf646d7f40c5b04e963bba63c0e276cf3b10c386bfcd4b2070caa947a1f895c2f0a94e0ea00f5c931fc623d801054db4ecb38ad821f35d1193ff54c518d23ea3c35985c9c8b414eae1b1f7a336ff62e2de0bf1231805808e229d2a4f7e6dfdd823029ae479de75e2bba1d7762a3d2931a5ddaf3517fc2634d4c218488cf69132519ada4a582a4a0518045444053fee26f10fbd21245f01da5bff02426021cd1b790a04961ef80b31dbfac9fb89ba87a276fa41a899fde5f62872eae2c4540550a24678912ca78532ce31a8e50c84032a898c7ea6fdc7a2fece1ab8b4bfc1afe9f5c29c9480b215f235e82007ae701304439300286c9d6094a59574f13dcd648b2a0f8420e178fb1679f6785effeedbea2d67b8a5bf8e08b616c2d4eb7127a0783efbcd3b638676423190f31e7fa0ba006a89266e7690575bb8dd8ae779454bd6d8f6faf981378ddfad9aebf35198125b58a84d1931f8bbecc19e52822b327b2a2a40551974ef3a92c1fd22e86fe169269ec89fea19de8ade810135c8d825d9f782707914bd3fb5b506d77951defb5b69698f3b21978a747459993e5386b1442637c587983cf2affab8b8fc146c63ae3a23aa50b8a0be96392470b9c7107f59c13efcddfd2f31f392f186ce734533232bfd3423753275f5348ac70d1ec0a071ae4e15a683254a52f5af1b88f52044da15db0dd6cfe0de53aa0c4434d35910407421c80ac3dcb74a3754624144bcf26922cb236e3f2c66468f63b5a2dbdfac4997e439b6bf9a71cd55524be215b0698988fc6cc2ec11a0f938970da4c06f88b3f0215a8923677a0fc74cf871daedd4ecad0780743b8ee88473c0f0d782ee92b5f1c0c5288edfe24651287b021265a102b63bedc615e6c00faa5d6a44c4e105a459cfecd740f97571aaa4a4d937ce26dac6ab0c499b071a5149b45a9c92241d9e1fc2ef5804d6ab745525513c7453e893223228e89f9ebc81d298e3087a81693bd13cbe8eca9716a151dafce7e30539b1fe9fee32f4fa5566c75509ce5b69d66575c6d87e7b9f7d7b0e39de0b135eaec662bd0b36cbe32625adf5b25de917ee60531fe0a4f4c7ec0f2ea5d63fbe8de1b2b76e6370a3c0c1ad72aa3e450599c1420b6843b59ae7b19914c00b9baf5fe2d6d32362dfb3863d709b700affa1d75f537f4b9901429e26922e21b7145331828cf7842283f6c1c80fb55cc1e9afa7515f16bd8ca055b48afefe6a394ed671ca7de359796be71de8995d13fd677339051a40b208292a9c5d02413b5188c4659b050ee3f65b4dd050d12a882f8c537c19fcb2bca505cbd395f9fee4a04eed2a3779f7c810098afc919835f477d468a6ce13be6387415d8ed84f42cfbbcc775ceb90da99dba8a8a821f523520fc4bf09de31336f1802ef33af0b6c9ece5bad56c440cf0401f9150513f1d5a7773292c4a3d5fd2744a473be9321dd65f1c6ca4cc52883fe709844b25e25349f5e9d4f3ee7a3f1b34c60a0d5b3549ef978b18b38bded403f8cb8e710dde623dbce2a5c4fd09025e8cae604fed8321fb7f9001fe6b1752f8c2168e221f1d09f72568a6e6372f7adbf8ee55fad0bff63179d05a6a210732b3a2cccccbcfa1961b40c142e83ba62611c10380559ea3deca8f61317ddc38e17ac75f53aca9595994edf12f84c188b27696d1ac3c8e0171d22f909792769c7043230e193b35708b9eebb223d80df293abdf09fe86d43e2c0b0f6893909a8854eab299c281e9e82acac1480ad7c004560c7711ca21e1acc99c72c4793e5e3a4dc3fb9b3090984f9bfc73b6080cbf5e402be5d06cfc07a691626e4eb857a58c5072610e4422f3f65bac16e6c4833889764428c3a2f5a54afff308642a288efe642dfe6405bf53b7ba9a8c7d31a629e32b318be0758658ceb1f02e7e2880b16324e311f95c92a238628d115e2170d46059510301630ce31207675b2141850162965102f32a6215b7eaaa15da39f67e51cdc6eefc7b37e550eda6d4fbc7411598e86c3fbc3bf42c986aef6a898ea773142dab0aeb793605dc4b6516333437bd90f104aec63db8bd79574df0ca9b1cb877f8491d286961eb15672f33d929308fdc282b428d8bcd107a0f6be186ac33f24e83757d454388521e0befd35d8e548820f285622beedf3ef4554c9547fc3ace29561824484869f0283dd5f16298ab745ecac13c7e8026058b05d8dfb4c92538d16298f676e721a7f8235758de6c833c4623140eb35e3514f77010ff5464b81ba23555ae1d5740b00a81a7804752adfa26e37b512d30d6b566193973479a62be0145a92d592535d4c01ec1a98df2fdd35ca0305a974c98ef365c0d4130153fff308ddb171cf075a76f9772353e8dc5c55255c6827d7d8906479eaa897ab0c45a17f7650a9ffc29875e93da7f6c87e9bec60cefc1990d88531fd370ddcd297b57286cf9f304c11e68b3bad12e4b24bc23eb2b9b15d9f429037130a7f086b154e6a5ede92ec2e31a60ff349edd12f4787ce3b95ac4c0f1ece1bbb2f9e102e25fed4", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1275.513576][T22175] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000bf, 0x10400003) [ 1275.724058][ T26] audit: type=1400 audit(2000001010.602:707): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=22561 comm="syz-executor.3" [ 1275.761267][T22654] FAT-fs (loop4): bogus number of reserved sectors 03:50:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffff8]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="be9797091ef9919371a2b5c99d7877c3794ed107266f144ff9b3b71a298dfd51d7b45e3e118db9fca30db2d1dafbbdaed6efdf33e3d0e8913c45a44e905a2dbbd97be33d97695bc0c70b7cac815d62e43aad9bb6bb5b0489887f1ffabbc9eaf729239eda5be5792444206830b623af86a8123cff21835ccf54b9cfeb10593b42914e12b135c590e0c6003d487004a40c7e454450d04cce21de949de9a8f48df56ee10f4d66f8daf3b2826d182f8a4ba125622b1b6e2bfcfd6093676e1c27a059c1a11c5668bf9040df805fc622b6ce35338e93a3f72559a47b94c2bcf30ea9e3e82cda9528f43fdb60a699f28a32746c5edce4c438142016863cbb85f7c7c6c3a7779fb1866eb05dacc29f6db71253422fff17eb3c76565fea66d993e3267ac2f773db7b3b0031d2a7763d9390802835f576dc49bbfb4bf76d747f78fef8b6dbacce1e9fd2ad8a1d0c840092c3968ef747a223b4932928e845061b66140abf784b491e80afdfe157b5722eaa5001866a14ea88e8540c75029859c04094ee627a2171658761b0d14f34509b985190e61029400af05f25cbc07d1cc4feb19ed8ce530d70d9d3145196eb6ef73ec6d1852db38eb99d6ecae45f4715cd8a0b70604c5ccce6a08c2c143572b03efbb51be727341ce70603c3d9daf65ddecda876053a3f3072bd23cf5ab1f23e7e5d06af74a8d6f49190ebc9230faf377677691140943a895181ce52726e3b80670a5bfd45778832bf72af845991f339a7f6ec94c93f9ab931542d7c1fd64b5253ce72c728b01e5252881c106740e8b69698fdbe549ae2eac9a30909f55fe01bfd52e91d73d159c9e762e2f7aad5689b17a3babfd74d8fdeac41ad25bc998bfbcfb8de8bce39c61c5145efc42fdb0b6d8c58384e525d1e73299a760d0919104a2a9a3c529d386a00a448584a420e95d99f2cf27f4cbf8c0c7ea159bae693ccfac8465b1382137ceec42c34d79dd9160b68b308b1c9ae5052681583e7ee287faf4683adbaf6095f98cc0824e9fb68ef419b4f55f15e797547ce1ccb94a4a0da33a64fd14d83847f84814309f1f138469027275294a5e389e542f889c6bcd5911d50a502b5b266f765a5c0accb50d201a2ef8431fb570718a48928313fc5391153ffcaadbbc9fccd2d5d297987219a6b0d0f46dd1caa10ddf8e77b7c5bebc8e681a921cb712bb276c6af02b729207b9b9ba0f51aafe11a48f97b6ed0925456970709ceb60e02064ca6cae9b80484a6ff658fb3df594dc5aca2978d452097d75148011dd9618348d3fabde495c104768d8fc32993f32d490788a077f5e3674f92966b63c381769362afc112ca81a22b99e760dc501b8cce5d9a6e740c152f534c45b6b9b48e1bde99d93abc21f9ea87823ff0db721035177bc5202eb8f63830b98bdaede03b0187b980372d42975521bc9f3157edaa1bd692f05d54575b88dca63dcfeef9d8c258714383b1c26e2504eb5fa75b1663010e32dd0632ecc000c2833f9ea4a019228c2300ab8cec0b19bb97f020a741b3f5092d40ea80f8d33913d9ea6b15f652c481056f89d3449f6b9b005df912320b06653cc7487d5429975bfc03a6fbf36027694d086b2af32924488f3ffef6627f4d9cc07dfbf865d7dacff95233017a080a6c17ff2ab49dad617f8de8e1fedc2dfb66329d9ec6ee8b20e5918be2ac4706c48613eeea826fa0b8cfeaa93926229ace06720ff16f37871a2e2769a03f681f5453eaaedf5e383bf03ac1d89def0807eb3951c374b0ca2a12fbd2adda2d2d0f49a0181f0e7878fa04ce0958b7cd6d2cfb8d93382190e7282a211b84e58d6b70bd98c5561c912cf5359fe80ff0d7a0c28713aada580799b197a5b432e355160d6c61a7ffe62a1be829ef041f8ff395fe9298d3f11d772090abf4ef3d3ff2f4c438758dae83f472e90b7fa40111bdaa9b354e664867139a0175fdb85003fbc8e471fdcae188f548a4fc98fdeb87d8f74a67400ed6319c6ab862359c8f0aacb12c7c1bca1da6747f867246dd0899111e2519e765ff7aa710897648013609ac7007e0712de19f56f00e07bc803280fc5c28200c808e5dbb15c4f64fd7f378f03525a11bac3cf8a973bb2d1a93b61c7f98b6e401f5823b257fd0134283c2f677508c4fbf340fa80a71cfa1a08a95d66d205a595028b897045be049966475bb7a4ee3bf5d3d554aec128a54c3097c6136a8f83e1b3233cb28a75b4981e49ec8a566bba020ece5967a00843819e5a40d55654c25e726c72d9e205419e27ade0d6f2f97854c180a1e5f0e76b1679320952d9d109bca65ea02db4ffbc6b2bc73f00a956cf4a792eafa2981c005615c60ab195ecaf3a3dbd01474b6486780d89c9027f119d68b41b9621da88374f926bd374b5fa635a95cb59e9f48b89a4c31481e9063e3a61f57eed3bf477b2476a5fa493bb8776d1c39755ef480876903c0272e735d84926d14ebb950e4390d868fd5eada7083c16199a8355e814e8b276dc7b89787a322fc002037d8d3e04fa02a65c1d2a44cf2825cd2d6969692b4332b6c421d73e4e16c3e133b06a414af34409e9cde151de9316d2ec482732cb97b2da9bbca55fd4b29c91291046498960a59828dd1ac51f5f2e4619661a5127f0ac6c0d23a65aeec3d073540a5992523223a32ab7a9b2a2519843a9b06883897cdec79ae019d5ba86021827c2fd0849aaec1ad4b90cd1c7f9f81ebf193da1866b9933fb5c226cb2b9aa3c2fb305ddf386b9f6790252583b2a97d5e3183ad5378633766af2c10971bc258e0a9108853373f4e4205c82b98310d67be026ec0bd78ddc6a8f61120297537fec16ba7997c2067ef47ff25bdc4c4a04345882309476fa91599819b07ec9e8c7f401cb4e5f494682f06d8d6bda08b87fc7bc84762492851d7341232da84be1f63fc29c6a59d4f3565ac689e4694f161fa9cce50cb9b648727b88ed103b639966e65d8373da1474c314a29548039fe41ab053811d477db1acd50f9de5dfc112a028c6c083046b309a09d2df395befe15f69e399b86e3bb8798f6adfa5e5b88626ecf26ad91dcfca1494eaf57f9dc76db94ecaa248b1a057f4d8a53b14c6e3d6c851865f21713324b5ea1951a0e4bb25262d0601c8476c2b34aadd7bfbdabd0cab49cbe3ff95ebb0c84cd934d3cac6281ad5abbf90b4e06f4b23e4d9b342040c4f861e8842ec61ed53d72c255db13cd5108133621f000fdf8047f6ff03f944f055aa66231a77e4195664de5e1423c96fb411ddf646d7f40c5b04e963bba63c0e276cf3b10c386bfcd4b2070caa947a1f895c2f0a94e0ea00f5c931fc623d801054db4ecb38ad821f35d1193ff54c518d23ea3c35985c9c8b414eae1b1f7a336ff62e2de0bf1231805808e229d2a4f7e6dfdd823029ae479de75e2bba1d7762a3d2931a5ddaf3517fc2634d4c218488cf69132519ada4a582a4a0518045444053fee26f10fbd21245f01da5bff02426021cd1b790a04961ef80b31dbfac9fb89ba87a276fa41a899fde5f62872eae2c4540550a24678912ca78532ce31a8e50c84032a898c7ea6fdc7a2fece1ab8b4bfc1afe9f5c29c9480b215f235e82007ae701304439300286c9d6094a59574f13dcd648b2a0f8420e178fb1679f6785effeedbea2d67b8a5bf8e08b616c2d4eb7127a0783efbcd3b638676423190f31e7fa0ba006a89266e7690575bb8dd8ae779454bd6d8f6faf981378ddfad9aebf35198125b58a84d1931f8bbecc19e52822b327b2a2a40551974ef3a92c1fd22e86fe169269ec89fea19de8ade810135c8d825d9f782707914bd3fb5b506d77951defb5b69698f3b21978a747459993e5386b1442637c587983cf2affab8b8fc146c63ae3a23aa50b8a0be96392470b9c7107f59c13efcddfd2f31f392f186ce734533232bfd3423753275f5348ac70d1ec0a071ae4e15a683254a52f5af1b88f52044da15db0dd6cfe0de53aa0c4434d35910407421c80ac3dcb74a3754624144bcf26922cb236e3f2c66468f63b5a2dbdfac4997e439b6bf9a71cd55524be215b0698988fc6cc2ec11a0f938970da4c06f88b3f0215a8923677a0fc74cf871daedd4ecad0780743b8ee88473c0f0d782ee92b5f1c0c5288edfe24651287b021265a102b63bedc615e6c00faa5d6a44c4e105a459cfecd740f97571aaa4a4d937ce26dac6ab0c499b071a5149b45a9c92241d9e1fc2ef5804d6ab745525513c7453e893223228e89f9ebc81d298e3087a81693bd13cbe8eca9716a151dafce7e30539b1fe9fee32f4fa5566c75509ce5b69d66575c6d87e7b9f7d7b0e39de0b135eaec662bd0b36cbe32625adf5b25de917ee60531fe0a4f4c7ec0f2ea5d63fbe8de1b2b76e6370a3c0c1ad72aa3e450599c1420b6843b59ae7b19914c00b9baf5fe2d6d32362dfb3863d709b700affa1d75f537f4b9901429e26922e21b7145331828cf7842283f6c1c80fb55cc1e9afa7515f16bd8ca055b48afefe6a394ed671ca7de359796be71de8995d13fd677339051a40b208292a9c5d02413b5188c4659b050ee3f65b4dd050d12a882f8c537c19fcb2bca505cbd395f9fee4a04eed2a3779f7c810098afc919835f477d468a6ce13be6387415d8ed84f42cfbbcc775ceb90da99dba8a8a821f523520fc4bf09de31336f1802ef33af0b6c9ece5bad56c440cf0401f9150513f1d5a7773292c4a3d5fd2744a473be9321dd65f1c6ca4cc52883fe709844b25e25349f5e9d4f3ee7a3f1b34c60a0d5b3549ef978b18b38bded403f8cb8e710dde623dbce2a5c4fd09025e8cae604fed8321fb7f9001fe6b1752f8c2168e221f1d09f72568a6e6372f7adbf8ee55fad0bff63179d05a6a210732b3a2cccccbcfa1961b40c142e83ba62611c10380559ea3deca8f61317ddc38e17ac75f53aca9595994edf12f84c188b27696d1ac3c8e0171d22f909792769c7043230e193b35708b9eebb223d80df293abdf09fe86d43e2c0b0f6893909a8854eab299c281e9e82acac1480ad7c004560c7711ca21e1acc99c72c4793e5e3a4dc3fb9b3090984f9bfc73b6080cbf5e402be5d06cfc07a691626e4eb857a58c5072610e4422f3f65bac16e6c4833889764428c3a2f5a54afff308642a288efe642dfe6405bf53b7ba9a8c7d31a629e32b318be0758658ceb1f02e7e2880b16324e311f95c92a238628d115e2170d46059510301630ce31207675b2141850162965102f32a6215b7eaaa15da39f67e51cdc6eefc7b37e550eda6d4fbc7411598e86c3fbc3bf42c986aef6a898ea773142dab0aeb793605dc4b6516333437bd90f104aec63db8bd79574df0ca9b1cb877f8491d286961eb15672f33d929308fdc282b428d8bcd107a0f6be186ac33f24e83757d454388521e0befd35d8e548820f285622beedf3ef4554c9547fc3ace29561824484869f0283dd5f16298ab745ecac13c7e8026058b05d8dfb4c92538d16298f676e721a7f8235758de6c833c4623140eb35e3514f77010ff5464b81ba23555ae1d5740b00a81a7804752adfa26e37b512d30d6b566193973479a62be0145a92d592535d4c01ec1a98df2fdd35ca0305a974c98ef365c0d4130153fff308ddb171cf075a76f9772353e8dc5c55255c6827d7d8906479eaa897ab0c45a17f7650a9ffc29875e93da7f6c87e9bec60cefc1990d88531fd370ddcd297b57286cf9f304c11e68b3bad12e4b24bc23eb2b9b15d9f429037130a7f086b154e6a5ede92ec2e31a60ff349edd12f4787ce3b95ac4c0f1ece1bbb2f9e102e25fed4", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) [ 1275.778243][T22654] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c0, 0x10400003) [ 1276.020811][ T26] audit: type=1400 audit(2000001010.892:708): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=23103 comm="syz-executor.3" 03:50:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="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", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1276.079458][T23148] FAT-fs (loop4): bogus number of reserved sectors 03:50:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x1, &(0x7f0000000080)=[0x0]) setfsgid(r1) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="737461636b202f707235dabd62d28c0cf8bb9015c5e5972b7d642d73656c662f617403838ccdf09cf035ba4de13445b8e324a74cf2bceb"], 0x22) [ 1276.187404][T23148] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0x1, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="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", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:11 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0xffffffffffffff49) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) accept4$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80000) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/icmp\x00') r5 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000200)=""/97) sendmsg$alg(r3, &(0x7f00000004c0)={0xffffff8d, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-self/aqtr/exec\x00'], 0x22) 03:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffffa]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c1, 0x10400003) [ 1276.381593][ T26] audit: type=1400 audit(2000001011.252:709): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2F707235DABD62D28C0CF8BB9015C5E5972B7D642D73656C662F6174 pid=23479 comm="syz-executor.3" 03:50:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000001500)=[{&(0x7f0000000100)="be9797091ef9919371a2b5c99d7877c3794ed107266f144ff9b3b71a298dfd51d7b45e3e118db9fca30db2d1dafbbdaed6efdf33e3d0e8913c45a44e905a2dbbd97be33d97695bc0c70b7cac815d62e43aad9bb6bb5b0489887f1ffabbc9eaf729239eda5be5792444206830b623af86a8123cff21835ccf54b9cfeb10593b42914e12b135c590e0c6003d487004a40c7e454450d04cce21de949de9a8f48df56ee10f4d66f8daf3b2826d182f8a4ba125622b1b6e2bfcfd6093676e1c27a059c1a11c5668bf9040df805fc622b6ce35338e93a3f72559a47b94c2bcf30ea9e3e82cda9528f43fdb60a699f28a32746c5edce4c438142016863cbb85f7c7c6c3a7779fb1866eb05dacc29f6db71253422fff17eb3c76565fea66d993e3267ac2f773db7b3b0031d2a7763d9390802835f576dc49bbfb4bf76d747f78fef8b6dbacce1e9fd2ad8a1d0c840092c3968ef747a223b4932928e845061b66140abf784b491e80afdfe157b5722eaa5001866a14ea88e8540c75029859c04094ee627a2171658761b0d14f34509b985190e61029400af05f25cbc07d1cc4feb19ed8ce530d70d9d3145196eb6ef73ec6d1852db38eb99d6ecae45f4715cd8a0b70604c5ccce6a08c2c143572b03efbb51be727341ce70603c3d9daf65ddecda876053a3f3072bd23cf5ab1f23e7e5d06af74a8d6f49190ebc9230faf377677691140943a895181ce52726e3b80670a5bfd45778832bf72af845991f339a7f6ec94c93f9ab931542d7c1fd64b5253ce72c728b01e5252881c106740e8b69698fdbe549ae2eac9a30909f55fe01bfd52e91d73d159c9e762e2f7aad5689b17a3babfd74d8fdeac41ad25bc998bfbcfb8de8bce39c61c5145efc42fdb0b6d8c58384e525d1e73299a760d0919104a2a9a3c529d386a00a448584a420e95d99f2cf27f4cbf8c0c7ea159bae693ccfac8465b1382137ceec42c34d79dd9160b68b308b1c9ae5052681583e7ee287faf4683adbaf6095f98cc0824e9fb68ef419b4f55f15e797547ce1ccb94a4a0da33a64fd14d83847f84814309f1f138469027275294a5e389e542f889c6bcd5911d50a502b5b266f765a5c0accb50d201a2ef8431fb570718a48928313fc5391153ffcaadbbc9fccd2d5d297987219a6b0d0f46dd1caa10ddf8e77b7c5bebc8e681a921cb712bb276c6af02b729207b9b9ba0f51aafe11a48f97b6ed0925456970709ceb60e02064ca6cae9b80484a6ff658fb3df594dc5aca2978d452097d75148011dd9618348d3fabde495c104768d8fc32993f32d490788a077f5e3674f92966b63c381769362afc112ca81a22b99e760dc501b8cce5d9a6e740c152f534c45b6b9b48e1bde99d93abc21f9ea87823ff0db721035177bc5202eb8f63830b98bdaede03b0187b980372d42975521bc9f3157edaa1bd692f05d54575b88dca63dcfeef9d8c258714383b1c26e2504eb5fa75b1663010e32dd0632ecc000c2833f9ea4a019228c2300ab8cec0b19bb97f020a741b3f5092d40ea80f8d33913d9ea6b15f652c481056f89d3449f6b9b005df912320b06653cc7487d5429975bfc03a6fbf36027694d086b2af32924488f3ffef6627f4d9cc07dfbf865d7dacff95233017a080a6c17ff2ab49dad617f8de8e1fedc2dfb66329d9ec6ee8b20e5918be2ac4706c48613eeea826fa0b8cfeaa93926229ace06720ff16f37871a2e2769a03f681f5453eaaedf5e383bf03ac1d89def0807eb3951c374b0ca2a12fbd2adda2d2d0f49a0181f0e7878fa04ce0958b7cd6d2cfb8d93382190e7282a211b84e58d6b70bd98c5561c912cf5359fe80ff0d7a0c28713aada580799b197a5b432e355160d6c61a7ffe62a1be829ef041f8ff395fe9298d3f11d772090abf4ef3d3ff2f4c438758dae83f472e90b7fa40111bdaa9b354e664867139a0175fdb85003fbc8e471fdcae188f548a4fc98fdeb87d8f74a67400ed6319c6ab862359c8f0aacb12c7c1bca1da6747f867246dd0899111e2519e765ff7aa710897648013609ac7007e0712de19f56f00e07bc803280fc5c28200c808e5dbb15c4f64fd7f378f03525a11bac3cf8a973bb2d1a93b61c7f98b6e401f5823b257fd0134283c2f677508c4fbf340fa80a71cfa1a08a95d66d205a595028b897045be049966475bb7a4ee3bf5d3d554aec128a54c3097c6136a8f83e1b3233cb28a75b4981e49ec8a566bba020ece5967a00843819e5a40d55654c25e726c72d9e205419e27ade0d6f2f97854c180a1e5f0e76b1679320952d9d109bca65ea02db4ffbc6b2bc73f00a956cf4a792eafa2981c005615c60ab195ecaf3a3dbd01474b6486780d89c9027f119d68b41b9621da88374f926bd374b5fa635a95cb59e9f48b89a4c31481e9063e3a61f57eed3bf477b2476a5fa493bb8776d1c39755ef480876903c0272e735d84926d14ebb950e4390d868fd5eada7083c16199a8355e814e8b276dc7b89787a322fc002037d8d3e04fa02a65c1d2a44cf2825cd2d6969692b4332b6c421d73e4e16c3e133b06a414af34409e9cde151de9316d2ec482732cb97b2da9bbca55fd4b29c91291046498960a59828dd1ac51f5f2e4619661a5127f0ac6c0d23a65aeec3d073540a5992523223a32ab7a9b2a2519843a9b06883897cdec79ae019d5ba86021827c2fd0849aaec1ad4b90cd1c7f9f81ebf193da1866b9933fb5c226cb2b9aa3c2fb305ddf386b9f6790252583b2a97d5e3183ad5378633766af2c10971bc258e0a9108853373f4e4205c82b98310d67be026ec0bd78ddc6a8f61120297537fec16ba7997c2067ef47ff25bdc4c4a04345882309476fa91599819b07ec9e8c7f401cb4e5f494682f06d8d6bda08b87fc7bc84762492851d7341232da84be1f63fc29c6a59d4f3565ac689e4694f161fa9cce50cb9b648727b88ed103b639966e65d8373da1474c314a29548039fe41ab053811d477db1acd50f9de5dfc112a028c6c083046b309a09d2df395befe15f69e399b86e3bb8798f6adfa5e5b88626ecf26ad91dcfca1494eaf57f9dc76db94ecaa248b1a057f4d8a53b14c6e3d6c851865f21713324b5ea1951a0e4bb25262d0601c8476c2b34aadd7bfbdabd0cab49cbe3ff95ebb0c84cd934d3cac6281ad5abbf90b4e06f4b23e4d9b342040c4f861e8842ec61ed53d72c255db13cd5108133621f000fdf8047f6ff03f944f055aa66231a77e4195664de5e1423c96fb411ddf646d7f40c5b04e963bba63c0e276cf3b10c386bfcd4b2070caa947a1f895c2f0a94e0ea00f5c931fc623d801054db4ecb38ad821f35d1193ff54c518d23ea3c35985c9c8b414eae1b1f7a336ff62e2de0bf1231805808e229d2a4f7e6dfdd823029ae479de75e2bba1d7762a3d2931a5ddaf3517fc2634d4c218488cf69132519ada4a582a4a0518045444053fee26f10fbd21245f01da5bff02426021cd1b790a04961ef80b31dbfac9fb89ba87a276fa41a899fde5f62872eae2c4540550a24678912ca78532ce31a8e50c84032a898c7ea6fdc7a2fece1ab8b4bfc1afe9f5c29c9480b215f235e82007ae701304439300286c9d6094a59574f13dcd648b2a0f8420e178fb1679f6785effeedbea2d67b8a5bf8e08b616c2d4eb7127a0783efbcd3b638676423190f31e7fa0ba006a89266e7690575bb8dd8ae779454bd6d8f6faf981378ddfad9aebf35198125b58a84d1931f8bbecc19e52822b327b2a2a40551974ef3a92c1fd22e86fe169269ec89fea19de8ade810135c8d825d9f782707914bd3fb5b506d77951defb5b69698f3b21978a747459993e5386b1442637c587983cf2affab8b8fc146c63ae3a23aa50b8a0be96392470b9c7107f59c13efcddfd2f31f392f186ce734533232bfd3423753275f5348ac70d1ec0a071ae4e15a683254a52f5af1b88f52044da15db0dd6cfe0de53aa0c4434d35910407421c80ac3dcb74a3754624144bcf26922cb236e3f2c66468f63b5a2dbdfac4997e439b6bf9a71cd55524be215b0698988fc6cc2ec11a0f938970da4c06f88b3f0215a8923677a0fc74cf871daedd4ecad0780743b8ee88473c0f0d782ee92b5f1c0c5288edfe24651287b021265a102b63bedc615e6c00faa5d6a44c4e105a459cfecd740f97571aaa4a4d937ce26dac6ab0c499b071a5149b45a9c92241d9e1fc2ef5804d6ab745525513c7453e893223228e89f9ebc81d298e3087a81693bd13cbe8eca9716a151dafce7e30539b1fe9fee32f4fa5566c75509ce5b69d66575c6d87e7b9f7d7b0e39de0b135eaec662bd0b36cbe32625adf5b25de917ee60531fe0a4f4c7ec0f2ea5d63fbe8de1b2b76e6370a3c0c1ad72aa3e450599c1420b6843b59ae7b19914c00b9baf5fe2d6d32362dfb3863d709b700affa1d75f537f4b9901429e26922e21b7145331828cf7842283f6c1c80fb55cc1e9afa7515f16bd8ca055b48afefe6a394ed671ca7de359796be71de8995d13fd677339051a40b208292a9c5d02413b5188c4659b050ee3f65b4dd050d12a882f8c537c19fcb2bca505cbd395f9fee4a04eed2a3779f7c810098afc919835f477d468a6ce13be6387415d8ed84f42cfbbcc775ceb90da99dba8a8a821f523520fc4bf09de31336f1802ef33af0b6c9ece5bad56c440cf0401f9150513f1d5a7773292c4a3d5fd2744a473be9321dd65f1c6ca4cc52883fe709844b25e25349f5e9d4f3ee7a3f1b34c60a0d5b3549ef978b18b38bded403f8cb8e710dde623dbce2a5c4fd09025e8cae604fed8321fb7f9001fe6b1752f8c2168e221f1d09f72568a6e6372f7adbf8ee55fad0bff63179d05a6a210732b3a2cccccbcfa1961b40c142e83ba62611c10380559ea3deca8f61317ddc38e17ac75f53aca9595994edf12f84c188b27696d1ac3c8e0171d22f909792769c7043230e193b35708b9eebb223d80df293abdf09fe86d43e2c0b0f6893909a8854eab299c281e9e82acac1480ad7c004560c7711ca21e1acc99c72c4793e5e3a4dc3fb9b3090984f9bfc73b6080cbf5e402be5d06cfc07a691626e4eb857a58c5072610e4422f3f65bac16e6c4833889764428c3a2f5a54afff308642a288efe642dfe6405bf53b7ba9a8c7d31a629e32b318be0758658ceb1f02e7e2880b16324e311f95c92a238628d115e2170d46059510301630ce31207675b2141850162965102f32a6215b7eaaa15da39f67e51cdc6eefc7b37e550eda6d4fbc7411598e86c3fbc3bf42c986aef6a898ea773142dab0aeb793605dc4b6516333437bd90f104aec63db8bd79574df0ca9b1cb877f8491d286961eb15672f33d929308fdc282b428d8bcd107a0f6be186ac33f24e83757d454388521e0befd35d8e548820f285622beedf3ef4554c9547fc3ace29561824484869f0283dd5f16298ab745ecac13c7e8026058b05d8dfb4c92538d16298f676e721a7f8235758de6c833c4623140eb35e3514f77010ff5464b81ba23555ae1d5740b00a81a7804752adfa26e37b512d30d6b566193973479a62be0145a92d592535d4c01ec1a98df2fdd35ca0305a974c98ef365c0d4130153fff308ddb171cf075a76f9772353e8dc5c55255c6827d7d8906479eaa897ab0c45a17f7650a9ffc29875e93da7f6c87e9bec60cefc1990d88531fd370ddcd297b57286cf9f304c11e68b3bad12e4b24bc23eb2b9b15d9f429037130a7f086b154e6a5ede92ec2e31a60ff349edd12f4787ce3b95ac4c0f1ece1bbb2f9e102e25fed4", 0x1000, 0x8}, {&(0x7f0000001100)="0a0d684ed3cda72d74e7c89163d837dea7bc72998153a96ae07fa99db3b05545431961531735563ad8dbc2522b908c119d2b2f49f63b62c9782429a25c8e53fd1ee93e2e57882b2e2696620f0debdff904c07055d984401fc4a52c94bbe19488d46d887883b9f3fff1e73b6a7718c293c206c25a87e013b7749a0d8f40d9cf1d3df3954716b68a42e535e7c3f2ccc543d520a23ff76e4a7b8f083d1a707f3c647c847bd18a20b62277f0b096e6732ae51e9ebb528a0ed5c5a08171ff12495f0aa6a773e921f422added797fed1d6", 0xce, 0x2}, {&(0x7f0000001200)="831a30de1b21a978101d989f1181593b7c7c6fdcf022da56ac70fb2dbdeaf185bba679c9a8eb4464e06f7c93d20c92d153a9fe0de4f465f94b715f637fec74f884992eacf9789b18f9f6e9341aafb02b155ca62c6333d17570815de63ad879beda747a23103296a76416aef15b296422db83e5d8a17a4c614a81434373b293ae1b350ec48718a793948ae17de21f877f643c860b70b9f47dbe42ed3831fa83c5150d81151a76a3d8e9324115f87c50404f13d719a6", 0xb5, 0x9}, {&(0x7f00000012c0)="3f038b8d623744653b8fc89967d8c6ecef98a6b4214eede9c6be4fee7eeb93c50f1bb04b314b9737d18386293ad077e70ab95331b9eb0b8fa3871a73dbd8536f667c86eb75f416b5bc8909ced830e466dd5930f392e06f563b83498050a082118aba190547c11eee5341ccda1944e6e46a64e0b9035793d998a404d53d66a179cadfe86568091b84dc8424b10a32fc9a1091d127", 0x94, 0x1}, {&(0x7f0000001380)="8a2efd3e9ab81b4163c6050bf620ffa71790502f27aaa8066142b6b8bc7fa5c533326920f9399247d9588f5137ea31e8188c50abc185605548a9f58c187c80cb72329eef7ba1da28ce1d05b40e6ca4d2048606998512b81b50e65c", 0x5b, 0x2}, {&(0x7f0000001400)="6d4442728ba3198cfb4348378618214908d36e5a13b9905ddbc84a9db47860dc865c45722bf5401292155b7a318206c0004d879e6a3f303c7f723cfa9eebcd937da9654033457160a69c33c7f343f8164605ad933d75b7da4c9d7f7cd6931c0504081c509f3e0d6f789455f4c9bdb41c068d5b4539bb6a390e9fe9273f05fe63859fbdefef8fc9f7144a97b74e34470c49edb401dd8816e7f31cdb55fa1f779832771b4755417425f3021022e658f32a3f7e98d53498b040b727e64dcc70a3444e3b20ac654f7f2beba1fd215f1542c6", 0xd0, 0x524}], 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001140)={0x7, &(0x7f0000001100)=[{}, {}, {}, {}, {}, {}, {}]}) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) write$P9_RMKDIR(r1, &(0x7f00000010c0)={0x14, 0x49, 0x1, {0x40, 0x4, 0x4}}, 0x14) [ 1276.561721][ T26] audit: type=1400 audit(2000001011.432:710): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/aqtr/exec" pid=23566 comm="syz-executor.4" 03:50:11 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0xffffffffffffff49) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) accept4$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80000) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/icmp\x00') r5 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000200)=""/97) sendmsg$alg(r3, &(0x7f00000004c0)={0xffffff8d, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-self/aqtr/exec\x00'], 0x22) 03:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffffb]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1276.657448][T23841] FAT-fs (loop1): Unrecognized mount option "fsmagic=0x0000000000000001" or missing value 03:50:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c2, 0x10400003) [ 1276.711476][ T26] audit: type=1400 audit(2000001011.582:711): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=23874 comm="syz-executor.3" 03:50:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) ppoll(&(0x7f0000000000)=[{r1, 0x2250}, {r2}, {r0}, {0xffffffffffffffff, 0x48}, {r1, 0x1140}, {r0, 0x4361}], 0x6, &(0x7f0000000080), &(0x7f00000000c0)={0x9f}, 0x8) 03:50:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) [ 1276.890322][ T26] audit: type=1400 audit(2000001011.762:712): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/aqtr/exec" pid=23925 comm="syz-executor.4" 03:50:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:11 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0xffffffffffffff49) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) accept4$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80000) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/icmp\x00') r5 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000200)=""/97) sendmsg$alg(r3, &(0x7f00000004c0)={0xffffff8d, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-self/aqtr/exec\x00'], 0x22) 03:50:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c3, 0x10400003) 03:50:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1276.956188][T24184] FAT-fs (loop1): Unrecognized mount option "fsmagic=0x0000000000000001" or missing value [ 1276.985404][ T26] audit: type=1400 audit(2000001011.862:713): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=24189 comm="syz-executor.3" [ 1277.117389][ T26] audit: type=1400 audit(2000001011.992:714): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/aqtr/exec" pid=24203 comm="syz-executor.4" 03:50:12 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0xffffffffffffff49) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) accept4$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80000) r3 = accept$alg(r1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/icmp\x00') r5 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000200)=""/97) sendmsg$alg(r3, &(0x7f00000004c0)={0xffffff8d, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-self/aqtr/exec\x00'], 0x22) 03:50:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000080)={0xf66b, 0x3, 0x9, 0x7fffffff}, 0x10) 03:50:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_eq={'uid'}}]}) 03:50:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c4, 0x10400003) 03:50:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1277.321211][ T26] audit: type=1400 audit(2000001012.192:715): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=24614 comm="syz-executor.3" 03:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0xffffffffffffffff}, 0x30) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x824c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '&&\n\x93>lu\xfb\xf9\x06\xf6R\xe8t\xae*\xc0\xd4u\xaa)\xa0;H\xd4\xd6 P\xcba}\xc0K\x8e='}, 0x29) [ 1277.384405][T24625] FAT-fs (loop1): Unrecognized mount option "fsmagic=0x0000000000000001" or missing value 03:50:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x100) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r3, 0x409, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x8004) 03:50:12 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c5, 0x10400003) 03:50:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1277.706133][T25054] FAT-fs (loop1): bogus number of reserved sectors [ 1277.712694][T25054] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1277.734124][T25077] FAULT_INJECTION: forcing a failure. [ 1277.734124][T25077] name failslab, interval 1, probability 0, space 0, times 0 03:50:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002f00)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/66, 0x42}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/111, 0x6f}], 0x3, &(0x7f0000000340)=""/235, 0xeb}, 0x7}, {{&(0x7f0000000440)=@ipx, 0x80, &(0x7f0000001700)=[{&(0x7f00000004c0)=""/228, 0xe4}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/20, 0x14}], 0x4, &(0x7f0000001740)=""/157, 0x9d}, 0x3}, {{&(0x7f0000001800)=@isdn, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001880)=""/64, 0x40}, {&(0x7f00000018c0)=""/179, 0xb3}, {&(0x7f0000001980)=""/254, 0xfe}, {&(0x7f0000001a80)=""/85, 0x55}], 0x4, &(0x7f0000001b40)=""/242, 0xf2}, 0x3}, {{&(0x7f0000001c40)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)=""/227, 0xe3}], 0x1}, 0x4}, {{&(0x7f0000001e00)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001e80)=""/29, 0x1d}, {&(0x7f0000001ec0)=""/4096, 0x1000}], 0x2}, 0x2560}], 0x5, 0x40000000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000003840)={0x0, 0x1000, "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"}, &(0x7f0000003040)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000003080)={r2, 0x20, 0x1e, "ef383b27537b1a88b5b16c2bc90905371f5497279957c5401161dd600102673f4fcca246c3c4e0b179cdea613b87083fac843dc45d7331675a0be9286f1e90cabef5b40adc1edf77e86522755c9959a8d8882c681b9f4c63a1bde33559b757892524e1176b2b73b695ffcfb9466f3280985676308bc829b228d135c8607fc19f4715daf6bb63a7b7ee5b89e9aad57a6c3b17f1394f9090e6b39a78ad07ffbcfc27b6fc187174974465e6819e128e452a6d8224a4541684ca21e8afbaf6ccfe375781255d"}, 0xcc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) [ 1277.799226][T25077] CPU: 0 PID: 25077 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1277.808376][T25077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.818434][T25077] Call Trace: [ 1277.821758][T25077] dump_stack+0x172/0x1f0 [ 1277.826117][T25077] should_fail.cold+0xa/0x15 [ 1277.830766][T25077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1277.836596][T25077] ? ___might_sleep+0x163/0x280 [ 1277.841456][T25077] __should_failslab+0x121/0x190 [ 1277.846421][T25077] should_failslab+0x9/0x14 [ 1277.850929][T25077] __kmalloc+0x2dc/0x740 [ 1277.855173][T25077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1277.861417][T25077] ? fput_many+0x12c/0x1a0 [ 1277.865839][T25077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1277.872109][T25077] ? strnlen_user+0x1f0/0x280 [ 1277.876799][T25077] ? __x64_sys_memfd_create+0x13c/0x470 [ 1277.882351][T25077] __x64_sys_memfd_create+0x13c/0x470 [ 1277.887937][T25077] ? memfd_fcntl+0x1550/0x1550 [ 1277.892705][T25077] ? do_syscall_64+0x26/0x610 03:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1277.897400][T25077] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1277.902695][T25077] ? trace_hardirqs_on+0x67/0x230 [ 1277.907777][T25077] do_syscall_64+0x103/0x610 [ 1277.912378][T25077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1277.918271][T25077] RIP: 0033:0x457e29 [ 1277.922174][T25077] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c6, 0x10400003) 03:50:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1277.941873][T25077] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1277.950301][T25077] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1277.958277][T25077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1277.966248][T25077] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1277.974209][T25077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeb97176d4 [ 1277.982158][T25077] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:12 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1278.138755][T25512] FAULT_INJECTION: forcing a failure. [ 1278.138755][T25512] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.194597][T25512] CPU: 0 PID: 25512 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1278.203750][T25512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.213815][T25512] Call Trace: [ 1278.217135][T25512] dump_stack+0x172/0x1f0 [ 1278.221487][T25512] should_fail.cold+0xa/0x15 [ 1278.226097][T25512] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1278.231927][T25512] ? ___might_sleep+0x163/0x280 [ 1278.236796][T25512] __should_failslab+0x121/0x190 03:50:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="737cff0f00002ff984210af38f2d736560662f6107000000e4386563000080000000"], 0x22) 03:50:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1278.241758][T25512] should_failslab+0x9/0x14 [ 1278.246283][T25512] kmem_cache_alloc+0x2be/0x710 [ 1278.251162][T25512] ? __alloc_fd+0x430/0x530 [ 1278.255697][T25512] ? shmem_destroy_callback+0xc0/0xc0 [ 1278.261079][T25512] shmem_alloc_inode+0x1c/0x50 [ 1278.265854][T25512] alloc_inode+0x66/0x190 [ 1278.270189][T25512] new_inode_pseudo+0x19/0xf0 [ 1278.274865][T25512] new_inode+0x1f/0x40 [ 1278.278936][T25512] shmem_get_inode+0x84/0x780 [ 1278.283626][T25512] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1278.289215][T25512] shmem_file_setup+0x66/0x90 [ 1278.293913][T25512] __x64_sys_memfd_create+0x2a2/0x470 [ 1278.293933][T25512] ? memfd_fcntl+0x1550/0x1550 [ 1278.293951][T25512] ? do_syscall_64+0x26/0x610 [ 1278.293969][T25512] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1278.293987][T25512] ? trace_hardirqs_on+0x67/0x230 [ 1278.294008][T25512] do_syscall_64+0x103/0x610 [ 1278.294032][T25512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.304139][T25512] RIP: 0033:0x457e29 03:50:13 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c7, 0x10400003) [ 1278.304156][T25512] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.304165][T25512] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1278.304182][T25512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1278.304191][T25512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1278.304200][T25512] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1278.304210][T25512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeb97176d4 [ 1278.304219][T25512] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 [ 1278.481498][T25821] FAULT_INJECTION: forcing a failure. [ 1278.481498][T25821] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.495976][T25783] FAT-fs (loop1): bogus number of reserved sectors [ 1278.517469][T25783] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1278.560676][T25821] CPU: 0 PID: 25821 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1278.569850][T25821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.579911][T25821] Call Trace: [ 1278.583225][T25821] dump_stack+0x172/0x1f0 [ 1278.587577][T25821] should_fail.cold+0xa/0x15 [ 1278.592178][T25821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1278.597999][T25821] ? ___might_sleep+0x163/0x280 [ 1278.602862][T25821] __should_failslab+0x121/0x190 03:50:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c8, 0x10400003) [ 1278.607804][T25821] should_failslab+0x9/0x14 [ 1278.612315][T25821] kmem_cache_alloc+0x2be/0x710 [ 1278.617166][T25821] ? current_time+0x6b/0x140 [ 1278.621776][T25821] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1278.627590][T25821] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1278.632880][T25821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.639122][T25821] ? timespec64_trunc+0xf0/0x180 [ 1278.644074][T25821] __d_alloc+0x2e/0x8c0 [ 1278.648242][T25821] d_alloc_pseudo+0x1e/0x30 [ 1278.652766][T25821] alloc_file_pseudo+0xe2/0x280 03:50:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000c9, 0x10400003) [ 1278.657627][T25821] ? alloc_file+0x4d0/0x4d0 [ 1278.662139][T25821] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1278.668393][T25821] __shmem_file_setup.part.0+0x108/0x2b0 [ 1278.674043][T25821] shmem_file_setup+0x66/0x90 [ 1278.678739][T25821] __x64_sys_memfd_create+0x2a2/0x470 [ 1278.684129][T25821] ? memfd_fcntl+0x1550/0x1550 [ 1278.688902][T25821] ? do_syscall_64+0x26/0x610 [ 1278.693592][T25821] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1278.698883][T25821] ? trace_hardirqs_on+0x67/0x230 [ 1278.703915][T25821] do_syscall_64+0x103/0x610 [ 1278.708511][T25821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.714402][T25821] RIP: 0033:0x457e29 [ 1278.718304][T25821] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.737904][T25821] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1278.746308][T25821] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 03:50:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73656c6612617474722f6578656300"], 0x22) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000080)={0x0, 0x6}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x3bd3204a3e25ca9b) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1f0, r4, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x110, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2e79422d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x471}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24008090) 03:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xf8ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ca, 0x10400003) [ 1278.754285][T25821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1278.762256][T25821] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1278.770226][T25821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeb97176d4 [ 1278.778199][T25821] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:13 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1278.972923][T26526] FAT-fs (loop1): bogus number of reserved sectors [ 1278.995196][T26659] FAULT_INJECTION: forcing a failure. [ 1278.995196][T26659] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.011354][T26526] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1279.035842][T26659] CPU: 0 PID: 26659 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1279.044968][T26659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.055025][T26659] Call Trace: [ 1279.058337][T26659] dump_stack+0x172/0x1f0 [ 1279.062688][T26659] should_fail.cold+0xa/0x15 [ 1279.067306][T26659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1279.073127][T26659] ? ___might_sleep+0x163/0x280 [ 1279.077993][T26659] __should_failslab+0x121/0x190 03:50:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000cb, 0x10400003) [ 1279.082937][T26659] should_failslab+0x9/0x14 [ 1279.087446][T26659] kmem_cache_alloc+0x2be/0x710 [ 1279.092294][T26659] ? current_time+0x6b/0x140 [ 1279.096901][T26659] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1279.102713][T26659] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1279.108018][T26659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.114263][T26659] ? timespec64_trunc+0xf0/0x180 [ 1279.119209][T26659] __d_alloc+0x2e/0x8c0 [ 1279.123376][T26659] d_alloc_pseudo+0x1e/0x30 [ 1279.127890][T26659] alloc_file_pseudo+0xe2/0x280 [ 1279.132742][T26659] ? alloc_file+0x4d0/0x4d0 [ 1279.137231][T26659] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1279.143477][T26659] __shmem_file_setup.part.0+0x108/0x2b0 [ 1279.149109][T26659] shmem_file_setup+0x66/0x90 [ 1279.153810][T26659] __x64_sys_memfd_create+0x2a2/0x470 [ 1279.159193][T26659] ? memfd_fcntl+0x1550/0x1550 [ 1279.163967][T26659] ? do_syscall_64+0x26/0x610 [ 1279.168651][T26659] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1279.173947][T26659] ? trace_hardirqs_on+0x67/0x230 [ 1279.178985][T26659] do_syscall_64+0x103/0x610 03:50:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000cc, 0x10400003) [ 1279.183583][T26659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.189484][T26659] RIP: 0033:0x457e29 [ 1279.193384][T26659] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1279.212990][T26659] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1279.221408][T26659] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 03:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xf9ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='stack\"/proc/thread-self/attr/exec\x00'], 0x22) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 03:50:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1279.229383][T26659] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1279.237358][T26659] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1279.245329][T26659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeb97176d4 [ 1279.253306][T26659] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:14 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000cd, 0x10400003) [ 1279.418455][T27136] FAULT_INJECTION: forcing a failure. [ 1279.418455][T27136] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.440276][T27136] CPU: 0 PID: 27136 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1279.449430][T27136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.459498][T27136] Call Trace: [ 1279.462820][T27136] dump_stack+0x172/0x1f0 [ 1279.467166][T27136] should_fail.cold+0xa/0x15 [ 1279.471788][T27136] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1279.477614][T27136] ? ___might_sleep+0x163/0x280 [ 1279.482476][T27136] __should_failslab+0x121/0x190 [ 1279.487429][T27136] should_failslab+0x9/0x14 [ 1279.491947][T27136] kmem_cache_alloc+0x2be/0x710 [ 1279.496811][T27136] ? rcu_read_lock_sched_held+0x110/0x130 [ 1279.502536][T27136] ? kmem_cache_alloc+0x341/0x710 [ 1279.507581][T27136] security_file_alloc+0x39/0x170 [ 1279.512611][T27136] __alloc_file+0xac/0x300 [ 1279.517033][T27136] alloc_empty_file+0x72/0x170 [ 1279.521803][T27136] alloc_file+0x5e/0x4d0 [ 1279.526050][T27136] alloc_file_pseudo+0x189/0x280 [ 1279.530996][T27136] ? alloc_file+0x4d0/0x4d0 [ 1279.535511][T27136] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1279.541780][T27136] __shmem_file_setup.part.0+0x108/0x2b0 [ 1279.547423][T27136] shmem_file_setup+0x66/0x90 [ 1279.552097][T27136] __x64_sys_memfd_create+0x2a2/0x470 [ 1279.557464][T27136] ? memfd_fcntl+0x1550/0x1550 [ 1279.562253][T27136] ? do_syscall_64+0x26/0x610 [ 1279.566953][T27136] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1279.572244][T27136] ? trace_hardirqs_on+0x67/0x230 [ 1279.577274][T27136] do_syscall_64+0x103/0x610 [ 1279.577298][T27136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.577309][T27136] RIP: 0033:0x457e29 [ 1279.577325][T27136] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:14 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000cc, 0x10400003) 03:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfaffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:14 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1279.577333][T27136] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1279.577348][T27136] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1279.577357][T27136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1279.577366][T27136] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1279.577375][T27136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faeb97176d4 [ 1279.577384][T27136] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ce, 0x10400003) [ 1279.744192][T27580] FAULT_INJECTION: forcing a failure. [ 1279.744192][T27580] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.791784][T27580] CPU: 0 PID: 27580 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1279.800948][T27580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.811004][T27580] Call Trace: [ 1279.814314][T27580] dump_stack+0x172/0x1f0 [ 1279.818659][T27580] should_fail.cold+0xa/0x15 [ 1279.823263][T27580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1279.829086][T27580] ? ___might_sleep+0x163/0x280 [ 1279.833953][T27580] __should_failslab+0x121/0x190 [ 1279.833973][T27580] should_failslab+0x9/0x14 [ 1279.833991][T27580] kmem_cache_alloc+0x2be/0x710 [ 1279.834012][T27580] ? notify_change+0x6d5/0xfb0 [ 1279.843428][T27580] ? do_sys_ftruncate+0x41e/0x550 [ 1279.843451][T27580] getname_flags+0xd6/0x5b0 [ 1279.843469][T27580] getname+0x1a/0x20 [ 1279.843484][T27580] do_sys_open+0x2c9/0x5d0 [ 1279.843503][T27580] ? filp_open+0x80/0x80 [ 1279.853088][T27580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1279.853112][T27580] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1279.862608][T27580] ? do_syscall_64+0x26/0x610 [ 1279.870894][T27580] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.870915][T27580] ? do_syscall_64+0x26/0x610 [ 1279.881376][T27580] __x64_sys_open+0x7e/0xc0 [ 1279.906687][T27580] do_syscall_64+0x103/0x610 [ 1279.911303][T27580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1279.917196][T27580] RIP: 0033:0x411f11 [ 1279.921097][T27580] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:50:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:14 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ca, 0x10400003) 03:50:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1279.940713][T27580] RSP: 002b:00007faeb9716a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1279.949154][T27580] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1279.957141][T27580] RDX: 00007faeb9716afa RSI: 0000000000000002 RDI: 00007faeb9716af0 [ 1279.965117][T27580] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1279.973091][T27580] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1279.981062][T27580] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x3) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80140}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x158, r3, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ipddp0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @rand_addr="f9c4401c6212d9bcc1c9dc8af29c4dee", 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3f, @local, 0xfff}}}}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x14}, 0x5}}}}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb3d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x33c9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x84}, 0x1) 03:50:15 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:15 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000cf, 0x10400003) 03:50:15 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1280.242850][T28074] FAULT_INJECTION: forcing a failure. [ 1280.242850][T28074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1280.256109][T28074] CPU: 1 PID: 28074 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1280.256121][T28074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.256127][T28074] Call Trace: [ 1280.256164][T28074] dump_stack+0x172/0x1f0 [ 1280.282922][T28074] should_fail.cold+0xa/0x15 [ 1280.287540][T28074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1280.293355][T28074] ? mark_held_locks+0xf0/0xf0 [ 1280.298141][T28074] should_fail_alloc_page+0x50/0x60 [ 1280.303348][T28074] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1280.303373][T28074] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1280.303387][T28074] ? find_held_lock+0x35/0x130 [ 1280.303408][T28074] ? do_truncate+0x187/0x220 [ 1280.303425][T28074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1280.303447][T28074] cache_grow_begin+0x9c/0x850 [ 1280.319278][T28074] ? getname_flags+0xd6/0x5b0 [ 1280.319301][T28074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1280.339096][T28074] kmem_cache_alloc+0x645/0x710 [ 1280.339115][T28074] ? notify_change+0x6d5/0xfb0 [ 1280.339133][T28074] ? do_sys_ftruncate+0x41e/0x550 [ 1280.339153][T28074] getname_flags+0xd6/0x5b0 [ 1280.364478][T28074] getname+0x1a/0x20 [ 1280.368382][T28074] do_sys_open+0x2c9/0x5d0 [ 1280.372805][T28074] ? filp_open+0x80/0x80 [ 1280.377056][T28074] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1280.383312][T28074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1280.388782][T28074] ? do_syscall_64+0x26/0x610 [ 1280.393992][T28074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.400060][T28074] ? do_syscall_64+0x26/0x610 [ 1280.404760][T28074] __x64_sys_open+0x7e/0xc0 [ 1280.409281][T28074] do_syscall_64+0x103/0x610 [ 1280.413889][T28074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.419783][T28074] RIP: 0033:0x411f11 [ 1280.423685][T28074] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000180)={0xa, 0x8, {0x0, 0x1, 0x80000001, {0x41, 0xfffffffffffffd68}, {0x7fff, 0x3f}, @cond=[{0xfffffffffffffffc, 0x9, 0x6c, 0x0, 0x8, 0x5}, {0x7, 0x0, 0x1, 0x9, 0x651, 0x1f}]}, {0x57, 0x0, 0xc4, {0x8001, 0x7}, {0xfffffffffffffff8, 0x1}, @period={0x0, 0x6, 0x9ce, 0x8, 0xffff, {0x1, 0xfffffffffffffff7, 0x636d, 0x8}, 0x9, &(0x7f0000000140)=[0x2, 0x6, 0xfff, 0x7, 0xc93, 0x8, 0x3, 0x9, 0x57d]}}}) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /prohread-self/cttr/exec\x00\x00\x00\x00'], 0x22) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x940, 0x0) accept4$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x80000) 03:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0xfff, @local, 0x400}}, [0x9, 0x5, 0xa7b1, 0x4, 0x5, 0x8, 0x7, 0x6e02, 0x3ff, 0x5, 0x7fff, 0x8, 0x5, 0x1, 0x1a5]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000240)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2b}}}, [0x1b, 0xad39, 0x5, 0x5, 0x0, 0x3, 0x1f, 0x8000, 0x2, 0x1, 0xf173, 0x2, 0x8000, 0x7fffffff, 0x9]}, &(0x7f00000000c0)=0x100) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000340)='vboxnet1securityselinux@\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x400, &(0x7f0000000400)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x5}}], [{@pcr={'pcr', 0x3d, 0x22}}]}}) 03:50:15 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1280.443298][T28074] RSP: 002b:00007faeb9716a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1280.451714][T28074] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1280.451739][T28074] RDX: 00007faeb9716afa RSI: 0000000000000002 RDI: 00007faeb9716af0 [ 1280.467896][T28074] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1280.475871][T28074] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1280.483841][T28074] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:15 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d0, 0x10400003) [ 1280.551386][T28386] FAULT_INJECTION: forcing a failure. [ 1280.551386][T28386] name failslab, interval 1, probability 0, space 0, times 0 [ 1280.569116][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 1280.569129][ T26] audit: type=1400 audit(2000001015.442:723): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=28384 comm="syz-executor.3" [ 1280.600758][T28386] CPU: 1 PID: 28386 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1280.609898][T28386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.609906][T28386] Call Trace: [ 1280.609934][T28386] dump_stack+0x172/0x1f0 [ 1280.609960][T28386] should_fail.cold+0xa/0x15 [ 1280.609981][T28386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1280.610007][T28386] ? ___might_sleep+0x163/0x280 [ 1280.642864][T28386] __should_failslab+0x121/0x190 [ 1280.647816][T28386] should_failslab+0x9/0x14 [ 1280.652325][T28386] __kmalloc+0x2dc/0x740 [ 1280.656579][T28386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1280.662822][T28386] ? fput_many+0x12c/0x1a0 [ 1280.667248][T28386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1280.673503][T28386] ? strnlen_user+0x1f0/0x280 [ 1280.678187][T28386] ? __x64_sys_memfd_create+0x13c/0x470 [ 1280.683752][T28386] __x64_sys_memfd_create+0x13c/0x470 [ 1280.689132][T28386] ? memfd_fcntl+0x1550/0x1550 [ 1280.689151][T28386] ? do_syscall_64+0x26/0x610 [ 1280.689169][T28386] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1280.689189][T28386] ? trace_hardirqs_on+0x67/0x230 [ 1280.689214][T28386] do_syscall_64+0x103/0x610 [ 1280.698641][T28386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.698655][T28386] RIP: 0033:0x457e29 [ 1280.698672][T28386] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1280.698681][T28386] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1280.698697][T28386] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1280.698706][T28386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1280.698722][T28386] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1280.732009][T28074] FAT-fs (loop4): bogus number of reserved sectors [ 1280.742953][T28386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1c20836d4 [ 1280.742964][T28386] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x401) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73746163f0202f70726f632f7468726561642d73656c662f617474722f6578656300"], 0x22) 03:50:15 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1280.870023][T28074] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1280.931831][ T26] audit: type=1400 audit(2000001015.802:724): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=28797 comm="syz-executor.3" 03:50:15 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:15 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d1, 0x10400003) 03:50:15 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461636b70726f632f7468726561642d73656c662f417474619f35095006166512801ece562ff05f722f657865630000008a8acf7aa301591488f97d57a450bf3a7b4004f2520b"], 0x22) [ 1281.098606][T29111] FAULT_INJECTION: forcing a failure. [ 1281.098606][T29111] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.164061][T29111] CPU: 1 PID: 29111 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1281.165819][T29119] FAULT_INJECTION: forcing a failure. [ 1281.165819][T29119] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.173222][T29111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.173230][T29111] Call Trace: [ 1281.173261][T29111] dump_stack+0x172/0x1f0 [ 1281.173297][T29111] should_fail.cold+0xa/0x15 [ 1281.173331][T29111] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1281.213901][T29111] ? ___might_sleep+0x163/0x280 [ 1281.218770][T29111] __should_failslab+0x121/0x190 [ 1281.223718][T29111] should_failslab+0x9/0x14 [ 1281.228244][T29111] kmem_cache_alloc+0x2be/0x710 [ 1281.233107][T29111] ? __alloc_fd+0x430/0x530 [ 1281.237629][T29111] ? shmem_destroy_callback+0xc0/0xc0 [ 1281.243010][T29111] shmem_alloc_inode+0x1c/0x50 [ 1281.247778][T29111] alloc_inode+0x66/0x190 [ 1281.252124][T29111] new_inode_pseudo+0x19/0xf0 [ 1281.256807][T29111] new_inode+0x1f/0x40 [ 1281.260877][T29111] shmem_get_inode+0x84/0x780 [ 1281.265568][T29111] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1281.271117][T29111] shmem_file_setup+0x66/0x90 [ 1281.275804][T29111] __x64_sys_memfd_create+0x2a2/0x470 [ 1281.281180][T29111] ? memfd_fcntl+0x1550/0x1550 [ 1281.285946][T29111] ? do_syscall_64+0x26/0x610 [ 1281.290638][T29111] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1281.295932][T29111] ? trace_hardirqs_on+0x67/0x230 [ 1281.300965][T29111] do_syscall_64+0x103/0x610 [ 1281.305568][T29111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.311462][T29111] RIP: 0033:0x457e29 [ 1281.315362][T29111] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1281.335196][T29111] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1281.343614][T29111] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1281.351584][T29111] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 03:50:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast1, 0x7fffffff}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:50:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1281.359551][T29111] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1281.367523][T29111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1c20836d4 [ 1281.375495][T29111] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 [ 1281.383496][T29119] CPU: 0 PID: 29119 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1281.392620][T29119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.402672][T29119] Call Trace: [ 1281.405979][T29119] dump_stack+0x172/0x1f0 [ 1281.410324][T29119] should_fail.cold+0xa/0x15 [ 1281.414932][T29119] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1281.420774][T29119] ? ___might_sleep+0x163/0x280 [ 1281.425642][T29119] __should_failslab+0x121/0x190 [ 1281.430590][T29119] should_failslab+0x9/0x14 [ 1281.435101][T29119] kmem_cache_alloc+0x2be/0x710 [ 1281.439958][T29119] ? __save_stack_trace+0x8a/0xf0 [ 1281.444991][T29119] __alloc_file+0x27/0x300 [ 1281.449415][T29119] alloc_empty_file+0x72/0x170 [ 1281.454191][T29119] path_openat+0xef/0x46e0 [ 1281.458618][T29119] ? __lock_acquire+0x55d/0x4710 [ 1281.463554][T29119] ? getname+0x1a/0x20 [ 1281.467628][T29119] ? do_sys_open+0x2c9/0x5d0 [ 1281.472220][T29119] ? __x64_sys_open+0x7e/0xc0 [ 1281.476904][T29119] ? do_syscall_64+0x103/0x610 [ 1281.481682][T29119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.487775][T29119] ? debug_smp_processor_id+0x3c/0x280 [ 1281.493245][T29119] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1281.498628][T29119] ? cache_grow_end+0xa4/0x190 [ 1281.503415][T29119] ? __alloc_fd+0x430/0x530 [ 1281.507929][T29119] do_filp_open+0x1a1/0x280 [ 1281.512442][T29119] ? may_open_dev+0x100/0x100 [ 1281.517125][T29119] ? lock_downgrade+0x880/0x880 [ 1281.521981][T29119] ? kasan_check_read+0x11/0x20 [ 1281.526830][T29119] ? do_raw_spin_unlock+0x57/0x270 [ 1281.526848][T29119] ? _raw_spin_unlock+0x2d/0x50 [ 1281.526864][T29119] ? __alloc_fd+0x430/0x530 [ 1281.526896][T29119] do_sys_open+0x3fe/0x5d0 [ 1281.526915][T29119] ? filp_open+0x80/0x80 [ 1281.526931][T29119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1281.526953][T29119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1281.561687][T29119] ? do_syscall_64+0x26/0x610 [ 1281.566363][T29119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.566380][T29119] ? do_syscall_64+0x26/0x610 [ 1281.566403][T29119] __x64_sys_open+0x7e/0xc0 [ 1281.566422][T29119] do_syscall_64+0x103/0x610 [ 1281.566441][T29119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.566454][T29119] RIP: 0033:0x411f11 [ 1281.566471][T29119] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:50:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="737461636b202fb5726f632f7468726561642d73656c662f617474722f65786563004fb84e7d63e295a0f5e9bb5d7ccd82cefdec7c19a4910e828ebc8e58133a234db0f50a1e4c5e09ddbc59c427e3462a7849beb375600b2a039f2522a33be7be2894d4d4fd99879cde94e57815b933ca58ba37b2ee5f75ad4ce62097c1b4b828947f3777805799e181984dfd54ebda675d00ede4b3c1933938d444bfffa93458adfb6fc8cea594dbd8581ffe30653461797478df8e33c97c96594db717dea3b065d2f7"], 0x22) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 03:50:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:16 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d2, 0x10400003) [ 1281.566486][T29119] RSP: 002b:00007faeb9716a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1281.624013][T29119] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1281.631982][T29119] RDX: 00007faeb9716afa RSI: 0000000000000002 RDI: 00007faeb9716af0 [ 1281.639953][T29119] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1281.647928][T29119] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1281.655900][T29119] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:16 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1281.760479][ T26] audit: type=1400 audit(2000001016.632:725): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2FB5726F632F7468726561642D73656C662F617474722F65786563 pid=29651 comm="syz-executor.3" [ 1281.787190][T29715] FAULT_INJECTION: forcing a failure. [ 1281.787190][T29715] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.803419][T29715] CPU: 0 PID: 29715 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1281.812537][T29715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.822592][T29715] Call Trace: [ 1281.825910][T29715] dump_stack+0x172/0x1f0 [ 1281.830265][T29715] should_fail.cold+0xa/0x15 [ 1281.834874][T29715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1281.840697][T29715] ? ___might_sleep+0x163/0x280 [ 1281.845569][T29715] __should_failslab+0x121/0x190 [ 1281.850518][T29715] should_failslab+0x9/0x14 [ 1281.855034][T29715] kmem_cache_alloc+0x2be/0x710 [ 1281.859892][T29715] ? current_time+0x6b/0x140 [ 1281.864504][T29715] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1281.870319][T29715] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1281.875615][T29715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.881858][T29715] ? timespec64_trunc+0xf0/0x180 [ 1281.886803][T29715] __d_alloc+0x2e/0x8c0 [ 1281.890969][T29715] d_alloc_pseudo+0x1e/0x30 [ 1281.895494][T29715] alloc_file_pseudo+0xe2/0x280 [ 1281.900357][T29715] ? alloc_file+0x4d0/0x4d0 [ 1281.904864][T29715] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1281.911121][T29715] __shmem_file_setup.part.0+0x108/0x2b0 [ 1281.916775][T29715] shmem_file_setup+0x66/0x90 [ 1281.921463][T29715] __x64_sys_memfd_create+0x2a2/0x470 [ 1281.926843][T29715] ? memfd_fcntl+0x1550/0x1550 [ 1281.931612][T29715] ? do_syscall_64+0x26/0x610 [ 1281.936295][T29715] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1281.941591][T29715] ? trace_hardirqs_on+0x67/0x230 [ 1281.946628][T29715] do_syscall_64+0x103/0x610 [ 1281.951233][T29715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.957129][T29715] RIP: 0033:0x457e29 03:50:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1281.961026][T29715] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1281.980635][T29715] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1281.989049][T29715] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1281.997020][T29715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 03:50:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d3, 0x10400003) 03:50:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1282.004989][T29715] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1282.012960][T29715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1c20836d4 [ 1282.012971][T29715] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 03:50:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)={'<\x1f\x03^\xe2\x92\xc1\x85\f\\n\x92\x8d\x98\x8b6\x93\x1d\x91d\x03\x9e\x011IMT0\xd6;_\xad\x16\xd4R\x12K\xbd\xf3\x10\xb0/\xa7\x9dl\x122(\xd8\x9cL\xb8\x81\xdeBa\a\x8b\xc3\xe8\x90\x89\x13\xad\xfa\x8a\x8am\x9d\x19\x1b\xf6P\x19\xfe\xbf$34\xd6\xe9;\xba\x0fF\x04>\xba \x04=\x90\n\xc7J\x80\xa0\xb9\x18\xf0\x04u*\xe0\xbc\xdd\x11G\t\xa7\x90\x9bfn\xd8g\xb2\x15Dz~\xe0=&NI\xd6FU\xbd\xc6\x8e\xf4\xa8\x99\xc6\x94\xf5C\xc8\xf8j\x99Hj\xaf1\x02L[\x9fES\xc4Jm\x90\x06!\xdd\xaeL\xcf\x06\xf9@\xfbi\xfc\xcf*\xb5\x96\x16#\xb1\x7fj\xee\xdcV\x15mX\xb4\t\xbc\xfc\x151E\xaa\xf8W\xcb\x96:\xb45\xfdLZ=\xd5[?', '/proc/thread-self/attr/exec\x00'}, 0xfffffffffffffe3c) 03:50:17 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d4, 0x10400003) [ 1282.145138][T30200] FAULT_INJECTION: forcing a failure. [ 1282.145138][T30200] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.207570][T30200] CPU: 0 PID: 30200 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1282.216718][T30200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.226793][T30200] Call Trace: [ 1282.230108][T30200] dump_stack+0x172/0x1f0 [ 1282.234450][T30200] should_fail.cold+0xa/0x15 [ 1282.239059][T30200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1282.244881][T30200] ? ___might_sleep+0x163/0x280 [ 1282.249748][T30200] __should_failslab+0x121/0x190 03:50:17 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1282.254720][T30200] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.260196][T30200] should_failslab+0x9/0x14 [ 1282.264712][T30200] kmem_cache_alloc_trace+0x2d1/0x760 [ 1282.270100][T30200] ? lockdep_init_map+0x10c/0x5b0 [ 1282.275141][T30200] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.280605][T30200] __kthread_create_on_node+0xf2/0x460 [ 1282.286073][T30200] ? lock_acquire+0x16f/0x3f0 [ 1282.290781][T30200] ? kthread_parkme+0xb0/0xb0 [ 1282.295480][T30200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.301726][T30200] ? kasan_check_read+0x11/0x20 03:50:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fe) r2 = getpid() socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x9, 0xffffffff80000000, 0x3, 0x20}) [ 1282.306612][T30200] ? mutex_trylock+0x1e0/0x1e0 [ 1282.311382][T30200] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.316844][T30200] kthread_create_on_node+0xbb/0xf0 [ 1282.322045][T30200] ? __kthread_create_on_node+0x460/0x460 [ 1282.327782][T30200] ? lockdep_init_map+0x10c/0x5b0 [ 1282.332809][T30200] ? lockdep_init_map+0x10c/0x5b0 [ 1282.337845][T30200] lo_ioctl+0xafb/0x20d0 [ 1282.342096][T30200] ? lo_rw_aio+0x1530/0x1530 [ 1282.346711][T30200] blkdev_ioctl+0xee8/0x1c40 [ 1282.351321][T30200] ? blkpg_ioctl+0xa90/0xa90 03:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1282.355926][T30200] ? perf_trace_lock_acquire+0xf5/0x580 [ 1282.361468][T30200] ? __fget+0x35a/0x550 [ 1282.365620][T30200] ? find_held_lock+0x35/0x130 [ 1282.370389][T30200] ? __fget+0x35a/0x550 [ 1282.374555][T30200] block_ioctl+0xee/0x130 [ 1282.378874][T30200] ? blkdev_fallocate+0x410/0x410 [ 1282.383897][T30200] do_vfs_ioctl+0xd6e/0x1390 [ 1282.388496][T30200] ? kasan_check_read+0x11/0x20 [ 1282.393351][T30200] ? ioctl_preallocate+0x210/0x210 [ 1282.398460][T30200] ? __fget+0x381/0x550 [ 1282.402621][T30200] ? ksys_dup3+0x3e0/0x3e0 [ 1282.407040][T30200] ? do_sys_open+0x31d/0x5d0 [ 1282.411616][T30200] ? security_file_ioctl+0x93/0xc0 [ 1282.416720][T30200] ksys_ioctl+0xab/0xd0 [ 1282.420883][T30200] __x64_sys_ioctl+0x73/0xb0 [ 1282.425459][T30200] do_syscall_64+0x103/0x610 [ 1282.430033][T30200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.435914][T30200] RIP: 0033:0x457c97 03:50:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d5, 0x10400003) [ 1282.439803][T30200] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.459700][T30200] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1282.468114][T30200] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1282.476074][T30200] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1282.484035][T30200] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1282.491984][T30200] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1282.499941][T30200] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:17 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1282.559829][T30569] FAULT_INJECTION: forcing a failure. [ 1282.559829][T30569] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.609682][T30569] CPU: 0 PID: 30569 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1282.618853][T30569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.628912][T30569] Call Trace: [ 1282.632221][T30569] dump_stack+0x172/0x1f0 [ 1282.636571][T30569] should_fail.cold+0xa/0x15 [ 1282.641177][T30569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1282.647005][T30569] ? ___might_sleep+0x163/0x280 [ 1282.651872][T30569] __should_failslab+0x121/0x190 [ 1282.656818][T30569] should_failslab+0x9/0x14 [ 1282.661326][T30569] kmem_cache_alloc+0x2be/0x710 [ 1282.666190][T30569] __alloc_file+0x27/0x300 [ 1282.670620][T30569] alloc_empty_file+0x72/0x170 [ 1282.675392][T30569] alloc_file+0x5e/0x4d0 [ 1282.679647][T30569] alloc_file_pseudo+0x189/0x280 [ 1282.684587][T30569] ? alloc_file+0x4d0/0x4d0 [ 1282.689104][T30569] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1282.695364][T30569] __shmem_file_setup.part.0+0x108/0x2b0 [ 1282.701011][T30569] shmem_file_setup+0x66/0x90 03:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1282.705697][T30569] __x64_sys_memfd_create+0x2a2/0x470 [ 1282.711081][T30569] ? memfd_fcntl+0x1550/0x1550 [ 1282.715854][T30569] ? do_syscall_64+0x26/0x610 [ 1282.720545][T30569] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1282.725843][T30569] ? trace_hardirqs_on+0x67/0x230 [ 1282.730878][T30569] do_syscall_64+0x103/0x610 [ 1282.735483][T30569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.741376][T30569] RIP: 0033:0x457e29 03:50:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) sched_yield() [ 1282.745276][T30569] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.764886][T30569] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1282.773302][T30569] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1282.781271][T30569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1282.789247][T30569] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1282.797221][T30569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1c20836d4 [ 1282.805195][T30569] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 [ 1282.821324][T30732] FAULT_INJECTION: forcing a failure. [ 1282.821324][T30732] name failslab, interval 1, probability 0, space 0, times 0 03:50:17 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1282.867709][ T26] audit: type=1400 audit(2000001017.742:726): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=30838 comm="syz-executor.3" [ 1282.872901][T30732] CPU: 0 PID: 30732 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1282.897103][T30732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.907158][T30732] Call Trace: [ 1282.910461][T30732] dump_stack+0x172/0x1f0 [ 1282.914815][T30732] should_fail.cold+0xa/0x15 [ 1282.919415][T30732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1282.925235][T30732] ? ___might_sleep+0x163/0x280 [ 1282.930094][T30732] __should_failslab+0x121/0x190 [ 1282.935039][T30732] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.940513][T30732] should_failslab+0x9/0x14 [ 1282.945025][T30732] kmem_cache_alloc_trace+0x2d1/0x760 [ 1282.950405][T30732] ? lockdep_init_map+0x10c/0x5b0 [ 1282.955446][T30732] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.960913][T30732] __kthread_create_on_node+0xf2/0x460 [ 1282.966381][T30732] ? lock_acquire+0x16f/0x3f0 [ 1282.971064][T30732] ? kthread_parkme+0xb0/0xb0 [ 1282.975774][T30732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.982026][T30732] ? kasan_check_read+0x11/0x20 [ 1282.986884][T30732] ? mutex_trylock+0x1e0/0x1e0 [ 1282.991650][T30732] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1282.997116][T30732] kthread_create_on_node+0xbb/0xf0 [ 1283.002325][T30732] ? __kthread_create_on_node+0x460/0x460 [ 1283.008056][T30732] ? lockdep_init_map+0x10c/0x5b0 [ 1283.013082][T30732] ? lockdep_init_map+0x10c/0x5b0 03:50:17 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e24, @remote}, {0x306, @random="a1d6b4d7aa08"}, 0x10, {0x2, 0x4e21, @broadcast}, 'veth1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf9ffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1283.018124][T30732] lo_ioctl+0xafb/0x20d0 [ 1283.022378][T30732] ? lo_rw_aio+0x1530/0x1530 [ 1283.026977][T30732] blkdev_ioctl+0xee8/0x1c40 [ 1283.031573][T30732] ? blkpg_ioctl+0xa90/0xa90 [ 1283.036175][T30732] ? perf_trace_lock_acquire+0xf5/0x580 [ 1283.041737][T30732] ? __fget+0x35a/0x550 [ 1283.045906][T30732] ? find_held_lock+0x35/0x130 [ 1283.050676][T30732] ? __fget+0x35a/0x550 [ 1283.054843][T30732] block_ioctl+0xee/0x130 [ 1283.059170][T30732] ? blkdev_fallocate+0x410/0x410 [ 1283.064203][T30732] do_vfs_ioctl+0xd6e/0x1390 03:50:17 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1283.068807][T30732] ? kasan_check_read+0x11/0x20 [ 1283.073666][T30732] ? ioctl_preallocate+0x210/0x210 [ 1283.078793][T30732] ? __fget+0x381/0x550 [ 1283.082964][T30732] ? ksys_dup3+0x3e0/0x3e0 [ 1283.087382][T30732] ? do_sys_open+0x31d/0x5d0 [ 1283.091986][T30732] ? security_file_ioctl+0x93/0xc0 [ 1283.097104][T30732] ksys_ioctl+0xab/0xd0 [ 1283.101272][T30732] __x64_sys_ioctl+0x73/0xb0 [ 1283.105873][T30732] do_syscall_64+0x103/0x610 [ 1283.110461][T30732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.116340][T30732] RIP: 0033:0x457c97 [ 1283.120227][T30732] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.139808][T30732] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1283.148197][T30732] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1283.156157][T30732] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1283.164126][T30732] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1283.172088][T30732] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1283.180036][T30732] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1283.248106][T31122] FAULT_INJECTION: forcing a failure. [ 1283.248106][T31122] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.271577][ T26] audit: type=1400 audit(2000001018.142:727): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=31076 comm="syz-executor.3" 03:50:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d6, 0x10400003) 03:50:18 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1283.343831][T31122] CPU: 0 PID: 31122 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1283.352963][T31122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.363022][T31122] Call Trace: [ 1283.366335][T31122] dump_stack+0x172/0x1f0 [ 1283.370681][T31122] should_fail.cold+0xa/0x15 [ 1283.375288][T31122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1283.381112][T31122] ? ___might_sleep+0x163/0x280 [ 1283.385974][T31122] __should_failslab+0x121/0x190 03:50:18 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1283.390924][T31122] should_failslab+0x9/0x14 [ 1283.395432][T31122] kmem_cache_alloc+0x2be/0x710 [ 1283.400287][T31122] ? rcu_read_lock_sched_held+0x110/0x130 [ 1283.406008][T31122] ? kmem_cache_alloc+0x341/0x710 [ 1283.411040][T31122] security_file_alloc+0x39/0x170 [ 1283.416075][T31122] __alloc_file+0xac/0x300 [ 1283.420506][T31122] alloc_empty_file+0x72/0x170 [ 1283.425279][T31122] alloc_file+0x5e/0x4d0 [ 1283.429537][T31122] alloc_file_pseudo+0x189/0x280 [ 1283.434956][T31122] ? alloc_file+0x4d0/0x4d0 [ 1283.434978][T31122] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1283.435007][T31122] __shmem_file_setup.part.0+0x108/0x2b0 [ 1283.435028][T31122] shmem_file_setup+0x66/0x90 [ 1283.435047][T31122] __x64_sys_memfd_create+0x2a2/0x470 [ 1283.435063][T31122] ? memfd_fcntl+0x1550/0x1550 [ 1283.435086][T31122] ? do_syscall_64+0x26/0x610 [ 1283.445811][T31122] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1283.445831][T31122] ? trace_hardirqs_on+0x67/0x230 [ 1283.445853][T31122] do_syscall_64+0x103/0x610 [ 1283.445877][T31122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.445890][T31122] RIP: 0033:0x457e29 [ 1283.445907][T31122] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.445915][T31122] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1283.445930][T31122] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 1283.445940][T31122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 1283.445949][T31122] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1283.445958][T31122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1c20836d4 [ 1283.445976][T31122] R13: 00000000004c679a R14: 00000000004dbcb0 R15: 0000000000000003 [ 1283.459458][T31386] FAULT_INJECTION: forcing a failure. [ 1283.459458][T31386] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.578609][T31386] CPU: 1 PID: 31386 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1283.587723][T31386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.597782][T31386] Call Trace: [ 1283.601085][T31386] dump_stack+0x172/0x1f0 [ 1283.605427][T31386] should_fail.cold+0xa/0x15 [ 1283.610032][T31386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1283.615867][T31386] ? ___might_sleep+0x163/0x280 [ 1283.620740][T31386] __should_failslab+0x121/0x190 [ 1283.625684][T31386] should_failslab+0x9/0x14 [ 1283.630200][T31386] kmem_cache_alloc+0x2be/0x710 [ 1283.635053][T31386] ? mark_held_locks+0xa4/0xf0 03:50:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="b93c564b636700000000b4ce360000a299b7f4d0e305952f", 0x18) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0xfec0}], 0x1}], 0x492492492492670, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f7072ef632f74682f6578656300"], 0x22) 03:50:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfaffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d7, 0x10400003) 03:50:18 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1283.639834][T31386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.645301][T31386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.650780][T31386] __kernfs_new_node+0xef/0x690 [ 1283.655637][T31386] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1283.661109][T31386] ? retint_kernel+0x2d/0x2d [ 1283.665715][T31386] ? kernfs_new_node+0x28/0x130 [ 1283.670587][T31386] kernfs_new_node+0x99/0x130 [ 1283.675280][T31386] kernfs_create_dir_ns+0x52/0x160 [ 1283.680395][T31386] internal_create_group+0x7f8/0xc40 [ 1283.685662][T31386] ? bd_set_size+0x89/0xb0 [ 1283.690068][T31386] ? remove_files.isra.0+0x190/0x190 [ 1283.695344][T31386] sysfs_create_group+0x20/0x30 [ 1283.700179][T31386] lo_ioctl+0xf8f/0x20d0 [ 1283.704403][T31386] ? lo_rw_aio+0x1530/0x1530 [ 1283.708979][T31386] blkdev_ioctl+0xee8/0x1c40 [ 1283.713546][T31386] ? blkpg_ioctl+0xa90/0xa90 [ 1283.718121][T31386] ? perf_trace_lock_acquire+0xf5/0x580 [ 1283.723646][T31386] ? __fget+0x35a/0x550 [ 1283.727782][T31386] ? find_held_lock+0x35/0x130 [ 1283.732524][T31386] ? __fget+0x35a/0x550 [ 1283.736663][T31386] block_ioctl+0xee/0x130 [ 1283.740981][T31386] ? blkdev_fallocate+0x410/0x410 [ 1283.746001][T31386] do_vfs_ioctl+0xd6e/0x1390 [ 1283.750573][T31386] ? kasan_check_read+0x11/0x20 [ 1283.755403][T31386] ? ioctl_preallocate+0x210/0x210 [ 1283.760500][T31386] ? __fget+0x381/0x550 [ 1283.764638][T31386] ? ksys_dup3+0x3e0/0x3e0 [ 1283.769050][T31386] ? do_sys_open+0x31d/0x5d0 [ 1283.773738][T31386] ? security_file_ioctl+0x93/0xc0 [ 1283.778835][T31386] ksys_ioctl+0xab/0xd0 [ 1283.782975][T31386] __x64_sys_ioctl+0x73/0xb0 [ 1283.787551][T31386] do_syscall_64+0x103/0x610 [ 1283.792127][T31386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.797999][T31386] RIP: 0033:0x457c97 [ 1283.801889][T31386] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.821486][T31386] RSP: 002b:00007faeb9716a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1283.829898][T31386] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1283.837851][T31386] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1283.845801][T31386] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1283.853757][T31386] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1283.861717][T31386] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1283.938641][T31386] FAT-fs (loop4): bogus number of reserved sectors [ 1283.976639][T31386] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1283.984015][T31717] FAULT_INJECTION: forcing a failure. [ 1283.984015][T31717] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.014092][T31717] CPU: 0 PID: 31717 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1284.023254][T31717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.033312][T31717] Call Trace: [ 1284.036617][T31717] dump_stack+0x172/0x1f0 [ 1284.040969][T31717] should_fail.cold+0xa/0x15 [ 1284.045576][T31717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1284.051397][T31717] ? ___might_sleep+0x163/0x280 [ 1284.056260][T31717] __should_failslab+0x121/0x190 [ 1284.061203][T31717] should_failslab+0x9/0x14 [ 1284.065715][T31717] kmem_cache_alloc+0x2be/0x710 [ 1284.070581][T31717] ? notify_change+0x6d5/0xfb0 [ 1284.075350][T31717] ? do_sys_ftruncate+0x41e/0x550 [ 1284.080377][T31717] getname_flags+0xd6/0x5b0 [ 1284.084886][T31717] getname+0x1a/0x20 [ 1284.088791][T31717] do_sys_open+0x2c9/0x5d0 [ 1284.093217][T31717] ? filp_open+0x80/0x80 [ 1284.097468][T31717] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1284.103714][T31717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1284.109191][T31717] ? do_syscall_64+0x26/0x610 [ 1284.113880][T31717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.119948][T31717] ? do_syscall_64+0x26/0x610 [ 1284.124637][T31717] __x64_sys_open+0x7e/0xc0 [ 1284.129151][T31717] do_syscall_64+0x103/0x610 [ 1284.133760][T31717] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:50:19 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1284.139670][T31717] RIP: 0033:0x411f11 [ 1284.143569][T31717] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1284.163174][T31717] RSP: 002b:00007ff1c2082a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1284.172013][T31717] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1284.179963][T31717] RDX: 00007ff1c2082afa RSI: 0000000000000002 RDI: 00007ff1c2082af0 03:50:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r3 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, r2, r3) r4 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x623, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x80000001, @mcast1, 0xd8}], 0x1c) 03:50:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d8, 0x10400003) [ 1284.187913][T31717] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1284.195871][T31717] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1284.203834][T31717] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:19 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1284.295666][ T26] audit: type=1400 audit(2000001019.172:728): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=32018 comm="syz-executor.3" 03:50:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x40040) recvmsg$kcm(r2, &(0x7f0000000880)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f0000000280)=""/10, 0xa}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/255, 0xff}, {&(0x7f0000000440)=""/34, 0x22}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/28, 0x1c}, {&(0x7f0000000500)=""/43, 0x2b}, {&(0x7f0000000540)=""/172, 0xac}, {&(0x7f0000000600)=""/227, 0xe3}], 0xa, &(0x7f00000007c0)=""/178, 0xb2}, 0x10000) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000080)={0x30cd, "2da42248b2fbde1fefcaec116fde3a37a7e91b2cd0040ba0dc389ec282177fb4", 0x800, 0x1, 0x6, 0x1e, 0x4}) [ 1284.437483][T32204] FAULT_INJECTION: forcing a failure. [ 1284.437483][T32204] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.474132][T32204] CPU: 1 PID: 32204 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1284.483289][T32204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.493347][T32204] Call Trace: [ 1284.496657][T32204] dump_stack+0x172/0x1f0 [ 1284.500998][T32204] should_fail.cold+0xa/0x15 [ 1284.505603][T32204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1284.511430][T32204] ? ___might_sleep+0x163/0x280 [ 1284.516294][T32204] __should_failslab+0x121/0x190 [ 1284.521245][T32204] should_failslab+0x9/0x14 [ 1284.525768][T32204] kmem_cache_alloc+0x2be/0x710 [ 1284.530627][T32204] ? notify_change+0x6d5/0xfb0 [ 1284.535400][T32204] ? do_sys_ftruncate+0x41e/0x550 [ 1284.540435][T32204] getname_flags+0xd6/0x5b0 [ 1284.544940][T32204] getname+0x1a/0x20 [ 1284.548842][T32204] do_sys_open+0x2c9/0x5d0 [ 1284.553279][T32204] ? filp_open+0x80/0x80 [ 1284.557527][T32204] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1284.563781][T32204] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1284.569249][T32204] ? do_syscall_64+0x26/0x610 [ 1284.573941][T32204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.580011][T32204] ? do_syscall_64+0x26/0x610 03:50:19 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d9, 0x10400003) 03:50:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="737461636b212f70726f632f7468722f617474722f657865630024e3d6d469e403d7ee65361aa396b34b32dc71dafec15aa5a04f72fe319216447680a85991"], 0x22) [ 1284.584708][T32204] __x64_sys_open+0x7e/0xc0 [ 1284.589227][T32204] do_syscall_64+0x103/0x610 [ 1284.593837][T32204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.599739][T32204] RIP: 0033:0x411f11 [ 1284.599757][T32204] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1284.599766][T32204] RSP: 002b:00007ff1c2082a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 03:50:19 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1284.599782][T32204] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1284.599792][T32204] RDX: 00007ff1c2082afa RSI: 0000000000000002 RDI: 00007ff1c2082af0 [ 1284.599808][T32204] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1284.623293][T32204] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1284.623304][T32204] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000da, 0x10400003) [ 1284.624233][ T26] audit: type=1400 audit(2000001019.352:729): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=32227 comm="syz-executor.3" [ 1284.773048][T32260] FAT-fs (loop4): bogus number of reserved sectors [ 1284.797692][T32260] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1284.809240][T32470] FAULT_INJECTION: forcing a failure. [ 1284.809240][T32470] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.886181][T32470] CPU: 0 PID: 32470 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1284.895348][T32470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.905411][T32470] Call Trace: [ 1284.908715][T32470] dump_stack+0x172/0x1f0 [ 1284.913067][T32470] should_fail.cold+0xa/0x15 [ 1284.917670][T32470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1284.923490][T32470] ? ___might_sleep+0x163/0x280 [ 1284.928355][T32470] __should_failslab+0x121/0x190 03:50:19 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1284.933359][T32470] should_failslab+0x9/0x14 [ 1284.937866][T32470] kmem_cache_alloc+0x2be/0x710 [ 1284.942719][T32470] ? __save_stack_trace+0x8a/0xf0 [ 1284.947790][T32470] __alloc_file+0x27/0x300 [ 1284.952209][T32470] alloc_empty_file+0x72/0x170 [ 1284.956982][T32470] path_openat+0xef/0x46e0 [ 1284.961403][T32470] ? __lock_acquire+0x55d/0x4710 [ 1284.966341][T32470] ? getname+0x1a/0x20 [ 1284.970409][T32470] ? do_sys_open+0x2c9/0x5d0 [ 1284.975007][T32470] ? __x64_sys_open+0x7e/0xc0 [ 1284.979694][T32470] ? do_syscall_64+0x103/0x610 [ 1284.984476][T32470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1284.990548][T32470] ? debug_smp_processor_id+0x3c/0x280 [ 1284.996010][T32470] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1285.001366][T32470] ? cache_grow_end+0xa4/0x190 [ 1285.006123][T32470] ? __alloc_fd+0x430/0x530 [ 1285.010639][T32470] do_filp_open+0x1a1/0x280 [ 1285.015136][T32470] ? may_open_dev+0x100/0x100 [ 1285.019800][T32470] ? lock_downgrade+0x880/0x880 [ 1285.024665][T32470] ? kasan_check_read+0x11/0x20 [ 1285.029519][T32470] ? do_raw_spin_unlock+0x57/0x270 [ 1285.034625][T32470] ? _raw_spin_unlock+0x2d/0x50 [ 1285.039460][T32470] ? __alloc_fd+0x430/0x530 [ 1285.043975][T32470] do_sys_open+0x3fe/0x5d0 [ 1285.048401][T32470] ? filp_open+0x80/0x80 [ 1285.052641][T32470] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1285.058866][T32470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1285.064319][T32470] ? do_syscall_64+0x26/0x610 [ 1285.069002][T32470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.075078][T32470] ? do_syscall_64+0x26/0x610 [ 1285.079762][T32470] __x64_sys_open+0x7e/0xc0 [ 1285.084268][T32470] do_syscall_64+0x103/0x610 [ 1285.088872][T32470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.094770][T32470] RIP: 0033:0x411f11 [ 1285.098648][T32470] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1285.118236][T32470] RSP: 002b:00007ff1c2082a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1285.126641][T32470] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 03:50:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:20 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000080)='./file0\x00', r1, r2, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/threa\t\x00selT/attr/eec\x00'], 0x22) [ 1285.134605][T32470] RDX: 00007ff1c2082afa RSI: 0000000000000002 RDI: 00007ff1c2082af0 [ 1285.142554][T32470] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1285.150512][T32470] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1285.158474][T32470] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000db, 0x10400003) 03:50:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='\nfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:20 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1285.309610][ T26] audit: type=1400 audit(2000001020.182:730): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/threa" pid=401 comm="syz-executor.3" [ 1285.392020][ T627] FAULT_INJECTION: forcing a failure. [ 1285.392020][ T627] name failslab, interval 1, probability 0, space 0, times 0 [ 1285.426562][ T627] CPU: 1 PID: 627 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 03:50:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1285.435531][ T627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.445591][ T627] Call Trace: [ 1285.448908][ T627] dump_stack+0x172/0x1f0 [ 1285.453260][ T627] should_fail.cold+0xa/0x15 [ 1285.453293][ T627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1285.453319][ T627] ? ___might_sleep+0x163/0x280 [ 1285.453343][ T627] __should_failslab+0x121/0x190 [ 1285.463726][ T627] should_failslab+0x9/0x14 [ 1285.463754][ T627] kmem_cache_alloc+0x2be/0x710 [ 1285.463774][ T627] ? rcu_read_lock_sched_held+0x110/0x130 03:50:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000dc, 0x10400003) [ 1285.463791][ T627] ? kmem_cache_alloc+0x341/0x710 [ 1285.463813][ T627] security_file_alloc+0x39/0x170 [ 1285.463831][ T627] __alloc_file+0xac/0x300 [ 1285.463849][ T627] alloc_empty_file+0x72/0x170 [ 1285.507813][ T627] path_openat+0xef/0x46e0 [ 1285.512240][ T627] ? __lock_acquire+0x55d/0x4710 [ 1285.517187][ T627] ? getname+0x1a/0x20 [ 1285.521258][ T627] ? do_sys_open+0x2c9/0x5d0 [ 1285.525860][ T627] ? __x64_sys_open+0x7e/0xc0 [ 1285.530544][ T627] ? do_syscall_64+0x103/0x610 [ 1285.535313][ T627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.541391][ T627] ? debug_smp_processor_id+0x3c/0x280 [ 1285.546866][ T627] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1285.552255][ T627] ? cache_grow_end+0xa4/0x190 [ 1285.557042][ T627] ? __alloc_fd+0x430/0x530 [ 1285.561558][ T627] do_filp_open+0x1a1/0x280 [ 1285.566072][ T627] ? may_open_dev+0x100/0x100 [ 1285.570767][ T627] ? lock_downgrade+0x880/0x880 [ 1285.575625][ T627] ? kasan_check_read+0x11/0x20 [ 1285.575643][ T627] ? do_raw_spin_unlock+0x57/0x270 [ 1285.575662][ T627] ? _raw_spin_unlock+0x2d/0x50 [ 1285.575678][ T627] ? __alloc_fd+0x430/0x530 [ 1285.575707][ T627] do_sys_open+0x3fe/0x5d0 [ 1285.585651][ T627] ? filp_open+0x80/0x80 [ 1285.585669][ T627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1285.585691][ T627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1285.585708][ T627] ? do_syscall_64+0x26/0x610 [ 1285.585723][ T627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.585755][ T627] ? do_syscall_64+0x26/0x610 [ 1285.595083][ T627] __x64_sys_open+0x7e/0xc0 [ 1285.595103][ T627] do_syscall_64+0x103/0x610 [ 1285.595125][ T627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.595138][ T627] RIP: 0033:0x411f11 [ 1285.595155][ T627] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1285.595164][ T627] RSP: 002b:00007ff1c2082a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1285.595180][ T627] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 1285.595190][ T627] RDX: 00007ff1c2082afa RSI: 0000000000000002 RDI: 00007ff1c2082af0 [ 1285.595199][ T627] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1285.595208][ T627] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1285.595224][ T627] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:20 executing program 3: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000080)={0xffff, {{0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x26}, 0x5}}}, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x4, 0x40) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x4, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4811) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000dd, 0x10400003) 03:50:20 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$P9_RVERSION(r2, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x3, 0x8, '9P2000.L'}, 0x15) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 03:50:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='%fat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1285.989190][ T1139] FAULT_INJECTION: forcing a failure. [ 1285.989190][ T1139] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.038414][ T26] audit: type=1400 audit(2000001020.912:731): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=1350 comm="syz-executor.3" [ 1286.043457][ T1139] CPU: 1 PID: 1139 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1286.067598][ T1139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.077656][ T1139] Call Trace: [ 1286.080954][ T1139] dump_stack+0x172/0x1f0 03:50:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1286.085300][ T1139] should_fail.cold+0xa/0x15 [ 1286.089905][ T1139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1286.095724][ T1139] ? ___might_sleep+0x163/0x280 [ 1286.100599][ T1139] __should_failslab+0x121/0x190 [ 1286.105543][ T1139] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1286.111009][ T1139] should_failslab+0x9/0x14 [ 1286.115522][ T1139] kmem_cache_alloc_trace+0x2d1/0x760 [ 1286.120910][ T1139] ? lockdep_init_map+0x10c/0x5b0 [ 1286.125948][ T1139] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1286.131410][ T1139] __kthread_create_on_node+0xf2/0x460 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000de, 0x10400003) [ 1286.136867][ T1139] ? lock_acquire+0x16f/0x3f0 [ 1286.141549][ T1139] ? kthread_parkme+0xb0/0xb0 [ 1286.146241][ T1139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1286.152500][ T1139] ? kasan_check_read+0x11/0x20 [ 1286.157368][ T1139] ? mutex_trylock+0x1e0/0x1e0 [ 1286.162146][ T1139] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1286.167622][ T1139] kthread_create_on_node+0xbb/0xf0 [ 1286.172838][ T1139] ? __kthread_create_on_node+0x460/0x460 [ 1286.178580][ T1139] ? lockdep_init_map+0x10c/0x5b0 [ 1286.183616][ T1139] ? lockdep_init_map+0x10c/0x5b0 [ 1286.188659][ T1139] lo_ioctl+0xafb/0x20d0 [ 1286.192926][ T1139] ? lo_rw_aio+0x1530/0x1530 [ 1286.197528][ T1139] blkdev_ioctl+0xee8/0x1c40 [ 1286.202130][ T1139] ? blkpg_ioctl+0xa90/0xa90 [ 1286.206741][ T1139] ? perf_trace_lock_acquire+0xf5/0x580 [ 1286.212313][ T1139] ? __fget+0x35a/0x550 [ 1286.216475][ T1139] ? find_held_lock+0x35/0x130 [ 1286.221246][ T1139] ? __fget+0x35a/0x550 [ 1286.225422][ T1139] block_ioctl+0xee/0x130 [ 1286.229764][ T1139] ? blkdev_fallocate+0x410/0x410 [ 1286.234792][ T1139] do_vfs_ioctl+0xd6e/0x1390 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000df, 0x10400003) 03:50:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73746f632f74687265616488ec36e95082199af97659e92d73656c669c6174000000"], 0x22) [ 1286.239396][ T1139] ? kasan_check_read+0x11/0x20 [ 1286.244254][ T1139] ? ioctl_preallocate+0x210/0x210 [ 1286.249384][ T1139] ? __fget+0x381/0x550 [ 1286.253578][ T1139] ? ksys_dup3+0x3e0/0x3e0 [ 1286.258015][ T1139] ? do_sys_open+0x31d/0x5d0 [ 1286.262623][ T1139] ? security_file_ioctl+0x93/0xc0 [ 1286.267756][ T1139] ksys_ioctl+0xab/0xd0 [ 1286.271923][ T1139] __x64_sys_ioctl+0x73/0xb0 [ 1286.276531][ T1139] do_syscall_64+0x103/0x610 [ 1286.281137][ T1139] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e0, 0x10400003) [ 1286.287032][ T1139] RIP: 0033:0x457c97 [ 1286.290964][ T1139] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.310576][ T1139] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1286.319021][ T1139] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1286.326992][ T1139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1286.334966][ T1139] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1286.342940][ T1139] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1286.350924][ T1139] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:21 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e1, 0x10400003) 03:50:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x9, 0x0, 0x0, 0x1]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="f3a9ad5071202f70726f632f7468726561642d7365000001000000016300"], 0x22) 03:50:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='v\nat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1286.644233][ T2202] FAULT_INJECTION: forcing a failure. [ 1286.644233][ T2202] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.660821][ T2202] CPU: 1 PID: 2202 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1286.669865][ T2202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.679919][ T2202] Call Trace: [ 1286.683239][ T2202] dump_stack+0x172/0x1f0 [ 1286.687598][ T2202] should_fail.cold+0xa/0x15 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e2, 0x10400003) [ 1286.692208][ T2202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1286.698031][ T2202] ? ___might_sleep+0x163/0x280 [ 1286.702916][ T2202] __should_failslab+0x121/0x190 [ 1286.707839][ T2202] should_failslab+0x9/0x14 [ 1286.712345][ T2202] kmem_cache_alloc+0x2be/0x710 [ 1286.717202][ T2202] ? __schedule+0x1387/0x1cc0 [ 1286.721895][ T2202] __kernfs_new_node+0xef/0x690 [ 1286.726746][ T2202] ? _raw_spin_unlock_irq+0x28/0x90 [ 1286.731956][ T2202] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1286.737429][ T2202] ? __lock_acquire+0x55d/0x4710 [ 1286.742375][ T2202] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1286.747586][ T2202] ? __schedule+0x1387/0x1cc0 [ 1286.752302][ T2202] kernfs_new_node+0x99/0x130 [ 1286.756996][ T2202] kernfs_create_dir_ns+0x52/0x160 [ 1286.762122][ T2202] internal_create_group+0x7f8/0xc40 [ 1286.767414][ T2202] ? bd_set_size+0x89/0xb0 [ 1286.771848][ T2202] ? remove_files.isra.0+0x190/0x190 [ 1286.777153][ T2202] sysfs_create_group+0x20/0x30 [ 1286.782012][ T2202] lo_ioctl+0xf8f/0x20d0 [ 1286.786280][ T2202] ? lo_rw_aio+0x1530/0x1530 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e3, 0x10400003) [ 1286.790876][ T2202] blkdev_ioctl+0xee8/0x1c40 [ 1286.795466][ T2202] ? blkpg_ioctl+0xa90/0xa90 [ 1286.800080][ T2202] ? perf_trace_lock_acquire+0xf5/0x580 [ 1286.805638][ T2202] ? __fget+0x35a/0x550 [ 1286.809799][ T2202] ? find_held_lock+0x35/0x130 [ 1286.814564][ T2202] ? __fget+0x35a/0x550 [ 1286.818721][ T2202] block_ioctl+0xee/0x130 [ 1286.823050][ T2202] ? blkdev_fallocate+0x410/0x410 [ 1286.828078][ T2202] do_vfs_ioctl+0xd6e/0x1390 [ 1286.832670][ T2202] ? kasan_check_read+0x11/0x20 [ 1286.837533][ T2202] ? ioctl_preallocate+0x210/0x210 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e4, 0x10400003) [ 1286.842649][ T2202] ? __fget+0x381/0x550 [ 1286.846852][ T2202] ? ksys_dup3+0x3e0/0x3e0 [ 1286.851283][ T2202] ? do_sys_open+0x31d/0x5d0 [ 1286.855890][ T2202] ? security_file_ioctl+0x93/0xc0 [ 1286.861012][ T2202] ksys_ioctl+0xab/0xd0 [ 1286.865178][ T2202] __x64_sys_ioctl+0x73/0xb0 [ 1286.869784][ T2202] do_syscall_64+0x103/0x610 [ 1286.874386][ T2202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1286.880292][ T2202] RIP: 0033:0x457c97 [ 1286.884191][ T2202] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1286.903795][ T2202] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1286.912211][ T2202] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1286.920203][ T2202] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1286.928176][ T2202] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1286.936149][ T2202] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:50:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e5, 0x10400003) [ 1286.944118][ T2202] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1287.020160][ T26] audit: type=1400 audit(2000001021.892:732): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=2635 comm="syz-executor.3" [ 1287.082985][ T2202] FAT-fs (loop1): bogus number of reserved sectors [ 1287.111652][ T2202] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:22 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x22, 0x80, 0x7, 0xfffffffffffffffe, 0x9, 0x7fff, 0x6e4, {0x0, @in6={{0xa, 0x4e24, 0x3, @loopback, 0x2}}, 0xffffffff, 0x7, 0x8, 0x5, 0xfffffffffffffffa}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x1}, 0x8) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='v%at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e6, 0x10400003) [ 1287.487559][ T3286] FAULT_INJECTION: forcing a failure. [ 1287.487559][ T3286] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.488859][ T26] audit: type=1400 audit(2000001022.362:733): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=3179 comm="syz-executor.3" [ 1287.500963][ T3286] CPU: 0 PID: 3286 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 03:50:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1287.530074][ T3286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.540132][ T3286] Call Trace: [ 1287.543440][ T3286] dump_stack+0x172/0x1f0 [ 1287.547790][ T3286] should_fail.cold+0xa/0x15 [ 1287.552386][ T3286] ? kernel_text_address+0x73/0xf0 [ 1287.557504][ T3286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1287.563323][ T3286] ? unwind_get_return_address+0x61/0xa0 [ 1287.568976][ T3286] ? __save_stack_trace+0x8a/0xf0 [ 1287.574012][ T3286] __should_failslab+0x121/0x190 [ 1287.578959][ T3286] should_failslab+0x9/0x14 [ 1287.583470][ T3286] kmem_cache_alloc+0x47/0x710 03:50:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1287.588242][ T3286] ? save_stack+0xa9/0xd0 [ 1287.592583][ T3286] ? save_stack+0x45/0xd0 [ 1287.596920][ T3286] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1287.602743][ T3286] ? kasan_slab_alloc+0xf/0x20 [ 1287.607527][ T3286] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1287.613875][ T3286] idr_get_free+0x425/0x8d0 [ 1287.618396][ T3286] idr_alloc_u32+0x19e/0x330 [ 1287.622993][ T3286] ? __fprop_inc_percpu_max+0x230/0x230 [ 1287.628549][ T3286] ? perf_trace_lock+0x510/0x510 [ 1287.633501][ T3286] idr_alloc_cyclic+0x132/0x270 03:50:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e7, 0x10400003) [ 1287.638356][ T3286] ? idr_alloc+0x150/0x150 [ 1287.642808][ T3286] __kernfs_new_node+0x171/0x690 [ 1287.647765][ T3286] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1287.653236][ T3286] ? __lock_acquire+0x55d/0x4710 [ 1287.658177][ T3286] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1287.663376][ T3286] ? __schedule+0x1387/0x1cc0 [ 1287.668077][ T3286] kernfs_new_node+0x99/0x130 [ 1287.672783][ T3286] kernfs_create_dir_ns+0x52/0x160 [ 1287.677905][ T3286] internal_create_group+0x7f8/0xc40 [ 1287.683199][ T3286] ? bd_set_size+0x89/0xb0 03:50:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xd8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000100)={0x1d, 0x26, 0x4, 0xed1c, 0x8}) r4 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r4, 0x6a3, &(0x7f0000000080)) [ 1287.687631][ T3286] ? remove_files.isra.0+0x190/0x190 [ 1287.692934][ T3286] sysfs_create_group+0x20/0x30 [ 1287.697794][ T3286] lo_ioctl+0xf8f/0x20d0 [ 1287.702050][ T3286] ? lo_rw_aio+0x1530/0x1530 [ 1287.706649][ T3286] blkdev_ioctl+0xee8/0x1c40 [ 1287.711250][ T3286] ? blkpg_ioctl+0xa90/0xa90 [ 1287.715849][ T3286] ? perf_trace_lock_acquire+0xf5/0x580 [ 1287.721410][ T3286] ? __fget+0x35a/0x550 [ 1287.725579][ T3286] ? find_held_lock+0x35/0x130 [ 1287.730348][ T3286] ? __fget+0x35a/0x550 [ 1287.734520][ T3286] block_ioctl+0xee/0x130 [ 1287.738852][ T3286] ? blkdev_fallocate+0x410/0x410 [ 1287.743890][ T3286] do_vfs_ioctl+0xd6e/0x1390 [ 1287.748488][ T3286] ? kasan_check_read+0x11/0x20 [ 1287.753349][ T3286] ? ioctl_preallocate+0x210/0x210 [ 1287.758461][ T3286] ? __fget+0x381/0x550 [ 1287.762636][ T3286] ? ksys_dup3+0x3e0/0x3e0 [ 1287.767066][ T3286] ? do_sys_open+0x31d/0x5d0 [ 1287.771671][ T3286] ? security_file_ioctl+0x93/0xc0 [ 1287.776791][ T3286] ksys_ioctl+0xab/0xd0 [ 1287.780957][ T3286] __x64_sys_ioctl+0x73/0xb0 [ 1287.785563][ T3286] do_syscall_64+0x103/0x610 [ 1287.790164][ T3286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1287.796058][ T3286] RIP: 0033:0x457c97 [ 1287.799955][ T3286] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1287.819566][ T3286] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1287.827974][ T3286] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 03:50:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e8, 0x10400003) [ 1287.835943][ T3286] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1287.843922][ T3286] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1287.851894][ T3286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1287.859894][ T3286] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1287.910005][ T3286] FAT-fs (loop1): bogus number of reserved sectors [ 1287.957910][ T3286] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1287.966869][ T26] audit: type=1400 audit(2000001022.842:734): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/th" pid=3670 comm="syz-executor.3" 03:50:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:23 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e9, 0x10400003) 03:50:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='v.at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1288.207267][ T4071] FAULT_INJECTION: forcing a failure. [ 1288.207267][ T4071] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.232320][ T4071] CPU: 0 PID: 4071 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1288.241449][ T4071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.251505][ T4071] Call Trace: [ 1288.254819][ T4071] dump_stack+0x172/0x1f0 [ 1288.259160][ T4071] should_fail.cold+0xa/0x15 [ 1288.263779][ T4071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1288.269601][ T4071] ? ___might_sleep+0x163/0x280 [ 1288.274464][ T4071] __should_failslab+0x121/0x190 [ 1288.279404][ T4071] should_failslab+0x9/0x14 [ 1288.283909][ T4071] kmem_cache_alloc+0x2be/0x710 [ 1288.288779][ T4071] ? lock_downgrade+0x880/0x880 [ 1288.293636][ T4071] ? kasan_check_read+0x11/0x20 [ 1288.298501][ T4071] __kernfs_new_node+0xef/0x690 03:50:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ea, 0x10400003) 03:50:23 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/68, 0x44}, {&(0x7f0000000200)=""/79, 0x4f}], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000080)={0x33, @multicast2, 0x4e22, 0xfffffffffffffffd, '\x00\x00\x00\x11\x00', 0x2, 0xfffffffffffff000, 0x56}, 0x148) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="737461636b2015262b0034e29a72c4025f60372bd1917b7f11b2010c136eb292b170826b44f5b19edda4bd71420be03ff53cd6ae0743768da3ae9ce964a0eaaa6c591032bd58ec"], 0xa) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x4}, 0x28, 0x3) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0xffffffffd033c1ec}, &(0x7f0000000300)=0x8) write$capi20(r3, &(0x7f0000000440)={0x10, 0x9, 0x80, 0x81, 0xd1, 0xb563}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={r4, 0x0, 0x30}, &(0x7f0000000380)=0xc) [ 1288.303369][ T4071] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1288.308838][ T4071] ? wait_for_completion+0x440/0x440 [ 1288.314141][ T4071] ? mutex_unlock+0xd/0x10 [ 1288.318560][ T4071] ? kernfs_activate+0x192/0x1f0 [ 1288.323503][ T4071] kernfs_new_node+0x99/0x130 [ 1288.328187][ T4071] __kernfs_create_file+0x51/0x340 [ 1288.333303][ T4071] sysfs_add_file_mode_ns+0x222/0x560 [ 1288.338689][ T4071] internal_create_group+0x35b/0xc40 [ 1288.343979][ T4071] ? bd_set_size+0x89/0xb0 [ 1288.348406][ T4071] ? remove_files.isra.0+0x190/0x190 [ 1288.353710][ T4071] sysfs_create_group+0x20/0x30 [ 1288.358577][ T4071] lo_ioctl+0xf8f/0x20d0 [ 1288.362828][ T4071] ? lo_rw_aio+0x1530/0x1530 [ 1288.367427][ T4071] blkdev_ioctl+0xee8/0x1c40 [ 1288.372011][ T4071] ? blkpg_ioctl+0xa90/0xa90 [ 1288.376616][ T4071] ? perf_trace_lock_acquire+0xf5/0x580 [ 1288.382170][ T4071] ? __fget+0x35a/0x550 [ 1288.386335][ T4071] ? find_held_lock+0x35/0x130 [ 1288.391104][ T4071] ? __fget+0x35a/0x550 [ 1288.395281][ T4071] block_ioctl+0xee/0x130 [ 1288.399612][ T4071] ? blkdev_fallocate+0x410/0x410 03:50:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000eb, 0x10400003) [ 1288.404646][ T4071] do_vfs_ioctl+0xd6e/0x1390 [ 1288.409242][ T4071] ? kasan_check_read+0x11/0x20 [ 1288.414104][ T4071] ? ioctl_preallocate+0x210/0x210 [ 1288.419221][ T4071] ? __fget+0x381/0x550 [ 1288.423384][ T4071] ? ksys_dup3+0x3e0/0x3e0 [ 1288.427809][ T4071] ? do_sys_open+0x31d/0x5d0 [ 1288.432413][ T4071] ? security_file_ioctl+0x93/0xc0 [ 1288.437532][ T4071] ksys_ioctl+0xab/0xd0 [ 1288.441695][ T4071] __x64_sys_ioctl+0x73/0xb0 [ 1288.446306][ T4071] do_syscall_64+0x103/0x610 [ 1288.450908][ T4071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.456808][ T4071] RIP: 0033:0x457c97 [ 1288.460941][ T4071] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1288.480548][ T4071] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1288.488964][ T4071] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1288.496936][ T4071] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1288.504912][ T4071] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1288.512885][ T4071] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1288.520856][ T4071] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1288.540686][ T4071] FAT-fs (loop1): bogus number of reserved sectors [ 1288.591760][ T4071] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ec, 0x10400003) [ 1288.634971][ T26] audit: type=1400 audit(2000001023.512:735): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=15262B pid=4423 comm="syz-executor.3" 03:50:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:23 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73656c662f61747472bf1900000000"], 0x22) 03:50:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='v/at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1288.968868][ T4875] FAULT_INJECTION: forcing a failure. [ 1288.968868][ T4875] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.988351][ T4875] CPU: 0 PID: 4875 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1288.989152][ T26] audit: type=1400 audit(2000001023.862:736): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2F70726F632F7468726561642D73656C662F61747472BF19 pid=4923 comm="syz-executor.3" [ 1288.997419][ T4875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.997427][ T4875] Call Trace: [ 1288.997458][ T4875] dump_stack+0x172/0x1f0 [ 1288.997485][ T4875] should_fail.cold+0xa/0x15 [ 1288.997509][ T4875] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1288.997536][ T4875] ? ___might_sleep+0x163/0x280 [ 1288.997561][ T4875] __should_failslab+0x121/0x190 [ 1288.997583][ T4875] should_failslab+0x9/0x14 [ 1288.997602][ T4875] kmem_cache_alloc+0x2be/0x710 [ 1288.997622][ T4875] ? lock_downgrade+0x880/0x880 [ 1288.997651][ T4875] ? kasan_check_read+0x11/0x20 [ 1289.076234][ T4875] __kernfs_new_node+0xef/0x690 [ 1289.081099][ T4875] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1289.086578][ T4875] ? wait_for_completion+0x440/0x440 [ 1289.091881][ T4875] ? mutex_unlock+0xd/0x10 [ 1289.096309][ T4875] ? kernfs_activate+0x192/0x1f0 [ 1289.101264][ T4875] kernfs_new_node+0x99/0x130 [ 1289.105963][ T4875] __kernfs_create_file+0x51/0x340 [ 1289.111089][ T4875] sysfs_add_file_mode_ns+0x222/0x560 03:50:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffff0001, 0x20c0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ed, 0x10400003) [ 1289.116485][ T4875] internal_create_group+0x35b/0xc40 [ 1289.121786][ T4875] ? bd_set_size+0x89/0xb0 [ 1289.126222][ T4875] ? remove_files.isra.0+0x190/0x190 [ 1289.131513][ T4875] sysfs_create_group+0x20/0x30 [ 1289.136370][ T4875] lo_ioctl+0xf8f/0x20d0 [ 1289.140625][ T4875] ? lo_rw_aio+0x1530/0x1530 [ 1289.145223][ T4875] blkdev_ioctl+0xee8/0x1c40 [ 1289.149825][ T4875] ? blkpg_ioctl+0xa90/0xa90 [ 1289.154430][ T4875] ? perf_trace_lock_acquire+0xf5/0x580 [ 1289.159990][ T4875] ? __fget+0x35a/0x550 [ 1289.164152][ T4875] ? find_held_lock+0x35/0x130 [ 1289.168923][ T4875] ? __fget+0x35a/0x550 [ 1289.173096][ T4875] block_ioctl+0xee/0x130 [ 1289.177443][ T4875] ? blkdev_fallocate+0x410/0x410 [ 1289.182482][ T4875] do_vfs_ioctl+0xd6e/0x1390 [ 1289.187089][ T4875] ? kasan_check_read+0x11/0x20 [ 1289.191948][ T4875] ? ioctl_preallocate+0x210/0x210 [ 1289.197069][ T4875] ? __fget+0x381/0x550 [ 1289.201238][ T4875] ? ksys_dup3+0x3e0/0x3e0 [ 1289.205674][ T4875] ? do_sys_open+0x31d/0x5d0 [ 1289.210278][ T4875] ? security_file_ioctl+0x93/0xc0 [ 1289.215399][ T4875] ksys_ioctl+0xab/0xd0 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ee, 0x10400003) [ 1289.219563][ T4875] __x64_sys_ioctl+0x73/0xb0 [ 1289.224164][ T4875] do_syscall_64+0x103/0x610 [ 1289.228784][ T4875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.234676][ T4875] RIP: 0033:0x457c97 [ 1289.238573][ T4875] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.258173][ T4875] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:50:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1289.266595][ T4875] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1289.274569][ T4875] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1289.282539][ T4875] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1289.290517][ T4875] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1289.298498][ T4875] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000ef, 0x10400003) [ 1289.382544][ T4875] FAT-fs (loop1): bogus number of reserved sectors [ 1289.399338][ T26] audit: type=1400 audit(2000001024.272:737): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=5319 comm="syz-executor.3" [ 1289.424266][ T4875] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="737461636b202f70726f632f74685b6d61642d73656c662f617474722f6578656300f384f2daf806e89220570957a35e3b9f66f497"], 0x22) 03:50:24 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1289.611767][ T26] audit: type=1400 audit(2000001024.482:738): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/th[mad-self/attr/exec" pid=5453 comm="syz-executor.3" 03:50:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vf\nt\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1289.727000][ T5662] FAULT_INJECTION: forcing a failure. [ 1289.727000][ T5662] name failslab, interval 1, probability 0, space 0, times 0 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f0, 0x10400003) [ 1289.782844][ T5662] CPU: 0 PID: 5662 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1289.791904][ T5662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.801961][ T5662] Call Trace: [ 1289.805276][ T5662] dump_stack+0x172/0x1f0 [ 1289.809625][ T5662] should_fail.cold+0xa/0x15 [ 1289.814237][ T5662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1289.820065][ T5662] ? ___might_sleep+0x163/0x280 [ 1289.824952][ T5662] __should_failslab+0x121/0x190 03:50:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1289.829902][ T5662] should_failslab+0x9/0x14 [ 1289.834412][ T5662] kmem_cache_alloc+0x2be/0x710 [ 1289.839289][ T5662] ? lock_downgrade+0x880/0x880 [ 1289.844159][ T5662] ? kasan_check_read+0x11/0x20 [ 1289.849025][ T5662] __kernfs_new_node+0xef/0x690 [ 1289.853899][ T5662] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1289.859366][ T5662] ? wait_for_completion+0x440/0x440 [ 1289.864665][ T5662] ? mutex_unlock+0xd/0x10 [ 1289.869095][ T5662] ? kernfs_activate+0x192/0x1f0 [ 1289.874058][ T5662] kernfs_new_node+0x99/0x130 03:50:24 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x12) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000000c0)={0x0, 0x10000000000, 0x3, 0x80, &(0x7f0000ffe000/0x1000)=nil, 0x6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000100)) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1289.878754][ T5662] __kernfs_create_file+0x51/0x340 [ 1289.883880][ T5662] sysfs_add_file_mode_ns+0x222/0x560 [ 1289.889279][ T5662] internal_create_group+0x35b/0xc40 [ 1289.894586][ T5662] ? bd_set_size+0x89/0xb0 [ 1289.899013][ T5662] ? remove_files.isra.0+0x190/0x190 [ 1289.904319][ T5662] sysfs_create_group+0x20/0x30 [ 1289.909177][ T5662] lo_ioctl+0xf8f/0x20d0 [ 1289.913429][ T5662] ? lo_rw_aio+0x1530/0x1530 [ 1289.918030][ T5662] blkdev_ioctl+0xee8/0x1c40 [ 1289.922631][ T5662] ? blkpg_ioctl+0xa90/0xa90 [ 1289.927233][ T5662] ? perf_trace_lock_acquire+0xf5/0x580 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f1, 0x10400003) [ 1289.932802][ T5662] ? __fget+0x35a/0x550 [ 1289.936972][ T5662] ? find_held_lock+0x35/0x130 [ 1289.941746][ T5662] ? __fget+0x35a/0x550 [ 1289.945922][ T5662] block_ioctl+0xee/0x130 [ 1289.950254][ T5662] ? blkdev_fallocate+0x410/0x410 [ 1289.955297][ T5662] do_vfs_ioctl+0xd6e/0x1390 [ 1289.959895][ T5662] ? kasan_check_read+0x11/0x20 [ 1289.964767][ T5662] ? ioctl_preallocate+0x210/0x210 [ 1289.969898][ T5662] ? __fget+0x381/0x550 [ 1289.974070][ T5662] ? ksys_dup3+0x3e0/0x3e0 [ 1289.978497][ T5662] ? do_sys_open+0x31d/0x5d0 [ 1289.983108][ T5662] ? security_file_ioctl+0x93/0xc0 [ 1289.988247][ T5662] ksys_ioctl+0xab/0xd0 [ 1289.992418][ T5662] __x64_sys_ioctl+0x73/0xb0 [ 1289.997020][ T5662] do_syscall_64+0x103/0x610 [ 1290.001637][ T5662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.007545][ T5662] RIP: 0033:0x457c97 [ 1290.011451][ T5662] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f2, 0x10400003) [ 1290.031065][ T5662] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1290.039490][ T5662] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1290.047481][ T5662] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1290.055472][ T5662] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1290.063447][ T5662] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1290.071420][ T5662] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1290.122370][ T5662] FAT-fs (loop1): bogus number of reserved sectors [ 1290.178753][ T5662] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1290.186839][ T26] audit: type=1400 audit(2000001025.062:739): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=6114 comm="syz-executor.3" 03:50:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f3, 0x10400003) 03:50:25 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374616308202f70726f632f7468726561642d73656c662f617474722f6578656300a3d9b122ddcb2cefe849e59927de9b11338111e02911021b949bb6534f3d1125b057bb89e794298cfa9d9834f5484952f0b589dc622b3f665d1249324e35031e8d841baf4dfea639fc59d5cd3a368c9a3f48a3ae16001259b8f9df96d5c057c7eb33f22aa61e7d12e2c7dad395e76c61d0341aae0413a217d8c52220ea67c3acdd48dab1b4485489ee70ac72e24a8f68120e3e3f36395bdced4317a2d8fcd10129b345b0d432d10aa2e4a6554caaca9921e7e4c445f54ae76cff2fc86f43529a7bd6b2564c841334c030b582550650ae7c88b26fec"], 0x22) 03:50:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vf%t\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f4, 0x10400003) [ 1290.587819][ T6481] FAULT_INJECTION: forcing a failure. [ 1290.587819][ T6481] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.602723][ T26] audit: type=1400 audit(2000001025.472:740): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=6703 comm="syz-executor.3" [ 1290.623330][ T6481] CPU: 1 PID: 6481 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 03:50:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf9ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1290.632359][ T6481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.642400][ T6481] Call Trace: [ 1290.645751][ T6481] dump_stack+0x172/0x1f0 [ 1290.650105][ T6481] should_fail.cold+0xa/0x15 [ 1290.654709][ T6481] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1290.660544][ T6481] ? ___might_sleep+0x163/0x280 [ 1290.665402][ T6481] __should_failslab+0x121/0x190 [ 1290.670353][ T6481] should_failslab+0x9/0x14 [ 1290.674870][ T6481] kmem_cache_alloc+0x2be/0x710 [ 1290.679746][ T6481] ? lock_downgrade+0x880/0x880 [ 1290.684607][ T6481] ? kasan_check_read+0x11/0x20 [ 1290.689477][ T6481] __kernfs_new_node+0xef/0x690 [ 1290.694338][ T6481] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1290.699801][ T6481] ? wait_for_completion+0x440/0x440 [ 1290.705092][ T6481] ? mutex_unlock+0xd/0x10 [ 1290.709510][ T6481] ? kernfs_activate+0x192/0x1f0 [ 1290.714462][ T6481] kernfs_new_node+0x99/0x130 [ 1290.719156][ T6481] __kernfs_create_file+0x51/0x340 [ 1290.724264][ T6481] sysfs_add_file_mode_ns+0x222/0x560 [ 1290.729625][ T6481] internal_create_group+0x35b/0xc40 [ 1290.734911][ T6481] ? bd_set_size+0x89/0xb0 [ 1290.739312][ T6481] ? remove_files.isra.0+0x190/0x190 [ 1290.744585][ T6481] sysfs_create_group+0x20/0x30 [ 1290.749418][ T6481] lo_ioctl+0xf8f/0x20d0 [ 1290.753646][ T6481] ? lo_rw_aio+0x1530/0x1530 [ 1290.758244][ T6481] blkdev_ioctl+0xee8/0x1c40 [ 1290.762812][ T6481] ? blkpg_ioctl+0xa90/0xa90 [ 1290.767416][ T6481] ? perf_trace_lock_acquire+0xf5/0x580 [ 1290.772945][ T6481] ? __fget+0x35a/0x550 [ 1290.777089][ T6481] ? find_held_lock+0x35/0x130 [ 1290.781846][ T6481] ? __fget+0x35a/0x550 [ 1290.785985][ T6481] block_ioctl+0xee/0x130 [ 1290.790305][ T6481] ? blkdev_fallocate+0x410/0x410 [ 1290.795309][ T6481] do_vfs_ioctl+0xd6e/0x1390 [ 1290.799890][ T6481] ? kasan_check_read+0x11/0x20 [ 1290.804722][ T6481] ? ioctl_preallocate+0x210/0x210 [ 1290.809852][ T6481] ? __fget+0x381/0x550 [ 1290.813994][ T6481] ? ksys_dup3+0x3e0/0x3e0 [ 1290.818406][ T6481] ? do_sys_open+0x31d/0x5d0 [ 1290.823019][ T6481] ? security_file_ioctl+0x93/0xc0 [ 1290.828126][ T6481] ksys_ioctl+0xab/0xd0 [ 1290.832263][ T6481] __x64_sys_ioctl+0x73/0xb0 [ 1290.836850][ T6481] do_syscall_64+0x103/0x610 [ 1290.841442][ T6481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.847315][ T6481] RIP: 0033:0x457c97 [ 1290.851189][ T6481] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.870788][ T6481] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1290.879207][ T6481] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 03:50:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x81, 0x2, 0x6, 0x4, 0x0, 0x7, 0x8000, 0x4, 0x45, 0x5, 0x80000001, 0xd738, 0x80000001, 0xffff, 0x401, 0x80000000, 0xfffffffffffffffa, 0x20, 0x2, 0x6, 0x5, 0x9a3, 0xbf, 0x5, 0x2, 0x3, 0x7fb800, 0xa38, 0xc9b, 0x6, 0x3, 0x6, 0x1, 0x9, 0x4, 0xdf2e, 0x0, 0x4, 0x6, @perf_bp={&(0x7f0000000000), 0x1}, 0x800, 0x0, 0x9, 0x1, 0x1, 0x401, 0x200}, r0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'team_slave_0\x00', 0x0}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r4, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000200)) r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="737461010068fa884231000070726f6361642d090000002f617474722f"], 0x22) 03:50:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1290.887156][ T6481] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1290.895106][ T6481] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1290.903056][ T6481] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1290.911009][ T6481] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:25 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1291.050110][ T6481] FAT-fs (loop1): bogus number of reserved sectors [ 1291.059662][ T6481] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfa\n\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfaffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:26 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f5, 0x10400003) [ 1291.272301][ T26] audit: type=1400 audit(2000001026.142:741): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=7194 comm="syz-executor.3" 03:50:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:26 executing program 3: socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40000, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000100)=""/150) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000280)={'TPROXY\x00'}, &(0x7f00000002c0)=0x1e) write$apparmor_exec(r3, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) ioctl(r1, 0x10001, &(0x7f00000001c0)="3a3fff10d8c19b961c64fdcea3808df05aa361b5482fde7c3fe2d97066050f0fac4ce49a92922965e8098cf05425dbacb78134b98b6e4aa023a0fe99de6fbca988af0997e286a4544e7705f72a15dc487736b270bda3d427e95656c91889d996028ffefa77928006f4f50b781c1b49ab95b65f634c9a528532935703e6d863818f89d0a74a4267849db62d4a6e7790a76758a68977") [ 1291.446476][ T7357] FAULT_INJECTION: forcing a failure. [ 1291.446476][ T7357] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.476936][ T7357] CPU: 1 PID: 7357 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1291.485980][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1291.496040][ T7357] Call Trace: [ 1291.499349][ T7357] dump_stack+0x172/0x1f0 [ 1291.503698][ T7357] should_fail.cold+0xa/0x15 [ 1291.508310][ T7357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1291.514129][ T7357] ? ___might_sleep+0x163/0x280 [ 1291.518991][ T7357] __should_failslab+0x121/0x190 [ 1291.523941][ T7357] should_failslab+0x9/0x14 [ 1291.528445][ T7357] kmem_cache_alloc+0x2be/0x710 [ 1291.533303][ T7357] ? lock_downgrade+0x880/0x880 [ 1291.538163][ T7357] ? kasan_check_read+0x11/0x20 03:50:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f6, 0x10400003) [ 1291.543029][ T7357] __kernfs_new_node+0xef/0x690 [ 1291.547895][ T7357] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1291.553367][ T7357] ? wait_for_completion+0x440/0x440 [ 1291.558668][ T7357] ? mutex_unlock+0xd/0x10 [ 1291.563090][ T7357] ? kernfs_activate+0x192/0x1f0 [ 1291.568034][ T7357] kernfs_new_node+0x99/0x130 [ 1291.572726][ T7357] __kernfs_create_file+0x51/0x340 [ 1291.577847][ T7357] sysfs_add_file_mode_ns+0x222/0x560 [ 1291.583205][ T7357] internal_create_group+0x35b/0xc40 [ 1291.588472][ T7357] ? bd_set_size+0x89/0xb0 [ 1291.592873][ T7357] ? remove_files.isra.0+0x190/0x190 [ 1291.598150][ T7357] sysfs_create_group+0x20/0x30 [ 1291.603002][ T7357] lo_ioctl+0xf8f/0x20d0 [ 1291.607240][ T7357] ? lo_rw_aio+0x1530/0x1530 [ 1291.611842][ T7357] blkdev_ioctl+0xee8/0x1c40 [ 1291.616431][ T7357] ? blkpg_ioctl+0xa90/0xa90 [ 1291.621005][ T7357] ? perf_trace_lock_acquire+0xf5/0x580 [ 1291.626532][ T7357] ? __fget+0x35a/0x550 [ 1291.630667][ T7357] ? find_held_lock+0x35/0x130 [ 1291.635411][ T7357] ? __fget+0x35a/0x550 [ 1291.639551][ T7357] block_ioctl+0xee/0x130 [ 1291.643857][ T7357] ? blkdev_fallocate+0x410/0x410 [ 1291.648863][ T7357] do_vfs_ioctl+0xd6e/0x1390 [ 1291.653435][ T7357] ? kasan_check_read+0x11/0x20 [ 1291.658265][ T7357] ? ioctl_preallocate+0x210/0x210 [ 1291.663362][ T7357] ? __fget+0x381/0x550 [ 1291.667499][ T7357] ? ksys_dup3+0x3e0/0x3e0 [ 1291.671896][ T7357] ? do_sys_open+0x31d/0x5d0 [ 1291.676501][ T7357] ? security_file_ioctl+0x93/0xc0 [ 1291.681618][ T7357] ksys_ioctl+0xab/0xd0 [ 1291.685763][ T7357] __x64_sys_ioctl+0x73/0xb0 [ 1291.690340][ T7357] do_syscall_64+0x103/0x610 [ 1291.694918][ T7357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.700788][ T7357] RIP: 0033:0x457c97 [ 1291.704683][ T7357] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1291.724268][ T7357] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1291.732662][ T7357] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 03:50:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1291.740612][ T7357] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1291.748571][ T7357] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1291.756524][ T7357] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1291.764480][ T7357] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfa%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1291.833656][ T7357] FAT-fs (loop1): bogus number of reserved sectors [ 1291.849635][ T7357] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1291.856464][ T26] audit: type=1400 audit(2000001026.732:742): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=7653 comm="syz-executor.3" 03:50:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f7, 0x10400003) 03:50:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000140)) r2 = getpid() ptrace$getregset(0x4204, r2, 0x6, &(0x7f0000000000)={&(0x7f0000000080)=""/85, 0x55}) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:26 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1292.186663][ T26] audit: type=1400 audit(2000001027.062:743): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=8125 comm="syz-executor.3" 03:50:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfa\\\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1292.302771][ T8210] FAULT_INJECTION: forcing a failure. [ 1292.302771][ T8210] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.333550][ T8210] CPU: 0 PID: 8210 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1292.342631][ T8210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:50:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='{tack \'proc/thread-self/attr/exec\x00'], 0x22) [ 1292.352685][ T8210] Call Trace: [ 1292.355987][ T8210] dump_stack+0x172/0x1f0 [ 1292.360333][ T8210] should_fail.cold+0xa/0x15 [ 1292.364932][ T8210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1292.370758][ T8210] ? ___might_sleep+0x163/0x280 [ 1292.375626][ T8210] __should_failslab+0x121/0x190 [ 1292.380569][ T8210] should_failslab+0x9/0x14 [ 1292.385076][ T8210] __kmalloc+0x2dc/0x740 [ 1292.389326][ T8210] ? kobject_uevent_env+0x2fb/0x1030 [ 1292.394622][ T8210] ? rcu_read_lock_sched_held+0x110/0x130 03:50:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f8, 0x10400003) [ 1292.400345][ T8210] ? kobject_get_path+0xc4/0x1b0 [ 1292.405289][ T8210] kobject_get_path+0xc4/0x1b0 [ 1292.410061][ T8210] kobject_uevent_env+0x31f/0x1030 [ 1292.415191][ T8210] kobject_uevent+0x20/0x26 [ 1292.419704][ T8210] lo_ioctl+0x100b/0x20d0 [ 1292.424053][ T8210] ? lo_rw_aio+0x1530/0x1530 [ 1292.428653][ T8210] blkdev_ioctl+0xee8/0x1c40 [ 1292.433251][ T8210] ? blkpg_ioctl+0xa90/0xa90 [ 1292.437857][ T8210] ? perf_trace_lock_acquire+0xf5/0x580 [ 1292.443408][ T8210] ? __fget+0x35a/0x550 [ 1292.447569][ T8210] ? find_held_lock+0x35/0x130 [ 1292.452337][ T8210] ? __fget+0x35a/0x550 [ 1292.456504][ T8210] block_ioctl+0xee/0x130 [ 1292.461036][ T8210] ? blkdev_fallocate+0x410/0x410 [ 1292.466070][ T8210] do_vfs_ioctl+0xd6e/0x1390 [ 1292.470671][ T8210] ? kasan_check_read+0x11/0x20 [ 1292.475532][ T8210] ? ioctl_preallocate+0x210/0x210 [ 1292.480643][ T8210] ? __fget+0x381/0x550 [ 1292.484816][ T8210] ? ksys_dup3+0x3e0/0x3e0 [ 1292.489241][ T8210] ? do_sys_open+0x31d/0x5d0 [ 1292.493852][ T8210] ? security_file_ioctl+0x93/0xc0 [ 1292.498965][ T8210] ksys_ioctl+0xab/0xd0 03:50:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f9, 0x10400003) [ 1292.503131][ T8210] __x64_sys_ioctl+0x73/0xb0 [ 1292.507733][ T8210] do_syscall_64+0x103/0x610 [ 1292.512350][ T8210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.518239][ T8210] RIP: 0033:0x457c97 [ 1292.522135][ T8210] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.541751][ T8210] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1292.550165][ T8210] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1292.558123][ T8210] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1292.566097][ T8210] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1292.574076][ T8210] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1292.582047][ T8210] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1292.597329][ T8210] FAT-fs (loop1): bogus number of reserved sectors 03:50:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fa, 0x10400003) [ 1292.604013][ T8210] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1292.690036][ T26] audit: type=1400 audit(2000001027.562:744): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=8746 comm="syz-executor.3" 03:50:27 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bind(r0, &(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x100000000, 0x8002) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73656c662fb80774bd617474722f65"], 0x22) 03:50:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1292.882610][ T9131] FAULT_INJECTION: forcing a failure. [ 1292.882610][ T9131] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.909040][ T9131] CPU: 0 PID: 9131 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1292.918081][ T9131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.928133][ T9131] Call Trace: [ 1292.931427][ T9131] dump_stack+0x172/0x1f0 [ 1292.935807][ T9131] should_fail.cold+0xa/0x15 [ 1292.940400][ T9131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1292.946206][ T9131] ? ___might_sleep+0x163/0x280 [ 1292.951052][ T9131] __should_failslab+0x121/0x190 [ 1292.955984][ T9131] should_failslab+0x9/0x14 [ 1292.960480][ T9131] kmem_cache_alloc_trace+0x2d1/0x760 [ 1292.965884][ T9131] kobject_uevent_env+0x2fb/0x1030 [ 1292.970994][ T9131] kobject_uevent+0x20/0x26 [ 1292.975491][ T9131] lo_ioctl+0x100b/0x20d0 [ 1292.979834][ T9131] ? lo_rw_aio+0x1530/0x1530 [ 1292.984425][ T9131] blkdev_ioctl+0xee8/0x1c40 [ 1292.989008][ T9131] ? blkpg_ioctl+0xa90/0xa90 [ 1292.993592][ T9131] ? perf_trace_lock_acquire+0xf5/0x580 [ 1292.999131][ T9131] ? __fget+0x35a/0x550 [ 1293.003277][ T9131] ? find_held_lock+0x35/0x130 [ 1293.008034][ T9131] ? __fget+0x35a/0x550 [ 1293.012172][ T9131] block_ioctl+0xee/0x130 [ 1293.016494][ T9131] ? blkdev_fallocate+0x410/0x410 [ 1293.021505][ T9131] do_vfs_ioctl+0xd6e/0x1390 [ 1293.026090][ T9131] ? kasan_check_read+0x11/0x20 [ 1293.030944][ T9131] ? ioctl_preallocate+0x210/0x210 [ 1293.036052][ T9131] ? __fget+0x381/0x550 [ 1293.040206][ T9131] ? ksys_dup3+0x3e0/0x3e0 [ 1293.044620][ T9131] ? do_sys_open+0x31d/0x5d0 [ 1293.049211][ T9131] ? security_file_ioctl+0x93/0xc0 [ 1293.054318][ T9131] ksys_ioctl+0xab/0xd0 [ 1293.058470][ T9131] __x64_sys_ioctl+0x73/0xb0 [ 1293.063042][ T9131] do_syscall_64+0x103/0x610 [ 1293.067619][ T9131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.073498][ T9131] RIP: 0033:0x457c97 [ 1293.077428][ T9131] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1293.097054][ T9131] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1293.105451][ T9131] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1293.113418][ T9131] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1293.121551][ T9131] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:50:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fb, 0x10400003) [ 1293.129516][ T9131] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1293.137481][ T9131] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1293.156155][ T9131] FAT-fs (loop1): bogus number of reserved sectors [ 1293.178596][ T9131] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000240)={'exec ', '/proc/thread-self/attr/exec\x00'}, 0x21) 03:50:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:28 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1293.476486][ T26] audit: type=1400 audit(2000001028.352:745): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=9491 comm="syz-executor.3" 03:50:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fc, 0x10400003) [ 1293.558889][ T9597] FAULT_INJECTION: forcing a failure. [ 1293.558889][ T9597] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.607093][ T9597] CPU: 0 PID: 9597 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1293.616196][ T9597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.626259][ T9597] Call Trace: [ 1293.629571][ T9597] dump_stack+0x172/0x1f0 [ 1293.633916][ T9597] should_fail.cold+0xa/0x15 [ 1293.638516][ T9597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1293.644332][ T9597] ? ___might_sleep+0x163/0x280 [ 1293.649190][ T9597] __should_failslab+0x121/0x190 [ 1293.654133][ T9597] should_failslab+0x9/0x14 [ 1293.658643][ T9597] __kmalloc+0x2dc/0x740 [ 1293.662896][ T9597] ? kobject_uevent_env+0x2fb/0x1030 [ 1293.668189][ T9597] ? rcu_read_lock_sched_held+0x110/0x130 [ 1293.673913][ T9597] ? kobject_get_path+0xc4/0x1b0 [ 1293.678860][ T9597] kobject_get_path+0xc4/0x1b0 [ 1293.683643][ T9597] kobject_uevent_env+0x31f/0x1030 [ 1293.688794][ T9597] kobject_uevent+0x20/0x26 [ 1293.693311][ T9597] lo_ioctl+0x100b/0x20d0 [ 1293.697652][ T9597] ? lo_rw_aio+0x1530/0x1530 [ 1293.702246][ T9597] blkdev_ioctl+0xee8/0x1c40 [ 1293.706844][ T9597] ? blkpg_ioctl+0xa90/0xa90 [ 1293.711444][ T9597] ? perf_trace_lock_acquire+0xf5/0x580 [ 1293.716983][ T9597] ? __fget+0x35a/0x550 [ 1293.721131][ T9597] ? find_held_lock+0x35/0x130 [ 1293.725900][ T9597] ? __fget+0x35a/0x550 [ 1293.730070][ T9597] block_ioctl+0xee/0x130 [ 1293.734400][ T9597] ? blkdev_fallocate+0x410/0x410 [ 1293.739430][ T9597] do_vfs_ioctl+0xd6e/0x1390 [ 1293.744030][ T9597] ? kasan_check_read+0x11/0x20 [ 1293.748889][ T9597] ? ioctl_preallocate+0x210/0x210 [ 1293.754005][ T9597] ? __fget+0x381/0x550 [ 1293.758175][ T9597] ? ksys_dup3+0x3e0/0x3e0 [ 1293.762592][ T9597] ? do_sys_open+0x31d/0x5d0 [ 1293.767193][ T9597] ? security_file_ioctl+0x93/0xc0 [ 1293.772312][ T9597] ksys_ioctl+0xab/0xd0 [ 1293.776475][ T9597] __x64_sys_ioctl+0x73/0xb0 [ 1293.781075][ T9597] do_syscall_64+0x103/0x610 [ 1293.785682][ T9597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.791571][ T9597] RIP: 0033:0x457c97 [ 1293.795472][ T9597] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1293.815081][ T9597] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1293.823494][ T9597] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1293.831469][ T9597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1293.839444][ T9597] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1293.847426][ T9597] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:50:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fd, 0x10400003) 03:50:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fe, 0x10400003) 03:50:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1293.855396][ T9597] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1293.959222][ T9597] FAT-fs (loop1): bogus number of reserved sectors [ 1293.975126][ T26] audit: type=1400 audit(2000001028.852:746): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=10057 comm="syz-executor.3" 03:50:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000102, 0x10400003) [ 1294.025317][ T9597] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:29 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:29 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="777461636b207468726561872d73656c262f617474722f65786563004036a9ca3da92cbc1a27883e2d8b282f783694c5111806b9d6d700935012ea2ed2c3bc74f3cb7e22a052c11073cb83eb31c5f11842c536eea30cf2f70c5683c583e26cf9787d00451b0a7e06651c619be73a4200e2"], 0x22) 03:50:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1294.282560][T10539] FAULT_INJECTION: forcing a failure. [ 1294.282560][T10539] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.302175][ T26] audit: type=1400 audit(2000001029.172:747): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=10516 comm="syz-executor.3" [ 1294.318934][T10539] CPU: 0 PID: 10539 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1294.328058][T10539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.338115][T10539] Call Trace: [ 1294.341422][T10539] dump_stack+0x172/0x1f0 [ 1294.345784][T10539] should_fail.cold+0xa/0x15 [ 1294.350392][T10539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1294.356209][T10539] ? ___might_sleep+0x163/0x280 [ 1294.361075][T10539] __should_failslab+0x121/0x190 [ 1294.366023][T10539] should_failslab+0x9/0x14 [ 1294.370531][T10539] kmem_cache_alloc_node+0x265/0x710 [ 1294.375825][T10539] ? find_held_lock+0x35/0x130 03:50:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1294.380603][T10539] __alloc_skb+0xd5/0x5e0 [ 1294.384941][T10539] ? skb_trim+0x190/0x190 [ 1294.389278][T10539] ? kasan_check_read+0x11/0x20 [ 1294.394136][T10539] alloc_uevent_skb+0x83/0x1e2 [ 1294.398903][T10539] kobject_uevent_env+0xa63/0x1030 [ 1294.404071][T10539] kobject_uevent+0x20/0x26 [ 1294.408580][T10539] lo_ioctl+0x100b/0x20d0 [ 1294.412912][T10539] ? lo_rw_aio+0x1530/0x1530 [ 1294.417502][T10539] blkdev_ioctl+0xee8/0x1c40 [ 1294.422093][T10539] ? blkpg_ioctl+0xa90/0xa90 [ 1294.426691][T10539] ? perf_trace_lock_acquire+0xf5/0x580 03:50:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000103, 0x10400003) [ 1294.432244][T10539] ? __fget+0x35a/0x550 [ 1294.436411][T10539] ? find_held_lock+0x35/0x130 [ 1294.441183][T10539] ? __fget+0x35a/0x550 [ 1294.445346][T10539] block_ioctl+0xee/0x130 [ 1294.449683][T10539] ? blkdev_fallocate+0x410/0x410 [ 1294.454719][T10539] do_vfs_ioctl+0xd6e/0x1390 [ 1294.459618][T10539] ? kasan_check_read+0x11/0x20 [ 1294.464478][T10539] ? ioctl_preallocate+0x210/0x210 [ 1294.469589][T10539] ? __fget+0x381/0x550 [ 1294.473754][T10539] ? ksys_dup3+0x3e0/0x3e0 [ 1294.478183][T10539] ? do_sys_open+0x31d/0x5d0 [ 1294.482816][T10539] ? security_file_ioctl+0x93/0xc0 [ 1294.487942][T10539] ksys_ioctl+0xab/0xd0 [ 1294.492110][T10539] __x64_sys_ioctl+0x73/0xb0 [ 1294.496709][T10539] do_syscall_64+0x103/0x610 [ 1294.501313][T10539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.507205][T10539] RIP: 0033:0x457c97 [ 1294.511103][T10539] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000104, 0x10400003) [ 1294.530706][T10539] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1294.539132][T10539] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1294.547101][T10539] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1294.555071][T10539] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1294.563039][T10539] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1294.571013][T10539] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1294.625349][T10539] FAT-fs (loop1): bogus number of reserved sectors [ 1294.656130][T10539] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x05', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1294.692053][ T26] audit: type=1400 audit(2000001029.562:748): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=10873 comm="syz-executor.3" 03:50:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="f1e7e9f24acf9d9401288074d40dded36137c19445274c67762776872419f72b3adf1a1bd8a6cf34e8a1844ffa5215932f7aa168b45f6e8613fe40a913373e2f34120f363df54539c8a2f957011fa8905e75c3ed2a117f7bfe92fe5b7305e151ac3440027ac121e6af2861f2c556c3c75c40e1361f244ffee177a755aac47ed00cdbb1cea3045812e2347b36df141b745769b1c8492d6d52", 0x98, 0x4}, {&(0x7f00000001c0)="4a02e5ace32bd2e72e75072159a5f6bd24cf00dae637307cffac7e541a85e673b678307b4e13b4a23a57ed0f2457922ed6ac6cbce2c008202f4abe0ef0d7bfe726edfeedec3c9bb26eb59cab68fb60", 0x4f, 0x20}], 0x40, &(0x7f0000000280)='stack ') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000002c0)={0x1, 0x100000000, 0x4, 0x3, 0xa, 0xd6f4, 0xc9d6494, 0x10001, 0x9, 0xffffffffffffe243, 0x100000001, 0x9a}) 03:50:29 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000105, 0x10400003) [ 1294.992489][ T26] audit: type=1400 audit(2000001029.862:749): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=11332 comm="syz-executor.3" [ 1295.022051][T11306] FAULT_INJECTION: forcing a failure. [ 1295.022051][T11306] name failslab, interval 1, probability 0, space 0, times 0 03:50:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1295.048113][T11306] CPU: 1 PID: 11306 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1295.057267][T11306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.067364][T11306] Call Trace: [ 1295.070685][T11306] dump_stack+0x172/0x1f0 [ 1295.075036][T11306] should_fail.cold+0xa/0x15 [ 1295.079642][T11306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1295.085494][T11306] ? ___might_sleep+0x163/0x280 [ 1295.090357][T11306] __should_failslab+0x121/0x190 03:50:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1295.095309][T11306] should_failslab+0x9/0x14 [ 1295.099819][T11306] kmem_cache_alloc+0x2be/0x710 [ 1295.104676][T11306] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1295.110481][T11306] ? lock_downgrade+0x880/0x880 [ 1295.115359][T11306] skb_clone+0x150/0x3b0 [ 1295.119649][T11306] netlink_broadcast_filtered+0x870/0xb20 [ 1295.125368][T11306] netlink_broadcast+0x3a/0x50 [ 1295.130122][T11306] kobject_uevent_env+0xa94/0x1030 [ 1295.135233][T11306] kobject_uevent+0x20/0x26 [ 1295.139717][T11306] lo_ioctl+0x100b/0x20d0 [ 1295.144036][T11306] ? lo_rw_aio+0x1530/0x1530 [ 1295.148609][T11306] blkdev_ioctl+0xee8/0x1c40 [ 1295.153181][T11306] ? blkpg_ioctl+0xa90/0xa90 [ 1295.157779][T11306] ? perf_trace_lock_acquire+0xf5/0x580 [ 1295.163307][T11306] ? __fget+0x35a/0x550 [ 1295.167440][T11306] ? find_held_lock+0x35/0x130 [ 1295.172183][T11306] ? __fget+0x35a/0x550 [ 1295.176324][T11306] block_ioctl+0xee/0x130 [ 1295.180630][T11306] ? blkdev_fallocate+0x410/0x410 [ 1295.185648][T11306] do_vfs_ioctl+0xd6e/0x1390 [ 1295.190216][T11306] ? kasan_check_read+0x11/0x20 [ 1295.195050][T11306] ? ioctl_preallocate+0x210/0x210 [ 1295.200141][T11306] ? __fget+0x381/0x550 [ 1295.204288][T11306] ? ksys_dup3+0x3e0/0x3e0 [ 1295.208684][T11306] ? do_sys_open+0x31d/0x5d0 [ 1295.213258][T11306] ? security_file_ioctl+0x93/0xc0 [ 1295.218397][T11306] ksys_ioctl+0xab/0xd0 [ 1295.222561][T11306] __x64_sys_ioctl+0x73/0xb0 [ 1295.227133][T11306] do_syscall_64+0x103/0x610 [ 1295.231722][T11306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.237617][T11306] RIP: 0033:0x457c97 [ 1295.241493][T11306] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1295.261072][T11306] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1295.269464][T11306] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1295.277421][T11306] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1295.285374][T11306] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:50:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000106, 0x10400003) 03:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1295.293325][T11306] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1295.301280][T11306] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x06', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1295.373345][T11306] FAT-fs (loop1): bogus number of reserved sectors [ 1295.412619][T11306] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1295.424731][ T26] audit: type=1400 audit(2000001030.302:750): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=11703 comm="syz-executor.3" 03:50:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000107, 0x10400003) 03:50:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:30 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9ffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1295.737902][T12192] FAULT_INJECTION: forcing a failure. [ 1295.737902][T12192] name failslab, interval 1, probability 0, space 0, times 0 03:50:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff, 0x80) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x7ff, 0x4, [], &(0x7f0000000080)=0x1a}) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\a', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000108, 0x10400003) 03:50:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfaffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1295.844177][T12192] CPU: 1 PID: 12192 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1295.853331][T12192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.863387][T12192] Call Trace: [ 1295.866690][T12192] dump_stack+0x172/0x1f0 [ 1295.871037][T12192] should_fail.cold+0xa/0x15 [ 1295.875642][T12192] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1295.881461][T12192] ? ___might_sleep+0x163/0x280 [ 1295.886327][T12192] __should_failslab+0x121/0x190 [ 1295.891304][T12192] should_failslab+0x9/0x14 [ 1295.895814][T12192] kmem_cache_alloc+0x2be/0x710 [ 1295.895830][T12192] ? __d_lookup+0x433/0x760 [ 1295.895843][T12192] ? lookup_dcache+0x23/0x140 [ 1295.895855][T12192] ? d_lookup+0xf9/0x260 [ 1295.895872][T12192] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1295.895892][T12192] __d_alloc+0x2e/0x8c0 [ 1295.905221][T12192] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1295.905240][T12192] d_alloc+0x4d/0x2b0 [ 1295.905260][T12192] __lookup_hash+0xcd/0x190 [ 1295.905286][T12192] filename_create+0x1a7/0x4f0 [ 1295.914167][T12192] ? kern_path_mountpoint+0x40/0x40 [ 1295.914185][T12192] ? strncpy_from_user+0x2a8/0x380 [ 1295.914205][T12192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1295.959032][T12192] ? getname_flags+0x277/0x5b0 [ 1295.963807][T12192] do_mkdirat+0xb5/0x2a0 [ 1295.968057][T12192] ? __ia32_sys_mknod+0xb0/0xb0 [ 1295.972915][T12192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1295.978379][T12192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1295.984444][T12192] ? do_syscall_64+0x26/0x610 [ 1295.989127][T12192] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1295.994419][T12192] __x64_sys_mkdir+0x5c/0x80 [ 1295.999018][T12192] do_syscall_64+0x103/0x610 [ 1296.003620][T12192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.009516][T12192] RIP: 0033:0x457247 [ 1296.013416][T12192] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1296.033020][T12192] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1296.041433][T12192] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1296.049404][T12192] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1296.057371][T12192] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1296.065343][T12192] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1296.073310][T12192] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7fff, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f00000000c0)='^lovboxnet0vboxnet0md5sum\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x900) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000140)={0x9, 0x5, 0x5, 0x0, 0x8, 0x9, 0xba9, 0xfffffffffffffffd, 0x4ad, 0x3, 0x1, 0x3ff, 0x0, 0x1, 0x7fff, 0x100000000, 0x8, 0x2, 0x7}) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000109, 0x10400003) 03:50:31 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x22) [ 1296.416606][T12876] FAULT_INJECTION: forcing a failure. [ 1296.416606][T12876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1296.429856][T12876] CPU: 0 PID: 12876 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1296.438958][T12876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.449013][T12876] Call Trace: [ 1296.452319][T12876] dump_stack+0x172/0x1f0 [ 1296.456666][T12876] should_fail.cold+0xa/0x15 [ 1296.461408][T12876] ? lo_ioctl+0x188/0x20d0 [ 1296.465829][T12876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1296.471661][T12876] should_fail_alloc_page+0x50/0x60 [ 1296.476866][T12876] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1296.482246][T12876] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1296.487971][T12876] ? find_held_lock+0x35/0x130 [ 1296.492757][T12876] ? __fget+0x35a/0x550 [ 1296.496926][T12876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1296.502750][T12876] cache_grow_begin+0x9c/0x850 [ 1296.507527][T12876] ? getname_flags+0xd6/0x5b0 [ 1296.512212][T12876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1296.518458][T12876] kmem_cache_alloc+0x645/0x710 [ 1296.523313][T12876] ? __fget+0x381/0x550 [ 1296.527480][T12876] getname_flags+0xd6/0x5b0 [ 1296.531993][T12876] do_mkdirat+0xa0/0x2a0 [ 1296.536250][T12876] ? __ia32_sys_mknod+0xb0/0xb0 [ 1296.541109][T12876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1296.546576][T12876] ? do_syscall_64+0x26/0x610 [ 1296.551260][T12876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.557330][T12876] ? do_syscall_64+0x26/0x610 [ 1296.562019][T12876] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1296.567316][T12876] __x64_sys_mkdir+0x5c/0x80 [ 1296.567336][T12876] do_syscall_64+0x103/0x610 [ 1296.567358][T12876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1296.567372][T12876] RIP: 0033:0x457247 [ 1296.567394][T12876] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1296.582422][T12876] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:50:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010a, 0x10400003) [ 1296.582439][T12876] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1296.582449][T12876] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1296.582458][T12876] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1296.582468][T12876] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1296.582478][T12876] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1296.680890][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 1296.680904][ T26] audit: type=1400 audit(2000001031.552:753): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=13203 comm="syz-executor.3" [ 1296.717554][T12876] FAT-fs (loop1): bogus number of reserved sectors 03:50:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x80000000, 0x62000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000200)=""/58) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x1, [0x800]}, &(0x7f0000000100)=0xa) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000140)={r4, 0x5, 0x30}, &(0x7f0000000180)=0xc) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x109000, 0x0) ioctl$TIOCSBRK(r5, 0x5427) 03:50:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1296.785906][T12876] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1296.874959][ T26] audit: type=1400 audit(2000001031.752:754): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=13553 comm="syz-executor.3" 03:50:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010b, 0x10400003) 03:50:31 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:31 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2880, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1297.073732][ T26] audit: type=1400 audit(2000001031.952:755): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=13924 comm="syz-executor.3" 03:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1297.126620][T14083] FAULT_INJECTION: forcing a failure. [ 1297.126620][T14083] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.173446][T14083] CPU: 0 PID: 14083 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1297.182617][T14083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.192678][T14083] Call Trace: [ 1297.195987][T14083] dump_stack+0x172/0x1f0 [ 1297.200337][T14083] should_fail.cold+0xa/0x15 [ 1297.204944][T14083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1297.210767][T14083] ? ___might_sleep+0x163/0x280 [ 1297.215658][T14083] __should_failslab+0x121/0x190 03:50:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010c, 0x10400003) [ 1297.220606][T14083] should_failslab+0x9/0x14 [ 1297.220625][T14083] kmem_cache_alloc+0x2be/0x710 [ 1297.220644][T14083] ? __d_lookup+0x433/0x760 [ 1297.229983][T14083] ? lookup_dcache+0x23/0x140 [ 1297.229997][T14083] ? d_lookup+0xf9/0x260 [ 1297.230016][T14083] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1297.230036][T14083] __d_alloc+0x2e/0x8c0 [ 1297.230060][T14083] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1297.258558][T14083] d_alloc+0x4d/0x2b0 [ 1297.262550][T14083] __lookup_hash+0xcd/0x190 [ 1297.267066][T14083] filename_create+0x1a7/0x4f0 03:50:32 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1297.271840][T14083] ? kern_path_mountpoint+0x40/0x40 [ 1297.277043][T14083] ? strncpy_from_user+0x2a8/0x380 [ 1297.282167][T14083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1297.288409][T14083] ? getname_flags+0x277/0x5b0 [ 1297.293181][T14083] do_mkdirat+0xb5/0x2a0 [ 1297.297432][T14083] ? __ia32_sys_mknod+0xb0/0xb0 [ 1297.302283][T14083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1297.307762][T14083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.313837][T14083] ? do_syscall_64+0x26/0x610 [ 1297.318519][T14083] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1297.323816][T14083] __x64_sys_mkdir+0x5c/0x80 [ 1297.328913][T14083] do_syscall_64+0x103/0x610 [ 1297.333511][T14083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1297.333525][T14083] RIP: 0033:0x457247 [ 1297.333542][T14083] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1297.333551][T14083] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:50:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\n', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:32 executing program 3: socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1297.333567][T14083] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1297.333576][T14083] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1297.333585][T14083] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1297.333594][T14083] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1297.333604][T14083] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:32 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010d, 0x10400003) [ 1297.522228][ T26] audit: type=1400 audit(2000001032.392:756): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=14588 comm="syz-executor.3" 03:50:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="736361556b202f70726f632f7468726561642d73656c662f6165747a2f6578c9ae00"], 0x22) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:50:32 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:32 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x0e', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1297.700431][ T26] audit: type=1400 audit(2000001032.572:757): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=14892 comm="syz-executor.3" 03:50:32 executing program 3: socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1297.796735][T15036] FAULT_INJECTION: forcing a failure. [ 1297.796735][T15036] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.863600][T15036] CPU: 1 PID: 15036 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1297.872754][T15036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.882818][T15036] Call Trace: [ 1297.885382][ T26] audit: type=1400 audit(2000001032.742:758): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=15242 comm="syz-executor.3" [ 1297.886130][T15036] dump_stack+0x172/0x1f0 [ 1297.910676][T15036] should_fail.cold+0xa/0x15 [ 1297.915286][T15036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1297.921107][T15036] ? ___might_sleep+0x163/0x280 [ 1297.925970][T15036] __should_failslab+0x121/0x190 [ 1297.930920][T15036] should_failslab+0x9/0x14 [ 1297.935436][T15036] __kmalloc+0x2dc/0x740 [ 1297.939690][T15036] ? __lock_acquire+0x55d/0x4710 [ 1297.944637][T15036] ? ext4_find_extent+0x76e/0x9d0 [ 1297.949676][T15036] ext4_find_extent+0x76e/0x9d0 [ 1297.954543][T15036] ext4_ext_map_blocks+0x1cc/0x4e50 03:50:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x7, 0xe61, 0x401}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x1, 0x100000000, 0x1c, 0x1ff, 0x56f]}, &(0x7f0000000140)=0xe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1297.959756][T15036] ? debug_smp_processor_id+0x3c/0x280 [ 1297.965231][T15036] ? ext4_ext_release+0x10/0x10 [ 1297.970091][T15036] ? perf_trace_lock+0x510/0x510 [ 1297.975046][T15036] ? lock_acquire+0x16f/0x3f0 [ 1297.979718][T15036] ? ext4_map_blocks+0x3fd/0x1a00 [ 1297.984738][T15036] ext4_map_blocks+0xebb/0x1a00 [ 1297.989582][T15036] ? ext4_issue_zeroout+0x190/0x190 [ 1297.994773][T15036] ? kasan_check_write+0x14/0x20 [ 1297.999696][T15036] ? __brelse+0x95/0xb0 [ 1298.003839][T15036] ext4_getblk+0xc4/0x510 [ 1298.008151][T15036] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1298.013165][T15036] ? ext4_free_inode+0x1450/0x1450 [ 1298.018261][T15036] ext4_bread+0x8f/0x230 [ 1298.022522][T15036] ? ext4_getblk+0x510/0x510 [ 1298.027144][T15036] ext4_append+0x155/0x370 [ 1298.031571][T15036] ext4_mkdir+0x61b/0xdf0 [ 1298.035914][T15036] ? ext4_init_dot_dotdot+0x520/0x520 [ 1298.041268][T15036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.047503][T15036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.053731][T15036] ? security_inode_permission+0xd5/0x110 [ 1298.059435][T15036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.065655][T15036] ? security_inode_mkdir+0xee/0x120 [ 1298.070938][T15036] vfs_mkdir+0x433/0x690 [ 1298.075166][T15036] do_mkdirat+0x234/0x2a0 [ 1298.079475][T15036] ? __ia32_sys_mknod+0xb0/0xb0 [ 1298.084308][T15036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1298.089759][T15036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.095813][T15036] ? do_syscall_64+0x26/0x610 [ 1298.100481][T15036] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1298.105771][T15036] __x64_sys_mkdir+0x5c/0x80 [ 1298.110344][T15036] do_syscall_64+0x103/0x610 [ 1298.114920][T15036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.120798][T15036] RIP: 0033:0x457247 [ 1298.124688][T15036] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1298.144292][T15036] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1298.152683][T15036] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 03:50:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010e, 0x10400003) 03:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:33 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1298.160631][T15036] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1298.168583][T15036] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1298.176531][T15036] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1298.184486][T15036] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1298.267663][T15036] FAT-fs (loop1): bogus number of reserved sectors [ 1298.291844][T15036] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1298.300827][ T26] audit: type=1400 audit(2000001033.172:759): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=15426 comm="syz-executor.3" 03:50:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x10', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010f, 0x10400003) 03:50:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/rt_acct\x00') ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x32) sendmsg$nl_generic(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x270, 0x15, 0x400, 0x70bd26, 0x25dfdbfc, {0x12}, [@generic="a0ad02dbc39f9e4e583598b2599fae5a356f756edf66bd51c0f6d2a7f4790c0ef54b72e736557823d1e314e1993eea4c820bcd05e7fb02b707c8302c14c4917faf9b6ab9a51078edcb2a7622aa4a90e46c92affa3cf063503ce3704b75177f3d7ec5365d87e89e4493a39be110a534750cbbc439f5b327bb1c4860be9fc611141a1eeada49b342370dd06cf2c79386c7ff157fd43583816164394591f51024f87af113cdc94dc81bbdebf0a4da308044fbd11692c7dc26688ac8e53bca8c6a2e25e7161b6d0ca843154183d511e49f9c44fa09d62bcbb1525ee1d79cce", @typed={0x4, 0x67}, @nested={0x90, 0x16, [@generic="04d27491d274fb51b09e6bf18688d2a49ee70c23bcd50e6394764f7a5ab0fe4d9607ca66df60cdc90ab07a65dadce88b5b7db84f09236492f565e58a874fcf2026073dc04d90f7d2ad1ea8fd36af8e68d87bae1a637ebec10f6dbc9b06600c22c0362ec51d19adde31608e37ea3522c3c78cbcc78bc2c6b7105056ebe7ba1251bbf01edecf7f69d47113a4"]}, @typed={0x20, 0x28, @str='/proc/thread-self/attr/exec\x00'}, @generic="8d72ef15c0ecb23bbf952876743c2d28b0127aa8ceaa849b2699c32c38b58b8165cd8f4d861d714aa1d94e69b71d31", @generic="e5dda1ca043c9f372368315c5fe19212976ac4863dd78e2cf73082db0bc2de72e3f65d57db4ec42a7b7e89a46551a0de0590702b70cf8af4991b82cf8f80dbc8fbc6ef0041a9e1779394b8b929e089bde8b1b3594a8dd347ad9da57f0fb07f2e7a6694836f2b03ffe1363608975bdd258a57f1df1417327ba75b8f5271d2e04ed0b93f08f5fb10675d7b68b9b66c1af1f35867d9d0294173ab"]}, 0x270}, 0x1, 0x0, 0x0, 0x8000}, 0x4) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000400)={'ipddp0\x00', 0x1}) 03:50:33 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:33 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1298.502771][ T26] audit: type=1400 audit(2000001033.372:760): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=15799 comm="syz-executor.3" [ 1298.546042][T15809] FAULT_INJECTION: forcing a failure. [ 1298.546042][T15809] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.559350][T15809] CPU: 0 PID: 15809 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1298.568471][T15809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.578528][T15809] Call Trace: [ 1298.581838][T15809] dump_stack+0x172/0x1f0 [ 1298.586181][T15809] should_fail.cold+0xa/0x15 [ 1298.590790][T15809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1298.596600][T15809] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1298.602247][T15809] __should_failslab+0x121/0x190 [ 1298.607194][T15809] should_failslab+0x9/0x14 [ 1298.611704][T15809] kmem_cache_alloc+0x47/0x710 [ 1298.616480][T15809] ? ext4_es_scan+0x6f0/0x6f0 [ 1298.621167][T15809] ? do_raw_write_lock+0x124/0x290 [ 1298.626328][T15809] __es_insert_extent+0x2cc/0xf20 [ 1298.631366][T15809] ext4_es_insert_extent+0x2b7/0xa40 [ 1298.636678][T15809] ? ext4_es_scan_clu+0x50/0x50 [ 1298.641541][T15809] ? rcu_read_lock_sched_held+0x110/0x130 [ 1298.647271][T15809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1298.653511][T15809] ? ext4_es_find_extent_range+0xff/0x600 [ 1298.659246][T15809] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1298.664801][T15809] ? ext4_rereserve_cluster+0x240/0x240 [ 1298.670351][T15809] ? ext4_find_extent+0x76e/0x9d0 [ 1298.675386][T15809] ? ext4_find_extent+0x6a6/0x9d0 [ 1298.680424][T15809] ext4_ext_map_blocks+0x216a/0x4e50 [ 1298.685727][T15809] ? ext4_ext_release+0x10/0x10 [ 1298.690605][T15809] ? perf_trace_lock+0x510/0x510 [ 1298.695566][T15809] ? lock_acquire+0x16f/0x3f0 [ 1298.700248][T15809] ? ext4_map_blocks+0x3fd/0x1a00 [ 1298.705294][T15809] ext4_map_blocks+0xebb/0x1a00 [ 1298.710163][T15809] ? ext4_issue_zeroout+0x190/0x190 [ 1298.715390][T15809] ? kasan_check_write+0x14/0x20 [ 1298.720345][T15809] ? __brelse+0x95/0xb0 [ 1298.724513][T15809] ext4_getblk+0xc4/0x510 [ 1298.728850][T15809] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1298.733888][T15809] ? ext4_free_inode+0x1450/0x1450 [ 1298.739014][T15809] ext4_bread+0x8f/0x230 [ 1298.743262][T15809] ? ext4_getblk+0x510/0x510 [ 1298.747868][T15809] ext4_append+0x155/0x370 [ 1298.752294][T15809] ext4_mkdir+0x61b/0xdf0 [ 1298.756649][T15809] ? ext4_init_dot_dotdot+0x520/0x520 [ 1298.762027][T15809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.768273][T15809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.774520][T15809] ? security_inode_permission+0xd5/0x110 [ 1298.780249][T15809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1298.786493][T15809] ? security_inode_mkdir+0xee/0x120 [ 1298.791801][T15809] vfs_mkdir+0x433/0x690 [ 1298.796054][T15809] do_mkdirat+0x234/0x2a0 [ 1298.800390][T15809] ? __ia32_sys_mknod+0xb0/0xb0 [ 1298.805247][T15809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1298.810717][T15809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.816798][T15809] ? do_syscall_64+0x26/0x610 [ 1298.821482][T15809] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1298.826786][T15809] __x64_sys_mkdir+0x5c/0x80 [ 1298.831380][T15809] do_syscall_64+0x103/0x610 [ 1298.835984][T15809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1298.841871][T15809] RIP: 0033:0x457247 [ 1298.845786][T15809] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1298.865388][T15809] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1298.873804][T15809] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1298.881798][T15809] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1298.889782][T15809] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:50:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000110, 0x10400003) 03:50:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1298.897761][T15809] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1298.905740][T15809] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1298.971883][T15809] FAT-fs (loop1): bogus number of reserved sectors [ 1298.991237][ T26] audit: type=1400 audit(2000001033.862:761): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=16051 comm="syz-executor.3" [ 1299.002548][T15809] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat#', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000111, 0x10400003) 03:50:34 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:34 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r1 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='%]proc\x00', 0xfffffffffffffffc) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r1) [ 1299.261998][ T26] audit: type=1400 audit(2000001034.132:762): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=16463 comm="syz-executor.3" [ 1299.292689][T16453] FAULT_INJECTION: forcing a failure. [ 1299.292689][T16453] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.305671][T16453] CPU: 1 PID: 16453 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1299.314793][T16453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.324860][T16453] Call Trace: [ 1299.328366][T16453] dump_stack+0x172/0x1f0 [ 1299.332718][T16453] should_fail.cold+0xa/0x15 [ 1299.337331][T16453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1299.343146][T16453] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1299.348795][T16453] __should_failslab+0x121/0x190 [ 1299.353753][T16453] should_failslab+0x9/0x14 03:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1299.358265][T16453] kmem_cache_alloc+0x47/0x710 [ 1299.363046][T16453] ? ext4_es_scan+0x6f0/0x6f0 [ 1299.367727][T16453] ? do_raw_write_lock+0x124/0x290 [ 1299.372858][T16453] __es_insert_extent+0x2cc/0xf20 [ 1299.377898][T16453] ext4_es_insert_extent+0x2b7/0xa40 [ 1299.383194][T16453] ? ext4_es_scan_clu+0x50/0x50 [ 1299.388057][T16453] ? rcu_read_lock_sched_held+0x110/0x130 [ 1299.393796][T16453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1299.400040][T16453] ? ext4_es_find_extent_range+0xff/0x600 [ 1299.406048][T16453] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1299.411603][T16453] ? ext4_rereserve_cluster+0x240/0x240 [ 1299.417151][T16453] ? ext4_find_extent+0x76e/0x9d0 [ 1299.422189][T16453] ? ext4_find_extent+0x6a6/0x9d0 [ 1299.427219][T16453] ? add_inode_ref+0xa30/0x1e40 [ 1299.432084][T16453] ext4_ext_map_blocks+0x216a/0x4e50 [ 1299.437386][T16453] ? ext4_ext_release+0x10/0x10 [ 1299.442242][T16453] ? perf_trace_lock+0x510/0x510 [ 1299.447200][T16453] ? lock_acquire+0x16f/0x3f0 [ 1299.451880][T16453] ? ext4_map_blocks+0x3fd/0x1a00 [ 1299.456919][T16453] ext4_map_blocks+0xebb/0x1a00 [ 1299.461794][T16453] ? ext4_issue_zeroout+0x190/0x190 [ 1299.467007][T16453] ? kasan_check_write+0x14/0x20 [ 1299.471947][T16453] ? __brelse+0x95/0xb0 [ 1299.476117][T16453] ext4_getblk+0xc4/0x510 [ 1299.480456][T16453] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1299.485489][T16453] ? ext4_free_inode+0x1450/0x1450 [ 1299.490609][T16453] ext4_bread+0x8f/0x230 [ 1299.494855][T16453] ? ext4_getblk+0x510/0x510 [ 1299.499458][T16453] ext4_append+0x155/0x370 [ 1299.503884][T16453] ext4_mkdir+0x61b/0xdf0 [ 1299.508225][T16453] ? ext4_init_dot_dotdot+0x520/0x520 [ 1299.513599][T16453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.519837][T16453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.526084][T16453] ? security_inode_permission+0xd5/0x110 [ 1299.531807][T16453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.538053][T16453] ? security_inode_mkdir+0xee/0x120 [ 1299.543342][T16453] vfs_mkdir+0x433/0x690 [ 1299.547602][T16453] do_mkdirat+0x234/0x2a0 [ 1299.551940][T16453] ? __ia32_sys_mknod+0xb0/0xb0 [ 1299.556795][T16453] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1299.562261][T16453] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.568335][T16453] ? do_syscall_64+0x26/0x610 [ 1299.573014][T16453] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1299.578307][T16453] __x64_sys_mkdir+0x5c/0x80 [ 1299.582903][T16453] do_syscall_64+0x103/0x610 [ 1299.587501][T16453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.593390][T16453] RIP: 0033:0x457247 [ 1299.597299][T16453] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.616914][T16453] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1299.625331][T16453] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1299.633307][T16453] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1299.641286][T16453] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1299.649259][T16453] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:50:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000112, 0x10400003) [ 1299.657248][T16453] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatH', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1299.685688][T16453] FAT-fs (loop1): bogus number of reserved sectors [ 1299.720893][T16453] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73656c662f61de8d8ecb27aa34a95c"], 0x22) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 03:50:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000113, 0x10400003) 03:50:34 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1299.943564][T17153] FAULT_INJECTION: forcing a failure. [ 1299.943564][T17153] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.956435][T17153] CPU: 0 PID: 17153 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1299.965543][T17153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.975601][T17153] Call Trace: [ 1299.978910][T17153] dump_stack+0x172/0x1f0 [ 1299.983266][T17153] should_fail.cold+0xa/0x15 [ 1299.987868][T17153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1299.993678][T17153] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1299.999324][T17153] __should_failslab+0x121/0x190 [ 1300.004270][T17153] should_failslab+0x9/0x14 [ 1300.008795][T17153] kmem_cache_alloc+0x47/0x710 [ 1300.013568][T17153] ? ext4_es_scan+0x6f0/0x6f0 [ 1300.018248][T17153] ? do_raw_write_lock+0x124/0x290 [ 1300.023364][T17153] __es_insert_extent+0x2cc/0xf20 [ 1300.028401][T17153] ext4_es_insert_extent+0x2b7/0xa40 [ 1300.033698][T17153] ? ext4_es_scan_clu+0x50/0x50 [ 1300.038562][T17153] ? rcu_read_lock_sched_held+0x110/0x130 [ 1300.044284][T17153] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1300.050530][T17153] ? ext4_es_find_extent_range+0xff/0x600 [ 1300.056263][T17153] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1300.061821][T17153] ? ext4_rereserve_cluster+0x240/0x240 [ 1300.067366][T17153] ? ext4_find_extent+0x76e/0x9d0 [ 1300.072397][T17153] ? ext4_find_extent+0x6a6/0x9d0 [ 1300.077430][T17153] ext4_ext_map_blocks+0x216a/0x4e50 [ 1300.082736][T17153] ? ext4_ext_release+0x10/0x10 [ 1300.087612][T17153] ? perf_trace_lock+0x510/0x510 [ 1300.092573][T17153] ? lock_acquire+0x16f/0x3f0 [ 1300.097275][T17153] ? ext4_map_blocks+0x3fd/0x1a00 [ 1300.102318][T17153] ext4_map_blocks+0xebb/0x1a00 [ 1300.107185][T17153] ? ext4_issue_zeroout+0x190/0x190 [ 1300.112404][T17153] ? kasan_check_write+0x14/0x20 [ 1300.117344][T17153] ? __brelse+0x95/0xb0 [ 1300.121549][T17153] ext4_getblk+0xc4/0x510 [ 1300.125891][T17153] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1300.130921][T17153] ? ext4_free_inode+0x1450/0x1450 [ 1300.136044][T17153] ext4_bread+0x8f/0x230 [ 1300.140292][T17153] ? ext4_getblk+0x510/0x510 [ 1300.140321][T17153] ext4_append+0x155/0x370 [ 1300.140342][T17153] ext4_mkdir+0x61b/0xdf0 [ 1300.153644][T17153] ? ext4_init_dot_dotdot+0x520/0x520 [ 1300.159060][T17153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.165303][T17153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.171552][T17153] ? security_inode_permission+0xd5/0x110 [ 1300.177277][T17153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.183518][T17153] ? security_inode_mkdir+0xee/0x120 [ 1300.183540][T17153] vfs_mkdir+0x433/0x690 03:50:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x7, 0x800}) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatL', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000114, 0x10400003) [ 1300.183562][T17153] do_mkdirat+0x234/0x2a0 [ 1300.183581][T17153] ? __ia32_sys_mknod+0xb0/0xb0 [ 1300.183598][T17153] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1300.183619][T17153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.183633][T17153] ? do_syscall_64+0x26/0x610 [ 1300.183651][T17153] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1300.183678][T17153] __x64_sys_mkdir+0x5c/0x80 [ 1300.213853][T17153] do_syscall_64+0x103/0x610 [ 1300.213880][T17153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.213893][T17153] RIP: 0033:0x457247 [ 1300.213909][T17153] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1300.213917][T17153] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1300.213933][T17153] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1300.213942][T17153] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 03:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1300.213950][T17153] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1300.213959][T17153] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1300.213968][T17153] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1300.330656][T17153] FAT-fs (loop1): bogus number of reserved sectors 03:50:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) accept$inet6(r1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10100, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x54) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1300.344888][T17153] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:35 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000115, 0x10400003) 03:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat`', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:35 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-self/aTtr/exec\x00'], 0x22) [ 1300.661521][T17996] FAULT_INJECTION: forcing a failure. [ 1300.661521][T17996] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.674312][T17996] CPU: 0 PID: 17996 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1300.683425][T17996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.693483][T17996] Call Trace: [ 1300.696810][T17996] dump_stack+0x172/0x1f0 [ 1300.701158][T17996] should_fail.cold+0xa/0x15 [ 1300.705767][T17996] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:50:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1300.711586][T17996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1300.717309][T17996] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1300.722951][T17996] __should_failslab+0x121/0x190 [ 1300.727898][T17996] should_failslab+0x9/0x14 [ 1300.732408][T17996] kmem_cache_alloc+0x47/0x710 [ 1300.737177][T17996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1300.742896][T17996] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1300.748353][T17996] ? ext4_es_scan+0x6f0/0x6f0 [ 1300.753035][T17996] ? do_raw_write_lock+0x124/0x290 03:50:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="737461636b202f70726f632f746872656162642d73656c662f617474722f65786563006f089f0f92e983c5c768bbcc608d6f045956"], 0x22) 03:50:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000116, 0x10400003) 03:50:35 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1300.758151][T17996] __es_insert_extent+0x2cc/0xf20 [ 1300.763189][T17996] ext4_es_insert_extent+0x2b7/0xa40 [ 1300.768485][T17996] ? ext4_es_scan_clu+0x50/0x50 [ 1300.773355][T17996] ext4_map_blocks+0xb7b/0x1a00 [ 1300.778203][T17996] ? ext4_issue_zeroout+0x190/0x190 [ 1300.783399][T17996] ? kasan_check_write+0x14/0x20 [ 1300.788344][T17996] ? __brelse+0x95/0xb0 [ 1300.792512][T17996] ext4_getblk+0xc4/0x510 [ 1300.796853][T17996] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1300.801889][T17996] ? ext4_free_inode+0x1450/0x1450 [ 1300.801918][T17996] ext4_bread+0x8f/0x230 [ 1300.811251][T17996] ? ext4_getblk+0x510/0x510 [ 1300.815857][T17996] ext4_append+0x155/0x370 [ 1300.820278][T17996] ext4_mkdir+0x61b/0xdf0 [ 1300.820307][T17996] ? ext4_init_dot_dotdot+0x520/0x520 [ 1300.820330][T17996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.836215][T17996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.842464][T17996] ? security_inode_permission+0xd5/0x110 [ 1300.848186][T17996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.854429][T17996] ? security_inode_mkdir+0xee/0x120 [ 1300.859723][T17996] vfs_mkdir+0x433/0x690 [ 1300.863984][T17996] do_mkdirat+0x234/0x2a0 [ 1300.868324][T17996] ? __ia32_sys_mknod+0xb0/0xb0 [ 1300.873179][T17996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1300.878648][T17996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.884717][T17996] ? do_syscall_64+0x26/0x610 [ 1300.889404][T17996] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1300.894696][T17996] __x64_sys_mkdir+0x5c/0x80 [ 1300.899290][T17996] do_syscall_64+0x103/0x610 [ 1300.903892][T17996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.909790][T17996] RIP: 0033:0x457247 [ 1300.913694][T17996] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1300.933302][T17996] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1300.941715][T17996] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1300.949699][T17996] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1300.957675][T17996] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1300.965654][T17996] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1300.973623][T17996] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:35 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000117, 0x10400003) [ 1301.049996][T17996] FAT-fs (loop1): bogus number of reserved sectors 03:50:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfath', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1301.091474][T17996] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:36 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:36 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r3 = dup3(r2, r0, 0x80000) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x5) 03:50:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:36 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000118, 0x10400003) [ 1301.322000][T18727] FAULT_INJECTION: forcing a failure. [ 1301.322000][T18727] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.335598][T18727] CPU: 0 PID: 18727 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1301.344704][T18727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.344753][T18727] Call Trace: [ 1301.344790][T18727] dump_stack+0x172/0x1f0 [ 1301.344816][T18727] should_fail.cold+0xa/0x15 [ 1301.344837][T18727] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1301.344855][T18727] ? __sigqueue_alloc+0x173/0x4d0 [ 1301.344879][T18727] ? find_held_lock+0x35/0x130 [ 1301.382658][T18727] __should_failslab+0x121/0x190 [ 1301.387611][T18727] should_failslab+0x9/0x14 [ 1301.392122][T18727] kmem_cache_alloc+0x47/0x710 [ 1301.396899][T18727] ? kasan_check_read+0x11/0x20 [ 1301.401836][T18727] __sigqueue_alloc+0x268/0x4d0 [ 1301.401858][T18727] __send_signal+0xda3/0x1590 [ 1301.401880][T18727] send_signal+0x49/0xd0 [ 1301.415634][T18727] force_sig_info+0x251/0x310 [ 1301.420325][T18727] force_sig_fault+0xbb/0xf0 [ 1301.424926][T18727] ? force_sigsegv+0x120/0x120 [ 1301.429712][T18727] ? trace_hardirqs_on+0x67/0x230 [ 1301.434772][T18727] __bad_area_nosemaphore+0x332/0x420 [ 1301.440174][T18727] bad_area+0x69/0x80 [ 1301.444167][T18727] __do_page_fault+0x996/0xda0 [ 1301.448949][T18727] do_page_fault+0x71/0x581 [ 1301.453459][T18727] ? page_fault+0x8/0x30 [ 1301.457709][T18727] page_fault+0x1e/0x30 [ 1301.461875][T18727] RIP: 0033:0x451adf 03:50:36 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback}, 0x8) connect$rds(r2, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) write$apparmor_exec(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="736b202ff2a56f23ecac9d5e6561642d73656c662f617474722f657865630000000008c7e157128e2bbe25b76a9ddb988a5c9890b99a454c5eba4dfc1ed77195a96daef8ed056360226b92a7282763ba9a7f4320f887f14bde"], 0x22) [ 1301.465785][T18727] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1301.485402][T18727] RSP: 002b:00007ff1c2082a88 EFLAGS: 00010283 [ 1301.491468][T18727] RAX: 00007ff1c2082b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 1301.499451][T18727] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007ff1c2082b30 [ 1301.507428][T18727] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 1301.515400][T18727] R10: 0000000000000075 R11: 00000000004e0f40 R12: 0000000000000004 [ 1301.523370][T18727] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatl', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1301.567563][T18727] FAT-fs (loop1): bogus number of reserved sectors [ 1301.586586][T18727] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9ffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:36 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000119, 0x10400003) 03:50:36 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:36 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0xe2, "df45522d1f47939424fa9bee39a4ccdb12e3cfaf209fe6b78b55a5fb3330d9db2c7bc7cc75f98738b511b26650358085f77a873136e513806ffc8bfaa33931e159af25c767402e9bc99c607896f620d44a86c7af948b8995f8c3f37507b6ddb45af7d78e6cbac5987d3695841089d1e62e13b5d77e086d21db875fdc86c3aa06a5d8b7c51d6ac6e20b756e1a8599210524c393828fc306b9721659f5ccf339d255a6b2807f6f865409df85cbf8f8c91b592f48b3e8ab82e7d8d90a5af9accf043ecb7f5dd4485262af793a1b8698332268680f8f1054d07def52843e62c08d0ff011"}, &(0x7f00000001c0)=0x106) [ 1301.832409][T19407] FAULT_INJECTION: forcing a failure. [ 1301.832409][T19407] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.845279][T19407] CPU: 0 PID: 19407 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1301.854389][T19407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.864442][T19407] Call Trace: [ 1301.867761][T19407] dump_stack+0x172/0x1f0 [ 1301.872110][T19407] should_fail.cold+0xa/0x15 [ 1301.876713][T19407] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:50:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfaffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1301.882532][T19407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1301.888254][T19407] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1301.893905][T19407] __should_failslab+0x121/0x190 [ 1301.898854][T19407] should_failslab+0x9/0x14 [ 1301.903367][T19407] kmem_cache_alloc+0x47/0x710 [ 1301.908143][T19407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1301.908159][T19407] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1301.908172][T19407] ? ext4_es_scan+0x6f0/0x6f0 [ 1301.908190][T19407] ? do_raw_write_lock+0x124/0x290 [ 1301.908213][T19407] __es_insert_extent+0x2cc/0xf20 [ 1301.934149][T19407] ext4_es_insert_extent+0x2b7/0xa40 [ 1301.939448][T19407] ? ext4_es_scan_clu+0x50/0x50 [ 1301.944317][T19407] ext4_map_blocks+0xb7b/0x1a00 [ 1301.944346][T19407] ? ext4_issue_zeroout+0x190/0x190 [ 1301.944373][T19407] ? kasan_check_write+0x14/0x20 [ 1301.944387][T19407] ? __brelse+0x95/0xb0 [ 1301.944410][T19407] ext4_getblk+0xc4/0x510 [ 1301.944430][T19407] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1301.944451][T19407] ? ext4_free_inode+0x1450/0x1450 [ 1301.944471][T19407] ext4_bread+0x8f/0x230 [ 1301.944488][T19407] ? ext4_getblk+0x510/0x510 [ 1301.944518][T19407] ext4_append+0x155/0x370 [ 1301.991231][T19407] ext4_mkdir+0x61b/0xdf0 [ 1301.995580][T19407] ? ext4_init_dot_dotdot+0x520/0x520 [ 1302.000959][T19407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.007199][T19407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.013449][T19407] ? security_inode_permission+0xd5/0x110 [ 1302.019174][T19407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.025413][T19407] ? security_inode_mkdir+0xee/0x120 03:50:36 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011a, 0x10400003) [ 1302.030700][T19407] vfs_mkdir+0x433/0x690 [ 1302.034973][T19407] do_mkdirat+0x234/0x2a0 [ 1302.039307][T19407] ? __ia32_sys_mknod+0xb0/0xb0 [ 1302.044165][T19407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.049633][T19407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1302.055703][T19407] ? do_syscall_64+0x26/0x610 [ 1302.060383][T19407] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1302.065675][T19407] __x64_sys_mkdir+0x5c/0x80 [ 1302.070274][T19407] do_syscall_64+0x103/0x610 [ 1302.074874][T19407] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:50:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatt', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1302.080772][T19407] RIP: 0033:0x457247 [ 1302.084677][T19407] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1302.104286][T19407] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1302.112695][T19407] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1302.120668][T19407] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1302.128639][T19407] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1302.136605][T19407] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1302.136616][T19407] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1302.159458][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 1302.159473][ T26] audit: type=1400 audit(2000001037.032:769): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=19432 comm="syz-executor.3" 03:50:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9a88) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="737461aef4202f70726f632f7468726561642d73656c662f61745b722f6578656300"], 0x22) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x10000) 03:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011b, 0x10400003) [ 1302.309070][T19407] FAT-fs (loop1): bogus number of reserved sectors [ 1302.367206][T19407] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1302.367805][ T26] audit: type=1400 audit(2000001037.242:770): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=19977 comm="syz-executor.3" 03:50:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x2) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x8, 0x4, 0x3, 0xbd14, 0x0, 0x0, 0x8, 0x4, 0x1, 0x95f4, 0x100000001, 0x3, 0x100000000, 0x0, 0x40, 0x6, 0x9, 0x1, 0x3eb0, 0x1b8, 0x6, 0x6, 0x9a, 0x5, 0x1, 0x4, 0x144c, 0x7, 0x8, 0x1000, 0x100, 0x0, 0x1ff, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x672, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x80, 0x3, 0x5, 0x8, 0x5, 0xffffffff, 0xb4d}, 0x0, 0x3, 0xffffffffffffff9c, 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x5, 0x4000) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400205) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="737461636b202f70726f632f7468726561642d73aa3c3a656c662f610074722f6578"], 0x22) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0)=0x5, 0x4) 03:50:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatz', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:37 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1302.511276][ T26] audit: type=1400 audit(2000001037.382:771): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=2F70726F632F7468726561642D73AA3C3A656C662F61 pid=20142 comm="syz-executor.3" 03:50:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011c, 0x10400003) [ 1302.638215][T20351] FAULT_INJECTION: forcing a failure. [ 1302.638215][T20351] name failslab, interval 1, probability 0, space 0, times 0 03:50:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r2) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) pselect6(0x40, &(0x7f0000001140)={0x4, 0x200, 0x0, 0x1, 0x607a, 0x8cc, 0x6}, &(0x7f0000001180)={0x9, 0x4, 0x7ff, 0x3a5e, 0x6, 0xeb3, 0x969, 0x200}, &(0x7f00000011c0)={0x0, 0xabf, 0x1, 0x1, 0x1, 0xb75, 0xff, 0x6}, &(0x7f0000001200), &(0x7f0000001280)={&(0x7f0000001240)={0x2}, 0x8}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000140)=""/4096) 03:50:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1302.736871][T20351] CPU: 1 PID: 20351 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1302.746030][T20351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.756088][T20351] Call Trace: [ 1302.759391][T20351] dump_stack+0x172/0x1f0 [ 1302.763733][T20351] should_fail.cold+0xa/0x15 [ 1302.768346][T20351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1302.774163][T20351] ? ___might_sleep+0x163/0x280 [ 1302.779025][T20351] __should_failslab+0x121/0x190 [ 1302.779046][T20351] should_failslab+0x9/0x14 [ 1302.779069][T20351] __kmalloc_track_caller+0x2d8/0x740 [ 1302.793852][T20351] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1302.800093][T20351] ? strndup_user+0x77/0xd0 [ 1302.800114][T20351] memdup_user+0x26/0xb0 [ 1302.800131][T20351] strndup_user+0x77/0xd0 [ 1302.800151][T20351] ksys_mount+0x7b/0x150 [ 1302.817421][T20351] __x64_sys_mount+0xbe/0x150 [ 1302.822111][T20351] do_syscall_64+0x103/0x610 [ 1302.826720][T20351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1302.832624][T20351] RIP: 0033:0x45a89a 03:50:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1302.836525][T20351] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1302.856140][T20351] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1302.864556][T20351] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1302.872527][T20351] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 03:50:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1302.880498][T20351] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1302.880509][T20351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1302.880518][T20351] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011d, 0x10400003) [ 1302.976160][T20796] FAT-fs (loop4): bogus number of reserved sectors [ 1303.003455][T20796] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1303.010864][ T26] audit: type=1400 audit(2000001037.882:772): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=20820 comm="syz-executor.3" 03:50:37 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1303.094702][T20796] FAT-fs (loop4): bogus number of reserved sectors [ 1303.113708][T20796] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_out(r0, 0x5460, &(0x7f0000000100)) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8000, 0x642240) getsockopt$bt_sco_SCO_CONNINFO(r3, 0x11, 0x2, &(0x7f0000000280)=""/54, &(0x7f0000000240)=0x36) write$apparmor_exec(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x22) 03:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat8', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1303.196338][T21176] FAULT_INJECTION: forcing a failure. [ 1303.196338][T21176] name failslab, interval 1, probability 0, space 0, times 0 03:50:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011e, 0x10400003) [ 1303.243406][T21176] CPU: 0 PID: 21176 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1303.252555][T21176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.262614][T21176] Call Trace: [ 1303.265924][T21176] dump_stack+0x172/0x1f0 [ 1303.270268][T21176] should_fail.cold+0xa/0x15 [ 1303.274871][T21176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1303.280694][T21176] ? ___might_sleep+0x163/0x280 [ 1303.285558][T21176] __should_failslab+0x121/0x190 03:50:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x63, 0x32000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000080)={0x0, 0xa0, 0x301b, 0x1}) [ 1303.290500][T21176] should_failslab+0x9/0x14 [ 1303.295013][T21176] kmem_cache_alloc_trace+0x2d1/0x760 [ 1303.300399][T21176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1303.306647][T21176] ? _copy_from_user+0xdd/0x150 [ 1303.311509][T21176] copy_mount_options+0x5c/0x440 [ 1303.316449][T21176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1303.322697][T21176] ksys_mount+0xa7/0x150 [ 1303.327422][T21176] __x64_sys_mount+0xbe/0x150 [ 1303.332120][T21176] do_syscall_64+0x103/0x610 [ 1303.336725][T21176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.342629][T21176] RIP: 0033:0x45a89a [ 1303.346527][T21176] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1303.366148][T21176] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1303.374562][T21176] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1303.382536][T21176] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1303.390508][T21176] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1303.398481][T21176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1303.406456][T21176] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011f, 0x10400003) [ 1303.449905][ T26] audit: type=1400 audit(2000001038.322:773): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=21445 comm="syz-executor.3" 03:50:38 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:38 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000000)=0x308008000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x1, @empty, 0x4}, @in={0x2, 0x4e21, @multicast1}], 0x4c) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1303.624871][T21564] FAULT_INJECTION: forcing a failure. [ 1303.624871][T21564] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.680261][T21564] CPU: 1 PID: 21564 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1303.689426][T21564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.699482][T21564] Call Trace: [ 1303.702805][T21564] dump_stack+0x172/0x1f0 [ 1303.707164][T21564] should_fail.cold+0xa/0x15 [ 1303.711786][T21564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1303.717606][T21564] ? ___might_sleep+0x163/0x280 [ 1303.722471][T21564] __should_failslab+0x121/0x190 [ 1303.727424][T21564] should_failslab+0x9/0x14 [ 1303.731937][T21564] kmem_cache_alloc+0x2be/0x710 [ 1303.736797][T21564] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1303.742436][T21564] ? find_held_lock+0x35/0x130 [ 1303.747212][T21564] getname_flags+0xd6/0x5b0 [ 1303.751730][T21564] user_path_at_empty+0x2f/0x50 [ 1303.756607][T21564] do_mount+0x150/0x2c40 [ 1303.760860][T21564] ? copy_mount_options+0x5c/0x440 [ 1303.765977][T21564] ? copy_mount_string+0x40/0x40 [ 1303.770925][T21564] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1303.777174][T21564] ? _copy_from_user+0xdd/0x150 [ 1303.782036][T21564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1303.788285][T21564] ? copy_mount_options+0x30e/0x440 [ 1303.793493][T21564] ksys_mount+0xdb/0x150 [ 1303.797762][T21564] __x64_sys_mount+0xbe/0x150 [ 1303.802462][T21564] do_syscall_64+0x103/0x610 [ 1303.807067][T21564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.812962][T21564] RIP: 0033:0x45a89a [ 1303.816859][T21564] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1303.836465][T21564] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1303.844968][T21564] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1303.852936][T21564] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1303.860909][T21564] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1303.868881][T21564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:50:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat>', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'\tnc=', 'raw', ' hash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1303.876850][T21564] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000120, 0x10400003) 03:50:38 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1304.001817][ T26] audit: type=1400 audit(2000001038.872:774): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=21965 comm="syz-executor.3" 03:50:38 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' \tash=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:39 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000121, 0x10400003) 03:50:39 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4200, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000080)={{0x8000, 0x5}, 'port0\x00', 0x1, 0x10000, 0x9, 0x7, 0x3fffffff8000, 0x800, 0x9, 0x0, 0x0, 0x58}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) creat(&(0x7f0000000140)='./file0\x00', 0x20) 03:50:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat?', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1304.242885][ T26] audit: type=1400 audit(2000001039.112:775): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=22363 comm="syz-executor.3" [ 1304.340940][T22563] FAULT_INJECTION: forcing a failure. [ 1304.340940][T22563] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.391931][T22563] CPU: 0 PID: 22563 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1304.401082][T22563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.411135][T22563] Call Trace: [ 1304.411167][T22563] dump_stack+0x172/0x1f0 [ 1304.411194][T22563] should_fail.cold+0xa/0x15 [ 1304.411216][T22563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1304.418825][T22563] ? ___might_sleep+0x163/0x280 [ 1304.434027][T22563] __should_failslab+0x121/0x190 [ 1304.438974][T22563] should_failslab+0x9/0x14 [ 1304.443482][T22563] kmem_cache_alloc_trace+0x2d1/0x760 [ 1304.448858][T22563] ? preempt_schedule+0x4b/0x60 [ 1304.453712][T22563] ? ___preempt_schedule+0x16/0x18 [ 1304.458986][T22563] alloc_fs_context+0x5a/0x640 [ 1304.463768][T22563] fs_context_for_mount+0x25/0x30 [ 1304.468808][T22563] do_mount+0x13d7/0x2c40 [ 1304.473149][T22563] ? copy_mount_string+0x40/0x40 [ 1304.478099][T22563] ? _copy_from_user+0xdd/0x150 [ 1304.482961][T22563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1304.489200][T22563] ? copy_mount_options+0x30e/0x440 [ 1304.494409][T22563] ksys_mount+0xdb/0x150 [ 1304.498666][T22563] __x64_sys_mount+0xbe/0x150 [ 1304.503357][T22563] do_syscall_64+0x103/0x610 [ 1304.507962][T22563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.513853][T22563] RIP: 0033:0x45a89a [ 1304.517763][T22563] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' ha%h=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1304.537379][T22563] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1304.545806][T22563] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1304.553787][T22563] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1304.561768][T22563] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1304.569760][T22563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1304.577739][T22563] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='stack /proc/thread-selfexec\x00\x00\x00\x00\x00\x00\x00'], 0x22) 03:50:39 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000122, 0x10400003) [ 1304.647241][ T26] audit: type=1400 audit(2000001039.522:776): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-selfexec" pid=22803 comm="syz-executor.3" 03:50:39 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x800}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r2, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:39 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat@', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hadh=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1304.828806][ T26] audit: type=1400 audit(2000001039.702:777): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=23099 comm="syz-executor.3" 03:50:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x7, 0x20, 0x8000, 0x2}, &(0x7f0000000540)=0x18) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000005c0)) connect$bt_l2cap(r1, &(0x7f0000000640)={0x1f, 0xffffffffffffffb5, {0x40, 0xff, 0x13d, 0x543, 0x4, 0x6}, 0x0, 0x100}, 0xe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000580)={r2, 0x3}, 0x8) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x5, 0x70, 0x80000001, 0xffff, 0x0, 0x8000, 0x0, 0x7, 0x12002, 0x4, 0x8, 0xffffffff, 0x6985a587, 0x2, 0x8, 0x400000, 0x7fffffff, 0x7fff, 0x2, 0x2, 0x5, 0x4, 0x3f, 0x6, 0x100, 0x3, 0x20, 0x0, 0xdf, 0x6, 0x81, 0x5, 0x48, 0x4, 0x3ff, 0x8000000000000, 0x8001, 0xfffffffffffffff7, 0x0, 0x2ea, 0x4, @perf_config_ext={0x8, 0x9}, 0x500, 0x1, 0x1, 0x0, 0x6, 0x5, 0x8}, r1, 0x4, 0xffffffffffffff9c, 0x8) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)="45b9fcd330d4fedd461b82f5bf198518c9d21fa90497162e6ebf966cf7b168fc63a13014b61ac7a9ae20cac67f4b4023f467e45b9a42426cd2dc8e377e715f872225e9928fd1b831497fd65c1128f4d16cfc970ef5a434564e493eafc26044c9b2d49dc2b8864c779b7e8f5e5e4a01773a5933d37d894635064adb5550725a6a18c68fb1aa28ef3467d343934b76536eb61e166876aed3ee935b7c485db2f5d4d091a26d6698354c48c1f9721b046ae22230d34767c741a0", 0xb8, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000200)={r4, 0x7}, &(0x7f0000000240)={'enc=', 'oaep', ' hash=', {'streebog256\x00'}}, &(0x7f00000002c0)="8b7102a67dc0adbfbb461df60251cdd241c1e2c07af3af4e823b9caa4623a760f52ae43059ec6e87ff3395b65e91f9a67cbcd6a67ad0b76ee8d56df9068efb43de639330e5a8f17dedcc6c8537282c6bf1f3c12ed757816c78c23678fe49d0295ab3c59abf689fd5738b63aa573c1869c0999c39935fc18e15cab2d0d57e05f5aa60a96fb6714a4f7d7c1b4a0127a68588d55f07cd702cf5a18e8d09708334159533fda282108a9e4192c85bb2e5ea9f7a07fb644b95960ad7086e", &(0x7f0000000380)="d2e2938a7b3ca03e60af7cfa844e643867d8d838054a35107f2fce0ae67144d925a4fb3d93fe771f88c83ebb398111bff921a3385030d4fd2d75372c12f854471a0549c4ad6e1c680754278f3e32caf98261cbf4eed05506f41f69f6fefc992042250fc39b2ea33635484ff7a04a959b83efab7b056b439c63ea9cbea2b451da6c2800668d0a346727ac4672348f8ee83e0ca627211f00f8d7bc888869") r5 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000600)=0x5, 0x4) ioctl$NBD_SET_SOCK(r1, 0xab00, r3) write$apparmor_exec(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="737461b66443be453001bbd258636b202f70726f632f7468696561642d73656c2c2f617474722f657865630043777c15bf6e1e9a7cdb2e5ae9d1338eec57f5d8895f2194e1af106349bd8cd0122e"], 0x22) 03:50:39 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000123, 0x10400003) [ 1304.965693][T23294] Unknown ioctl 28692 03:50:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1304.988555][T23294] Unknown ioctl 21525 [ 1305.002954][T23294] Unknown ioctl 43776 [ 1305.007489][T23298] FAULT_INJECTION: forcing a failure. [ 1305.007489][T23298] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.020636][ T26] audit: type=1400 audit(2000001039.892:778): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=23293 comm="syz-executor.3" [ 1305.110558][T23298] CPU: 0 PID: 23298 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1305.119723][T23298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.129798][T23298] Call Trace: [ 1305.133103][T23298] dump_stack+0x172/0x1f0 [ 1305.137448][T23298] should_fail.cold+0xa/0x15 [ 1305.142045][T23298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1305.147863][T23298] ? ___might_sleep+0x163/0x280 [ 1305.152725][T23298] __should_failslab+0x121/0x190 [ 1305.157677][T23298] should_failslab+0x9/0x14 [ 1305.162190][T23298] kmem_cache_alloc+0x2be/0x710 [ 1305.167041][T23298] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1305.172683][T23298] ? find_held_lock+0x35/0x130 [ 1305.177456][T23298] getname_flags+0xd6/0x5b0 [ 1305.181969][T23298] user_path_at_empty+0x2f/0x50 [ 1305.181993][T23298] do_mount+0x150/0x2c40 [ 1305.182011][T23298] ? copy_mount_options+0x5c/0x440 [ 1305.196197][T23298] ? copy_mount_string+0x40/0x40 [ 1305.201165][T23298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.201199][T23298] ? _copy_from_user+0xdd/0x150 [ 1305.201245][T23298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1305.218522][T23298] ? copy_mount_options+0x30e/0x440 [ 1305.223733][T23298] ksys_mount+0xdb/0x150 [ 1305.228012][T23298] __x64_sys_mount+0xbe/0x150 [ 1305.232705][T23298] do_syscall_64+0x103/0x610 [ 1305.237409][T23298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.243303][T23298] RIP: 0033:0x45a89a [ 1305.247202][T23298] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1305.266810][T23298] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1305.275226][T23298] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1305.283198][T23298] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1305.291166][T23298] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1305.299139][T23298] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:50:40 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000011d, 0x10400003) 03:50:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatA', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000124, 0x10400003) [ 1305.307113][T23298] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:40 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000114, 0x10400003) 03:50:40 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' haoh=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatB', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hauh=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000125, 0x10400003) 03:50:40 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010f, 0x10400003) 03:50:40 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:40 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1305.836044][T24163] FAULT_INJECTION: forcing a failure. [ 1305.836044][T24163] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.873302][T24163] CPU: 1 PID: 24163 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1305.882434][T24163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.892488][T24163] Call Trace: [ 1305.895798][T24163] dump_stack+0x172/0x1f0 [ 1305.900154][T24163] should_fail.cold+0xa/0x15 [ 1305.904761][T24163] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1305.910576][T24163] ? ___might_sleep+0x163/0x280 [ 1305.915433][T24163] __should_failslab+0x121/0x190 [ 1305.920377][T24163] should_failslab+0x9/0x14 [ 1305.924891][T24163] __kmalloc_track_caller+0x2d8/0x740 [ 1305.930314][T24163] ? vfs_parse_fs_string+0xe8/0x170 03:50:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000126, 0x10400003) [ 1305.935528][T24163] kmemdup_nul+0x31/0xa0 [ 1305.939792][T24163] vfs_parse_fs_string+0xe8/0x170 [ 1305.944825][T24163] ? vfs_parse_fs_param+0x510/0x510 [ 1305.950036][T24163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1305.956289][T24163] ? alloc_fs_context+0x3bb/0x640 [ 1305.961331][T24163] do_mount+0x6e9/0x2c40 [ 1305.965589][T24163] ? copy_mount_string+0x40/0x40 [ 1305.970535][T24163] ? _copy_from_user+0xdd/0x150 [ 1305.975394][T24163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1305.981635][T24163] ? copy_mount_options+0x30e/0x440 03:50:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000127, 0x10400003) [ 1305.986849][T24163] ksys_mount+0xdb/0x150 [ 1305.991100][T24163] __x64_sys_mount+0xbe/0x150 [ 1305.995793][T24163] do_syscall_64+0x103/0x610 [ 1306.000403][T24163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.006305][T24163] RIP: 0033:0x45a89a [ 1306.010212][T24163] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000128, 0x10400003) 03:50:40 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' haxh=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:40 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010e, 0x10400003) [ 1306.029823][T24163] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1306.038242][T24163] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1306.046218][T24163] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1306.054190][T24163] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1306.062162][T24163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1306.070134][T24163] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:41 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatC', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:41 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000010e, 0x10400003) 03:50:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000129, 0x10400003) 03:50:41 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' has\t=', {'wp256-generic\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1306.357639][T24869] FAULT_INJECTION: forcing a failure. [ 1306.357639][T24869] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.374269][T24869] CPU: 1 PID: 24869 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1306.383389][T24869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.393447][T24869] Call Trace: [ 1306.396762][T24869] dump_stack+0x172/0x1f0 [ 1306.401105][T24869] should_fail.cold+0xa/0x15 03:50:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1306.405706][T24869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1306.411519][T24869] ? ___might_sleep+0x163/0x280 [ 1306.416390][T24869] __should_failslab+0x121/0x190 [ 1306.421343][T24869] should_failslab+0x9/0x14 [ 1306.425858][T24869] kmem_cache_alloc_trace+0x2d1/0x760 [ 1306.431247][T24869] alloc_fs_context+0x5a/0x640 [ 1306.436033][T24869] fs_context_for_mount+0x25/0x30 [ 1306.441066][T24869] do_mount+0x13d7/0x2c40 [ 1306.445420][T24869] ? copy_mount_string+0x40/0x40 [ 1306.450372][T24869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:50:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-g\tneric\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1306.456622][T24869] ? copy_mount_options+0x30e/0x440 [ 1306.462366][T24869] ksys_mount+0xdb/0x150 [ 1306.466621][T24869] __x64_sys_mount+0xbe/0x150 [ 1306.471320][T24869] do_syscall_64+0x103/0x610 [ 1306.475928][T24869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.481824][T24869] RIP: 0033:0x45a89a [ 1306.485720][T24869] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) [ 1306.505328][T24869] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1306.513743][T24869] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1306.521735][T24869] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1306.529723][T24869] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1306.537702][T24869] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1306.545678][T24869] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012a, 0x10400003) 03:50:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatD', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r6, &(0x7f0000000040)={'stack ', '/proc/thread-self/attr/exec\x00'}, 0x22) 03:50:41 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-gen\tric\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:41 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000003800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:50:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012b, 0x10400003) 03:50:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatE', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1306.929311][T25505] FAULT_INJECTION: forcing a failure. [ 1306.929311][T25505] name failslab, interval 1, probability 0, space 0, times 0 03:50:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) [ 1307.004669][T25505] CPU: 0 PID: 25505 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1307.013845][T25505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.013854][T25505] Call Trace: [ 1307.013885][T25505] dump_stack+0x172/0x1f0 [ 1307.013912][T25505] should_fail.cold+0xa/0x15 [ 1307.013935][T25505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1307.013963][T25505] ? ___might_sleep+0x163/0x280 [ 1307.013988][T25505] __should_failslab+0x121/0x190 [ 1307.014008][T25505] should_failslab+0x9/0x14 [ 1307.014038][T25505] __kmalloc_track_caller+0x2d8/0x740 [ 1307.014068][T25505] ? vfs_parse_fs_string+0xe8/0x170 [ 1307.042092][T25505] kmemdup_nul+0x31/0xa0 [ 1307.042117][T25505] vfs_parse_fs_string+0xe8/0x170 [ 1307.042136][T25505] ? vfs_parse_fs_param+0x510/0x510 [ 1307.042163][T25505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.087595][T25505] ? alloc_fs_context+0x3bb/0x640 [ 1307.092633][T25505] do_mount+0x6e9/0x2c40 [ 1307.096892][T25505] ? copy_mount_string+0x40/0x40 03:50:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012c, 0x10400003) [ 1307.101846][T25505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.108108][T25505] ? copy_mount_options+0x30e/0x440 [ 1307.113313][T25505] ksys_mount+0xdb/0x150 [ 1307.117565][T25505] __x64_sys_mount+0xbe/0x150 [ 1307.122251][T25505] do_syscall_64+0x103/0x610 [ 1307.126853][T25505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.132745][T25505] RIP: 0033:0x45a89a 03:50:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1307.136674][T25505] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1307.156282][T25505] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1307.164699][T25505] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1307.172671][T25505] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1307.180648][T25505] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1307.188618][T25505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1307.196585][T25505] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:42 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r5 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r5, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:50:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatF', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:42 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012d, 0x10400003) 03:50:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:42 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r4 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r4, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x36d) [ 1307.506955][T26068] FAULT_INJECTION: forcing a failure. [ 1307.506955][T26068] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.543378][T26068] CPU: 1 PID: 26068 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1307.552517][T26068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.562570][T26068] Call Trace: [ 1307.565876][T26068] dump_stack+0x172/0x1f0 [ 1307.570219][T26068] should_fail.cold+0xa/0x15 [ 1307.574821][T26068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1307.580641][T26068] ? ___might_sleep+0x163/0x280 [ 1307.585504][T26068] __should_failslab+0x121/0x190 [ 1307.590458][T26068] should_failslab+0x9/0x14 [ 1307.594967][T26068] kmem_cache_alloc_trace+0x2d1/0x760 [ 1307.600354][T26068] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1307.606170][T26068] ? rcu_read_lock_sched_held+0x110/0x130 [ 1307.611897][T26068] ? kmem_cache_alloc_trace+0x354/0x760 [ 1307.617463][T26068] legacy_init_fs_context+0x48/0xe0 [ 1307.622666][T26068] ? generic_parse_monolithic+0x200/0x200 [ 1307.628385][T26068] alloc_fs_context+0x365/0x640 [ 1307.633244][T26068] fs_context_for_mount+0x25/0x30 [ 1307.638276][T26068] do_mount+0x13d7/0x2c40 [ 1307.642629][T26068] ? copy_mount_string+0x40/0x40 [ 1307.647589][T26068] ? _copy_from_user+0xdd/0x150 [ 1307.652465][T26068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.658710][T26068] ? copy_mount_options+0x30e/0x440 [ 1307.663935][T26068] ksys_mount+0xdb/0x150 [ 1307.668186][T26068] __x64_sys_mount+0xbe/0x150 [ 1307.672878][T26068] do_syscall_64+0x103/0x610 [ 1307.677481][T26068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.683378][T26068] RIP: 0033:0x45a89a [ 1307.687279][T26068] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012e, 0x10400003) 03:50:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000012f, 0x10400003) 03:50:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1307.706901][T26068] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1307.715317][T26068] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1307.723315][T26068] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1307.731295][T26068] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1307.739278][T26068] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1307.747263][T26068] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r4 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r4, 0x0, 0xb, &(0x7f0000000100)=""/4096) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) 03:50:42 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatG', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:42 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000130, 0x10400003) 03:50:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) r3 = semget(0x1, 0x1, 0x9fa6773000481032) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000100)=""/4096) [ 1308.165307][T26650] FAULT_INJECTION: forcing a failure. [ 1308.165307][T26650] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.223319][T26650] CPU: 0 PID: 26650 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1308.232470][T26650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.242531][T26650] Call Trace: [ 1308.245843][T26650] dump_stack+0x172/0x1f0 [ 1308.250197][T26650] should_fail.cold+0xa/0x15 [ 1308.254814][T26650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1308.260637][T26650] ? ___might_sleep+0x163/0x280 [ 1308.265537][T26650] __should_failslab+0x121/0x190 [ 1308.270488][T26650] should_failslab+0x9/0x14 [ 1308.274999][T26650] kmem_cache_alloc+0x2be/0x710 [ 1308.279871][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.286117][T26650] ? should_fail+0x1de/0x852 [ 1308.290728][T26650] getname_kernel+0x53/0x370 [ 1308.295337][T26650] kern_path+0x20/0x40 [ 1308.299453][T26650] lookup_bdev.part.0+0x7b/0x1b0 [ 1308.304399][T26650] ? blkdev_open+0x290/0x290 [ 1308.308996][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.315245][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:50:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1308.321492][T26650] ? vfs_parse_fs_string+0x111/0x170 [ 1308.326800][T26650] blkdev_get_by_path+0x81/0x130 [ 1308.331741][T26650] mount_bdev+0x5d/0x3c0 [ 1308.336000][T26650] ? vfat_mount+0x40/0x40 [ 1308.340330][T26650] ? vfs_parse_fs_string+0x116/0x170 [ 1308.345621][T26650] vfat_mount+0x35/0x40 [ 1308.349798][T26650] ? setup+0x120/0x120 [ 1308.353876][T26650] legacy_get_tree+0xf2/0x200 [ 1308.358571][T26650] vfs_get_tree+0x123/0x450 [ 1308.363085][T26650] do_mount+0x1436/0x2c40 [ 1308.367435][T26650] ? copy_mount_string+0x40/0x40 03:50:43 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000131, 0x10400003) [ 1308.372379][T26650] ? _copy_from_user+0xdd/0x150 [ 1308.372420][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.372435][T26650] ? copy_mount_options+0x30e/0x440 [ 1308.372455][T26650] ksys_mount+0xdb/0x150 [ 1308.372473][T26650] __x64_sys_mount+0xbe/0x150 [ 1308.397622][T26650] do_syscall_64+0x103/0x610 [ 1308.402228][T26650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.408125][T26650] RIP: 0033:0x45a89a [ 1308.412025][T26650] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1308.431634][T26650] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1308.440048][T26650] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1308.448023][T26650] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1308.456000][T26650] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1308.464182][T26650] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:50:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0xea6}, 0x10) semget(0x1, 0x1, 0x9fa6773000481032) [ 1308.472155][T26650] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:43 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatH', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:43 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:43 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000132, 0x10400003) [ 1308.720833][T27195] FAULT_INJECTION: forcing a failure. [ 1308.720833][T27195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1308.734081][T27195] CPU: 1 PID: 27195 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1308.743190][T27195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.753238][T27195] Call Trace: [ 1308.756539][T27195] dump_stack+0x172/0x1f0 [ 1308.760886][T27195] should_fail.cold+0xa/0x15 [ 1308.765489][T27195] ? unwind_get_return_address+0x61/0xa0 [ 1308.771127][T27195] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1308.776944][T27195] ? mark_held_locks+0xf0/0xf0 [ 1308.776969][T27195] should_fail_alloc_page+0x50/0x60 [ 1308.776991][T27195] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1308.786964][T27195] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1308.786979][T27195] ? find_held_lock+0x35/0x130 [ 1308.787003][T27195] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1308.808603][T27195] cache_grow_begin+0x9c/0x850 [ 1308.813372][T27195] ? getname_kernel+0x53/0x370 [ 1308.818144][T27195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1308.824423][T27195] kmem_cache_alloc+0x645/0x710 [ 1308.829274][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.835525][T27195] ? should_fail+0x1de/0x852 [ 1308.840125][T27195] getname_kernel+0x53/0x370 [ 1308.844720][T27195] kern_path+0x20/0x40 [ 1308.848812][T27195] lookup_bdev.part.0+0x7b/0x1b0 [ 1308.853768][T27195] ? blkdev_open+0x290/0x290 [ 1308.858364][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.864610][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.870862][T27195] ? vfs_parse_fs_string+0x111/0x170 [ 1308.876158][T27195] blkdev_get_by_path+0x81/0x130 [ 1308.881117][T27195] mount_bdev+0x5d/0x3c0 [ 1308.885380][T27195] ? vfat_mount+0x40/0x40 [ 1308.889716][T27195] ? vfs_parse_fs_string+0x116/0x170 [ 1308.895016][T27195] vfat_mount+0x35/0x40 [ 1308.899172][T27195] ? setup+0x120/0x120 [ 1308.903244][T27195] legacy_get_tree+0xf2/0x200 [ 1308.907928][T27195] vfs_get_tree+0x123/0x450 [ 1308.912439][T27195] do_mount+0x1436/0x2c40 [ 1308.916787][T27195] ? copy_mount_string+0x40/0x40 [ 1308.921738][T27195] ? _copy_from_user+0xdd/0x150 [ 1308.926609][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.932848][T27195] ? copy_mount_options+0x30e/0x440 [ 1308.938055][T27195] ksys_mount+0xdb/0x150 [ 1308.942307][T27195] __x64_sys_mount+0xbe/0x150 [ 1308.946995][T27195] do_syscall_64+0x103/0x610 [ 1308.951595][T27195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.957489][T27195] RIP: 0033:0x45a89a [ 1308.961400][T27195] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1308.981007][T27195] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1308.989419][T27195] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1308.997391][T27195] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1309.005362][T27195] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1309.013344][T27195] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:50:43 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1309.021331][T27195] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1309.050082][T27195] FAT-fs (loop1): bogus number of reserved sectors 03:50:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1309.099463][T27195] FAT-fs (loop1): Can't find a valid FAT filesystem 03:50:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5, 0x4) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000133, 0x10400003) 03:50:44 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfatI', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1309.381170][T27786] FAULT_INJECTION: forcing a failure. [ 1309.381170][T27786] name failslab, interval 1, probability 0, space 0, times 0 03:50:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000134, 0x10400003) [ 1309.424306][T27786] CPU: 1 PID: 27786 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1309.433458][T27786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.443518][T27786] Call Trace: [ 1309.446828][T27786] dump_stack+0x172/0x1f0 [ 1309.451181][T27786] should_fail.cold+0xa/0x15 [ 1309.455801][T27786] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1309.461627][T27786] ? ___might_sleep+0x163/0x280 [ 1309.466491][T27786] __should_failslab+0x121/0x190 [ 1309.471440][T27786] should_failslab+0x9/0x14 [ 1309.475949][T27786] __kmalloc+0x2dc/0x740 [ 1309.480205][T27786] ? lockdep_init_map+0x10c/0x5b0 [ 1309.485239][T27786] ? prealloc_shrinker+0xa6/0x350 [ 1309.490273][T27786] prealloc_shrinker+0xa6/0x350 [ 1309.495141][T27786] alloc_super+0x710/0x890 [ 1309.499566][T27786] ? test_single_super+0x10/0x10 [ 1309.504511][T27786] sget_userns+0xf1/0x560 [ 1309.508847][T27786] ? kill_litter_super+0x60/0x60 [ 1309.513794][T27786] ? test_single_super+0x10/0x10 [ 1309.518733][T27786] ? kill_litter_super+0x60/0x60 [ 1309.523684][T27786] sget+0x10c/0x150 [ 1309.527501][T27786] mount_bdev+0xff/0x3c0 [ 1309.531764][T27786] ? vfat_mount+0x40/0x40 [ 1309.536105][T27786] vfat_mount+0x35/0x40 [ 1309.540269][T27786] ? setup+0x120/0x120 [ 1309.544356][T27786] legacy_get_tree+0xf2/0x200 [ 1309.549044][T27786] vfs_get_tree+0x123/0x450 [ 1309.553555][T27786] do_mount+0x1436/0x2c40 [ 1309.557899][T27786] ? copy_mount_string+0x40/0x40 [ 1309.562852][T27786] ? _copy_from_user+0xdd/0x150 [ 1309.567714][T27786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:50:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000135, 0x10400003) [ 1309.573967][T27786] ? copy_mount_options+0x30e/0x440 [ 1309.579173][T27786] ksys_mount+0xdb/0x150 [ 1309.583421][T27786] __x64_sys_mount+0xbe/0x150 [ 1309.588111][T27786] do_syscall_64+0x103/0x610 [ 1309.592714][T27786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.598614][T27786] RIP: 0033:0x45a89a [ 1309.602516][T27786] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1309.622120][T27786] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1309.630538][T27786] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1309.638513][T27786] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1309.646485][T27786] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1309.654455][T27786] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1309.662430][T27786] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000136, 0x10400003) 03:50:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:44 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1309.908288][T28325] FAT-fs (loop4): bogus number of reserved sectors [ 1309.937321][T28325] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1309.974320][T28382] FAULT_INJECTION: forcing a failure. [ 1309.974320][T28382] name failslab, interval 1, probability 0, space 0, times 0 03:50:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000137, 0x10400003) [ 1310.025399][T28325] FAT-fs (loop4): bogus number of reserved sectors [ 1310.048001][T28325] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1310.066867][T28382] CPU: 1 PID: 28382 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1310.076081][T28382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.086221][T28382] Call Trace: [ 1310.089524][T28382] dump_stack+0x172/0x1f0 [ 1310.093863][T28382] should_fail.cold+0xa/0x15 [ 1310.093884][T28382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1310.093907][T28382] ? ___might_sleep+0x163/0x280 [ 1310.093929][T28382] __should_failslab+0x121/0x190 [ 1310.093950][T28382] should_failslab+0x9/0x14 [ 1310.118567][T28382] kmem_cache_alloc_node_trace+0x270/0x720 [ 1310.124390][T28382] __kmalloc_node+0x3d/0x70 [ 1310.128900][T28382] kvmalloc_node+0x68/0x100 [ 1310.133410][T28382] __list_lru_init+0x4a6/0x6e0 [ 1310.138179][T28382] alloc_super+0x762/0x890 [ 1310.142601][T28382] ? test_single_super+0x10/0x10 [ 1310.147550][T28382] sget_userns+0xf1/0x560 [ 1310.151882][T28382] ? kill_litter_super+0x60/0x60 [ 1310.156825][T28382] ? test_single_super+0x10/0x10 [ 1310.161768][T28382] ? kill_litter_super+0x60/0x60 [ 1310.166706][T28382] sget+0x10c/0x150 [ 1310.170521][T28382] mount_bdev+0xff/0x3c0 [ 1310.174776][T28382] ? vfat_mount+0x40/0x40 [ 1310.179114][T28382] vfat_mount+0x35/0x40 [ 1310.183272][T28382] ? setup+0x120/0x120 [ 1310.187358][T28382] legacy_get_tree+0xf2/0x200 [ 1310.192037][T28382] vfs_get_tree+0x123/0x450 [ 1310.196544][T28382] do_mount+0x1436/0x2c40 [ 1310.200881][T28382] ? copy_mount_string+0x40/0x40 [ 1310.205826][T28382] ? _copy_from_user+0xdd/0x150 [ 1310.210686][T28382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1310.216927][T28382] ? copy_mount_options+0x30e/0x440 [ 1310.222133][T28382] ksys_mount+0xdb/0x150 [ 1310.226379][T28382] __x64_sys_mount+0xbe/0x150 [ 1310.231065][T28382] do_syscall_64+0x103/0x610 [ 1310.235666][T28382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.241563][T28382] RIP: 0033:0x45a89a [ 1310.245459][T28382] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1310.265060][T28382] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:50:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) semget(0x1, 0x1, 0x9fa6773000481032) [ 1310.273471][T28382] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1310.281443][T28382] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1310.289415][T28382] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1310.297384][T28382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1310.305354][T28382] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:45 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1310.518073][T28794] FAT-fs (loop4): bogus number of reserved sectors 03:50:45 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000138, 0x10400003) 03:50:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1310.591098][T28794] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1310.680160][T28794] FAT-fs (loop4): bogus number of reserved sectors [ 1310.710382][T28794] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:45 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000139, 0x10400003) 03:50:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1310.804698][T28885] FAULT_INJECTION: forcing a failure. [ 1310.804698][T28885] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.842374][T28885] CPU: 0 PID: 28885 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1310.851508][T28885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.861559][T28885] Call Trace: [ 1310.864858][T28885] dump_stack+0x172/0x1f0 [ 1310.869215][T28885] should_fail.cold+0xa/0x15 [ 1310.873818][T28885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1310.879634][T28885] ? ___might_sleep+0x163/0x280 [ 1310.884493][T28885] __should_failslab+0x121/0x190 [ 1310.889437][T28885] should_failslab+0x9/0x14 [ 1310.893942][T28885] kmem_cache_alloc_trace+0x2d1/0x760 [ 1310.899322][T28885] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1310.905136][T28885] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1310.905161][T28885] __list_lru_init+0x3cf/0x6e0 [ 1310.905191][T28885] alloc_super+0x762/0x890 [ 1310.915580][T28885] ? test_single_super+0x10/0x10 [ 1310.915598][T28885] sget_userns+0xf1/0x560 [ 1310.915612][T28885] ? kill_litter_super+0x60/0x60 [ 1310.915629][T28885] ? test_single_super+0x10/0x10 [ 1310.915643][T28885] ? kill_litter_super+0x60/0x60 [ 1310.915657][T28885] sget+0x10c/0x150 [ 1310.915677][T28885] mount_bdev+0xff/0x3c0 [ 1310.915694][T28885] ? vfat_mount+0x40/0x40 [ 1310.915714][T28885] vfat_mount+0x35/0x40 [ 1310.960561][T28885] ? setup+0x120/0x120 [ 1310.964640][T28885] legacy_get_tree+0xf2/0x200 [ 1310.969326][T28885] vfs_get_tree+0x123/0x450 [ 1310.973836][T28885] do_mount+0x1436/0x2c40 [ 1310.978173][T28885] ? copy_mount_string+0x40/0x40 [ 1310.983112][T28885] ? _copy_from_user+0xdd/0x150 [ 1310.987976][T28885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1310.994216][T28885] ? copy_mount_options+0x30e/0x440 [ 1310.999421][T28885] ksys_mount+0xdb/0x150 [ 1311.003672][T28885] __x64_sys_mount+0xbe/0x150 [ 1311.008356][T28885] do_syscall_64+0x103/0x610 [ 1311.012958][T28885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.018847][T28885] RIP: 0033:0x45a89a [ 1311.022742][T28885] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1311.043919][T28885] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:50:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1311.052336][T28885] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1311.060312][T28885] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1311.068287][T28885] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1311.076258][T28885] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1311.084232][T28885] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1311.180538][T29382] FAT-fs (loop4): bogus number of reserved sectors 03:50:46 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:46 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013a, 0x10400003) 03:50:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1311.222554][T29382] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:46 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1311.340641][T29576] FAULT_INJECTION: forcing a failure. [ 1311.340641][T29576] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.354847][T29382] FAT-fs (loop4): bogus number of reserved sectors [ 1311.372231][T29382] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1311.382435][T29576] CPU: 1 PID: 29576 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1311.391558][T29576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.401615][T29576] Call Trace: [ 1311.405359][T29576] dump_stack+0x172/0x1f0 [ 1311.409730][T29576] should_fail.cold+0xa/0x15 [ 1311.414348][T29576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1311.420181][T29576] ? ___might_sleep+0x163/0x280 [ 1311.425053][T29576] __should_failslab+0x121/0x190 [ 1311.430003][T29576] should_failslab+0x9/0x14 [ 1311.434528][T29576] kmem_cache_alloc_node_trace+0x270/0x720 [ 1311.440364][T29576] __kmalloc_node+0x3d/0x70 [ 1311.444883][T29576] kvmalloc_node+0x68/0x100 [ 1311.449402][T29576] __list_lru_init+0x4a6/0x6e0 [ 1311.454183][T29576] alloc_super+0x762/0x890 [ 1311.458610][T29576] ? test_single_super+0x10/0x10 [ 1311.463557][T29576] sget_userns+0xf1/0x560 [ 1311.467888][T29576] ? kill_litter_super+0x60/0x60 [ 1311.472831][T29576] ? test_single_super+0x10/0x10 [ 1311.477784][T29576] ? kill_litter_super+0x60/0x60 [ 1311.482734][T29576] sget+0x10c/0x150 [ 1311.486564][T29576] mount_bdev+0xff/0x3c0 03:50:46 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013b, 0x10400003) [ 1311.490816][T29576] ? vfat_mount+0x40/0x40 [ 1311.495168][T29576] vfat_mount+0x35/0x40 [ 1311.499329][T29576] ? setup+0x120/0x120 [ 1311.503405][T29576] legacy_get_tree+0xf2/0x200 [ 1311.508093][T29576] vfs_get_tree+0x123/0x450 [ 1311.512611][T29576] do_mount+0x1436/0x2c40 [ 1311.516961][T29576] ? copy_mount_string+0x40/0x40 [ 1311.521920][T29576] ? _copy_from_user+0xdd/0x150 [ 1311.526790][T29576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1311.533037][T29576] ? copy_mount_options+0x30e/0x440 [ 1311.538246][T29576] ksys_mount+0xdb/0x150 [ 1311.542509][T29576] __x64_sys_mount+0xbe/0x150 [ 1311.547199][T29576] do_syscall_64+0x103/0x610 [ 1311.551805][T29576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.557705][T29576] RIP: 0033:0x45a89a [ 1311.561604][T29576] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1311.581224][T29576] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:50:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1311.589635][T29576] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1311.597605][T29576] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1311.605613][T29576] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1311.613595][T29576] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1311.621580][T29576] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:46 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x2, 0x4) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:46 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013c, 0x10400003) 03:50:46 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1311.809996][T30194] FAT-fs (loop4): bogus number of reserved sectors [ 1311.824749][T30194] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1311.908215][T30194] FAT-fs (loop4): bogus number of reserved sectors [ 1311.915265][T30194] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1311.986118][T30375] FAULT_INJECTION: forcing a failure. [ 1311.986118][T30375] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.019707][T30375] CPU: 0 PID: 30375 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 03:50:46 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1312.028846][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.038903][T30375] Call Trace: [ 1312.042213][T30375] dump_stack+0x172/0x1f0 [ 1312.046567][T30375] should_fail.cold+0xa/0x15 [ 1312.051168][T30375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1312.056986][T30375] ? ___might_sleep+0x163/0x280 [ 1312.061846][T30375] __should_failslab+0x121/0x190 [ 1312.066801][T30375] should_failslab+0x9/0x14 [ 1312.071310][T30375] kmem_cache_alloc_node_trace+0x270/0x720 [ 1312.077131][T30375] __kmalloc_node+0x3d/0x70 [ 1312.081661][T30375] kvmalloc_node+0x68/0x100 03:50:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1312.086183][T30375] __list_lru_init+0x4a6/0x6e0 [ 1312.090962][T30375] alloc_super+0x762/0x890 [ 1312.095384][T30375] ? test_single_super+0x10/0x10 [ 1312.095416][T30375] sget_userns+0xf1/0x560 [ 1312.095435][T30375] ? kill_litter_super+0x60/0x60 [ 1312.109611][T30375] ? test_single_super+0x10/0x10 [ 1312.114549][T30375] ? kill_litter_super+0x60/0x60 [ 1312.114564][T30375] sget+0x10c/0x150 [ 1312.114583][T30375] mount_bdev+0xff/0x3c0 [ 1312.114600][T30375] ? vfat_mount+0x40/0x40 [ 1312.114621][T30375] vfat_mount+0x35/0x40 [ 1312.127562][T30375] ? setup+0x120/0x120 [ 1312.127584][T30375] legacy_get_tree+0xf2/0x200 [ 1312.127608][T30375] vfs_get_tree+0x123/0x450 [ 1312.136068][T30375] do_mount+0x1436/0x2c40 [ 1312.136099][T30375] ? copy_mount_string+0x40/0x40 [ 1312.144822][T30375] ? _copy_from_user+0xdd/0x150 [ 1312.144847][T30375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.144861][T30375] ? copy_mount_options+0x30e/0x440 [ 1312.144880][T30375] ksys_mount+0xdb/0x150 [ 1312.179091][T30375] __x64_sys_mount+0xbe/0x150 [ 1312.183799][T30375] do_syscall_64+0x103/0x610 [ 1312.188418][T30375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.194311][T30375] RIP: 0033:0x45a89a [ 1312.198210][T30375] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1312.217817][T30375] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1312.226231][T30375] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:50:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013d, 0x10400003) 03:50:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:47 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1312.234203][T30375] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1312.242179][T30375] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1312.250150][T30375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1312.258125][T30375] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1312.275564][T30524] FAT-fs (loop4): bogus number of reserved sectors [ 1312.292657][T30524] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:47 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1312.365727][T30524] FAT-fs (loop4): bogus number of reserved sectors [ 1312.376207][T30524] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:47 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013e, 0x10400003) 03:50:47 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:47 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1312.572631][T30943] FAT-fs (loop4): bogus number of reserved sectors [ 1312.602294][T30943] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:47 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1312.647793][T31079] FAULT_INJECTION: forcing a failure. [ 1312.647793][T31079] name failslab, interval 1, probability 0, space 0, times 0 03:50:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000013f, 0x10400003) [ 1312.694573][T30943] FAT-fs (loop4): bogus number of reserved sectors [ 1312.710452][T30943] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:47 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1312.768615][T31079] CPU: 1 PID: 31079 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1312.777799][T31079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.787859][T31079] Call Trace: [ 1312.791165][T31079] dump_stack+0x172/0x1f0 [ 1312.795519][T31079] should_fail.cold+0xa/0x15 [ 1312.800129][T31079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1312.805948][T31079] ? ___might_sleep+0x163/0x280 [ 1312.810824][T31079] __should_failslab+0x121/0x190 [ 1312.815815][T31079] should_failslab+0x9/0x14 [ 1312.820329][T31079] kmem_cache_alloc_trace+0x2d1/0x760 [ 1312.825726][T31079] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1312.831561][T31079] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1312.837212][T31079] __list_lru_init+0x3cf/0x6e0 [ 1312.841991][T31079] alloc_super+0x762/0x890 [ 1312.846436][T31079] ? test_single_super+0x10/0x10 [ 1312.851381][T31079] sget_userns+0xf1/0x560 [ 1312.855718][T31079] ? kill_litter_super+0x60/0x60 [ 1312.860679][T31079] ? test_single_super+0x10/0x10 [ 1312.865619][T31079] ? kill_litter_super+0x60/0x60 [ 1312.870565][T31079] sget+0x10c/0x150 [ 1312.874389][T31079] mount_bdev+0xff/0x3c0 [ 1312.878642][T31079] ? vfat_mount+0x40/0x40 [ 1312.882983][T31079] vfat_mount+0x35/0x40 [ 1312.887145][T31079] ? setup+0x120/0x120 [ 1312.891224][T31079] legacy_get_tree+0xf2/0x200 [ 1312.895909][T31079] vfs_get_tree+0x123/0x450 [ 1312.900423][T31079] do_mount+0x1436/0x2c40 [ 1312.904776][T31079] ? copy_mount_string+0x40/0x40 [ 1312.909726][T31079] ? _copy_from_user+0xdd/0x150 03:50:47 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000140, 0x10400003) [ 1312.914647][T31079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.920888][T31079] ? copy_mount_options+0x30e/0x440 [ 1312.926091][T31079] ksys_mount+0xdb/0x150 [ 1312.930345][T31079] __x64_sys_mount+0xbe/0x150 [ 1312.935047][T31079] do_syscall_64+0x103/0x610 [ 1312.939658][T31079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.945556][T31079] RIP: 0033:0x45a89a [ 1312.949458][T31079] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1312.969069][T31079] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1312.977493][T31079] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1312.985482][T31079] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1312.993453][T31079] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1313.001424][T31079] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1313.009400][T31079] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat ', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:48 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:48 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000141, 0x10400003) [ 1313.247318][T31761] FAULT_INJECTION: forcing a failure. [ 1313.247318][T31761] name failslab, interval 1, probability 0, space 0, times 0 03:50:48 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:48 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1313.300149][T31761] CPU: 0 PID: 31761 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1313.309311][T31761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.319377][T31761] Call Trace: [ 1313.322696][T31761] dump_stack+0x172/0x1f0 [ 1313.327564][T31761] should_fail.cold+0xa/0x15 [ 1313.332169][T31761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1313.337995][T31761] ? ___might_sleep+0x163/0x280 [ 1313.342859][T31761] __should_failslab+0x121/0x190 03:50:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1313.347817][T31761] should_failslab+0x9/0x14 [ 1313.352334][T31761] kmem_cache_alloc_trace+0x2d1/0x760 [ 1313.357724][T31761] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1313.363582][T31761] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1313.369224][T31761] __list_lru_init+0x3cf/0x6e0 [ 1313.374010][T31761] alloc_super+0x762/0x890 [ 1313.378437][T31761] ? test_single_super+0x10/0x10 [ 1313.383381][T31761] sget_userns+0xf1/0x560 [ 1313.387717][T31761] ? kill_litter_super+0x60/0x60 [ 1313.392674][T31761] ? test_single_super+0x10/0x10 03:50:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000142, 0x10400003) [ 1313.397618][T31761] ? kill_litter_super+0x60/0x60 [ 1313.402576][T31761] sget+0x10c/0x150 [ 1313.406409][T31761] mount_bdev+0xff/0x3c0 [ 1313.410661][T31761] ? vfat_mount+0x40/0x40 [ 1313.415004][T31761] vfat_mount+0x35/0x40 [ 1313.419178][T31761] ? setup+0x120/0x120 [ 1313.423257][T31761] legacy_get_tree+0xf2/0x200 [ 1313.427943][T31761] vfs_get_tree+0x123/0x450 [ 1313.432453][T31761] do_mount+0x1436/0x2c40 [ 1313.436814][T31761] ? copy_mount_string+0x40/0x40 [ 1313.441782][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1313.448037][T31761] ? copy_mount_options+0x30e/0x440 [ 1313.453246][T31761] ksys_mount+0xdb/0x150 [ 1313.457498][T31761] __x64_sys_mount+0xbe/0x150 [ 1313.462211][T31761] do_syscall_64+0x103/0x610 [ 1313.466822][T31761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.472718][T31761] RIP: 0033:0x45a89a [ 1313.476626][T31761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000143, 0x10400003) [ 1313.496229][T31761] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1313.504676][T31761] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1313.512652][T31761] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1313.520626][T31761] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1313.528602][T31761] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1313.536599][T31761] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat ', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:48 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:48 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000144, 0x10400003) 03:50:48 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:48 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1313.851934][T32388] FAULT_INJECTION: forcing a failure. [ 1313.851934][T32388] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.911033][T32388] CPU: 0 PID: 32388 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1313.920253][T32388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.930327][T32388] Call Trace: [ 1313.933649][T32388] dump_stack+0x172/0x1f0 [ 1313.937998][T32388] should_fail.cold+0xa/0x15 [ 1313.942618][T32388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1313.948473][T32388] ? ___might_sleep+0x163/0x280 [ 1313.953345][T32388] __should_failslab+0x121/0x190 [ 1313.958289][T32388] should_failslab+0x9/0x14 [ 1313.962811][T32388] kmem_cache_alloc_trace+0x2d1/0x760 [ 1313.968200][T32388] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1313.974024][T32388] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1313.979670][T32388] __list_lru_init+0x3cf/0x6e0 [ 1313.984449][T32388] alloc_super+0x762/0x890 [ 1313.988873][T32388] ? test_single_super+0x10/0x10 [ 1313.993828][T32388] sget_userns+0xf1/0x560 [ 1313.998166][T32388] ? kill_litter_super+0x60/0x60 [ 1314.003110][T32388] ? test_single_super+0x10/0x10 [ 1314.008053][T32388] ? kill_litter_super+0x60/0x60 [ 1314.013000][T32388] sget+0x10c/0x150 [ 1314.016824][T32388] mount_bdev+0xff/0x3c0 [ 1314.021078][T32388] ? vfat_mount+0x40/0x40 [ 1314.025424][T32388] vfat_mount+0x35/0x40 [ 1314.029589][T32388] ? setup+0x120/0x120 [ 1314.033670][T32388] legacy_get_tree+0xf2/0x200 [ 1314.038363][T32388] vfs_get_tree+0x123/0x450 [ 1314.042909][T32388] do_mount+0x1436/0x2c40 [ 1314.047247][T32388] ? copy_mount_string+0x40/0x40 [ 1314.047269][T32388] ? _copy_from_user+0xdd/0x150 03:50:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000145, 0x10400003) [ 1314.047292][T32388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1314.047307][T32388] ? copy_mount_options+0x30e/0x440 [ 1314.047331][T32388] ksys_mount+0xdb/0x150 [ 1314.063345][T32388] __x64_sys_mount+0xbe/0x150 [ 1314.063369][T32388] do_syscall_64+0x103/0x610 [ 1314.063394][T32388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.063408][T32388] RIP: 0033:0x45a89a [ 1314.063424][T32388] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1314.063432][T32388] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.063448][T32388] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1314.063457][T32388] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1314.063467][T32388] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1314.063476][T32388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1314.063485][T32388] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:49 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1314.164193][T32670] FAT-fs (loop4): bogus number of reserved sectors [ 1314.183784][T32670] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:49 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000146, 0x10400003) 03:50:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1314.271652][T32670] FAT-fs (loop4): bogus number of reserved sectors [ 1314.303611][T32670] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1314.405606][ T575] FAULT_INJECTION: forcing a failure. [ 1314.405606][ T575] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.441747][ T575] CPU: 0 PID: 575 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1314.450797][ T575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.450805][ T575] Call Trace: [ 1314.450843][ T575] dump_stack+0x172/0x1f0 [ 1314.468999][ T575] should_fail.cold+0xa/0x15 [ 1314.473600][ T575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1314.479422][ T575] ? ___might_sleep+0x163/0x280 [ 1314.484286][ T575] __should_failslab+0x121/0x190 [ 1314.489235][ T575] should_failslab+0x9/0x14 [ 1314.493748][ T575] kmem_cache_alloc_trace+0x2d1/0x760 [ 1314.493779][ T575] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1314.493812][ T575] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1314.493836][ T575] __list_lru_init+0x3cf/0x6e0 [ 1314.493859][ T575] alloc_super+0x762/0x890 [ 1314.493875][ T575] ? test_single_super+0x10/0x10 [ 1314.493892][ T575] sget_userns+0xf1/0x560 [ 1314.493907][ T575] ? kill_litter_super+0x60/0x60 [ 1314.493926][ T575] ? test_single_super+0x10/0x10 [ 1314.539072][ T575] ? kill_litter_super+0x60/0x60 [ 1314.544015][ T575] sget+0x10c/0x150 [ 1314.547835][ T575] mount_bdev+0xff/0x3c0 [ 1314.552085][ T575] ? vfat_mount+0x40/0x40 [ 1314.556426][ T575] vfat_mount+0x35/0x40 [ 1314.560585][ T575] ? setup+0x120/0x120 [ 1314.564663][ T575] legacy_get_tree+0xf2/0x200 [ 1314.569346][ T575] vfs_get_tree+0x123/0x450 [ 1314.573855][ T575] do_mount+0x1436/0x2c40 [ 1314.578196][ T575] ? copy_mount_string+0x40/0x40 [ 1314.583145][ T575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1314.589393][ T575] ? copy_mount_options+0x30e/0x440 [ 1314.594601][ T575] ksys_mount+0xdb/0x150 [ 1314.598853][ T575] __x64_sys_mount+0xbe/0x150 [ 1314.603541][ T575] do_syscall_64+0x103/0x610 [ 1314.608142][ T575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.614039][ T575] RIP: 0033:0x45a89a [ 1314.617937][ T575] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1314.637548][ T575] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.645966][ T575] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:50:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000147, 0x10400003) 03:50:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1314.653939][ T575] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1314.661912][ T575] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1314.669881][ T575] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1314.669892][ T575] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1314.717924][ T851] FAT-fs (loop4): bogus number of reserved sectors [ 1314.747102][ T851] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000148, 0x10400003) 03:50:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:49 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:49 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1314.852987][ T851] FAT-fs (loop4): bogus number of reserved sectors [ 1314.874326][ T851] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x0f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1314.991250][ T1202] FAULT_INJECTION: forcing a failure. [ 1314.991250][ T1202] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.013792][ T1202] CPU: 0 PID: 1202 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1315.022851][ T1202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.032925][ T1202] Call Trace: [ 1315.036238][ T1202] dump_stack+0x172/0x1f0 [ 1315.040587][ T1202] should_fail.cold+0xa/0x15 [ 1315.045193][ T1202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1315.051010][ T1202] ? ___might_sleep+0x163/0x280 [ 1315.055878][ T1202] __should_failslab+0x121/0x190 [ 1315.060835][ T1202] should_failslab+0x9/0x14 [ 1315.065350][ T1202] kmem_cache_alloc_trace+0x2d1/0x760 [ 1315.070729][ T1202] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1315.076560][ T1202] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1315.082210][ T1202] __list_lru_init+0x3cf/0x6e0 [ 1315.086987][ T1202] alloc_super+0x762/0x890 [ 1315.091411][ T1202] ? test_single_super+0x10/0x10 [ 1315.096380][ T1202] sget_userns+0xf1/0x560 [ 1315.100733][ T1202] ? kill_litter_super+0x60/0x60 [ 1315.105682][ T1202] ? test_single_super+0x10/0x10 [ 1315.110621][ T1202] ? kill_litter_super+0x60/0x60 [ 1315.115599][ T1202] sget+0x10c/0x150 [ 1315.119434][ T1202] mount_bdev+0xff/0x3c0 [ 1315.123683][ T1202] ? vfat_mount+0x40/0x40 [ 1315.128021][ T1202] vfat_mount+0x35/0x40 [ 1315.132184][ T1202] ? setup+0x120/0x120 [ 1315.136265][ T1202] legacy_get_tree+0xf2/0x200 [ 1315.140956][ T1202] vfs_get_tree+0x123/0x450 [ 1315.145467][ T1202] do_mount+0x1436/0x2c40 [ 1315.149862][ T1202] ? copy_mount_string+0x40/0x40 [ 1315.154847][ T1202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1315.161089][ T1202] ? copy_mount_options+0x30e/0x440 [ 1315.166297][ T1202] ksys_mount+0xdb/0x150 [ 1315.170544][ T1202] __x64_sys_mount+0xbe/0x150 [ 1315.175232][ T1202] do_syscall_64+0x103/0x610 [ 1315.179836][ T1202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1315.185727][ T1202] RIP: 0033:0x45a89a [ 1315.189632][ T1202] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1315.209236][ T1202] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1315.217660][ T1202] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1315.225631][ T1202] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1315.233605][ T1202] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 03:50:50 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1315.241581][ T1202] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1315.249557][ T1202] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000149, 0x10400003) 03:50:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:50 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x10', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014a, 0x10400003) 03:50:50 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014b, 0x10400003) 03:50:50 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1315.773583][ T2146] FAULT_INJECTION: forcing a failure. [ 1315.773583][ T2146] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.830238][ T2146] CPU: 0 PID: 2146 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1315.839307][ T2146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.849368][ T2146] Call Trace: [ 1315.852708][ T2146] dump_stack+0x172/0x1f0 [ 1315.857061][ T2146] should_fail.cold+0xa/0x15 [ 1315.861665][ T2146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1315.867494][ T2146] ? ___might_sleep+0x163/0x280 [ 1315.872353][ T2146] __should_failslab+0x121/0x190 [ 1315.877297][ T2146] should_failslab+0x9/0x14 [ 1315.881818][ T2146] kmem_cache_alloc_trace+0x2d1/0x760 [ 1315.887201][ T2146] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1315.893024][ T2146] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1315.898674][ T2146] __list_lru_init+0x3cf/0x6e0 [ 1315.903482][ T2146] alloc_super+0x762/0x890 [ 1315.907906][ T2146] ? test_single_super+0x10/0x10 [ 1315.912853][ T2146] sget_userns+0xf1/0x560 [ 1315.917204][ T2146] ? kill_litter_super+0x60/0x60 [ 1315.922148][ T2146] ? test_single_super+0x10/0x10 [ 1315.927092][ T2146] ? kill_litter_super+0x60/0x60 [ 1315.932031][ T2146] sget+0x10c/0x150 [ 1315.935892][ T2146] mount_bdev+0xff/0x3c0 [ 1315.940190][ T2146] ? vfat_mount+0x40/0x40 [ 1315.944545][ T2146] vfat_mount+0x35/0x40 [ 1315.948734][ T2146] ? setup+0x120/0x120 [ 1315.952888][ T2146] legacy_get_tree+0xf2/0x200 [ 1315.957574][ T2146] vfs_get_tree+0x123/0x450 [ 1315.962087][ T2146] do_mount+0x1436/0x2c40 [ 1315.966433][ T2146] ? copy_mount_string+0x40/0x40 [ 1315.971393][ T2146] ? _copy_from_user+0xdd/0x150 [ 1315.976258][ T2146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1315.982524][ T2146] ? copy_mount_options+0x30e/0x440 [ 1315.987729][ T2146] ksys_mount+0xdb/0x150 [ 1315.991993][ T2146] __x64_sys_mount+0xbe/0x150 [ 1315.996689][ T2146] do_syscall_64+0x103/0x610 [ 1316.001310][ T2146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.007257][ T2146] RIP: 0033:0x45a89a [ 1316.011166][ T2146] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1316.030777][ T2146] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1316.039205][ T2146] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1316.047179][ T2146] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1316.055153][ T2146] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1316.063131][ T2146] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1316.071206][ T2146] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:51 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014c, 0x10400003) 03:50:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) [ 1316.170050][ T2365] FAT-fs (loop4): bogus number of reserved sectors [ 1316.216960][ T2365] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:51 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:51 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1316.315609][ T2365] FAT-fs (loop4): bogus number of reserved sectors [ 1316.333780][ T2365] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0xffffffffffffffff, 0x1, 0x9fa6773000481032) 03:50:51 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014d, 0x10400003) [ 1316.394594][ T2686] FAULT_INJECTION: forcing a failure. [ 1316.394594][ T2686] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.413291][ T2686] CPU: 0 PID: 2686 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1316.422353][ T2686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.432423][ T2686] Call Trace: [ 1316.435738][ T2686] dump_stack+0x172/0x1f0 [ 1316.440103][ T2686] should_fail.cold+0xa/0x15 [ 1316.444716][ T2686] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1316.450549][ T2686] ? ___might_sleep+0x163/0x280 [ 1316.455416][ T2686] __should_failslab+0x121/0x190 [ 1316.460647][ T2686] should_failslab+0x9/0x14 [ 1316.465166][ T2686] kmem_cache_alloc_trace+0x2d1/0x760 [ 1316.470546][ T2686] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1316.476369][ T2686] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1316.482020][ T2686] __list_lru_init+0x3cf/0x6e0 [ 1316.486806][ T2686] alloc_super+0x762/0x890 [ 1316.491234][ T2686] ? test_single_super+0x10/0x10 [ 1316.496179][ T2686] sget_userns+0xf1/0x560 [ 1316.500524][ T2686] ? kill_litter_super+0x60/0x60 [ 1316.505484][ T2686] ? test_single_super+0x10/0x10 [ 1316.510424][ T2686] ? kill_litter_super+0x60/0x60 [ 1316.515372][ T2686] sget+0x10c/0x150 [ 1316.519197][ T2686] mount_bdev+0xff/0x3c0 [ 1316.523451][ T2686] ? vfat_mount+0x40/0x40 [ 1316.527803][ T2686] vfat_mount+0x35/0x40 [ 1316.531969][ T2686] ? setup+0x120/0x120 [ 1316.536053][ T2686] legacy_get_tree+0xf2/0x200 [ 1316.540739][ T2686] vfs_get_tree+0x123/0x450 [ 1316.545264][ T2686] do_mount+0x1436/0x2c40 [ 1316.549605][ T2686] ? copy_mount_string+0x40/0x40 [ 1316.554561][ T2686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1316.560810][ T2686] ? copy_mount_options+0x30e/0x440 [ 1316.566018][ T2686] ksys_mount+0xdb/0x150 [ 1316.570275][ T2686] __x64_sys_mount+0xbe/0x150 [ 1316.574967][ T2686] do_syscall_64+0x103/0x610 [ 1316.579575][ T2686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1316.585469][ T2686] RIP: 0033:0x45a89a [ 1316.589368][ T2686] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1316.608978][ T2686] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1316.617393][ T2686] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1316.625364][ T2686] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1316.633338][ T2686] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 03:50:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x85', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:51 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1316.641309][ T2686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1316.649279][ T2686] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0xffffffffffffffff, 0x1, 0x9fa6773000481032) 03:50:51 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:51 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014e, 0x10400003) 03:50:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0xffffffffffffffff, 0x1, 0x9fa6773000481032) 03:50:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:52 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xac', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:50:52 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:52 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014f, 0x10400003) 03:50:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x0) 03:50:52 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1317.355592][ T3804] FAULT_INJECTION: forcing a failure. [ 1317.355592][ T3804] name failslab, interval 1, probability 0, space 0, times 0 03:50:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x0) [ 1317.433535][ T3804] CPU: 1 PID: 3804 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1317.442609][ T3804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.452660][ T3804] Call Trace: [ 1317.455977][ T3804] dump_stack+0x172/0x1f0 [ 1317.460611][ T3804] should_fail.cold+0xa/0x15 [ 1317.465215][ T3804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1317.471042][ T3804] ? ___might_sleep+0x163/0x280 [ 1317.475911][ T3804] __should_failslab+0x121/0x190 [ 1317.480865][ T3804] should_failslab+0x9/0x14 [ 1317.485388][ T3804] kmem_cache_alloc_node_trace+0x270/0x720 [ 1317.491234][ T3804] ? kmem_cache_alloc_trace+0x354/0x760 [ 1317.496800][ T3804] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1317.502622][ T3804] __kmalloc_node+0x3d/0x70 [ 1317.507132][ T3804] kvmalloc_node+0x68/0x100 [ 1317.511645][ T3804] __list_lru_init+0x4a6/0x6e0 [ 1317.516434][ T3804] alloc_super+0x762/0x890 [ 1317.520857][ T3804] ? test_single_super+0x10/0x10 [ 1317.525808][ T3804] sget_userns+0xf1/0x560 [ 1317.530146][ T3804] ? kill_litter_super+0x60/0x60 [ 1317.535093][ T3804] ? test_single_super+0x10/0x10 [ 1317.540034][ T3804] ? kill_litter_super+0x60/0x60 [ 1317.544981][ T3804] sget+0x10c/0x150 [ 1317.548803][ T3804] mount_bdev+0xff/0x3c0 [ 1317.553055][ T3804] ? vfat_mount+0x40/0x40 [ 1317.557397][ T3804] vfat_mount+0x35/0x40 [ 1317.561564][ T3804] ? setup+0x120/0x120 [ 1317.565647][ T3804] legacy_get_tree+0xf2/0x200 [ 1317.570356][ T3804] vfs_get_tree+0x123/0x450 [ 1317.574887][ T3804] do_mount+0x1436/0x2c40 [ 1317.579232][ T3804] ? copy_mount_string+0x40/0x40 [ 1317.584206][ T3804] ? _copy_from_user+0xdd/0x150 [ 1317.589073][ T3804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1317.595319][ T3804] ? copy_mount_options+0x30e/0x440 [ 1317.600528][ T3804] ksys_mount+0xdb/0x150 [ 1317.604797][ T3804] __x64_sys_mount+0xbe/0x150 [ 1317.609488][ T3804] do_syscall_64+0x103/0x610 [ 1317.614094][ T3804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1317.619988][ T3804] RIP: 0033:0x45a89a [ 1317.623887][ T3804] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1317.643494][ T3804] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1317.651906][ T3804] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1317.659884][ T3804] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1317.667855][ T3804] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1317.675825][ T3804] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:50:52 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000150, 0x10400003) [ 1317.683798][ T3804] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:52 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:52 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) 03:50:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x0) 03:50:52 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000151, 0x10400003) 03:50:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:52 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000014d, 0x10400003) 03:50:52 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:53 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000152, 0x10400003) 03:50:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x1, 0x9fa6773000481032) 03:50:53 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1318.371271][ T4790] FAULT_INJECTION: forcing a failure. [ 1318.371271][ T4790] name failslab, interval 1, probability 0, space 0, times 0 [ 1318.423508][ T4790] CPU: 1 PID: 4790 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1318.432558][ T4790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1318.442663][ T4790] Call Trace: [ 1318.445970][ T4790] dump_stack+0x172/0x1f0 [ 1318.450335][ T4790] should_fail.cold+0xa/0x15 [ 1318.454938][ T4790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1318.461236][ T4790] ? ___might_sleep+0x163/0x280 [ 1318.466099][ T4790] __should_failslab+0x121/0x190 [ 1318.471047][ T4790] should_failslab+0x9/0x14 [ 1318.475556][ T4790] kmem_cache_alloc_trace+0x2d1/0x760 [ 1318.480942][ T4790] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1318.486769][ T4790] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1318.492430][ T4790] __list_lru_init+0x3cf/0x6e0 [ 1318.497206][ T4790] alloc_super+0x762/0x890 [ 1318.501625][ T4790] ? test_single_super+0x10/0x10 [ 1318.506570][ T4790] sget_userns+0xf1/0x560 [ 1318.510902][ T4790] ? kill_litter_super+0x60/0x60 [ 1318.515847][ T4790] ? test_single_super+0x10/0x10 [ 1318.520790][ T4790] ? kill_litter_super+0x60/0x60 [ 1318.525732][ T4790] sget+0x10c/0x150 [ 1318.529558][ T4790] mount_bdev+0xff/0x3c0 [ 1318.533807][ T4790] ? vfat_mount+0x40/0x40 [ 1318.538149][ T4790] vfat_mount+0x35/0x40 [ 1318.542317][ T4790] ? setup+0x120/0x120 [ 1318.546395][ T4790] legacy_get_tree+0xf2/0x200 [ 1318.551080][ T4790] vfs_get_tree+0x123/0x450 [ 1318.555588][ T4790] do_mount+0x1436/0x2c40 [ 1318.559934][ T4790] ? copy_mount_string+0x40/0x40 [ 1318.564887][ T4790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1318.571128][ T4790] ? copy_mount_options+0x30e/0x440 [ 1318.576334][ T4790] ksys_mount+0xdb/0x150 [ 1318.580614][ T4790] __x64_sys_mount+0xbe/0x150 [ 1318.585305][ T4790] do_syscall_64+0x103/0x610 [ 1318.589906][ T4790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1318.595798][ T4790] RIP: 0033:0x45a89a [ 1318.599698][ T4790] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1318.619313][ T4790] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1318.627835][ T4790] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1318.635813][ T4790] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1318.643810][ T4790] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1318.651796][ T4790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1318.659780][ T4790] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:53 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:53 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000136, 0x10400003) 03:50:53 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000153, 0x10400003) 03:50:53 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1318.798629][ T4957] FAT-fs (loop4): bogus number of reserved sectors [ 1318.813360][ T4957] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1318.824478][ T4961] FAULT_INJECTION: forcing a failure. [ 1318.824478][ T4961] name failslab, interval 1, probability 0, space 0, times 0 [ 1318.887495][ T4961] CPU: 0 PID: 4961 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1318.896575][ T4961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1318.906640][ T4961] Call Trace: [ 1318.909954][ T4961] dump_stack+0x172/0x1f0 [ 1318.914300][ T4961] should_fail.cold+0xa/0x15 [ 1318.918901][ T4961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1318.924719][ T4961] ? ___might_sleep+0x163/0x280 [ 1318.929593][ T4961] __should_failslab+0x121/0x190 [ 1318.934541][ T4961] should_failslab+0x9/0x14 [ 1318.939054][ T4961] kmem_cache_alloc_trace+0x2d1/0x760 [ 1318.944438][ T4961] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1318.950263][ T4961] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1318.955914][ T4961] __list_lru_init+0x3cf/0x6e0 [ 1318.960701][ T4961] alloc_super+0x762/0x890 [ 1318.965127][ T4961] ? test_single_super+0x10/0x10 [ 1318.970071][ T4961] sget_userns+0xf1/0x560 [ 1318.974404][ T4961] ? kill_litter_super+0x60/0x60 [ 1318.979350][ T4961] ? test_single_super+0x10/0x10 03:50:53 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1318.984291][ T4961] ? kill_litter_super+0x60/0x60 [ 1318.989234][ T4961] sget+0x10c/0x150 [ 1318.993052][ T4961] mount_bdev+0xff/0x3c0 [ 1318.997302][ T4961] ? vfat_mount+0x40/0x40 [ 1319.001642][ T4961] vfat_mount+0x35/0x40 [ 1319.005808][ T4961] ? setup+0x120/0x120 [ 1319.009888][ T4961] legacy_get_tree+0xf2/0x200 [ 1319.014572][ T4961] vfs_get_tree+0x123/0x450 [ 1319.019081][ T4961] do_mount+0x1436/0x2c40 [ 1319.023424][ T4961] ? copy_mount_string+0x40/0x40 [ 1319.028368][ T4961] ? _copy_from_user+0xdd/0x150 [ 1319.033233][ T4961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1319.039480][ T4961] ? copy_mount_options+0x30e/0x440 [ 1319.044689][ T4961] ksys_mount+0xdb/0x150 [ 1319.048937][ T4961] __x64_sys_mount+0xbe/0x150 [ 1319.053623][ T4961] do_syscall_64+0x103/0x610 [ 1319.058223][ T4961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.064116][ T4961] RIP: 0033:0x45a89a [ 1319.068015][ T4961] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:54 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1319.087631][ T4961] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1319.096060][ T4961] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1319.104042][ T4961] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1319.112020][ T4961] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1319.119998][ T4961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1319.127979][ T4961] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:54 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000154, 0x10400003) [ 1319.173197][ T4957] FAT-fs (loop4): bogus number of reserved sectors [ 1319.179765][ T4957] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:54 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000131, 0x10400003) 03:50:54 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:54 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000155, 0x10400003) [ 1319.442946][ T5573] FAULT_INJECTION: forcing a failure. [ 1319.442946][ T5573] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.486132][ T5573] CPU: 0 PID: 5573 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1319.495230][ T5573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1319.505291][ T5573] Call Trace: [ 1319.508601][ T5573] dump_stack+0x172/0x1f0 [ 1319.512956][ T5573] should_fail.cold+0xa/0x15 [ 1319.517570][ T5573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1319.523397][ T5573] ? ___might_sleep+0x163/0x280 [ 1319.528259][ T5573] __should_failslab+0x121/0x190 03:50:54 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fe, 0x10400003) 03:50:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1319.533207][ T5573] should_failslab+0x9/0x14 [ 1319.537723][ T5573] kmem_cache_alloc_trace+0x2d1/0x760 [ 1319.543115][ T5573] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1319.548941][ T5573] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1319.554585][ T5573] __list_lru_init+0x3cf/0x6e0 [ 1319.559369][ T5573] alloc_super+0x762/0x890 [ 1319.563807][ T5573] ? test_single_super+0x10/0x10 [ 1319.568754][ T5573] sget_userns+0xf1/0x560 [ 1319.573111][ T5573] ? kill_litter_super+0x60/0x60 [ 1319.578057][ T5573] ? test_single_super+0x10/0x10 03:50:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1319.582997][ T5573] ? kill_litter_super+0x60/0x60 [ 1319.587940][ T5573] sget+0x10c/0x150 [ 1319.591769][ T5573] mount_bdev+0xff/0x3c0 [ 1319.596030][ T5573] ? vfat_mount+0x40/0x40 [ 1319.600377][ T5573] vfat_mount+0x35/0x40 [ 1319.604545][ T5573] ? setup+0x120/0x120 [ 1319.608627][ T5573] legacy_get_tree+0xf2/0x200 [ 1319.613319][ T5573] vfs_get_tree+0x123/0x450 [ 1319.617832][ T5573] do_mount+0x1436/0x2c40 [ 1319.617858][ T5573] ? copy_mount_string+0x40/0x40 [ 1319.617879][ T5573] ? _copy_from_user+0xdd/0x150 [ 1319.617901][ T5573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1319.631973][ T5573] ? copy_mount_options+0x30e/0x440 [ 1319.631995][ T5573] ksys_mount+0xdb/0x150 [ 1319.632015][ T5573] __x64_sys_mount+0xbe/0x150 [ 1319.632037][ T5573] do_syscall_64+0x103/0x610 [ 1319.632062][ T5573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1319.662814][ T5573] RIP: 0033:0x45a89a [ 1319.662832][ T5573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:54 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000156, 0x10400003) [ 1319.662842][ T5573] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1319.662857][ T5573] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1319.662867][ T5573] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1319.662884][ T5573] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1319.694786][ T5573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1319.694803][ T5573] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:54 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fb, 0x10400003) 03:50:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:50:54 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:54 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000157, 0x10400003) 03:50:54 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000fa, 0x10400003) [ 1320.042159][ T6399] FAT-fs (loop4): bogus number of reserved sectors [ 1320.074239][ T6399] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}) 03:50:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1320.089272][ T6414] FAULT_INJECTION: forcing a failure. [ 1320.089272][ T6414] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.120637][ T6414] CPU: 1 PID: 6414 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1320.129690][ T6414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1320.139751][ T6414] Call Trace: [ 1320.143072][ T6414] dump_stack+0x172/0x1f0 [ 1320.147425][ T6414] should_fail.cold+0xa/0x15 [ 1320.152032][ T6414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1320.157854][ T6414] ? ___might_sleep+0x163/0x280 [ 1320.162742][ T6414] __should_failslab+0x121/0x190 [ 1320.167702][ T6414] should_failslab+0x9/0x14 [ 1320.172213][ T6414] kmem_cache_alloc_trace+0x2d1/0x760 [ 1320.177590][ T6414] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1320.183409][ T6414] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1320.189056][ T6414] __list_lru_init+0x3cf/0x6e0 [ 1320.193831][ T6414] alloc_super+0x762/0x890 [ 1320.198255][ T6414] ? test_single_super+0x10/0x10 [ 1320.203208][ T6414] sget_userns+0xf1/0x560 [ 1320.207542][ T6414] ? kill_litter_super+0x60/0x60 [ 1320.212484][ T6414] ? test_single_super+0x10/0x10 [ 1320.217420][ T6414] ? kill_litter_super+0x60/0x60 [ 1320.222359][ T6414] sget+0x10c/0x150 [ 1320.226179][ T6414] mount_bdev+0xff/0x3c0 [ 1320.230425][ T6414] ? vfat_mount+0x40/0x40 [ 1320.234778][ T6414] vfat_mount+0x35/0x40 [ 1320.238942][ T6414] ? setup+0x120/0x120 [ 1320.243058][ T6414] legacy_get_tree+0xf2/0x200 [ 1320.247745][ T6414] vfs_get_tree+0x123/0x450 [ 1320.252265][ T6414] do_mount+0x1436/0x2c40 [ 1320.256614][ T6414] ? copy_mount_string+0x40/0x40 [ 1320.261562][ T6414] ? _copy_from_user+0xdd/0x150 [ 1320.266421][ T6414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1320.272663][ T6414] ? copy_mount_options+0x30e/0x440 [ 1320.277872][ T6414] ksys_mount+0xdb/0x150 [ 1320.282125][ T6414] __x64_sys_mount+0xbe/0x150 [ 1320.286812][ T6414] do_syscall_64+0x103/0x610 [ 1320.291415][ T6414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1320.297313][ T6414] RIP: 0033:0x45a89a [ 1320.301215][ T6414] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1320.320829][ T6414] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1320.329247][ T6414] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:50:55 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000158, 0x10400003) [ 1320.337222][ T6414] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1320.345195][ T6414] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1320.353167][ T6414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1320.361138][ T6414] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:55 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f7, 0x10400003) 03:50:55 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:55 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000]}) [ 1320.426168][ T6399] FAT-fs (loop4): bogus number of reserved sectors [ 1320.460905][ T6399] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1320.575096][ T6803] FAULT_INJECTION: forcing a failure. [ 1320.575096][ T6803] name failslab, interval 1, probability 0, space 0, times 0 03:50:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_gettime(0x0, 0x0) 03:50:55 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000159, 0x10400003) [ 1320.690485][ T6803] CPU: 0 PID: 6803 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1320.699558][ T6803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1320.709618][ T6803] Call Trace: [ 1320.712927][ T6803] dump_stack+0x172/0x1f0 [ 1320.717269][ T6803] should_fail.cold+0xa/0x15 [ 1320.721869][ T6803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1320.727703][ T6803] ? ___might_sleep+0x163/0x280 [ 1320.732599][ T6803] __should_failslab+0x121/0x190 [ 1320.737548][ T6803] should_failslab+0x9/0x14 [ 1320.742108][ T6803] kmem_cache_alloc_trace+0x2d1/0x760 [ 1320.747512][ T6803] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1320.753342][ T6803] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1320.758988][ T6803] __list_lru_init+0x3cf/0x6e0 [ 1320.763799][ T6803] alloc_super+0x762/0x890 [ 1320.768222][ T6803] ? test_single_super+0x10/0x10 [ 1320.773169][ T6803] sget_userns+0xf1/0x560 [ 1320.777502][ T6803] ? kill_litter_super+0x60/0x60 [ 1320.782448][ T6803] ? test_single_super+0x10/0x10 [ 1320.787387][ T6803] ? kill_litter_super+0x60/0x60 [ 1320.792333][ T6803] sget+0x10c/0x150 [ 1320.796165][ T6803] mount_bdev+0xff/0x3c0 [ 1320.800415][ T6803] ? vfat_mount+0x40/0x40 [ 1320.804773][ T6803] vfat_mount+0x35/0x40 [ 1320.808960][ T6803] ? setup+0x120/0x120 [ 1320.813042][ T6803] legacy_get_tree+0xf2/0x200 [ 1320.817755][ T6803] vfs_get_tree+0x123/0x450 [ 1320.822284][ T6803] do_mount+0x1436/0x2c40 [ 1320.826628][ T6803] ? copy_mount_string+0x40/0x40 [ 1320.831586][ T6803] ? copy_mount_options+0x242/0x440 [ 1320.836812][ T6803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1320.843058][ T6803] ? copy_mount_options+0x30e/0x440 [ 1320.848268][ T6803] ksys_mount+0xdb/0x150 [ 1320.852542][ T6803] __x64_sys_mount+0xbe/0x150 [ 1320.857237][ T6803] do_syscall_64+0x103/0x610 [ 1320.861850][ T6803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1320.867748][ T6803] RIP: 0033:0x45a89a [ 1320.871662][ T6803] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:55 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, []}) [ 1320.891281][ T6803] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1320.899698][ T6803] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1320.907672][ T6803] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1320.915642][ T6803] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1320.923617][ T6803] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1320.931594][ T6803] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:55 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015a, 0x10400003) [ 1321.059063][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 1321.059078][ T26] audit: type=1326 audit(2000001055.932:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6930 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 03:50:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, []}) 03:50:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@v2={0x0, 0x0, 0x0, 0x0, 0x3b, "23241bb07e79afdde68c555608933460bebaaa5148a73da0acf05b48b9d92dcba829984e9cf23ea7c395f65ca3e4b7ed9305b53dfb2a13657d08b8"}, 0x45, 0x0) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 03:50:56 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015b, 0x10400003) 03:50:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, []}) 03:50:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) setresuid(0x0, 0x0, 0x0) [ 1321.502267][ T7819] FAULT_INJECTION: forcing a failure. [ 1321.502267][ T7819] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.535834][ T26] audit: type=1326 audit(2000001056.412:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7951 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 03:50:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015c, 0x10400003) [ 1321.594120][ T7819] CPU: 0 PID: 7819 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1321.603184][ T7819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.603192][ T7819] Call Trace: [ 1321.603222][ T7819] dump_stack+0x172/0x1f0 [ 1321.603246][ T7819] should_fail.cold+0xa/0x15 [ 1321.603270][ T7819] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1321.603296][ T7819] ? ___might_sleep+0x163/0x280 [ 1321.603319][ T7819] __should_failslab+0x121/0x190 [ 1321.603343][ T7819] should_failslab+0x9/0x14 [ 1321.625581][ T7819] kmem_cache_alloc_trace+0x2d1/0x760 [ 1321.625603][ T7819] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1321.625630][ T7819] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1321.625654][ T7819] __list_lru_init+0x3cf/0x6e0 [ 1321.625675][ T7819] alloc_super+0x762/0x890 [ 1321.625694][ T7819] ? test_single_super+0x10/0x10 [ 1321.676620][ T7819] sget_userns+0xf1/0x560 [ 1321.680958][ T7819] ? kill_litter_super+0x60/0x60 [ 1321.685905][ T7819] ? test_single_super+0x10/0x10 [ 1321.690844][ T7819] ? kill_litter_super+0x60/0x60 [ 1321.695804][ T7819] sget+0x10c/0x150 [ 1321.699625][ T7819] mount_bdev+0xff/0x3c0 [ 1321.703879][ T7819] ? vfat_mount+0x40/0x40 [ 1321.708219][ T7819] vfat_mount+0x35/0x40 [ 1321.712382][ T7819] ? setup+0x120/0x120 [ 1321.716463][ T7819] legacy_get_tree+0xf2/0x200 [ 1321.721151][ T7819] vfs_get_tree+0x123/0x450 [ 1321.725748][ T7819] do_mount+0x1436/0x2c40 [ 1321.730110][ T7819] ? copy_mount_string+0x40/0x40 [ 1321.735079][ T7819] ? _copy_from_user+0xdd/0x150 03:50:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015d, 0x10400003) [ 1321.739948][ T7819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1321.746187][ T7819] ? copy_mount_options+0x30e/0x440 [ 1321.751398][ T7819] ksys_mount+0xdb/0x150 [ 1321.755650][ T7819] __x64_sys_mount+0xbe/0x150 [ 1321.760342][ T7819] do_syscall_64+0x103/0x610 [ 1321.764951][ T7819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1321.770845][ T7819] RIP: 0033:0x45a89a [ 1321.774769][ T7819] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) mount$9p_virtio(&(0x7f00000000c0)='/dev/snd/controlC#\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000480)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_fscache='cache=fscache'}], [{@euid_lt={'euid<', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@subj_role={'subj_role'}}, {@fsname={'fsname', 0x3d, '/dev/snd/controlC#\x00'}}, {@uid_eq={'uid', 0x3d, r4}}, {@fsname={'fsname', 0x3d, 'selfusermime_type{mime_type[^'}}, {@measure='measure'}]}}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x7f, 0x1000, 0x72, 0x200}, {0x4, 0x8, 0x2, 0x46}, {0x2, 0x7, 0x1, 0x4}, {0x2e, 0x0, 0x7fff, 0x1b1}, {0x5, 0x5, 0x5, 0x5}, {0x9, 0x9, 0x5, 0x7}, {0x0, 0x9daf, 0x5, 0x7fff}]}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:50:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1321.794384][ T7819] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1321.802804][ T7819] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1321.810797][ T7819] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1321.818783][ T7819] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1321.826779][ T7819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1321.834771][ T7819] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015e, 0x10400003) 03:50:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:56 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:56 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x7fff, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101100, 0x0) socketpair(0xa, 0x579c5f79d80c10bc, 0x7, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:50:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:57 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000015f, 0x10400003) [ 1322.179232][ T8720] FAULT_INJECTION: forcing a failure. [ 1322.179232][ T8720] name failslab, interval 1, probability 0, space 0, times 0 03:50:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1322.243642][ T8720] CPU: 1 PID: 8720 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1322.252748][ T8720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.262816][ T8720] Call Trace: [ 1322.266123][ T8720] dump_stack+0x172/0x1f0 [ 1322.270467][ T8720] should_fail.cold+0xa/0x15 [ 1322.275071][ T8720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1322.280898][ T8720] ? ___might_sleep+0x163/0x280 [ 1322.285775][ T8720] __should_failslab+0x121/0x190 [ 1322.290725][ T8720] should_failslab+0x9/0x14 [ 1322.295251][ T8720] kmem_cache_alloc_trace+0x2d1/0x760 [ 1322.300645][ T8720] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1322.306475][ T8720] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1322.312149][ T8720] __list_lru_init+0x3cf/0x6e0 [ 1322.316920][ T8720] alloc_super+0x762/0x890 [ 1322.321337][ T8720] ? test_single_super+0x10/0x10 [ 1322.326272][ T8720] sget_userns+0xf1/0x560 [ 1322.330600][ T8720] ? kill_litter_super+0x60/0x60 [ 1322.335538][ T8720] ? test_single_super+0x10/0x10 [ 1322.340473][ T8720] ? kill_litter_super+0x60/0x60 [ 1322.345410][ T8720] sget+0x10c/0x150 [ 1322.349219][ T8720] mount_bdev+0xff/0x3c0 [ 1322.353460][ T8720] ? vfat_mount+0x40/0x40 [ 1322.357797][ T8720] vfat_mount+0x35/0x40 [ 1322.361951][ T8720] ? setup+0x120/0x120 [ 1322.366026][ T8720] legacy_get_tree+0xf2/0x200 [ 1322.370704][ T8720] vfs_get_tree+0x123/0x450 [ 1322.375256][ T8720] do_mount+0x1436/0x2c40 [ 1322.379614][ T8720] ? copy_mount_string+0x40/0x40 [ 1322.384560][ T8720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1322.390799][ T8720] ? copy_mount_options+0x30e/0x440 [ 1322.396001][ T8720] ksys_mount+0xdb/0x150 [ 1322.400244][ T8720] __x64_sys_mount+0xbe/0x150 [ 1322.404929][ T8720] do_syscall_64+0x103/0x610 [ 1322.409525][ T8720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1322.415427][ T8720] RIP: 0033:0x45a89a [ 1322.419339][ T8720] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1322.438945][ T8720] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1322.447359][ T8720] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1322.455330][ T8720] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1322.463815][ T8720] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1322.471818][ T8720] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1322.479791][ T8720] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1322.525334][ T26] audit: type=1326 audit(2000001057.402:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7951 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 03:50:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x101) 03:50:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000080)={0x7, 0x8001, 0x595a, 'queue1\x00', 0x80}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r2, 0x0, 0x1b, &(0x7f0000000000)='em1}}userppp1nodevvmnet0]\'\x00'}, 0x30) getpriority(0x2, r3) 03:50:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:57 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000160, 0x10400003) 03:50:57 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) 03:50:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xd00, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xc734, 0x4000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000080)=[0x81, 0x3f]) 03:50:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1322.835773][ T9335] FAULT_INJECTION: forcing a failure. [ 1322.835773][ T9335] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.859079][ T26] audit: type=1326 audit(2000001057.732:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9336 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 1322.919231][ T9335] CPU: 0 PID: 9335 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1322.928289][ T9335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.938350][ T9335] Call Trace: [ 1322.941669][ T9335] dump_stack+0x172/0x1f0 [ 1322.946023][ T9335] should_fail.cold+0xa/0x15 [ 1322.950631][ T9335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1322.956461][ T9335] ? ___might_sleep+0x163/0x280 [ 1322.961324][ T9335] __should_failslab+0x121/0x190 [ 1322.966270][ T9335] should_failslab+0x9/0x14 [ 1322.970798][ T9335] kmem_cache_alloc_trace+0x2d1/0x760 [ 1322.976191][ T9335] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1322.981845][ T9335] __list_lru_init+0x3cf/0x6e0 [ 1322.986620][ T9335] alloc_super+0x762/0x890 [ 1322.991043][ T9335] ? test_single_super+0x10/0x10 [ 1322.995987][ T9335] sget_userns+0xf1/0x560 [ 1323.000318][ T9335] ? kill_litter_super+0x60/0x60 [ 1323.005266][ T9335] ? test_single_super+0x10/0x10 [ 1323.010208][ T9335] ? kill_litter_super+0x60/0x60 [ 1323.015151][ T9335] sget+0x10c/0x150 03:50:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1323.018971][ T9335] mount_bdev+0xff/0x3c0 [ 1323.023223][ T9335] ? vfat_mount+0x40/0x40 [ 1323.027564][ T9335] vfat_mount+0x35/0x40 [ 1323.031727][ T9335] ? setup+0x120/0x120 [ 1323.035826][ T9335] legacy_get_tree+0xf2/0x200 [ 1323.040518][ T9335] vfs_get_tree+0x123/0x450 [ 1323.045034][ T9335] do_mount+0x1436/0x2c40 [ 1323.049373][ T9335] ? copy_mount_string+0x40/0x40 [ 1323.054325][ T9335] ? _copy_from_user+0xdd/0x150 [ 1323.059202][ T9335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1323.065478][ T9335] ? copy_mount_options+0x30e/0x440 [ 1323.070686][ T9335] ksys_mount+0xdb/0x150 [ 1323.074939][ T9335] __x64_sys_mount+0xbe/0x150 [ 1323.079635][ T9335] do_syscall_64+0x103/0x610 [ 1323.084252][ T9335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.090144][ T9335] RIP: 0033:0x45a89a [ 1323.094047][ T9335] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r1, 0x27, &(0x7f0000000100)={0x2, 0x3, 0x4, 0x2, r2}) 03:50:58 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000161, 0x10400003) [ 1323.113674][ T9335] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1323.122089][ T9335] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1323.130061][ T9335] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1323.138038][ T9335] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1323.146013][ T9335] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1323.153985][ T9335] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:58 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000162, 0x10400003) 03:50:58 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0xffff, {0xffffffffffff95b2, 0x1d952d5e, 0x7, 0x400, 0x9, 0xc4be}}) 03:50:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1323.398401][ T9921] FAULT_INJECTION: forcing a failure. [ 1323.398401][ T9921] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.483229][ T9921] CPU: 0 PID: 9921 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1323.492333][ T9921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1323.502392][ T9921] Call Trace: [ 1323.505701][ T9921] dump_stack+0x172/0x1f0 [ 1323.510056][ T9921] should_fail.cold+0xa/0x15 [ 1323.514668][ T9921] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1323.520490][ T9921] ? ___might_sleep+0x163/0x280 [ 1323.525351][ T9921] __should_failslab+0x121/0x190 [ 1323.530317][ T9921] should_failslab+0x9/0x14 [ 1323.534833][ T9921] kmem_cache_alloc_trace+0x2d1/0x760 [ 1323.540246][ T9921] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1323.546066][ T9921] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1323.551714][ T9921] __list_lru_init+0x3cf/0x6e0 [ 1323.556490][ T9921] alloc_super+0x762/0x890 [ 1323.560928][ T9921] ? test_single_super+0x10/0x10 [ 1323.565872][ T9921] sget_userns+0xf1/0x560 [ 1323.570211][ T9921] ? kill_litter_super+0x60/0x60 [ 1323.575153][ T9921] ? test_single_super+0x10/0x10 [ 1323.580098][ T9921] ? kill_litter_super+0x60/0x60 [ 1323.585036][ T9921] sget+0x10c/0x150 [ 1323.588851][ T9921] mount_bdev+0xff/0x3c0 [ 1323.593100][ T9921] ? vfat_mount+0x40/0x40 [ 1323.597442][ T9921] vfat_mount+0x35/0x40 [ 1323.601601][ T9921] ? setup+0x120/0x120 [ 1323.605678][ T9921] legacy_get_tree+0xf2/0x200 [ 1323.610357][ T9921] vfs_get_tree+0x123/0x450 [ 1323.614871][ T9921] do_mount+0x1436/0x2c40 [ 1323.619240][ T9921] ? copy_mount_string+0x40/0x40 [ 1323.624226][ T9921] ? copy_mount_options+0x244/0x440 [ 1323.629437][ T9921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1323.635672][ T9921] ? copy_mount_options+0x30e/0x440 [ 1323.640876][ T9921] ksys_mount+0xdb/0x150 [ 1323.645125][ T9921] __x64_sys_mount+0xbe/0x150 [ 1323.649844][ T9921] do_syscall_64+0x103/0x610 [ 1323.654447][ T9921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.660341][ T9921] RIP: 0033:0x45a89a [ 1323.664238][ T9921] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1323.683844][ T9921] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1323.692262][ T9921] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1323.700230][ T9921] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1323.708201][ T9921] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1323.716185][ T9921] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1323.724161][ T9921] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1323.736125][ T26] audit: type=1326 audit(2000001058.612:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9336 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 03:50:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) syz_open_pts(r0, 0x0) 03:50:58 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x101000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:50:58 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000163, 0x10400003) 03:50:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:58 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1323.963798][T10344] FAULT_INJECTION: forcing a failure. [ 1323.963798][T10344] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.014498][T10344] CPU: 1 PID: 10344 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1324.023647][T10344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.033704][T10344] Call Trace: [ 1324.037003][T10344] dump_stack+0x172/0x1f0 [ 1324.041342][T10344] should_fail.cold+0xa/0x15 [ 1324.045937][T10344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1324.051753][T10344] ? ___might_sleep+0x163/0x280 [ 1324.056638][T10344] __should_failslab+0x121/0x190 [ 1324.061575][T10344] should_failslab+0x9/0x14 [ 1324.066081][T10344] kmem_cache_alloc_trace+0x2d1/0x760 [ 1324.071452][T10344] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1324.077264][T10344] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1324.082904][T10344] __list_lru_init+0x3cf/0x6e0 [ 1324.087669][T10344] alloc_super+0x762/0x890 [ 1324.092086][T10344] ? test_single_super+0x10/0x10 [ 1324.097020][T10344] sget_userns+0xf1/0x560 [ 1324.101361][T10344] ? kill_litter_super+0x60/0x60 [ 1324.106315][T10344] ? test_single_super+0x10/0x10 [ 1324.111247][T10344] ? kill_litter_super+0x60/0x60 [ 1324.116181][T10344] sget+0x10c/0x150 [ 1324.119992][T10344] mount_bdev+0xff/0x3c0 [ 1324.124235][T10344] ? vfat_mount+0x40/0x40 [ 1324.128585][T10344] vfat_mount+0x35/0x40 [ 1324.132737][T10344] ? setup+0x120/0x120 [ 1324.136819][T10344] legacy_get_tree+0xf2/0x200 [ 1324.141500][T10344] vfs_get_tree+0x123/0x450 [ 1324.146001][T10344] do_mount+0x1436/0x2c40 [ 1324.150342][T10344] ? copy_mount_string+0x40/0x40 [ 1324.155291][T10344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1324.161534][T10344] ? copy_mount_options+0x30e/0x440 [ 1324.166735][T10344] ksys_mount+0xdb/0x150 [ 1324.170985][T10344] __x64_sys_mount+0xbe/0x150 [ 1324.175669][T10344] do_syscall_64+0x103/0x610 [ 1324.180281][T10344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.186174][T10344] RIP: 0033:0x45a89a [ 1324.190065][T10344] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1324.209659][T10344] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1324.218069][T10344] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1324.226039][T10344] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1324.234005][T10344] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1324.241971][T10344] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1324.249939][T10344] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1324.290123][ T26] audit: type=1326 audit(2000001059.162:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10428 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 03:50:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:59 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000164, 0x10400003) 03:50:59 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0xfffffffffffffe1a, 0x0, 0x0, 0x0}) 03:50:59 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1324.510779][T10751] FAULT_INJECTION: forcing a failure. [ 1324.510779][T10751] name failslab, interval 1, probability 0, space 0, times 0 03:50:59 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000165, 0x10400003) [ 1324.566640][T10986] FAT-fs (loop4): bogus number of reserved sectors [ 1324.568261][T10751] CPU: 0 PID: 10751 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1324.582289][T10751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.592342][T10751] Call Trace: [ 1324.595642][T10751] dump_stack+0x172/0x1f0 [ 1324.599981][T10751] should_fail.cold+0xa/0x15 [ 1324.600454][T10986] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1324.604574][T10751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1324.604603][T10751] ? ___might_sleep+0x163/0x280 [ 1324.604628][T10751] __should_failslab+0x121/0x190 [ 1324.604648][T10751] should_failslab+0x9/0x14 [ 1324.604667][T10751] kmem_cache_alloc_trace+0x2d1/0x760 [ 1324.604687][T10751] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1324.604712][T10751] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1324.648138][T10751] __list_lru_init+0x3cf/0x6e0 [ 1324.652919][T10751] alloc_super+0x762/0x890 [ 1324.657343][T10751] ? test_single_super+0x10/0x10 [ 1324.662282][T10751] sget_userns+0xf1/0x560 [ 1324.666643][T10751] ? kill_litter_super+0x60/0x60 [ 1324.671595][T10751] ? test_single_super+0x10/0x10 [ 1324.676548][T10751] ? kill_litter_super+0x60/0x60 [ 1324.681493][T10751] sget+0x10c/0x150 [ 1324.685311][T10751] mount_bdev+0xff/0x3c0 [ 1324.689557][T10751] ? vfat_mount+0x40/0x40 [ 1324.693900][T10751] vfat_mount+0x35/0x40 [ 1324.698056][T10751] ? setup+0x120/0x120 [ 1324.702132][T10751] legacy_get_tree+0xf2/0x200 [ 1324.706826][T10751] vfs_get_tree+0x123/0x450 [ 1324.711340][T10751] do_mount+0x1436/0x2c40 [ 1324.715681][T10751] ? copy_mount_string+0x40/0x40 [ 1324.720634][T10751] ? copy_mount_options+0x244/0x440 [ 1324.725847][T10751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1324.732107][T10751] ? copy_mount_options+0x30e/0x440 [ 1324.737341][T10751] ksys_mount+0xdb/0x150 [ 1324.741596][T10751] __x64_sys_mount+0xbe/0x150 [ 1324.746286][T10751] do_syscall_64+0x103/0x610 [ 1324.750888][T10751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.756785][T10751] RIP: 0033:0x45a89a [ 1324.760690][T10751] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1324.780302][T10751] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1324.788737][T10751] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1324.796719][T10751] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1324.804717][T10751] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1324.812689][T10751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1324.820663][T10751] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:50:59 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) bind$alg(r1, 0x0, 0x0) 03:50:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:59 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = msgget(0x1, 0x200) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/206) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1324.869140][T10986] FAT-fs (loop4): bogus number of reserved sectors [ 1324.895611][T10986] FAT-fs (loop4): Can't find a valid FAT filesystem 03:50:59 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:59 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000166, 0x10400003) 03:50:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:50:59 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$FICLONE(r0, 0x40049409, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) get_thread_area(&(0x7f0000000000)={0x1, 0x0, 0x400, 0x5, 0x4e40, 0xfffffffffffffff7, 0x0, 0x9, 0x50, 0x1}) 03:51:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount(&(0x7f0000000000)=@filename='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x14c7e310498837d1, 0x0) [ 1325.084066][T11363] FAULT_INJECTION: forcing a failure. [ 1325.084066][T11363] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.147878][T11363] CPU: 0 PID: 11363 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1325.157062][T11363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.167131][T11363] Call Trace: [ 1325.170450][T11363] dump_stack+0x172/0x1f0 [ 1325.174817][T11363] should_fail.cold+0xa/0x15 [ 1325.179430][T11363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1325.185246][T11363] ? ___might_sleep+0x163/0x280 [ 1325.190112][T11363] __should_failslab+0x121/0x190 [ 1325.195063][T11363] should_failslab+0x9/0x14 [ 1325.199575][T11363] kmem_cache_alloc_trace+0x2d1/0x760 [ 1325.204966][T11363] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1325.210815][T11363] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1325.216468][T11363] __list_lru_init+0x3cf/0x6e0 [ 1325.221247][T11363] alloc_super+0x78d/0x890 [ 1325.225674][T11363] ? test_single_super+0x10/0x10 [ 1325.230620][T11363] sget_userns+0xf1/0x560 [ 1325.234955][T11363] ? kill_litter_super+0x60/0x60 [ 1325.239900][T11363] ? test_single_super+0x10/0x10 [ 1325.244838][T11363] ? kill_litter_super+0x60/0x60 [ 1325.249788][T11363] sget+0x10c/0x150 [ 1325.253632][T11363] mount_bdev+0xff/0x3c0 [ 1325.257907][T11363] ? vfat_mount+0x40/0x40 [ 1325.262250][T11363] vfat_mount+0x35/0x40 [ 1325.266415][T11363] ? setup+0x120/0x120 [ 1325.270493][T11363] legacy_get_tree+0xf2/0x200 [ 1325.275188][T11363] vfs_get_tree+0x123/0x450 [ 1325.279704][T11363] do_mount+0x1436/0x2c40 [ 1325.284050][T11363] ? copy_mount_string+0x40/0x40 [ 1325.289007][T11363] ? _copy_from_user+0xdd/0x150 [ 1325.293869][T11363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1325.300114][T11363] ? copy_mount_options+0x30e/0x440 [ 1325.305331][T11363] ksys_mount+0xdb/0x150 [ 1325.309586][T11363] __x64_sys_mount+0xbe/0x150 [ 1325.314274][T11363] do_syscall_64+0x103/0x610 [ 1325.318889][T11363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.324798][T11363] RIP: 0033:0x45a89a [ 1325.329194][T11363] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:00 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000167, 0x10400003) [ 1325.348835][T11363] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1325.357271][T11363] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1325.365326][T11363] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1325.373317][T11363] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1325.381326][T11363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1325.389301][T11363] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:00 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:00 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000080)=""/167) syncfs(r2) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0xfffffffffffffffd, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) prctl$PR_SET_UNALIGN(0x6, 0x2) 03:51:00 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000168, 0x10400003) 03:51:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1325.684367][T12081] FAULT_INJECTION: forcing a failure. [ 1325.684367][T12081] name failslab, interval 1, probability 0, space 0, times 0 [ 1325.712040][T12081] CPU: 0 PID: 12081 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1325.721165][T12081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.731220][T12081] Call Trace: [ 1325.731250][T12081] dump_stack+0x172/0x1f0 [ 1325.731277][T12081] should_fail.cold+0xa/0x15 [ 1325.731303][T12081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1325.731331][T12081] ? ___might_sleep+0x163/0x280 [ 1325.731360][T12081] __should_failslab+0x121/0x190 [ 1325.759103][T12081] should_failslab+0x9/0x14 [ 1325.763625][T12081] __kmalloc+0x2dc/0x740 [ 1325.767886][T12081] ? __list_lru_init+0xd1/0x6e0 [ 1325.772745][T12081] __list_lru_init+0xd1/0x6e0 [ 1325.777458][T12081] alloc_super+0x78d/0x890 [ 1325.781886][T12081] ? test_single_super+0x10/0x10 [ 1325.786840][T12081] sget_userns+0xf1/0x560 [ 1325.786856][T12081] ? kill_litter_super+0x60/0x60 [ 1325.786872][T12081] ? test_single_super+0x10/0x10 [ 1325.786884][T12081] ? kill_litter_super+0x60/0x60 [ 1325.786899][T12081] sget+0x10c/0x150 [ 1325.786919][T12081] mount_bdev+0xff/0x3c0 [ 1325.786935][T12081] ? vfat_mount+0x40/0x40 [ 1325.786956][T12081] vfat_mount+0x35/0x40 [ 1325.786979][T12081] ? setup+0x120/0x120 [ 1325.826626][T12081] legacy_get_tree+0xf2/0x200 [ 1325.831325][T12081] vfs_get_tree+0x123/0x450 [ 1325.835844][T12081] do_mount+0x1436/0x2c40 [ 1325.840190][T12081] ? copy_mount_string+0x40/0x40 [ 1325.845139][T12081] ? _copy_from_user+0xdd/0x150 [ 1325.850009][T12081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1325.856253][T12081] ? copy_mount_options+0x30e/0x440 [ 1325.861461][T12081] ksys_mount+0xdb/0x150 [ 1325.865712][T12081] __x64_sys_mount+0xbe/0x150 [ 1325.870404][T12081] do_syscall_64+0x103/0x610 [ 1325.875008][T12081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.880917][T12081] RIP: 0033:0x45a89a [ 1325.884821][T12081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1325.904427][T12081] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1325.912847][T12081] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1325.920859][T12081] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 03:51:00 executing program 2: socket$key(0xf, 0x3, 0x2) prctl$PR_GET_TIMERSLACK(0x1e) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008d13, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = fcntl$getown(r1, 0x9) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000180)) ptrace$getsig(0x4202, r2, 0xff, &(0x7f0000000080)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmsg$tipc(r3, &(0x7f00000006c0)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x2, 0x4}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000200)="777629ccb6a716595780c56ea5f31d028f9d9ef23d68655e114cab497f21d71ce62af927a0fbdec40b80aa19175dfc70165d371e5fa6e711a9e4653bbacfab731dcad69c6df4f3b4b5f8af3f6b463d2e0d2d3381f3ac8cd908fbc155efc9c2ed07688526db88017f722317da6b1d7293dcd921855a6d0ea7c7c0d7ad6d04a40078ffe2c05ec1c627bf7f334d222862b4bcb879ae8811197ea0ada618c448605c1018c4b734d0812e84ad82eab1fa1a0a5ef62b254db6714cb1f2fa641f0f624a2ee6436f311d218a3092073dfbe45cedd71b9124f29fa59da39988ebe55a71bd166341bd1799f5aa94eaa41caf", 0xed}, {&(0x7f0000000300)="ddd4fb5d224da6cc1f251eca223e7aa42992ce47c0b4f580e463ebef574f3ea010c12d8d51f810de5ee4b118aab8f0a61bc1832e84db69032b43a6090aa67c7358eb830441fc6747324bc6a7c94ac983a9b3089480c6a8d1537b5d2a06654863a06b70ca2a562eb76b1df790a95118cd574fa00fb47e65784041432d39b72b0a246d97f10c1f6d594c080f3b386cd8218807c219b1a04a7c9c2d7682270c7ce7fe387e775fc62d17790056a3d97cbfe67e69e8da66dfbec27920fff1edeaef70f99a9dab200c942e8a6304325ad6decedeb02c6d8bb2736bb1132e4ec8abba7e8b127717176c", 0xe6}, {&(0x7f0000000400)="9261243b69a0ec4ebd4bcd6c39dbff11255da0216af25f143e134b8c9eeb7bc10b59e4e659ff3cf9eb790ed255cfa00c5e7034560f8c27b272843a5ed5043e103c73f5f8797e2abfbcc4a85f990a65df500f44b0ac9b69822deee30ff89f9ea4717c", 0x62}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000002780)="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", 0x1000}, {&(0x7f0000000480)="361b08c439767b0efec6d701541e890a264c41412689ab41e3b3c086f427bf9396dfb76f94eecf260bd7b9828acb83289ee90dd532c01f2cb2bfb9cd551cb0831611cbe34ae90465340905a9bcebfae768a68ba3e1996391ad4f21725e81f4fa358417e72b504f0d87e8ffdcfc613d7b560989d32121dc83e60097b49db59a", 0x7f}, {&(0x7f0000000500)="68e7b0ee5d8ae063e19b656c0d6419622461e33d41d4b974beb713f3e07152842396229528b961e78dbc77fea3ef43cbb71e8a747eb05e82c7818eb3a387061c74f0c131a4206b25c80de65ffca11323fc041b22252ae3449351dbfb7a391e38aa329618846bc3ae935bc1ca1f3e55ed6efb14388871076ecda280ed5959d7a33e2b3ef25dd80e1f3dfba441790cffae440fad", 0x93}], 0x8, &(0x7f0000000640)="6ae0a5a3fdcb1a4936209d5dae9055828c8bcd136bf2de13ba79bdb3b3311abb4bc877f251038a4907e1c7db2ad7748e99988a88c40b74c0151c28bf6c3a8c3b1cac714233d615e34f953c8e31d728ba900753b312b6db24", 0x58, 0x4011}, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1325.928845][T12081] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1325.936822][T12081] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1325.944808][T12081] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:00 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000169, 0x10400003) 03:51:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:01 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) bind$x25(r2, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0xb3) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000ffd000/0x2000)=nil}) fcntl$dupfd(r0, 0x400000000000000, r2) 03:51:01 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1326.299919][T12758] FAT-fs (loop4): bogus number of reserved sectors 03:51:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1326.374791][T12758] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:01 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016a, 0x10400003) [ 1326.439051][T12945] FAULT_INJECTION: forcing a failure. [ 1326.439051][T12945] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.486922][T12758] FAT-fs (loop4): bogus number of reserved sectors [ 1326.495652][T12945] CPU: 1 PID: 12945 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1326.504781][T12945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.514843][T12945] Call Trace: [ 1326.518160][T12945] dump_stack+0x172/0x1f0 [ 1326.521533][T12758] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1326.522510][T12945] should_fail.cold+0xa/0x15 [ 1326.533751][T12945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1326.539586][T12945] ? ___might_sleep+0x163/0x280 [ 1326.544450][T12945] __should_failslab+0x121/0x190 [ 1326.549399][T12945] should_failslab+0x9/0x14 [ 1326.553914][T12945] kmem_cache_alloc_node_trace+0x270/0x720 [ 1326.559742][T12945] __kmalloc_node+0x3d/0x70 [ 1326.564263][T12945] kvmalloc_node+0x68/0x100 [ 1326.568790][T12945] __list_lru_init+0x4a6/0x6e0 [ 1326.573568][T12945] alloc_super+0x78d/0x890 [ 1326.577995][T12945] ? test_single_super+0x10/0x10 [ 1326.582941][T12945] sget_userns+0xf1/0x560 [ 1326.587280][T12945] ? kill_litter_super+0x60/0x60 [ 1326.592229][T12945] ? test_single_super+0x10/0x10 [ 1326.597171][T12945] ? kill_litter_super+0x60/0x60 [ 1326.602117][T12945] sget+0x10c/0x150 [ 1326.605940][T12945] mount_bdev+0xff/0x3c0 [ 1326.610193][T12945] ? vfat_mount+0x40/0x40 [ 1326.614547][T12945] vfat_mount+0x35/0x40 [ 1326.618709][T12945] ? setup+0x120/0x120 [ 1326.622795][T12945] legacy_get_tree+0xf2/0x200 [ 1326.627482][T12945] vfs_get_tree+0x123/0x450 [ 1326.631993][T12945] do_mount+0x1436/0x2c40 [ 1326.636338][T12945] ? copy_mount_string+0x40/0x40 [ 1326.641289][T12945] ? _copy_from_user+0xdd/0x150 [ 1326.646161][T12945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1326.652403][T12945] ? copy_mount_options+0x30e/0x440 [ 1326.657607][T12945] ksys_mount+0xdb/0x150 [ 1326.661867][T12945] __x64_sys_mount+0xbe/0x150 [ 1326.666554][T12945] do_syscall_64+0x103/0x610 [ 1326.671164][T12945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.677058][T12945] RIP: 0033:0x45a89a [ 1326.680983][T12945] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1326.700589][T12945] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1326.709006][T12945] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1326.716987][T12945] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1326.724958][T12945] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1326.732952][T12945] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1326.740928][T12945] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0xfffffffffffffffd, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000300)={{0x2, 0x4e21, @empty}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 'irlan0\x00'}) prctl$PR_SET_UNALIGN(0x6, 0x2) 03:51:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:01 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000080)) epoll_create1(0x17cd0e94486f895a) 03:51:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:01 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016b, 0x10400003) [ 1327.011825][T13206] FAT-fs (loop4): bogus number of reserved sectors [ 1327.019175][T13206] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:01 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, 0x11, 0xd, 0x100, 0x70bd2a, 0x25dfdbfe, {0x1, 0x0, 0x9}, [@typed={0x18, 0x3e, @str='/dev/snd/controlC#\x00'}, @typed={0x8, 0x8a, @pid=r2}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000001) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:02 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016c, 0x10400003) [ 1327.204970][T13206] FAT-fs (loop4): bogus number of reserved sectors [ 1327.211527][T13206] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1327.247651][T13649] FAULT_INJECTION: forcing a failure. [ 1327.247651][T13649] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.300868][T13649] CPU: 0 PID: 13649 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1327.310009][T13649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.320066][T13649] Call Trace: [ 1327.323370][T13649] dump_stack+0x172/0x1f0 [ 1327.328162][T13649] should_fail.cold+0xa/0x15 [ 1327.332778][T13649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.338620][T13649] ? ___might_sleep+0x163/0x280 [ 1327.343479][T13649] __should_failslab+0x121/0x190 [ 1327.348428][T13649] should_failslab+0x9/0x14 [ 1327.352943][T13649] kmem_cache_alloc_trace+0x2d1/0x760 [ 1327.358326][T13649] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1327.364154][T13649] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1327.369814][T13649] __list_lru_init+0x3cf/0x6e0 [ 1327.374591][T13649] alloc_super+0x78d/0x890 [ 1327.379013][T13649] ? test_single_super+0x10/0x10 [ 1327.383957][T13649] sget_userns+0xf1/0x560 [ 1327.388312][T13649] ? kill_litter_super+0x60/0x60 [ 1327.393259][T13649] ? test_single_super+0x10/0x10 [ 1327.398199][T13649] ? kill_litter_super+0x60/0x60 [ 1327.403140][T13649] sget+0x10c/0x150 [ 1327.406959][T13649] mount_bdev+0xff/0x3c0 [ 1327.411210][T13649] ? vfat_mount+0x40/0x40 [ 1327.415550][T13649] vfat_mount+0x35/0x40 [ 1327.419713][T13649] ? setup+0x120/0x120 [ 1327.423804][T13649] legacy_get_tree+0xf2/0x200 [ 1327.428495][T13649] vfs_get_tree+0x123/0x450 [ 1327.433004][T13649] do_mount+0x1436/0x2c40 [ 1327.437350][T13649] ? copy_mount_string+0x40/0x40 [ 1327.442292][T13649] ? copy_mount_options+0x1de/0x440 [ 1327.447515][T13649] ? __sanitizer_cov_trace_pc+0x11/0x50 [ 1327.453065][T13649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.459310][T13649] ? copy_mount_options+0x30e/0x440 [ 1327.464522][T13649] ksys_mount+0xdb/0x150 [ 1327.468786][T13649] __x64_sys_mount+0xbe/0x150 [ 1327.473484][T13649] do_syscall_64+0x103/0x610 [ 1327.478087][T13649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.483980][T13649] RIP: 0033:0x45a89a [ 1327.487893][T13649] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1327.507496][T13649] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1327.515910][T13649] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1327.523883][T13649] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1327.531856][T13649] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1327.539832][T13649] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1327.547815][T13649] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:02 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016d, 0x10400003) 03:51:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1327.713837][T13979] FAT-fs (loop4): bogus number of reserved sectors [ 1327.735534][T13979] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x17, 0x0, 0x0}) 03:51:02 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400001, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000080)=[0x0, 0x31]) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:02 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:02 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016e, 0x10400003) [ 1328.052014][T14213] FAT-fs (loop4): bogus number of reserved sectors [ 1328.070753][T14210] FAULT_INJECTION: forcing a failure. [ 1328.070753][T14210] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.087712][T14213] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1328.136039][T14210] CPU: 1 PID: 14210 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1328.145194][T14210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.155247][T14210] Call Trace: [ 1328.158560][T14210] dump_stack+0x172/0x1f0 [ 1328.162898][T14210] should_fail.cold+0xa/0x15 [ 1328.167491][T14210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1328.173305][T14210] ? ___might_sleep+0x163/0x280 [ 1328.178163][T14210] __should_failslab+0x121/0x190 [ 1328.183101][T14210] should_failslab+0x9/0x14 [ 1328.187608][T14210] kmem_cache_alloc_trace+0x2d1/0x760 [ 1328.192985][T14210] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1328.198803][T14210] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1328.204440][T14210] __list_lru_init+0x3cf/0x6e0 [ 1328.209206][T14210] alloc_super+0x78d/0x890 [ 1328.213623][T14210] ? test_single_super+0x10/0x10 [ 1328.218561][T14210] sget_userns+0xf1/0x560 [ 1328.222889][T14210] ? kill_litter_super+0x60/0x60 [ 1328.227851][T14210] ? test_single_super+0x10/0x10 [ 1328.232796][T14210] ? kill_litter_super+0x60/0x60 [ 1328.237728][T14210] sget+0x10c/0x150 [ 1328.241560][T14210] mount_bdev+0xff/0x3c0 [ 1328.245804][T14210] ? vfat_mount+0x40/0x40 [ 1328.250137][T14210] vfat_mount+0x35/0x40 [ 1328.254305][T14210] ? setup+0x120/0x120 [ 1328.258386][T14210] legacy_get_tree+0xf2/0x200 [ 1328.263082][T14210] vfs_get_tree+0x123/0x450 [ 1328.267600][T14210] do_mount+0x1436/0x2c40 [ 1328.271934][T14210] ? copy_mount_string+0x40/0x40 [ 1328.276872][T14210] ? _copy_from_user+0xdd/0x150 [ 1328.281729][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1328.287972][T14210] ? copy_mount_options+0x30e/0x440 [ 1328.293172][T14210] ksys_mount+0xdb/0x150 [ 1328.297414][T14210] __x64_sys_mount+0xbe/0x150 [ 1328.302103][T14210] do_syscall_64+0x103/0x610 [ 1328.306720][T14210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1328.312619][T14210] RIP: 0033:0x45a89a [ 1328.316522][T14210] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1328.336132][T14210] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1328.344563][T14210] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1328.352529][T14210] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1328.360490][T14210] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1328.368474][T14210] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1328.376442][T14210] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:03 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x101001) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0xc000}, 0x800) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:03 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x40) 03:51:03 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016f, 0x10400003) [ 1328.421579][T14213] FAT-fs (loop4): bogus number of reserved sectors [ 1328.441261][T14213] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:03 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2400, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000340)=0x9, &(0x7f0000000480)=0x2) r1 = openat(r0, &(0x7f0000000200)='./file0\x00', 0x10000, 0x80) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1200008912, &(0x7f0000000380)="ca9f8c504ef6c2a274d95c17fad1734dd1ff513b0a9a1678059463341b8a3a580c91406a0c51630fead5d3f958357d2825ed45c838abd2ed4678e1bdca6a3c1ae72eb0ea569e6870a6500a66ab99af40399f691bc15545c1dda45682e0d714b280646d2f7da05cb81036f0b91ca295a0d340a574dc9cef8d232fa9399614b67d1cb1e81b08c9e4b157d145fec20166092b54ab1f4ab8ea45f1aef4b436cb62dfba07a21ad6bff50163da9eef4e25068c65232fe5793a3a00d663a7a91a6d33ebc06c4c1242209d1e755b0b") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r4, 0x0, 0x1, 0x4}}, 0x1c) sendfile(r2, r1, 0x0, 0x9) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x35, 0x30c, 0x70bd2c, 0x25dfdbfe, {0x1c}}, 0x14}, 0x1, 0x0, 0x0, 0x40d0}, 0x80) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x100, 0x0) getsockopt$inet_int(r3, 0x0, 0x21, &(0x7f00000004c0), &(0x7f0000000500)=0x4) 03:51:03 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000300)={0x3, 0x0, 0xfffffffffffffffd}) 03:51:03 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1328.637800][T14760] FAT-fs (loop4): bogus number of reserved sectors 03:51:03 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000170, 0x10400003) 03:51:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1328.680215][T14760] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:03 executing program 3: r0 = socket$unix(0x1, 0x801, 0x0) bind$unix(r0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 1328.736586][T14881] FAULT_INJECTION: forcing a failure. [ 1328.736586][T14881] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.768186][T14881] CPU: 0 PID: 14881 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1328.777311][T14881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.787364][T14881] Call Trace: [ 1328.790671][T14881] dump_stack+0x172/0x1f0 [ 1328.795020][T14881] should_fail.cold+0xa/0x15 [ 1328.799626][T14881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1328.805449][T14881] ? ___might_sleep+0x163/0x280 [ 1328.810309][T14881] __should_failslab+0x121/0x190 [ 1328.815260][T14881] should_failslab+0x9/0x14 [ 1328.819803][T14881] kmem_cache_alloc_trace+0x2d1/0x760 [ 1328.825198][T14881] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1328.831020][T14881] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1328.836665][T14881] __list_lru_init+0x3cf/0x6e0 [ 1328.841441][T14881] alloc_super+0x78d/0x890 [ 1328.845865][T14881] ? test_single_super+0x10/0x10 [ 1328.850815][T14881] sget_userns+0xf1/0x560 [ 1328.855153][T14881] ? kill_litter_super+0x60/0x60 [ 1328.860098][T14881] ? test_single_super+0x10/0x10 [ 1328.865036][T14881] ? kill_litter_super+0x60/0x60 [ 1328.869978][T14881] sget+0x10c/0x150 [ 1328.873821][T14881] mount_bdev+0xff/0x3c0 [ 1328.878071][T14881] ? vfat_mount+0x40/0x40 [ 1328.882411][T14881] vfat_mount+0x35/0x40 [ 1328.886576][T14881] ? setup+0x120/0x120 [ 1328.890745][T14881] legacy_get_tree+0xf2/0x200 [ 1328.895440][T14881] vfs_get_tree+0x123/0x450 [ 1328.899948][T14881] do_mount+0x1436/0x2c40 [ 1328.904295][T14881] ? copy_mount_string+0x40/0x40 [ 1328.909249][T14881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1328.915494][T14881] ? copy_mount_options+0x30e/0x440 [ 1328.920704][T14881] ksys_mount+0xdb/0x150 [ 1328.924955][T14881] __x64_sys_mount+0xbe/0x150 [ 1328.929641][T14881] do_syscall_64+0x103/0x610 [ 1328.934277][T14881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1328.940174][T14881] RIP: 0033:0x45a89a [ 1328.944075][T14881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1328.963680][T14881] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1328.972090][T14881] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:51:03 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000171, 0x10400003) 03:51:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x2200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x4, &(0x7f0000000080)="2adc1f121e00341e42266eb287264e0e2307c16d7e0f98f20b2f2d93dbeb8a5626941b842e5b4501b5c6699ceaeb7f06a8b77ec55d21288433477960bc239f942958cc75dfa7db826c80c77091ef3a77122759ada9e31ca5eac2f52c10bfb4549a2e957154425e01c05a68ed41bd0496dd5989c51eb043523f7684f86c82d66faeb1030c2e9e8114ac93b82d53fc397400b6dfa75b911c6a20e52c") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1328.980063][T14881] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1328.988043][T14881] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1328.996015][T14881] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1329.003987][T14881] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:03 executing program 3: [ 1329.052578][T14760] FAT-fs (loop4): bogus number of reserved sectors [ 1329.069595][T14760] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008913, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x81, 0x101000) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000080)={0x663, 0xfffffffffffffffb}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:04 executing program 3: 03:51:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:04 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000172, 0x10400003) 03:51:04 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:04 executing program 3: [ 1329.300673][T15388] FAT-fs (loop4): bogus number of reserved sectors 03:51:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) [ 1329.373477][T15388] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:04 executing program 3: [ 1329.490809][T15388] FAT-fs (loop4): bogus number of reserved sectors [ 1329.527553][T15388] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) tgkill(r2, r3, 0x1b) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:04 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000173, 0x10400003) 03:51:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat&', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:04 executing program 3: 03:51:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1329.707636][T15954] FAULT_INJECTION: forcing a failure. [ 1329.707636][T15954] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.736978][T15954] CPU: 1 PID: 15954 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1329.746096][T15954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.756152][T15954] Call Trace: [ 1329.756183][T15954] dump_stack+0x172/0x1f0 [ 1329.756209][T15954] should_fail.cold+0xa/0x15 [ 1329.756232][T15954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1329.756259][T15954] ? ___might_sleep+0x163/0x280 [ 1329.756288][T15954] __should_failslab+0x121/0x190 [ 1329.763887][T15954] should_failslab+0x9/0x14 [ 1329.763906][T15954] kmem_cache_alloc_trace+0x2d1/0x760 [ 1329.763927][T15954] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1329.763954][T15954] __memcg_init_list_lru_node+0x8a/0x1e0 03:51:04 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000174, 0x10400003) [ 1329.763977][T15954] __list_lru_init+0x3cf/0x6e0 [ 1329.763998][T15954] alloc_super+0x78d/0x890 [ 1329.774373][T15954] ? test_single_super+0x10/0x10 [ 1329.774391][T15954] sget_userns+0xf1/0x560 [ 1329.774406][T15954] ? kill_litter_super+0x60/0x60 [ 1329.774424][T15954] ? test_single_super+0x10/0x10 [ 1329.774437][T15954] ? kill_litter_super+0x60/0x60 [ 1329.774451][T15954] sget+0x10c/0x150 [ 1329.774471][T15954] mount_bdev+0xff/0x3c0 [ 1329.774487][T15954] ? vfat_mount+0x40/0x40 [ 1329.774507][T15954] vfat_mount+0x35/0x40 [ 1329.855263][T15954] ? setup+0x120/0x120 [ 1329.859363][T15954] legacy_get_tree+0xf2/0x200 [ 1329.864094][T15954] vfs_get_tree+0x123/0x450 [ 1329.868606][T15954] do_mount+0x1436/0x2c40 [ 1329.872948][T15954] ? copy_mount_string+0x40/0x40 [ 1329.877890][T15954] ? copy_mount_options+0x2e5/0x440 [ 1329.883097][T15954] ? copy_mount_options+0x309/0x440 [ 1329.888308][T15954] ? copy_mount_options+0x30e/0x440 [ 1329.893519][T15954] ksys_mount+0xdb/0x150 [ 1329.897781][T15954] __x64_sys_mount+0xbe/0x150 [ 1329.902477][T15954] do_syscall_64+0x103/0x610 [ 1329.907110][T15954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1329.913004][T15954] RIP: 0033:0x45a89a [ 1329.916907][T15954] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1329.936537][T15954] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1329.944947][T15954] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:51:04 executing program 3: [ 1329.952923][T15954] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1329.960896][T15954] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1329.968866][T15954] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1329.976836][T15954] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:05 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:05 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000175, 0x10400003) 03:51:05 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) 03:51:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat&', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1330.268585][T16339] FAULT_INJECTION: forcing a failure. [ 1330.268585][T16339] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.336125][T16339] CPU: 1 PID: 16339 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1330.345271][T16339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1330.355333][T16339] Call Trace: [ 1330.358642][T16339] dump_stack+0x172/0x1f0 [ 1330.362989][T16339] should_fail.cold+0xa/0x15 [ 1330.367590][T16339] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1330.373407][T16339] ? ___might_sleep+0x163/0x280 [ 1330.378266][T16339] __should_failslab+0x121/0x190 [ 1330.383221][T16339] should_failslab+0x9/0x14 [ 1330.387729][T16339] kmem_cache_alloc_trace+0x2d1/0x760 [ 1330.387751][T16339] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1330.387787][T16339] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1330.387814][T16339] __list_lru_init+0x3cf/0x6e0 [ 1330.398982][T16339] alloc_super+0x78d/0x890 [ 1330.399000][T16339] ? test_single_super+0x10/0x10 [ 1330.399018][T16339] sget_userns+0xf1/0x560 [ 1330.399032][T16339] ? kill_litter_super+0x60/0x60 [ 1330.399052][T16339] ? test_single_super+0x10/0x10 [ 1330.413821][T16339] ? kill_litter_super+0x60/0x60 [ 1330.413851][T16339] sget+0x10c/0x150 [ 1330.413887][T16339] mount_bdev+0xff/0x3c0 [ 1330.413905][T16339] ? vfat_mount+0x40/0x40 [ 1330.413925][T16339] vfat_mount+0x35/0x40 [ 1330.413941][T16339] ? setup+0x120/0x120 [ 1330.413965][T16339] legacy_get_tree+0xf2/0x200 [ 1330.423206][T16339] vfs_get_tree+0x123/0x450 [ 1330.423227][T16339] do_mount+0x1436/0x2c40 [ 1330.423251][T16339] ? copy_mount_string+0x40/0x40 [ 1330.423272][T16339] ? _copy_from_user+0xdd/0x150 [ 1330.423307][T16339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1330.488556][T16339] ? copy_mount_options+0x30e/0x440 [ 1330.493775][T16339] ksys_mount+0xdb/0x150 [ 1330.498026][T16339] __x64_sys_mount+0xbe/0x150 [ 1330.502711][T16339] do_syscall_64+0x103/0x610 [ 1330.507323][T16339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1330.513216][T16339] RIP: 0033:0x45a89a [ 1330.517114][T16339] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:05 executing program 3: [ 1330.536719][T16339] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1330.545137][T16339] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1330.553108][T16339] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1330.561078][T16339] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1330.569049][T16339] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1330.577019][T16339] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:05 executing program 3: 03:51:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = dup(r1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000080)=""/80) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:05 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000176, 0x10400003) 03:51:05 executing program 3: 03:51:05 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xc0', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:05 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000177, 0x10400003) 03:51:05 executing program 3: 03:51:05 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) signalfd(r0, &(0x7f0000000000)={0x5}, 0x8) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x100000000}}, 0x18) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfa2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000240)=0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000200)={r2, 0xffffffff}, &(0x7f0000000540)=0xffffffffffffff49) r4 = socket$alg(0x26, 0x5, 0x0) unshare(0x20000000) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r0, 0x0, &(0x7f0000000340)=0xffffffffffffff09, 0x8000) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r5, r6, &(0x7f0000000040)=0x500, 0x10000000000443) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000df8000/0x3000)=nil, &(0x7f0000000440)) r7 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000e57000/0x1000)=nil) shmctl$IPC_RMID(r7, 0x0) writev(r5, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r5, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r5, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") 03:51:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1330.938038][T17153] FAULT_INJECTION: forcing a failure. [ 1330.938038][T17153] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.006128][T17153] CPU: 1 PID: 17153 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1331.015277][T17153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.015284][T17153] Call Trace: [ 1331.015319][T17153] dump_stack+0x172/0x1f0 [ 1331.015343][T17153] should_fail.cold+0xa/0x15 [ 1331.037565][T17153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1331.037590][T17153] ? ___might_sleep+0x163/0x280 [ 1331.037612][T17153] __should_failslab+0x121/0x190 [ 1331.037635][T17153] should_failslab+0x9/0x14 [ 1331.057676][T17153] kmem_cache_alloc_trace+0x2d1/0x760 [ 1331.063062][T17153] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1331.068885][T17153] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1331.074529][T17153] __list_lru_init+0x3cf/0x6e0 [ 1331.079314][T17153] alloc_super+0x78d/0x890 [ 1331.083736][T17153] ? test_single_super+0x10/0x10 [ 1331.088688][T17153] sget_userns+0xf1/0x560 [ 1331.093022][T17153] ? kill_litter_super+0x60/0x60 [ 1331.097968][T17153] ? test_single_super+0x10/0x10 [ 1331.102905][T17153] ? kill_litter_super+0x60/0x60 [ 1331.107842][T17153] sget+0x10c/0x150 [ 1331.111658][T17153] mount_bdev+0xff/0x3c0 [ 1331.115914][T17153] ? vfat_mount+0x40/0x40 [ 1331.120259][T17153] vfat_mount+0x35/0x40 [ 1331.124449][T17153] ? setup+0x120/0x120 [ 1331.128527][T17153] legacy_get_tree+0xf2/0x200 [ 1331.133211][T17153] vfs_get_tree+0x123/0x450 [ 1331.137725][T17153] do_mount+0x1436/0x2c40 [ 1331.142091][T17153] ? copy_mount_string+0x40/0x40 [ 1331.147037][T17153] ? _copy_from_user+0xdd/0x150 [ 1331.151898][T17153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1331.158143][T17153] ? copy_mount_options+0x30e/0x440 [ 1331.163360][T17153] ksys_mount+0xdb/0x150 [ 1331.167611][T17153] __x64_sys_mount+0xbe/0x150 [ 1331.172309][T17153] do_syscall_64+0x103/0x610 [ 1331.176912][T17153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1331.182822][T17153] RIP: 0033:0x45a89a [ 1331.186740][T17153] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:06 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000016a, 0x10400003) 03:51:06 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000178, 0x10400003) [ 1331.206351][T17153] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1331.214775][T17153] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1331.222747][T17153] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1331.230726][T17153] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1331.238704][T17153] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1331.246686][T17153] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:06 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x0f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:06 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x400) 03:51:06 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000179, 0x10400003) 03:51:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:06 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000159, 0x10400003) [ 1331.517658][T17574] FAULT_INJECTION: forcing a failure. [ 1331.517658][T17574] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.530896][T17574] CPU: 0 PID: 17574 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1331.540009][T17574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.540017][T17574] Call Trace: [ 1331.540047][T17574] dump_stack+0x172/0x1f0 [ 1331.540071][T17574] should_fail.cold+0xa/0x15 [ 1331.562311][T17574] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1331.568151][T17574] ? ___might_sleep+0x163/0x280 [ 1331.573018][T17574] __should_failslab+0x121/0x190 [ 1331.577973][T17574] should_failslab+0x9/0x14 [ 1331.582481][T17574] kmem_cache_alloc_trace+0x2d1/0x760 [ 1331.582503][T17574] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1331.582530][T17574] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1331.582554][T17574] __list_lru_init+0x3cf/0x6e0 [ 1331.582577][T17574] alloc_super+0x78d/0x890 [ 1331.582596][T17574] ? test_single_super+0x10/0x10 [ 1331.599401][T17574] sget_userns+0xf1/0x560 [ 1331.599417][T17574] ? kill_litter_super+0x60/0x60 [ 1331.599435][T17574] ? test_single_super+0x10/0x10 [ 1331.599448][T17574] ? kill_litter_super+0x60/0x60 [ 1331.599463][T17574] sget+0x10c/0x150 [ 1331.599483][T17574] mount_bdev+0xff/0x3c0 [ 1331.599500][T17574] ? vfat_mount+0x40/0x40 [ 1331.599527][T17574] vfat_mount+0x35/0x40 [ 1331.608679][T17574] ? setup+0x120/0x120 [ 1331.608701][T17574] legacy_get_tree+0xf2/0x200 [ 1331.608719][T17574] vfs_get_tree+0x123/0x450 [ 1331.662485][T17574] do_mount+0x1436/0x2c40 [ 1331.666846][T17574] ? copy_mount_string+0x40/0x40 [ 1331.671811][T17574] ? copy_mount_options+0x234/0x440 [ 1331.677020][T17574] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 1331.682577][T17574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1331.688837][T17574] ? copy_mount_options+0x30e/0x440 [ 1331.694046][T17574] ksys_mount+0xdb/0x150 [ 1331.698301][T17574] __x64_sys_mount+0xbe/0x150 [ 1331.702993][T17574] do_syscall_64+0x103/0x610 [ 1331.707597][T17574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1331.713493][T17574] RIP: 0033:0x45a89a 03:51:06 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1331.717391][T17574] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1331.737086][T17574] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1331.745502][T17574] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1331.745513][T17574] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1331.745524][T17574] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1331.745534][T17574] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1331.745544][T17574] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:06 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000159, 0x10400003) 03:51:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:06 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4801, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r4 = accept$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x40000, &(0x7f0000000ac0)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@debug={'debug', 0x3d, 0x8}}, {@access_any='access=any'}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@version_u='version=9p2000.u'}, {@access_user='access=user'}, {@version_9p2000='version=9p2000'}, {@loose='loose'}, {@noextend='noextend'}], [{@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r7}}, {@fowner_lt={'fowner<', r8}}, {@pcr={'pcr', 0x3d, 0xa}}]}}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c00)={'\x00', r9}) accept$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000980)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000100}, 0xc, &(0x7f0000000940)={&(0x7f00000007c0)={0x144, r3, 0x4, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x128, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9967}}}]}}]}, 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 03:51:06 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017a, 0x10400003) 03:51:06 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:06 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000f0, 0x10400003) 03:51:07 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x21, "fdb66f954dbcd84880d2a10a0da4054c787e1c4b123292ce19a4d7cd94aa800b33"}, &(0x7f0000000240)=0x29) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1332.145504][T18376] FAULT_INJECTION: forcing a failure. [ 1332.145504][T18376] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.148251][T18438] FAT-fs (loop4): bogus number of reserved sectors [ 1332.183507][T18376] CPU: 1 PID: 18376 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 03:51:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017b, 0x10400003) 03:51:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1332.192649][T18376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.202702][T18376] Call Trace: [ 1332.206011][T18376] dump_stack+0x172/0x1f0 [ 1332.210396][T18376] should_fail.cold+0xa/0x15 [ 1332.215004][T18376] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1332.220823][T18376] ? ___might_sleep+0x163/0x280 [ 1332.225691][T18376] __should_failslab+0x121/0x190 [ 1332.230681][T18376] should_failslab+0x9/0x14 [ 1332.235210][T18376] kmem_cache_alloc_trace+0x2d1/0x760 [ 1332.240615][T18376] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1332.246443][T18376] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1332.252099][T18376] __list_lru_init+0x3cf/0x6e0 [ 1332.256880][T18376] alloc_super+0x78d/0x890 [ 1332.261307][T18376] ? test_single_super+0x10/0x10 [ 1332.266259][T18376] sget_userns+0xf1/0x560 [ 1332.270602][T18376] ? kill_litter_super+0x60/0x60 [ 1332.275563][T18376] ? test_single_super+0x10/0x10 [ 1332.280501][T18376] ? kill_litter_super+0x60/0x60 [ 1332.285450][T18376] sget+0x10c/0x150 [ 1332.289275][T18376] mount_bdev+0xff/0x3c0 03:51:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000e6, 0x10400003) [ 1332.293531][T18376] ? vfat_mount+0x40/0x40 [ 1332.297872][T18376] vfat_mount+0x35/0x40 [ 1332.302036][T18376] ? setup+0x120/0x120 [ 1332.306122][T18376] legacy_get_tree+0xf2/0x200 [ 1332.310813][T18376] vfs_get_tree+0x123/0x450 [ 1332.315334][T18376] do_mount+0x1436/0x2c40 [ 1332.319686][T18376] ? copy_mount_string+0x40/0x40 [ 1332.324671][T18376] ? _copy_from_user+0xdd/0x150 [ 1332.329553][T18376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1332.335811][T18376] ? copy_mount_options+0x30e/0x440 [ 1332.341036][T18376] ksys_mount+0xdb/0x150 03:51:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1332.345293][T18376] __x64_sys_mount+0xbe/0x150 [ 1332.350000][T18376] do_syscall_64+0x103/0x610 [ 1332.354613][T18376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.360509][T18376] RIP: 0033:0x45a89a [ 1332.364411][T18376] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1332.384014][T18376] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:51:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017c, 0x10400003) [ 1332.392426][T18376] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1332.400401][T18376] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1332.408376][T18376] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1332.416352][T18376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1332.424346][T18376] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1332.434095][T18438] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000df, 0x10400003) 03:51:07 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:07 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x800000c2000, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000100)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000080)={0x7, 0x271c, 0x8, 0x9, 0xf, 0xfef, 0x807c, 0x8e3, 0x2, 0x3}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6e, r3}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") [ 1332.527748][T18438] FAT-fs (loop4): bogus number of reserved sectors [ 1332.550458][T18438] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1332.623888][T18884] FAULT_INJECTION: forcing a failure. [ 1332.623888][T18884] name failslab, interval 1, probability 0, space 0, times 0 03:51:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017d, 0x10400003) [ 1332.667710][T18884] CPU: 1 PID: 18884 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1332.676863][T18884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.686922][T18884] Call Trace: [ 1332.690229][T18884] dump_stack+0x172/0x1f0 [ 1332.694574][T18884] should_fail.cold+0xa/0x15 [ 1332.699179][T18884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1332.704997][T18884] ? ___might_sleep+0x163/0x280 [ 1332.709872][T18884] __should_failslab+0x121/0x190 [ 1332.714836][T18884] should_failslab+0x9/0x14 [ 1332.719379][T18884] kmem_cache_alloc_trace+0x2d1/0x760 [ 1332.724784][T18884] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1332.730604][T18884] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1332.736253][T18884] __list_lru_init+0x3cf/0x6e0 [ 1332.741037][T18884] alloc_super+0x78d/0x890 [ 1332.745460][T18884] ? test_single_super+0x10/0x10 [ 1332.750404][T18884] sget_userns+0xf1/0x560 [ 1332.754743][T18884] ? kill_litter_super+0x60/0x60 [ 1332.759701][T18884] ? test_single_super+0x10/0x10 [ 1332.764640][T18884] ? kill_litter_super+0x60/0x60 [ 1332.769581][T18884] sget+0x10c/0x150 [ 1332.773440][T18884] mount_bdev+0xff/0x3c0 [ 1332.777694][T18884] ? vfat_mount+0x40/0x40 [ 1332.782044][T18884] vfat_mount+0x35/0x40 [ 1332.786218][T18884] ? setup+0x120/0x120 [ 1332.790307][T18884] legacy_get_tree+0xf2/0x200 [ 1332.794995][T18884] vfs_get_tree+0x123/0x450 [ 1332.799508][T18884] do_mount+0x1436/0x2c40 [ 1332.803858][T18884] ? copy_mount_string+0x40/0x40 [ 1332.808824][T18884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:51:07 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017e, 0x10400003) [ 1332.815073][T18884] ? copy_mount_options+0x30e/0x440 [ 1332.820288][T18884] ksys_mount+0xdb/0x150 [ 1332.824550][T18884] __x64_sys_mount+0xbe/0x150 [ 1332.829242][T18884] do_syscall_64+0x103/0x610 [ 1332.833843][T18884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.839736][T18884] RIP: 0033:0x45a89a [ 1332.843642][T18884] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000da, 0x10400003) [ 1332.863242][T18884] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1332.871658][T18884] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1332.879634][T18884] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1332.887609][T18884] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1332.895584][T18884] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1332.903559][T18884] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:07 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d5, 0x10400003) [ 1333.025977][T19242] FAT-fs (loop4): bogus number of reserved sectors [ 1333.044755][T19242] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000017f, 0x10400003) [ 1333.094430][T19242] FAT-fs (loop4): bogus number of reserved sectors [ 1333.106778][T19242] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1333.185197][T19405] FAULT_INJECTION: forcing a failure. [ 1333.185197][T19405] name failslab, interval 1, probability 0, space 0, times 0 03:51:08 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d1, 0x10400003) 03:51:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000180, 0x10400003) [ 1333.313368][T19607] FAT-fs (loop4): bogus number of reserved sectors [ 1333.326954][T19405] CPU: 1 PID: 19405 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1333.336079][T19405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.346135][T19405] Call Trace: [ 1333.349444][T19405] dump_stack+0x172/0x1f0 [ 1333.353807][T19405] should_fail.cold+0xa/0x15 [ 1333.358414][T19405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1333.364233][T19405] ? ___might_sleep+0x163/0x280 [ 1333.369102][T19405] __should_failslab+0x121/0x190 [ 1333.374050][T19405] should_failslab+0x9/0x14 [ 1333.378566][T19405] kmem_cache_alloc_trace+0x2d1/0x760 [ 1333.383955][T19405] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1333.389788][T19405] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1333.395437][T19405] __list_lru_init+0x3cf/0x6e0 [ 1333.400217][T19405] alloc_super+0x78d/0x890 [ 1333.404642][T19405] ? test_single_super+0x10/0x10 [ 1333.409588][T19405] sget_userns+0xf1/0x560 03:51:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000181, 0x10400003) [ 1333.413923][T19405] ? kill_litter_super+0x60/0x60 [ 1333.418887][T19405] ? test_single_super+0x10/0x10 [ 1333.423823][T19405] ? kill_litter_super+0x60/0x60 [ 1333.428777][T19405] sget+0x10c/0x150 [ 1333.432602][T19405] mount_bdev+0xff/0x3c0 [ 1333.436861][T19405] ? vfat_mount+0x40/0x40 [ 1333.441212][T19405] vfat_mount+0x35/0x40 [ 1333.456169][T19405] ? setup+0x120/0x120 [ 1333.460733][T19405] legacy_get_tree+0xf2/0x200 [ 1333.465429][T19405] vfs_get_tree+0x123/0x450 [ 1333.469944][T19405] do_mount+0x1436/0x2c40 [ 1333.474291][T19405] ? copy_mount_string+0x40/0x40 [ 1333.479256][T19405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1333.485510][T19405] ? copy_mount_options+0x30e/0x440 [ 1333.490737][T19405] ksys_mount+0xdb/0x150 [ 1333.494995][T19405] __x64_sys_mount+0xbe/0x150 [ 1333.499684][T19405] do_syscall_64+0x103/0x610 [ 1333.504288][T19405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.510197][T19405] RIP: 0033:0x45a89a [ 1333.514097][T19405] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1333.533708][T19405] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1333.542129][T19405] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1333.550098][T19405] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 03:51:08 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000000d0, 0x10400003) 03:51:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x900) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e22, @remote}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r3, 0x9, 0x7, [0x58, 0x3, 0x1, 0x1, 0x40, 0x5ffe, 0x4]}, &(0x7f00000001c0)=0x16) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000182, 0x10400003) [ 1333.558071][T19405] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1333.566042][T19405] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1333.574018][T19405] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1333.594756][T19607] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1333.664293][T19607] FAT-fs (loop4): bogus number of reserved sectors [ 1333.681279][T19607] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:08 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x80000) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:08 executing program 3 (fault-call:3 fault-nth:0): r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:08 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000183, 0x10400003) 03:51:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1334.026118][T20261] FAT-fs (loop4): bogus number of reserved sectors 03:51:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x400, 0x4) [ 1334.084512][T20410] FAULT_INJECTION: forcing a failure. [ 1334.084512][T20410] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.089055][T20261] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1334.149807][T20410] CPU: 0 PID: 20410 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1334.158958][T20410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.169027][T20410] Call Trace: [ 1334.172350][T20410] dump_stack+0x172/0x1f0 [ 1334.176708][T20410] should_fail.cold+0xa/0x15 [ 1334.181315][T20410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1334.187136][T20410] ? ___might_sleep+0x163/0x280 [ 1334.191999][T20410] __should_failslab+0x121/0x190 [ 1334.196944][T20410] should_failslab+0x9/0x14 [ 1334.201458][T20410] kmem_cache_alloc_trace+0x2d1/0x760 [ 1334.206851][T20410] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1334.212676][T20410] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1334.218317][T20410] __list_lru_init+0x3cf/0x6e0 [ 1334.223093][T20410] alloc_super+0x78d/0x890 [ 1334.227515][T20410] ? test_single_super+0x10/0x10 [ 1334.232469][T20410] sget_userns+0xf1/0x560 [ 1334.236820][T20410] ? kill_litter_super+0x60/0x60 [ 1334.241761][T20410] ? test_single_super+0x10/0x10 [ 1334.246714][T20410] ? kill_litter_super+0x60/0x60 [ 1334.251659][T20410] sget+0x10c/0x150 [ 1334.255478][T20410] mount_bdev+0xff/0x3c0 [ 1334.259733][T20410] ? vfat_mount+0x40/0x40 [ 1334.264086][T20410] vfat_mount+0x35/0x40 [ 1334.268248][T20410] ? setup+0x120/0x120 [ 1334.272325][T20410] legacy_get_tree+0xf2/0x200 [ 1334.277013][T20410] vfs_get_tree+0x123/0x450 [ 1334.281525][T20410] do_mount+0x1436/0x2c40 [ 1334.285869][T20410] ? copy_mount_string+0x40/0x40 [ 1334.290818][T20410] ? copy_mount_options+0x255/0x440 [ 1334.296020][T20410] ? copy_mount_options+0x255/0x440 [ 1334.301230][T20410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1334.307476][T20410] ? copy_mount_options+0x30e/0x440 [ 1334.312679][T20410] ksys_mount+0xdb/0x150 [ 1334.316926][T20410] __x64_sys_mount+0xbe/0x150 [ 1334.321613][T20410] do_syscall_64+0x103/0x610 [ 1334.326219][T20410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.332115][T20410] RIP: 0033:0x45a89a [ 1334.336017][T20410] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1334.355618][T20410] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1334.364030][T20410] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1334.372002][T20410] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1334.379976][T20410] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1334.387948][T20410] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:51:09 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000184, 0x10400003) 03:51:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:09 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001580)={0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000015c0)=0x30, 0x8) modify_ldt$write(0x1, &(0x7f0000001540)={0xb174, 0x100000, 0x0, 0x8, 0x1, 0x5, 0x100, 0x1, 0x9, 0x10001}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r2, 0x0, 0x4, &(0x7f00000016c0)=""/193, &(0x7f0000000140)=0xc1) r3 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x4, 0x101002) sendto$ax25(r3, &(0x7f0000000300)="7ae29c72c36f1711c537a98a88374627d0b74fc641266498271167768e7d35bab13264c3c4364e2291887201026f2e8c31f2a1b2f43e95b1a077ce239472f0522f3e7195d5ee97d70415", 0x4a, 0xc084, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @bcast]}, 0x48) ioctl(r2, 0x7, &(0x7f0000001600)="0adc1f121e0d3fff88a070e312925c43fb81c4c4b9249739d2f9205f1f6f0134c783a1994d359c38e165797ff92ceaa8a9cc6fd6978d4cf1ae8df6630488e007c69b7c0000c8007af6f1f7c59e7ac428f86094cd2cea178aa404d66e5b59b08386f82097418ca0fa75a0db3d1e841de7022fb1b8947dfb437a1de5d4aeeb78f90270da992061c19a05afa6") ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x1, 0xfffffffffffffff2, 0x7, 0x9, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x4, &(0x7f0000000000), 0x10) r4 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) sendto$ax25(r4, &(0x7f0000000400)="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", 0x1000, 0x0, &(0x7f0000001400)={{0x3, @bcast, 0x3}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f00000001c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null}) sendmsg$nl_netfilter(r4, &(0x7f0000000280)={&(0x7f0000001500), 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000000b00fe0129bd7000ffdbdf250000000014002c00fe800000000000000039d3ff89c2f77700000000000026"], 0x28}}, 0x4004000) socket$caif_seqpacket(0x25, 0x5, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000001480), &(0x7f00000014c0)=0x4) 03:51:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0x344) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1334.395917][T20410] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:09 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:09 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000185, 0x10400003) 03:51:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:09 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000080)={0x6b}, 0x1) [ 1334.634683][T21105] FAT-fs (loop4): bogus number of reserved sectors [ 1334.654060][T21134] FAULT_INJECTION: forcing a failure. [ 1334.654060][T21134] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.678323][T21105] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1334.690631][T21134] CPU: 1 PID: 21134 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1334.699756][T21134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.709817][T21134] Call Trace: [ 1334.709849][T21134] dump_stack+0x172/0x1f0 [ 1334.709875][T21134] should_fail.cold+0xa/0x15 [ 1334.709902][T21134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1334.717528][T21134] ? ___might_sleep+0x163/0x280 [ 1334.717550][T21134] __should_failslab+0x121/0x190 [ 1334.717570][T21134] should_failslab+0x9/0x14 [ 1334.717589][T21134] kmem_cache_alloc_trace+0x2d1/0x760 [ 1334.717625][T21134] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1334.727994][T21134] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1334.728019][T21134] __list_lru_init+0x3cf/0x6e0 [ 1334.728041][T21134] alloc_super+0x78d/0x890 [ 1334.728059][T21134] ? test_single_super+0x10/0x10 [ 1334.728075][T21134] sget_userns+0xf1/0x560 [ 1334.728094][T21134] ? kill_litter_super+0x60/0x60 [ 1334.782409][T21134] ? test_single_super+0x10/0x10 [ 1334.787348][T21134] ? kill_litter_super+0x60/0x60 [ 1334.792294][T21134] sget+0x10c/0x150 [ 1334.796119][T21134] mount_bdev+0xff/0x3c0 [ 1334.800367][T21134] ? vfat_mount+0x40/0x40 [ 1334.804705][T21134] vfat_mount+0x35/0x40 [ 1334.808871][T21134] ? setup+0x120/0x120 [ 1334.812947][T21134] legacy_get_tree+0xf2/0x200 [ 1334.817634][T21134] vfs_get_tree+0x123/0x450 [ 1334.822147][T21134] do_mount+0x1436/0x2c40 [ 1334.826490][T21134] ? copy_mount_string+0x40/0x40 [ 1334.831435][T21134] ? _copy_from_user+0xdd/0x150 [ 1334.836307][T21134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1334.842552][T21134] ? copy_mount_options+0x30e/0x440 [ 1334.847757][T21134] ksys_mount+0xdb/0x150 [ 1334.852021][T21134] __x64_sys_mount+0xbe/0x150 [ 1334.856709][T21134] do_syscall_64+0x103/0x610 [ 1334.861317][T21134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.867211][T21134] RIP: 0033:0x45a89a [ 1334.871113][T21134] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:09 executing program 3: r0 = socket(0x14, 0x4, 0x0) r1 = gettid() sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x6) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x4a0000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000200)=0x13005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x204000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r4, 0x4010ae74, &(0x7f0000000140)={0x6, 0x8, 0x3}) clock_nanosleep(0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000180)) setresuid(0x0, r3, 0x0) semget(0x1, 0x1, 0x9fa677300048103a) ptrace$getsig(0x4202, r1, 0x80000000, &(0x7f00000000c0)) [ 1334.890725][T21134] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1334.899153][T21134] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1334.907127][T21134] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1334.915099][T21134] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1334.923069][T21134] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1334.931041][T21134] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:09 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000186, 0x10400003) 03:51:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:09 executing program 2: semget(0x3, 0x2, 0x8) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x800, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @loopback}, 0x43, 0x0, 0x0, 0x0, 0x5823, &(0x7f0000000300)='team_slave_0\x00', 0x4, 0x1, 0x8}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f12fd029e895543ee") r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x3fd, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000080)=0xffffffff, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x679c1c96}, &(0x7f0000000100)=0x8) sendmmsg$nfc_llcp(r3, &(0x7f00000019c0)=[{&(0x7f00000003c0)={0x27, 0x0, 0x2, 0x7, 0x5, 0x100000001, "f6b0078658c8f717d50401d921ebf5202a4bd0fc7355e64cbed8ba08578ab5af566683af581e9fed0b1201232af79312fe176a076b05fcfd7eb42dbbe64a72", 0x21}, 0x60, &(0x7f0000000600)=[{&(0x7f0000000780)="40a2888ce50f5e9dd4d686ba87e249fa2cb43724570a3876e5120cc13fd81d47c429e1156afa5fbec2cd3364bd559fc3eef8356f631537a9a7c8dbf62215952f74360102c0027498b078b7c1788c03f057ff2d6e31002c8657b74704839a0f43e0d77a57cf12c31e9c0ba160a13ca16fd3b3c0a368570861aca2e07f7f6e851fc3ba39d3d696c5c31afa367cefb645b8cb8b6785383e77f9829faad4001820571109deb1a4aaab7f84c6a6ae4e7e437ca67f40a03b234c2fcc25a98f6aedd010fcdff5255f7661919976fdb91daf9e8fc0df91ec716d16ab90e0045f8df9b917f961d51fd4a6e32944f74382b91d323033c0c0e6cd46f9125e1bb1ca127d8cc8da09405880e56e4ee5b05f77dac3db8bdeb68f1d23ed653e2a550fe7006699e0775d9bf6362d178b3ecad54b156f4f18c9931f2e16e22613298a23079faa38761181a75b1a7104c68c609762a980dd48371d9cd634bb41b14b99f6063b2218a7ae5bf628a5c0f8481f0c3c2a601b8fcb9aeb419ad687568091154ea8051ee8d2ba6c24a1cedaa446ad53ee60b495e04df46be81d51656fea0e97a967b5eeb2c6e8371edd5d7ba8b828a8e1663c5ffc718c65fd6938f64d0ebf72a827084d18e5323796f07ce93a3acb872b84da3925b427a2bfc801bc2740f3216138416ac7bb17a8a660429be9e29b3048bdcf490505075c9542e29437f43a41f1f49456ca280ce9fc593ac35ba2c0ab7c0234ac7e4bc49f03f7b6769676d53e79578eb0c8dd64ffa2843e4d38363a9daaf634be3f53e9cee751a68d949a3a97e975392081503bf48bb34115fa901a958f20051e5e6632f7cb19fc9a34dae415a828962cc91eeac0a981e693581687d1537de8841d455be67f4e32dd37de5b2ccd7b037e6253f47c01ab953546194ec5790bfda5e1d7caf0db88b606844b0e8949107649c45583f66da81fc6fd2063c55821f4b8df0ac615a650dd8902ff706fad64014ca2dc4906bccd7bfb15ea1a61d24a64aabdec98f2dafe47844ae6dcac07abf36058e86f6076955ec680423b299e50ee862292467e2edf9eb9946c81460549d6f0a0170fe60d3aed8d14bcbae0f03f73d7d370a74c89387c87f227c7693ae7f005bd7a2abac5636d17082fecd2f797062c3f89bcf5ec13f155f9c8163ffd38efeed539b5beedbcf78ab7d8927e1aa2926b50b410fbda58f93b2758abcc60a29e91e6386f72504cff6be91a8a438c82ec72b8a8d579decc6e4bd1836b96b953e4826594a2f7ddb57b4a6975a83077e3eb52962ce714aa178ebb4970a372cd18b5361bf358724cf5f9bbcd11aba6ecf2915492fb731fcda163607748ba59cc94440c5f8d65bc3d4b11d5d1220cad9a0e7f90173dc88aa19354d27ca7ff6809d8684c7c7858bd94a9d9ebcbf839cb0dbb41d4ad4d53577dc8fbceb18ed9e490533ea14d0aca645b8b5b4672bd1562ac42a8d2612d7c0d4f46303b9cd32e6307f98d8bbc05a73d3d0521b6c2beaff3ee152015b9e41dea83c71f9558fb504e0b3801cee7563163552eaeda3895f85ffccd82f5f3dd954b00cf512e7ef11a8372aef95d935d9e0d55151b55dde80328cf944f1cddabd8726907c395e1be58049a1a32b44f1da877fe1c1aa7820c21168dee1224d64e628a4883430fe4a40d91a6b0036ca3d12072c8ec2c884b63053393d236139c4eea248b488f2e95b12653cf831f5a727dbb1ca1b335bc76ff1a0dd7b4196151bb73e50b702948b32d4eda299e8ce1e40cb9c93536c89aebcb6c7873067e4924476833454bb05d36da8283db830505293043c0009c8ff8ee15533206840c1dac132070b539155e46e22dc2c7ae8e4bafaa3339dacb424525b63401ad6ba34a7755f8813c848a6c9d9e6ab79ee27579fd29459480e18d9fd79325ee9ef9bf24612dd46042f4e74347b9dbfea8d2bd230c03c3a285ee5d65eb39d10bc2e685cccd3aaa2746d19c0e7da5513e10bf990c9708659dd5d71fcbc4ce914f9ba147723e0c13948bef72146f984b1f4f7ddce75d8c0d4f473f0efae876222734381c5421b4cdfacbc22854e1f73066d631641d4c0cc03a718ab3784820f5b3d6bbf5d80248f69ae910ff0740e296d461bc377ff5f4b2509a86ba93bd5c5dc6bd14f0220dcc2164e1c4f1110a8f3e3a91293d9a3c7db9b5283f077d6ee2806e766cd798019c50106264fd0740a86e1fc64a916cab12d05dbcc60fe680528fc8d0463ea5887835d4cc2f9dbeec241e3dda15b820c2d0128c2b15705565d76a7873dfb622c75181c35c7bb03f2db078b542dd9b0d2f2b9230ec9d3b5a015c1c884050a51f50891012e8b629f938199cd9054f7242d27578e72d67885ecd2c98405330d553f1b4f2e865f46d77c7151c9c889d702fc86f6f69c23acaaaaa68f848ecd172d0c4f2d70d1f986e8ceb03f995d52e95afb1bfc2220fe717063ce41ffffb254d41c8257e2a4134209437a02590ce097045f5aabff5b704b7811461f923c273e00ece587ffbd4de969e37caed0477c08094f32e3fe9510e4c3c7510c3d10cc83ddae827a144fdb86d9d2f953650f195c64a15bdb9f2c4982174075bb646d4e0ace2281ff7dbcde60ec313cf2cb9665c2823b241426a0b95c9898a599d9144585fdc672b0358d8db72a72fe75a45fb78e5e0520a12815fec739f5481e27e3a4ffb47214f9c476901fb823d2e1ee336ce9c54ca84c2eadd2afb4faf6d1a4945a89aea97caf7b46cb7d426fd38e43722c9aad37d364973caf394440bec04ba9647c1d15d9cd0b15daa7d11648566a01aaaf57fd388955dfc7cfe59c5bd0fbc7b5bfb63ea5be708f4abf594ab8e232fbf9532e5492ec254026000e562c9f0c131167bae51083f4be52918271a608048a09e5b3d9adba7c63be2d87f1459f2223c9315a248c1280aab79622d34a577990271e589e6a96213cfb131b6bd24490c0ce66ec9920c57a302c3a061569d2f18020c5fa2d7db6f92628779cc1f7195eacd577f36efd3a6232ffca7d419c8932ebb82f39c5920e02c97df59e189b055d0b2d310e77da21b75e65df4b448c3a1a9c9cbbba659f1ad580e79e87cd5cdf6ef2a757324ccff598f1a7be9e873cdabf45ffec95dbaaa5722cadc0d39fd67b05716d9eb7124fef9a6ee7a32c1f583a247973155f1fdefcdbc4f99047e6d810ea6f1bfca4608e49a7e13257537736297140ced9ecdd9624314707c0ac3c144cf776094e9239a3c1728496fd8c7fa7f65785ea245431ec0710285afd3c28f12a86d1a136f203071e9c75faa6ec4830eefc850d242c6610ae337f1c3809f1253a472bf50b3aeae64d4a348ef466957e3b418157c2c637452010ea7ba44b4c350c1f18be31a2efa56d64370f926b0970d750caa4eeb73642ebcf7317b391ce5dc99a0f6f85cdbc3fb65dee4057c8877bf014766791e25a43694df0e07d1fb0ffe0a768a75aee4c550cd7a3e1c3cfc4b02865c4c529825660e6a6424e4047441115ff04cbfda3088bd0230fe3d843d2158acaccffcba3e7c377f599262198743d802dc9692787640993737be4b1b41ad8c6444748d1494cacbce78a90e7425a48dacddbda6d83598d017afcc44a307fba57bf2400b67665ae3afe21bddb4e3b4ff39fcc02074a2e0ee72cfac03c13848f5b2c3180f9242a8c5cfe5435e04348293ca6a234b362d224813d7e3e7582b2e36836408f235fddc71b8d60448d4a93247a4e62e912b7d6bb39de638c0e15f1444986290e720b509a21d112648793b0a8930b2a0c0f034348c38687094a96dc25c769c12dc814285250e358f16bb3aadc0cc0d2ed442b131fcda97a3ae6828993e160d83e91786bf35e22f02b8e95c6ee0ec53b3cb8987f90c329961ccb81d3cd53f1a723f5b345169e99910571e0dee76285f80e0e337e097ac66b68617624be482cba85239d267eef246b0a6c7f00ea37c8fbae8b2e194235ae9f392f6e8f34f810bdb860392dff0f2e18cda7ea06eacfc92cb2b7c8c6453899e5c4d9fa9665746d02e15117192adabc168b1812fb9579ca483e2569b264343e20bb995779619a7d658c1190f8f655d8354edaa1970fdade4f8f116cf39f4990246dc10cf2897c0038973d5493eddb523960c827171bcb2b375ff075127f3697dbc940dfc49f9518085e386523f17c42a2bf034bcc167cf36ecc58a30a759c95625d67f121e62d9e2895a38b604330a8152e8622c785a2fa2f09d1811dc957952282969806ae4ed97a19f3fedb6b60463159be89efad6763613ce1b1f2fb747ce9e8ddf96cdefbe8fd89e06886e7577ba6d88812660555b0c405736fe2234683163eda312f29400c8e1520e19f0ff887fcdf80738f95340cecab6b78c50e220f01e10189ff91b58cc8e856af9c4e4ad1c0176d5e2826834dd63a68c520bc9e46a0c83f32ebc1e9c113297772067f5bcecf07fde3a0443f7657d30f7b1dfa71529c8f8f4a6bfebefeeef605870b3e9d6b4dffac0c5cf61948123fd16b538b0ac62265844cb662480cac30842b016f6d8acdbc0c98f90136475ccbb10a99b52efa711831c62f345cbd82821c267a25f30ce9ffa7fb15ac2490773b5d8a46aa11943413447767011bdbf89115322b3faa79f9ba16473099a968d5792d4737aef1e74f8bf09abfa707288129410a1453eedd7e45ac78d5799fcec641a503884480d1a69d6b01b657762def658ddf53405646be94c4911f3dfe8b3946bda07262298e94b8615440d396eb20e26ea09f5397c30483d1d0616227ad8ad72bd4b90704a64a318d820c70434dc309c79f340fe0f9511d37402d238ad56f9e4790c44c1dfaf7fe767d28a864ed2eb80c3d7a2d288a10446986352bc7ebb1a6cedbdc43d8833027ea3261c1532c296356fa863e4711414a888fd2203c803ad19a469f45ad8e366703760a937e9bd37e5cba00ff8d64494bc9d8c60a12ac4c93ef1fc5b3c6277abafc9a7481ac5d27b48ff168120c4b04fc4a5b83322c433bf91627a151d776334a99ead6d5b1b1c71dde4138b3e194a652d7cca12caa65e4d9cc5b8fb0f9512ad636ce5ef307b86469cd1546b8fca6002cb022975941a537c0e6aba8bad588d9452ccb3f5e1768953d45890bd2a86ae853424101a836f81812a4519c03d081abe27d3ebf6d4b15277b3fa2bc0082bb8ec253e397523107534669b9b28a92f7382b4e66797d2018fa808fe690bcd41aca786206125ca551988a30d13b9c3c3a7b21ce6927faa880c418466b1a2715989a9d761258f50f3966922887b72484e7d9807d7441bbe14fa9b24390b5eb046c96345ab3ba3a09d66ee2e97ab4724229e3c89625c78508f1a2522afa5e631f141716b759909dd9be9cf92fe38c62e82eb0893900cdcb3ed873b01427970eeca5323fd382ec0d1d0e7d8818780667be52ace82906f10dda2cf80100367182cdd340c2d14c7a83838ef3c1e413cf684d20b944942723a3254a464cf301eb4334cf42ff9c6d64e8c6fcd1c2747d37fdc9f7f6d8edf1f808d0c811592cb8b58ad15ec7585b42a84f3c0166dc8eb7e74ce22948e9d40a3b1d80106cd115ccfa18c1519bfccc5da467f8696fa820f248ca4b68d32bdcb2e9a937c644072ac024c35f40be5d022fcb4fa83357ffecff622edd5fca182f7292ac42d2333e216c97982dd60510d09a97dc9140ddf14317ecd3e5fc6b1cb1735c2f27289e7b105397ecfc627e5d5ecb419f60ba98713df73e26e64f3c0159291ae3c9f321f3f3a611d384397939091b30fa4b69aa0df6a36d349d230c45a5de266aa8e07cda32196783c", 0x1000}, {&(0x7f0000000440)="6b0ff0103aa26c0d720d5ea47aa388e4d6d55de26e0bb3383b34c35cbb3521d03a027695ff651335c74a463b2c96809dcea6333269a8e0ab003ad211982604ace958f2ea27ec5a1ddb4ac79aedc0c34fe26ba45b007907b33f1c560d3e2e256090c6b538cb2b7e1537cce87cf91aaa6c8c80babbbc09d96a5313cd4f12523bc257cee5b20914fd8e868c6d405550b233b8bb19d1654dfbe9792a90fe4ea5c221dfbc6d4c3a39618ace7e3f73a8f560143875a07b7e58bd15dd7d3c4b0eea074dd12c3cff170cfb2cf4c4bffc41777843cb676c5ea1034d2eedc481e53cf70ecb223b21e1a2d308", 0xe7}, {&(0x7f0000000540)="adaa6cb6dc9e6ad5ad71239f52bfdaebc9e61a1235756f96018203117d36654e68bb9bdbfc0349c887409f54c78ebd17f39095bb14f3596fdf3a7d57da463773fbf1dfa63db46046de298386a1157740bb34057fba7ed6fc6705035180613280a14ef6c3f4873c5969cf8cf66c6a214362f37722cdf064a913dc93f0b625f47b12dbe04ac26ea30301e88d6f904e4556801bc9ed49a33263ce472a8a2500b22692a9ee91c0c9a1774f73be8b2a8f5a11e41b5641c537e8e3400c", 0xba}], 0x3, &(0x7f0000000640)={0x48, 0x100, 0x2, "5f61836e454e410673e69e1fcc89c1b42cd912bc2002155340250209e0029c1dc518ffc7d07b7b4c6ed8f711f5f04d5c4866c8"}, 0x48, 0x40}, {&(0x7f0000001780)={0x27, 0x1, 0x2, 0x6, 0x2, 0xffffffff, "7e66f058b80746e0c4008da458f3f58cf92e3c9fcd3882c2c0d2effde17d4c49dbda6e31fa61f5897b2a85eb1e1bdab0771a80999034347639ce45135683e0", 0x6}, 0x60, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x4000}, {&(0x7f0000001800)={0x27, 0x0, 0x0, 0x3, 0x401, 0x80000000, "e74729f15ab7d7ce10011bfc701999004ea1a557988b91adb24a8b1749659538ef0a35263b85372bcff33daa229361765f18a905d921acd1db1991a8a38c3f", 0x1f}, 0x60, &(0x7f0000001880), 0x0, &(0x7f00000018c0)={0xe0, 0x109, 0x7, "563e3fcf1a19e6332d41ad94cd7829db80a653f2511c333e5e7493feb1d1e4790ad2fa46386645a28115037f9981b3ddc0fb768de235147e5a784e3098a01f704fd469abe5dc24e8e0405f498fd1cf44475ce42da4c7f14e2e952dcaa370fff0b9eef3fb9c0eb0fa068b395b5c83809977c89fef16365903549d65a7cdc0eee2061fd42d43fcea1015a3a3f2857a2232dd016c48942d173bacb3abdd3a672311418472ec8595b80a73f4281d6d09f83987c1f66b107c97abf46013a4fc09d9c28d606556a8b7744eb67b434f"}, 0xe0}], 0x3, 0x4000001) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000180)={r4, 0xe8, "bff3b696b155cd32dff98963eaff8af739b77dfb43099c6775fb20f86066bf029be96f766054b787b9bbddb7cb8577f581450f08ec38126d5820a7cdc84af034d3de7494299a7d442421be9dbbd6b3e71347b1aa5e0d808e4926db84723673cecd21db41ed9333a7089675ec95970756df8d80386046deb7977c30e6be12d50c53c8e4c23f533076fa82cff64d01782bb36bc856d33bece3d64d92ae25ab0def8ee2b9cf87b35ec8b208a966d532fa3f3cb3e87d4e7aaa8ba3bd03f7fb368ef71c98b485e35b98f4bc560b69207eb744bd73784206a57cab304a9871e12b724c3e4ca64b80341571"}, &(0x7f0000000280)=0xf0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:10 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1335.055900][T21105] FAT-fs (loop4): bogus number of reserved sectors [ 1335.089374][T21105] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x7fffffff, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000000)=0x20000, 0x4) listen(r0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r5 = geteuid() write$P9_RGETATTR(r4, &(0x7f00000000c0)={0xa0, 0x19, 0x2, {0x2000, {0x80, 0x2, 0x6}, 0x100, r5, r3, 0x5, 0x7, 0xfff, 0x8, 0xd1b, 0xfffffffffffffff8, 0x2, 0x5, 0x7fff, 0x5a96, 0x5, 0x7, 0xbbf, 0x9, 0x40}}, 0xa0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1335.241629][T21637] FAULT_INJECTION: forcing a failure. [ 1335.241629][T21637] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.274071][T21724] FAT-fs (loop4): bogus number of reserved sectors [ 1335.283368][T21637] CPU: 0 PID: 21637 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1335.292485][T21637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.302177][T21724] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1335.302536][T21637] Call Trace: [ 1335.302566][T21637] dump_stack+0x172/0x1f0 [ 1335.302591][T21637] should_fail.cold+0xa/0x15 [ 1335.321339][T21637] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1335.327644][T21637] ? ___might_sleep+0x163/0x280 [ 1335.332504][T21637] __should_failslab+0x121/0x190 [ 1335.337448][T21637] should_failslab+0x9/0x14 [ 1335.341965][T21637] kmem_cache_alloc_trace+0x2d1/0x760 [ 1335.347343][T21637] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1335.353160][T21637] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1335.358821][T21637] __list_lru_init+0x3cf/0x6e0 [ 1335.363595][T21637] alloc_super+0x78d/0x890 [ 1335.368019][T21637] ? test_single_super+0x10/0x10 [ 1335.372965][T21637] sget_userns+0xf1/0x560 [ 1335.377293][T21637] ? kill_litter_super+0x60/0x60 [ 1335.382238][T21637] ? test_single_super+0x10/0x10 [ 1335.387177][T21637] ? kill_litter_super+0x60/0x60 [ 1335.392119][T21637] sget+0x10c/0x150 [ 1335.395938][T21637] mount_bdev+0xff/0x3c0 [ 1335.400185][T21637] ? vfat_mount+0x40/0x40 [ 1335.404525][T21637] vfat_mount+0x35/0x40 [ 1335.408690][T21637] ? setup+0x120/0x120 [ 1335.412777][T21637] legacy_get_tree+0xf2/0x200 [ 1335.417471][T21637] vfs_get_tree+0x123/0x450 [ 1335.421986][T21637] do_mount+0x1436/0x2c40 [ 1335.426334][T21637] ? copy_mount_string+0x40/0x40 [ 1335.431287][T21637] ? _copy_from_user+0xdd/0x150 [ 1335.436147][T21637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1335.442390][T21637] ? copy_mount_options+0x30e/0x440 [ 1335.447598][T21637] ksys_mount+0xdb/0x150 [ 1335.451848][T21637] __x64_sys_mount+0xbe/0x150 [ 1335.456536][T21637] do_syscall_64+0x103/0x610 [ 1335.461141][T21637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.467039][T21637] RIP: 0033:0x45a89a [ 1335.470941][T21637] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, r1) semget(0x1, 0x0, 0x9fa6773000481032) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0xa4002) 03:51:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) 03:51:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000187, 0x10400003) [ 1335.490549][T21637] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1335.498967][T21637] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1335.506938][T21637] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1335.514910][T21637] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1335.522885][T21637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1335.530856][T21637] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:10 executing program 1 (fault-call:0 fault-nth:83): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:10 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffffe, 0x404000) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080)={0xa, 0x0, 0x1, 0xffffffff}, 0xa) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xfffffffffffffffd, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000180)={0x1, 0x240, 0x4e8, 0x7fff0000000000, 0x0}) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000000c0)={0x65}) 03:51:10 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000188, 0x10400003) [ 1335.789856][T22353] FAULT_INJECTION: forcing a failure. [ 1335.789856][T22353] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.795900][T22342] FAT-fs (loop4): bogus number of reserved sectors [ 1335.813351][T22342] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1335.857206][T22353] CPU: 0 PID: 22353 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1335.866333][T22353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.876383][T22353] Call Trace: [ 1335.879686][T22353] dump_stack+0x172/0x1f0 [ 1335.884035][T22353] should_fail.cold+0xa/0x15 [ 1335.888632][T22353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1335.894445][T22353] ? ___might_sleep+0x163/0x280 [ 1335.899306][T22353] __should_failslab+0x121/0x190 [ 1335.904255][T22353] should_failslab+0x9/0x14 [ 1335.908777][T22353] kmem_cache_alloc_trace+0x2d1/0x760 [ 1335.914178][T22353] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1335.920001][T22353] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1335.925653][T22353] __list_lru_init+0x3cf/0x6e0 [ 1335.930432][T22353] alloc_super+0x78d/0x890 [ 1335.934874][T22353] ? test_single_super+0x10/0x10 [ 1335.939825][T22353] sget_userns+0xf1/0x560 [ 1335.944163][T22353] ? kill_litter_super+0x60/0x60 [ 1335.949103][T22353] ? test_single_super+0x10/0x10 [ 1335.954045][T22353] ? kill_litter_super+0x60/0x60 [ 1335.958981][T22353] sget+0x10c/0x150 [ 1335.962814][T22353] mount_bdev+0xff/0x3c0 [ 1335.967069][T22353] ? vfat_mount+0x40/0x40 [ 1335.971409][T22353] vfat_mount+0x35/0x40 [ 1335.975572][T22353] ? setup+0x120/0x120 [ 1335.979648][T22353] legacy_get_tree+0xf2/0x200 [ 1335.984337][T22353] vfs_get_tree+0x123/0x450 [ 1335.988848][T22353] do_mount+0x1436/0x2c40 [ 1335.993190][T22353] ? copy_mount_string+0x40/0x40 [ 1335.998139][T22353] ? copy_mount_options+0x1de/0x440 [ 1336.003340][T22353] ? copy_mount_options+0x20a/0x440 [ 1336.008559][T22353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1336.014816][T22353] ? copy_mount_options+0x30e/0x440 [ 1336.020020][T22353] ksys_mount+0xdb/0x150 [ 1336.024271][T22353] __x64_sys_mount+0xbe/0x150 [ 1336.028981][T22353] do_syscall_64+0x103/0x610 [ 1336.033585][T22353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.039472][T22353] RIP: 0033:0x45a89a [ 1336.043367][T22353] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1336.062965][T22353] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1336.071380][T22353] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1336.079370][T22353] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1336.087343][T22353] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1336.095313][T22353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:51:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = semget(0x1, 0x0, 0x9fa6773000481032) semtimedop(r2, &(0x7f0000000000)=[{0x7, 0x0, 0x1000}, {0x4, 0x7f, 0x1000}, {0x4, 0xffff, 0x1000}, {0x0, 0x8, 0x1800}, {0x3, 0xdc78, 0x1800}, {0x4, 0x5}], 0x6, &(0x7f0000000040)) 03:51:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000189, 0x10400003) [ 1336.103287][T22353] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:11 executing program 1 (fault-call:0 fault-nth:84): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1336.245105][T22342] FAT-fs (loop4): bogus number of reserved sectors [ 1336.265367][T22342] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:11 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000680)=@abs, &(0x7f0000000700)=0x6e) r2 = socket$xdp(0x2c, 0x3, 0x0) bind(r1, &(0x7f0000000740)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x2, 0x1, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x2a}, 0x9}}}, 0x80) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000800)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r3, 0x300, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r4 = syz_open_dev$dspn(&(0x7f0000000900)='/dev/dsp#\x00', 0x4, 0x400000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000940)={0x3, 0x8, 0x4, 0x3, 0x7, 0x4ab, 0x6, 0x1, 0xc2, 0x20}) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000640)={&(0x7f0000000180)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/243, 0xf3}, {&(0x7f0000000000)=""/6, 0x6}, {&(0x7f0000000300)=""/213, 0xd5}, {&(0x7f0000000100)=""/50, 0x32}, {&(0x7f0000000400)=""/186, 0xba}], 0x5, &(0x7f0000000540)=""/249, 0xf9}, 0x2102) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0}) 03:51:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018a, 0x10400003) [ 1336.388464][T22886] FAULT_INJECTION: forcing a failure. [ 1336.388464][T22886] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.429054][T22886] CPU: 1 PID: 22886 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1336.438201][T22886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.448258][T22886] Call Trace: [ 1336.451564][T22886] dump_stack+0x172/0x1f0 [ 1336.455918][T22886] should_fail.cold+0xa/0x15 [ 1336.460992][T22886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1336.466817][T22886] ? ___might_sleep+0x163/0x280 [ 1336.471682][T22886] __should_failslab+0x121/0x190 [ 1336.476627][T22886] should_failslab+0x9/0x14 [ 1336.481138][T22886] kmem_cache_alloc_trace+0x2d1/0x760 [ 1336.486530][T22886] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1336.492180][T22886] __list_lru_init+0x3cf/0x6e0 [ 1336.496966][T22886] alloc_super+0x78d/0x890 [ 1336.501403][T22886] ? test_single_super+0x10/0x10 [ 1336.506379][T22886] sget_userns+0xf1/0x560 [ 1336.510741][T22886] ? kill_litter_super+0x60/0x60 [ 1336.515723][T22886] ? test_single_super+0x10/0x10 [ 1336.520700][T22886] ? kill_litter_super+0x60/0x60 [ 1336.525693][T22886] sget+0x10c/0x150 [ 1336.529525][T22886] mount_bdev+0xff/0x3c0 [ 1336.533784][T22886] ? vfat_mount+0x40/0x40 [ 1336.538127][T22886] vfat_mount+0x35/0x40 [ 1336.542291][T22886] ? setup+0x120/0x120 [ 1336.546379][T22886] legacy_get_tree+0xf2/0x200 [ 1336.551072][T22886] vfs_get_tree+0x123/0x450 [ 1336.555584][T22886] do_mount+0x1436/0x2c40 [ 1336.559941][T22886] ? copy_mount_string+0x40/0x40 [ 1336.564898][T22886] ? _copy_from_user+0xdd/0x150 [ 1336.569766][T22886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1336.576021][T22886] ? copy_mount_options+0x30e/0x440 [ 1336.581226][T22886] ksys_mount+0xdb/0x150 [ 1336.585478][T22886] __x64_sys_mount+0xbe/0x150 [ 1336.590164][T22886] do_syscall_64+0x103/0x610 [ 1336.594763][T22886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.600667][T22886] RIP: 0033:0x45a89a [ 1336.604565][T22886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = creat(&(0x7f0000000000)='\x00', 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000080)={{0x8, 0x4, 0x3, 0x10001, 'syz1\x00', 0x8001}, 0x5, 0x100, 0x7, r1, 0x4, 0x0, 'syz1\x00', &(0x7f0000000040)=['\x00', 'proc\x00', ':\x00', 'trusted]\x00'], 0x11, [], [0xffffffffffffb388, 0x3, 0x1ff, 0x100000001]}) setresuid(r2, r2, r2) semget(0x0, 0x0, 0x9fa6773000481032) 03:51:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018b, 0x10400003) [ 1336.624164][T22886] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1336.632579][T22886] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1336.640561][T22886] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1336.648533][T22886] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1336.656501][T22886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1336.664488][T22886] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:11 executing program 1 (fault-call:0 fault-nth:85): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1336.778175][T23109] FAT-fs (loop4): bogus number of reserved sectors [ 1336.813411][T23109] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1336.856970][T23109] FAT-fs (loop4): bogus number of reserved sectors [ 1336.882836][T23109] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018c, 0x10400003) 03:51:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) getsockname(r0, &(0x7f00000000c0)=@xdp, &(0x7f0000000140)=0x80) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) connect$ax25(r0, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ptrace$peek(0x2, r1, &(0x7f0000000080)) semget(0x1, 0x0, 0x9fa6773000481032) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) setuid(r2) [ 1336.921090][T23516] FAULT_INJECTION: forcing a failure. [ 1336.921090][T23516] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.953753][T23516] CPU: 0 PID: 23516 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1336.962892][T23516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.972945][T23516] Call Trace: [ 1336.976254][T23516] dump_stack+0x172/0x1f0 [ 1336.980604][T23516] should_fail.cold+0xa/0x15 [ 1336.985208][T23516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1336.991030][T23516] ? ___might_sleep+0x163/0x280 [ 1336.995893][T23516] __should_failslab+0x121/0x190 [ 1337.000850][T23516] should_failslab+0x9/0x14 [ 1337.005365][T23516] kmem_cache_alloc_trace+0x2d1/0x760 [ 1337.010742][T23516] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1337.016569][T23516] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1337.022214][T23516] __list_lru_init+0x3cf/0x6e0 [ 1337.026994][T23516] alloc_super+0x78d/0x890 [ 1337.031418][T23516] ? test_single_super+0x10/0x10 [ 1337.036360][T23516] sget_userns+0xf1/0x560 [ 1337.040697][T23516] ? kill_litter_super+0x60/0x60 [ 1337.045640][T23516] ? test_single_super+0x10/0x10 [ 1337.050576][T23516] ? kill_litter_super+0x60/0x60 [ 1337.055517][T23516] sget+0x10c/0x150 [ 1337.059335][T23516] mount_bdev+0xff/0x3c0 [ 1337.063580][T23516] ? vfat_mount+0x40/0x40 [ 1337.067923][T23516] vfat_mount+0x35/0x40 [ 1337.072089][T23516] ? setup+0x120/0x120 [ 1337.076169][T23516] legacy_get_tree+0xf2/0x200 [ 1337.080852][T23516] vfs_get_tree+0x123/0x450 [ 1337.085364][T23516] do_mount+0x1436/0x2c40 [ 1337.089733][T23516] ? copy_mount_string+0x40/0x40 [ 1337.094687][T23516] ? _copy_from_user+0xdd/0x150 [ 1337.099546][T23516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1337.105799][T23516] ? copy_mount_options+0x30e/0x440 [ 1337.111023][T23516] ksys_mount+0xdb/0x150 [ 1337.115270][T23516] __x64_sys_mount+0xbe/0x150 [ 1337.119956][T23516] do_syscall_64+0x103/0x610 [ 1337.124558][T23516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.130450][T23516] RIP: 0033:0x45a89a [ 1337.134353][T23516] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1337.153954][T23516] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.162371][T23516] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a 03:51:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018d, 0x10400003) 03:51:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$tipc(r2, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2}}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)) 03:51:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1337.170339][T23516] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1337.178311][T23516] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1337.186306][T23516] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1337.194273][T23516] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:12 executing program 1 (fault-call:0 fault-nth:86): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1337.376536][T23915] FAT-fs (loop4): bogus number of reserved sectors [ 1337.394934][T23915] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018e, 0x10400003) 03:51:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x2, 0x4, 0x80b) timer_create(0x6, &(0x7f00000001c0)={0x0, 0x1e, 0x4, @thr={&(0x7f0000000000)="94b0a1f5fea166c1d6ce93b419f7a8764cd1e8bf4f2bbfa0d6d0dfaef030ffa515c8025138ae4ed4d3a9caaf7e87016a72df2d22097d32ce7d7781ebf344f48b7b2f898aa3e59f77ab709effe5f08ace85b67ee2fcfa19ecf9255a658499f54c601ab4ad012852db9e6d27d300ca100c67095edacecc3e3a4f2dcd1a5bc1a4e9b1bc96d9310c5ffddb12ead03dcf881feee30956c33eaa8ec788", &(0x7f00000000c0)="709c3990db5765f82a0b440ccf2fe3fc3690818e2ddf41f96ddbf68df5fa83c437e06d9ddc2894cc7173aae8201b1694229925159f787a4fdd40c04d9814daacc349af277d35baaef359efd64ffc36892e45b091d297dac56f6d963b09996c9447f91ed24a492e93cbd79cf798b5d4bd24ae2f128f24803c64436a5ce0e8bf2219f43926d3b1574f73e4915dd9f5b7d1fe1bdbeb9cd8a73dd545d576bf1737836fdc4933b36847c872a71f92fa7f0c7aa673d0519f76787072cdbb71fc776a1fce5f417fd340ebc91143dfa120bc61c0129209e735feada3126668cc9562c014056cc6"}}, &(0x7f0000000200)=0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000340)={0x1, 0x1, [@dev={[], 0x2a}]}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+30000000}}, &(0x7f00000002c0)) 03:51:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1337.497936][T24036] FAULT_INJECTION: forcing a failure. [ 1337.497936][T24036] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.498750][T23915] FAT-fs (loop4): bogus number of reserved sectors [ 1337.534910][T23915] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1337.571016][T24036] CPU: 1 PID: 24036 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1337.580151][T24036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.590214][T24036] Call Trace: [ 1337.593527][T24036] dump_stack+0x172/0x1f0 [ 1337.597877][T24036] should_fail.cold+0xa/0x15 [ 1337.602486][T24036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1337.608317][T24036] ? ___might_sleep+0x163/0x280 [ 1337.613179][T24036] __should_failslab+0x121/0x190 [ 1337.618127][T24036] should_failslab+0x9/0x14 [ 1337.622642][T24036] kmem_cache_alloc_trace+0x2d1/0x760 [ 1337.628032][T24036] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1337.633678][T24036] __list_lru_init+0x3cf/0x6e0 [ 1337.638455][T24036] alloc_super+0x78d/0x890 [ 1337.642876][T24036] ? test_single_super+0x10/0x10 [ 1337.647823][T24036] sget_userns+0xf1/0x560 [ 1337.652161][T24036] ? kill_litter_super+0x60/0x60 [ 1337.657111][T24036] ? test_single_super+0x10/0x10 [ 1337.662045][T24036] ? kill_litter_super+0x60/0x60 [ 1337.666982][T24036] sget+0x10c/0x150 [ 1337.670804][T24036] mount_bdev+0xff/0x3c0 [ 1337.675081][T24036] ? vfat_mount+0x40/0x40 [ 1337.679427][T24036] vfat_mount+0x35/0x40 [ 1337.683590][T24036] ? setup+0x120/0x120 [ 1337.687672][T24036] legacy_get_tree+0xf2/0x200 [ 1337.692363][T24036] vfs_get_tree+0x123/0x450 [ 1337.696880][T24036] do_mount+0x1436/0x2c40 [ 1337.701224][T24036] ? copy_mount_string+0x40/0x40 [ 1337.706183][T24036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1337.712427][T24036] ? copy_mount_options+0x30e/0x440 [ 1337.717631][T24036] ksys_mount+0xdb/0x150 [ 1337.721883][T24036] __x64_sys_mount+0xbe/0x150 [ 1337.726570][T24036] do_syscall_64+0x103/0x610 [ 1337.731181][T24036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.737392][T24036] RIP: 0033:0x45a89a [ 1337.741288][T24036] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1337.760897][T24036] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:51:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000018f, 0x10400003) 03:51:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x78, 0x204002) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x4000, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@nodevmap='nodevmap'}, {@access_any='access=any'}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x5}}, {@loose='loose'}], [{@appraise='appraise'}]}}) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xc2080, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xffffffffffff8000, 0x14400) accept(0xffffffffffffff9c, &(0x7f0000000200)=@x25={0x9, @remote}, &(0x7f0000000280)=0x80) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'hwsim0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000480)={@ipv4={[], [], @multicast1}, @remote, @rand_addr="9741d9f7b72d5f8283bc1c725c414f6e", 0x200, 0x100000000, 0x3, 0x400, 0x8, 0x1, r3}) r4 = accept$inet6(r2, 0x0, &(0x7f0000000340)=0xffffffffffffff4b) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x4e24, @rand_addr=0x1}}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e24, 0x8000, @loopback, 0x3}}, [0x7, 0x7fff, 0x4, 0x25, 0x7, 0x4, 0x6, 0x40, 0x57, 0x8, 0x2, 0x4, 0x22ce, 0x2, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r6, 0x1}, 0x8) socket$xdp(0x2c, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000180)="f600000000000000000000bd9b09f8f25bd131d33d3a6ea01c596c340230ad65a0b7f73adb9c0cd05e1e9bb4a4e5b22f05355f0ab64e8450dd72c6e01bca0143d52bd4029fe8cfd4f9e2f072a88e792cbf3fffff97e2499897bffcf0ad13420a481b8b771ad4e3bbb1f272ef94d5bb2e85669fbf684dd2300c3cbf96e6815bc9") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1337.769315][T24036] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1337.777284][T24036] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1337.785261][T24036] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1337.793229][T24036] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1337.801202][T24036] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:12 executing program 1 (fault-call:0 fault-nth:87): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1337.967721][T24580] FAT-fs (loop4): bogus number of reserved sectors 03:51:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x42880, 0x0) ioctl$TIOCSBRK(r2, 0x5427) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) fsync(r0) 03:51:12 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3fc, &(0x7f0000000000)="0afc1f88a0700000000000") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0x0, 0x292, 0x1, 0x7, 0x0}) 03:51:12 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000190, 0x10400003) [ 1338.012310][T24580] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1338.104129][T24823] FAULT_INJECTION: forcing a failure. [ 1338.104129][T24823] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.119212][T24580] FAT-fs (loop4): bogus number of reserved sectors [ 1338.139836][T24580] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1338.143278][T24823] CPU: 1 PID: 24823 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1338.155554][T24823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.165613][T24823] Call Trace: [ 1338.168910][T24823] dump_stack+0x172/0x1f0 [ 1338.173243][T24823] should_fail.cold+0xa/0x15 [ 1338.177838][T24823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1338.183644][T24823] ? ___might_sleep+0x163/0x280 [ 1338.188494][T24823] __should_failslab+0x121/0x190 [ 1338.193432][T24823] should_failslab+0x9/0x14 [ 1338.197938][T24823] kmem_cache_alloc_trace+0x2d1/0x760 [ 1338.203319][T24823] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1338.209129][T24823] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1338.214767][T24823] __list_lru_init+0x3cf/0x6e0 [ 1338.219547][T24823] alloc_super+0x78d/0x890 [ 1338.223961][T24823] ? test_single_super+0x10/0x10 [ 1338.228897][T24823] sget_userns+0xf1/0x560 [ 1338.233222][T24823] ? kill_litter_super+0x60/0x60 [ 1338.238156][T24823] ? test_single_super+0x10/0x10 [ 1338.243086][T24823] ? kill_litter_super+0x60/0x60 [ 1338.248019][T24823] sget+0x10c/0x150 [ 1338.251832][T24823] mount_bdev+0xff/0x3c0 [ 1338.256075][T24823] ? vfat_mount+0x40/0x40 [ 1338.260407][T24823] vfat_mount+0x35/0x40 [ 1338.264563][T24823] ? setup+0x120/0x120 [ 1338.268630][T24823] legacy_get_tree+0xf2/0x200 [ 1338.273309][T24823] vfs_get_tree+0x123/0x450 [ 1338.277809][T24823] do_mount+0x1436/0x2c40 [ 1338.282145][T24823] ? copy_mount_string+0x40/0x40 [ 1338.287114][T24823] ? _copy_from_user+0xdd/0x150 [ 1338.291989][T24823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1338.298226][T24823] ? copy_mount_options+0x30e/0x440 [ 1338.303435][T24823] ksys_mount+0xdb/0x150 [ 1338.307703][T24823] __x64_sys_mount+0xbe/0x150 [ 1338.312383][T24823] do_syscall_64+0x103/0x610 [ 1338.316975][T24823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.322857][T24823] RIP: 0033:0x45a89a [ 1338.326753][T24823] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1338.346454][T24823] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:51:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1338.354859][T24823] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1338.362828][T24823] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1338.370797][T24823] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1338.378760][T24823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1338.386760][T24823] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x539e01) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:13 executing program 3: r0 = socket(0x10, 0x2, 0x4000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0x3) semget(0x0, 0x8000000000000, 0x40) 03:51:13 executing program 1 (fault-call:0 fault-nth:88): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000191, 0x10400003) [ 1338.591180][T25221] FAT-fs (loop4): bogus number of reserved sectors [ 1338.628718][T25221] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1338.655931][T25351] FAULT_INJECTION: forcing a failure. [ 1338.655931][T25351] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.702483][T25351] CPU: 1 PID: 25351 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1338.711619][T25351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.721667][T25351] Call Trace: [ 1338.724966][T25351] dump_stack+0x172/0x1f0 [ 1338.729311][T25351] should_fail.cold+0xa/0x15 [ 1338.733904][T25351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1338.739715][T25351] ? ___might_sleep+0x163/0x280 [ 1338.744567][T25351] __should_failslab+0x121/0x190 [ 1338.749505][T25351] should_failslab+0x9/0x14 [ 1338.754006][T25351] kmem_cache_alloc_trace+0x2d1/0x760 [ 1338.759381][T25351] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1338.765198][T25351] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1338.770837][T25351] __list_lru_init+0x3cf/0x6e0 [ 1338.775604][T25351] alloc_super+0x78d/0x890 [ 1338.780015][T25351] ? test_single_super+0x10/0x10 [ 1338.784948][T25351] sget_userns+0xf1/0x560 [ 1338.789271][T25351] ? kill_litter_super+0x60/0x60 [ 1338.794213][T25351] ? test_single_super+0x10/0x10 [ 1338.799145][T25351] ? kill_litter_super+0x60/0x60 [ 1338.804079][T25351] sget+0x10c/0x150 [ 1338.807895][T25351] mount_bdev+0xff/0x3c0 [ 1338.812137][T25351] ? vfat_mount+0x40/0x40 [ 1338.816473][T25351] vfat_mount+0x35/0x40 [ 1338.820623][T25351] ? setup+0x120/0x120 [ 1338.824693][T25351] legacy_get_tree+0xf2/0x200 [ 1338.829366][T25351] vfs_get_tree+0x123/0x450 [ 1338.833871][T25351] do_mount+0x1436/0x2c40 [ 1338.838208][T25351] ? copy_mount_string+0x40/0x40 [ 1338.843226][T25351] ? copy_mount_options+0x1de/0x440 [ 1338.848417][T25351] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 1338.853962][T25351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1338.860194][T25351] ? copy_mount_options+0x30e/0x440 [ 1338.865392][T25351] ksys_mount+0xdb/0x150 [ 1338.869632][T25351] __x64_sys_mount+0xbe/0x150 [ 1338.874314][T25351] do_syscall_64+0x103/0x610 [ 1338.878907][T25351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.884798][T25351] RIP: 0033:0x45a89a [ 1338.888689][T25351] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1338.908286][T25351] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1338.916696][T25351] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1338.924676][T25351] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1338.932636][T25351] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1338.940602][T25351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 03:51:13 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup(r1) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0x1, 0x0, 0x9, 0x2d, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e21, 0xd68, @remote, 0xc26}}, @sadb_address={0x3, 0x7, 0x3f, 0x80, 0x0, @in={0x2, 0x4e22, @multicast2}}, @sadb_ident={0x2, 0xa, 0x5, 0x0, 0x7}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e24, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0xd6}}, @sadb_ident={0x2, 0xb, 0x8, 0x0, 0x4}, @sadb_key={0x13, 0x9, 0x468, 0x0, "8a65df2c4d83d754017d54e11793e04a08b9d4b1500f24d16e56518690dd455a9b6c31bed3d7703cf0fd59412621d4509029025409427151da91d4fbc71203da10107527b94119269f27fa6f9a4dff3b8e3e08b822a24466c46e74dfdde96bee1179c2c17a6d3d12f8d6ff51343a51358672122d72465c81ffd8115ce5d9cabd906f918eae03cf20f411bc0b45"}, @sadb_x_sa2={0x2, 0x13, 0x4, 0x0, 0x0, 0x70bd27, 0x3506}]}, 0x168}}, 0x4000800) 03:51:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1338.948566][T25351] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) clock_gettime(0x0, &(0x7f0000000000)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffffffffffffa, 0x4, 0x3d82], 0x3, 0xff, 0x3, 0x82, 0x101, 0xff, {0x7, 0x8, 0x8000, 0x2, 0x8, 0x0, 0x5, 0x4000000000000000, 0x3, 0x3, 0x5ef70e08, 0xb5c, 0x100, 0x7, "b2d15d1e4b91b541bf39421ae9b93e0e4a7576942ff8c7ee3d5b4287dbbaba5d"}}) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:13 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000192, 0x10400003) 03:51:14 executing program 1 (fault-call:0 fault-nth:89): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1339.173995][T25221] FAT-fs (loop4): bogus number of reserved sectors [ 1339.193703][T25221] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000193, 0x10400003) 03:51:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e21, 0x900, @dev={0xfe, 0x80, [], 0x1c}, 0x1}}, 0x0, 0x200, 0x0, "9fabad9ba345a991c40ca1c65cf929cfc7502460a3920e289e3c7b7cc0ff284c7604352fd2e84104c202e97393f7cf312c0e5050d8eb58344645526b4eea431db094eb03128d50f99c1bc6123fa1d8fe"}, 0xd8) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x18) 03:51:14 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xc57, 0x80002) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '/dev/snd/controlC#\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x2) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x9) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1339.407834][T26026] FAULT_INJECTION: forcing a failure. [ 1339.407834][T26026] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1339.421083][T26026] CPU: 1 PID: 26026 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1339.430187][T26026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.440241][T26026] Call Trace: [ 1339.443554][T26026] dump_stack+0x172/0x1f0 [ 1339.447910][T26026] should_fail.cold+0xa/0x15 [ 1339.452517][T26026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1339.458351][T26026] should_fail_alloc_page+0x50/0x60 [ 1339.463554][T26026] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1339.468944][T26026] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1339.474668][T26026] ? find_held_lock+0x35/0x130 [ 1339.479451][T26026] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1339.485270][T26026] cache_grow_begin+0x9c/0x850 [ 1339.490046][T26026] ? fat_fill_super+0xcf/0x3870 [ 1339.494904][T26026] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1339.501157][T26026] kmem_cache_alloc_trace+0x67f/0x760 [ 1339.506543][T26026] ? enable_ptr_key_workfn+0x30/0x30 [ 1339.511838][T26026] ? vfat_cmpi+0x440/0x440 [ 1339.516262][T26026] fat_fill_super+0xcf/0x3870 [ 1339.520944][T26026] ? vsnprintf+0x32f/0x19b0 [ 1339.525464][T26026] ? pointer+0x910/0x910 [ 1339.529708][T26026] ? fat_flush_inodes+0x1a0/0x1a0 [ 1339.534739][T26026] ? snprintf+0xbb/0xf0 [ 1339.534753][T26026] ? vsprintf+0x40/0x40 [ 1339.534785][T26026] ? wait_for_completion+0x440/0x440 [ 1339.534806][T26026] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1339.554079][T26026] ? set_blocksize+0x2bf/0x340 [ 1339.558850][T26026] vfat_fill_super+0x32/0x40 [ 1339.563447][T26026] mount_bdev+0x307/0x3c0 [ 1339.567788][T26026] ? vfat_mount+0x40/0x40 [ 1339.572129][T26026] vfat_mount+0x35/0x40 [ 1339.576302][T26026] ? setup+0x120/0x120 [ 1339.580431][T26026] legacy_get_tree+0xf2/0x200 [ 1339.585111][T26026] vfs_get_tree+0x123/0x450 [ 1339.589619][T26026] do_mount+0x1436/0x2c40 [ 1339.593958][T26026] ? copy_mount_string+0x40/0x40 [ 1339.598900][T26026] ? _copy_from_user+0xdd/0x150 [ 1339.603762][T26026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1339.610015][T26026] ? copy_mount_options+0x30e/0x440 [ 1339.615225][T26026] ksys_mount+0xdb/0x150 [ 1339.619476][T26026] __x64_sys_mount+0xbe/0x150 [ 1339.624164][T26026] do_syscall_64+0x103/0x610 [ 1339.628762][T26026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1339.634670][T26026] RIP: 0033:0x45a89a [ 1339.638564][T26026] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 03:51:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$TIOCCONS(r1, 0x541d) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'eth1security'}], 0xa, "959d14247b6da868fb0803f9d325b6db98620a5707b876d4281f4c39853602c6d81c0460103310b5876dfa93295626cb451c3ddccf02fa722bc0dfd99d68643a1a8cc774eef24caa59fffdee034a590a5a50aa93"}, 0x6c) 03:51:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1339.638574][T26026] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1339.638590][T26026] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1339.638600][T26026] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1339.638616][T26026] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1339.690505][T26026] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1339.698489][T26026] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:14 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2100, 0x0) write$nbd(r0, &(0x7f0000000180)={0x67446698, 0x1, 0x1, 0x0, 0x2, "012f8d6b547d0c1d89221981d6ceadd4ee92a46b504d60c6f0ce2e75d9eb6c2aeeb28d9e97f971b0e961ebe625dd567e625ffceacf6794fd81b2b2257af6f315751f9b0cc1122ace13c9619cdfa89ef2a689678530fe422ad8b89793e0b2bab19eef66aba208cdb1141f39628c33f6b69c6142c959f780d2c197d82ca2a1c3ba97e2afc891cdded0f1c90a26484a4dd8a59f70ac87eecad78475537e2d9c9e12aa9d3b5e90aefe68494e9950bdfe6f5710f75bf28731e7fca5db3426d9c7cf7e3efa255e8cf05c10a635bfeb4c8732254ed1fa9deed36868bc68279ac644b02b1293c5d023fb183de69420fc6bc48c2ff613c30a11d4e3ce99"}, 0x109) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x6, 0x3, 0x8000, 0x6, 'syz0\x00', 0x1ff}) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1339.718105][T26026] FAT-fs (loop1): bogus number of reserved sectors [ 1339.752341][T26561] FAT-fs (loop4): bogus number of reserved sectors [ 1339.759573][T26026] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000194, 0x10400003) 03:51:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x2, 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8050000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x726, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x80) semget(0x1, 0x0, 0x9fa6773000481032) [ 1339.781469][T26561] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1339.801075][T26622] Unknown ioctl 1077957909 03:51:14 executing program 1 (fault-call:0 fault-nth:90): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1339.885098][T26561] FAT-fs (loop4): bogus number of reserved sectors [ 1339.903715][T26561] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x100000001, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000780)={0x0, 0x1000, "65be44f90f13336ce3bc597c5e06f995c543e1a4a61ce4bd15cf4b71e350c4607888a9b21d3329b8ce9500586d08468938f7ffa06d151434be81c861ce372b76d5dbb70969b0b98656d424efc49add4d1a43930e909ebf1327883bd6b0dc338262cb3b1aa0130894280646487f79e330d869ed0674bf5c263dfe2a47dd8bbd40f4a40fb3162e55dccf27e95ea90da7694ab5142877d255cf0bdd6f36506fda9187f42f18f12a04a1478ce2558c2eb6b44d34c054be791134c7a4c6764c2ce652c5f3aab49713fa9879405a29beead82b00550ef15eaba64ccc113f13598fe181ed248ac7d20c8566332933cd57d021c444a13456ca67bf39485493ca44559cff25c1cb703c8d0b58674334cb7f8644faf063006fd1c7aac74d95760b1b4d6da437ce1192b8c656464a49c5010e45928eba6f097c74b50b565b6f59baef4fb70f1a05d6cf9137203a7c09cfa1076ea7d7fec3a58e8ede0337b3f373379a61d53cddc842fb57de380fd126f793e7a837250993b238c07c482e6defd6c487799f41bcc8c5fdaca97e4772c4314f95af865a2ec70c77707f55f0a213d714713dd2778d46ce520e0bf3513ad0699f2c6432e4a35cd8feb15b76b14ed891c7989332fed63081e023462793290bbb598a35c9c7d3ab4a79f54dc39f7e2f3c568184d17e13a483864c2fc4dd7b7aaefc4d6b13dd75d6a48c5501c80bb88ac55d232a6d0eab6d49ee76206a0388c59f90222bc6129cbccfbd5153317d05bb138cff3f364ba71bd1dde7a9bbd0993600535ffea397be4eb6bb2c38d4a123983e3626e7bacd2e13b8bd8988836af50f3e8fbae2b366b0bd2f9b794dbebbd055e2cb7d7c2e0d9543bdb5a1c14be7f30d6fd13d94f69b80be6ce9183b9c4dde1d97dbe3ab08b0aeb346d06ce93416c46d4844cdcd03d839bb693213c1de3dc83b26ff87c0255c35e5d076282906acc4c7039caf4f8aecbb20545ef1ce1f1ada76a61a7b60e695b0df777911b9f09eb8942110417bc30b67c437f59f7f6d6492535299e44776bd6be25e61a74a2a92c6688ee66428ed1b3428ccfb59a1ffcfbbebb0fe6b28fd9bd2a4ef96b659a210989bdf518cdadebb436bc10867885531a84e3cecbd087e8b05477066d14cebabbd60e5d176d76b36a0b50d2f898ef588e1d84a59e2407f90bb481588c8b29f08ca5666950747abfe6e626a832549c1cbbf88da83e557e2d8277c2e6c2885a626fe05216152c2761f7096b28e7d4c89997c69198a1fab392e69915125af6e82e696a41fa521763ac21fb82fbb86773f90861d28379484dd1dde0f8bfb6933fc5a4798dd2d6d2f982420db745f542c61b99f38fe9efd848b68b5fd1cac3d29ddf140d2098dc2b286f029621837f55ae85d8e8f59a98ae0bd7fd42dc1e49f1ec7e029c3a3e8486ba2a485785acee0fd3acda69e7d002336a07a62027bdb074cf33aa0248add639e0da0f7aba3a1f12c0bf0e8296377e4bed8b5ebc44ce54e8f1b7e3d64a7c62287cf513650c065b494eb6adbfab6665547567eda243b595f4d6c71028fd598c5f51df56760d46b8990be579290b48ac07456576cb850e0a4904d4a905f19fcafab697f94f63a7fc05a02abe1129121a1880d1e3b41749938391c22d07cbc7889c242f77d204d7e5e8310a57fd5db458ddb4368d5d876b94409e2359fc4ace21a47eb8ddb0daa054828eecdb029635baa9c3c2e67dd911520a01354c70f093c32f41f0b2721e634e8da77bc0ed8aded39ca6335a3703384212a71adcbd7d326778db8f63b3d5fd4a57d5c901c4fc22ba96ec7d88a56ee82f8e6a9ff95aa3a2c4fae235c9bb7606ca92766cdb0463f053d4a33bd806e24b45be1cbc3850a3aa4f3a8ca407922b9eb65bcf3aed28ffd8c0e98453b3395b168b0df27b2d369e01a8f43638aa7a72094fa5f1d275cb38e41c0c290f09a56f68bc42ca056f372e240649e3099c32ec1b868f9c1f599cd4bd7042d376fc6055d0bccac05c00bc6e408f90cbeaed34871fd282dc1fdfb1ad69fb80953fe3f93a91530fd8bdbfce66ae28c39d9b2cb3f5c9b0206d4a1bd7a479139fd20130a097ad38aee4eedd2d28ab51d20bbacc4196c0f61a9398fbee09929e76b22899d784796a36bc00e612d7ecf63738c82edd22cb9fc61baf7cbf30f67ab54ab9606c738c907a2d8a328f97c305a4292e7b3feb543ae59a04838944838b0da16d85ab8639e958718a79fbad301b8c43a5d2098a51a0f433f5a52dfb3c484b0289e6d3a06580a2c9c1c71767846f8b13dcab48d649265ebacce505069035130bec58c238328e0ee99bd4ce790f2dfcd63889b3df7e8b8cf1d898057eac7fe3d541b5e0f130f478477ff5940946d5ed47e6ec0876b129fb717e0bac22d394f4f8b98d30fa1d04b949fc48dd1b29b95d6feba5f14fe33a5ef551e6bb0702b57e391456b1c20002b50506501d776f63da37cb50944893a2e8c9a30ff63f32b3e2b3ff6ee39b3a4487ecc0a0c7b5823ec2a629fa9eaf6a519b31040e33c720baaa7dc625b638b70c2de965abc77d629ae96e286a4b1cc81f1f66f88cc8c5426cc9770f9c54514d6e4c1ae685841d07a2cd0e63dfa41ec4c780d4427804da80ccc1bf9ddcd531dc74580f10b3125062a523ca763dccd0facd666bcb86c34a122b4bf89c721a3105c790eeb42788a7cb9b1758c5a7ced8f2c4f47bb4a038becce3c138ae3f6c0f252c98492a394bafbdd6fc87ecd3e17fb78cb3b324a8e57cda306a310b10371ef1bf1c769ea4a9addbc7db2d93240f3a49c2f69bbfb771b12735d26c69910559fc25f464649904df0d5ca877d54732cd489f9ed45e9334cae7b23751243ba674f55e7334ca6f6e36bec38fcd9123f5f37dbd20a7bc824e21a112c3f29a23353ff27a2a58e0c264e1eff458459a8a2b7ff8e76978053d403091027cfa9ec901e84567040e3415b5742724788433513315476801e516d48f16bb8e64f5983b642d790b7391ba654fe1c0b80599ee7b0f90c1928ff78bcfe408db17ffdd2ad2b1496174eae0ae5b1e964fb6447a73dc6d6e7beb61a5723d6c0c22d93c84ee612e08c25b468ef5b05d78ca5927670aa7c9cda019609dee582477f7f8d9767eb08457005a56858a4c0079dc554436ec43f670455079e95ba3ab49e2eec3b786655c31b858ac92608e2080df240c1ae62d6073d58917dcfc6a07a15ef131ea2db64873b1c0d71ec9f2ac7b90c50a2e3d2cb2579ef0dfe140768241dbb3cc395ac22e130827071ce0999d77db0e72afa88b73186a417f8c3fabd977976e3d6c9c4c4c3b72bdec7fd812a4bfa47b3a484b3311959b2e30a70e3a54e83809d867f326ec6d69df44c285de8a11457e349ef036dade7f043c779fee2c709c7b25dbbfa4b3c69cff8be5a3434d46a3b486184765ef796870dbd36d67106103192d5416d82dbadcb806582af65a73beffd7a064927ff2c0532f9906fa9ade458c18c533efe99631f828714100b8872d1bc35fb43b918f1466c6220c4d861295285dd0b90674fc47d63f2e00d45b66d4fa47996f553e5f06bcd46142a93cfd64a06cba4a422c95907dc242064819b5884b891ece1f36000075840bb7bf6f86abfb06054e744ba416bb777e85ea145e09a6e16f6d5a0c67d60eb2c6d4525ac4adbd6aec40add56f3e6eb5d415347ad6c43fd602b3df0994cb11824b130ced9c61ebcc6e83e1b816f40e630b067c7113bbb7c7799be91a5a2a8a76f144d4003b241970cec22566cd48a95d2d4a04c01c74f4b0c055eb14acae06678122f383ee4920af24d1495e34e06c8f1ff912eb37958bad60a549fd7512dead1d2cba1d060213e56febc8bfe8fe43e4e9fe56ec6b964b2607304370bb38c1ffb431251983af1cf8fe226584f2f3ff47647d2ae3d5d8d9a2d1ad2674f0e7b98bb15b7ce07e30118f25fa8d6df0aa4d4bda21902207569c077762141fccbef10ba0aa3ab011be61c1f7df5266366a56fb0e57b8294bebe031f25934f490f490a4c3122133f74cdd6e67c4b98bc4b08291234504e329e8b9c84109a121bae8563bb24e1ce5d9c8061a03b8fc52cb55a2205c3dcf787e516c1a099b36495717c3efb37198be4cc787f1123bb9fc228121a7679ae24beb49a6c9195a353dd11eb8258cc9137c677ab2514d0c9216975a9a863fa3d7a338598368fa67f2eee96311138d5a4e0b23416de3a09791a75744579122fbb6cb628436b2d5a6c6973eed3acb84c81ad788d6bc26d5abf40a1daab4a792f77e7bbd482525406401eeed73dfd2b4db8d9be6ff063db9b9dad141a8ee01a6b7b5e0af7e17b1e3c87a803e43d9d642d4bc6e67937f614b574bba51c4d7725cb152b1ed2d81b1763360d17aad2079075beddace7439c0eaf8de314c7733beb5a76d9808f18476ddcd0318828194f3d3cc820247da556412933646c228baa841fa57d27e154114e812ef0c5340d9bdd80b9d4614796771588dd6da60128f3265ad95e6c7f3b8e75e7c4821d22133f88bc9e5a6f9a8a49309c72fa46c3fd49c4ac143fa409740b5052c1626d1a8ecd5a93c8164151425e1ecdc2009d2e7c62c19f9cb61c6eb08d78f89b1fbd1e1cb58e606fbf1ff8bf505750b1d83efe84a68159998374c7d877c7cb0c090b8241245ca868b6cc4dde75a0689b246cf59f2ffcbd7c6c52162ac76d2f3a75fe41055fb2e50d4bbf2c35387adbc88637e7238b3c499b117f4b2b986a18ed806e313b48bb381cad6610a267fd3ebb853d579e494f6223fb3a3a8171b6e017dcf18f5f2f51a2297ebd81a80ba715b2b03b2dfcd6f1573ee8958e3d1ccd636b2f2f5c3346b427cba6980dfe738f43a792566ba4be8059034e92204bb59ca9d7277def0b7525496d19d33a56220ac18081ce264c2674d80ad1f9fa360f5acbaf8da9cc27b86da57b71db256b1447e018ee18c73c9390368b50fb5812e3f7d1325772196d7799db2b818394edc2b134985d47d039922e3d852e73ba6451e5faa38eea2a81dd7212905ffa20eced4891ec767fb42ba51e99239b3b64846e1b20968aba9e06d704a19e2ea069f564d0e74ab0e944bb178f6e52c47403976392e6443b750b93dcd8bef6139feb0d99f229598f5a197bb5783220d881e863f66e3e5caa5d7b54ca96083be16b2b9d5c0c548e2bf77f6f799acc0133759ffdc6482ebdb69579cb61033c1d2561cd8552d2421e104c7cd35811c953e979702815d7c651be3c287334333e37af35d6bc5a652a8cebeef12bf6d09c23eda8ec81c4fedbf208a9e77589623cf82f4e9f5178388d2f1bb03476acd71323a2532f36b99576d0dd2226631a144a0bed9892cf286bd53fd9589a0d94d2733a9701be2362aa76b6b67f5b0fc14ecc98f4c8fd0494ee58f4ea51e8734589875235696f2b3d400af45a910e828539e7b064ed7ec3a23bdd2133b93601c877a158ba9c51f76d5d6b0607ce06f94a77ff2d72bc3453efb343bf8239f9b1143571416bda7763d564ff3364119c3dd85ee0e9ec25605e045f0a62c99ffcaa518712748ef895f20a8b47c98c6cfcdf215fa818c05fabd777a110b4f59db80407ab9e4e9d718d65ef6bc0c28d4187c58e902d77b9fa1cd82654924b8e15db71c296573a71e9b648733b7c067e7a4d207c98f91ae16f50f828d9b18b2e36a6bd66e1a1248ebe8cbc1fdba3bd5e78e37a2ad3a2babbb051a3c6fc3d082649c6e4e37417989d0de4486cd143fdbdc8631032de3f8c0dd158e02e232af784dccb81839a599d91efff0d5e609de69eb679a0e1eb05f92d5ad484731d58f8"}, &(0x7f0000000200)=0x1008) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000240)={r4, 0xa1, "13bbc538acbc0061bb746e35934d26ae9ba3a222db4f8914a9a1f5c84ed708992887fc2da12d208539e957d2a9adbbd62427c6d13c8bc764ac665176b3183d425c72817c2451aace7a24f6941c68a6d3aff3254115f7edf9c2f2d5f7b3d128146f90b26c8cc4f70e695de64b29013194dcc6a2b1ed897e265819c44f1da6bd3d3ec1b005f9a25e134765b13da80a6aa508cad239a69c861355c7c9a8fdfee9c7bb"}, &(0x7f0000000300)=0xa9) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/rt_cache\x00') ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000180)=0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='yam0\x00') fadvise64(r0, 0x0, 0xfff, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") getpeername$packet(r5, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) fsetxattr$security_selinux(r2, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:14 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000195, 0x10400003) 03:51:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1340.057474][T27014] FAULT_INJECTION: forcing a failure. [ 1340.057474][T27014] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.113517][T27098] FAT-fs (loop4): bogus number of reserved sectors [ 1340.138691][T27014] CPU: 0 PID: 27014 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1340.147860][T27014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.157910][T27014] Call Trace: [ 1340.161214][T27014] dump_stack+0x172/0x1f0 [ 1340.165564][T27014] should_fail.cold+0xa/0x15 [ 1340.170165][T27014] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1340.175979][T27014] ? mark_held_locks+0xf0/0xf0 [ 1340.180747][T27014] ? debug_smp_processor_id+0x3c/0x280 [ 1340.186232][T27014] __should_failslab+0x121/0x190 [ 1340.191175][T27014] should_failslab+0x9/0x14 [ 1340.193373][T27098] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1340.195681][T27014] kmem_cache_alloc+0x47/0x710 [ 1340.195702][T27014] ? ___might_sleep+0x163/0x280 [ 1340.195728][T27014] ? mempool_alloc+0x380/0x380 [ 1340.195744][T27014] mempool_alloc_slab+0x47/0x60 [ 1340.195766][T27014] mempool_alloc+0x16b/0x380 [ 1340.226098][T27014] ? mempool_destroy+0x40/0x40 [ 1340.230867][T27014] ? mark_held_locks+0xa4/0xf0 [ 1340.235635][T27014] ? lock_downgrade+0x880/0x880 [ 1340.240495][T27014] ? __find_get_block+0x9ba/0xcf0 [ 1340.245516][T27014] ? __getblk_gfp+0x2c8/0xd30 [ 1340.250193][T27014] ? __find_get_block+0x9ba/0xcf0 [ 1340.255221][T27014] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1340.260519][T27014] bio_alloc_bioset+0x3bf/0x680 [ 1340.265370][T27014] ? __find_get_block+0x317/0xcf0 [ 1340.270405][T27014] ? bvec_alloc+0x2f0/0x2f0 [ 1340.274922][T27014] submit_bh_wbc+0x133/0x7f0 [ 1340.279522][T27014] __bread_gfp+0x13d/0x300 [ 1340.283943][T27014] ? vfat_cmpi+0x440/0x440 [ 1340.288376][T27014] fat_fill_super+0x356/0x3870 [ 1340.293152][T27014] ? vsnprintf+0x32f/0x19b0 [ 1340.297707][T27014] ? fat_flush_inodes+0x1a0/0x1a0 [ 1340.302744][T27014] ? snprintf+0xbb/0xf0 [ 1340.306910][T27014] ? vsprintf+0x40/0x40 [ 1340.311078][T27014] ? wait_for_completion+0x440/0x440 [ 1340.316369][T27014] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1340.322092][T27014] ? set_blocksize+0x2bf/0x340 [ 1340.326866][T27014] vfat_fill_super+0x32/0x40 [ 1340.331463][T27014] mount_bdev+0x307/0x3c0 [ 1340.335825][T27014] ? vfat_mount+0x40/0x40 [ 1340.340168][T27014] vfat_mount+0x35/0x40 [ 1340.344327][T27014] ? setup+0x120/0x120 [ 1340.348403][T27014] legacy_get_tree+0xf2/0x200 [ 1340.353089][T27014] vfs_get_tree+0x123/0x450 [ 1340.357603][T27014] do_mount+0x1436/0x2c40 [ 1340.361947][T27014] ? copy_mount_string+0x40/0x40 [ 1340.366890][T27014] ? _copy_from_user+0xdd/0x150 [ 1340.371750][T27014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1340.378006][T27014] ? copy_mount_options+0x30e/0x440 [ 1340.383209][T27014] ksys_mount+0xdb/0x150 [ 1340.387457][T27014] __x64_sys_mount+0xbe/0x150 [ 1340.392141][T27014] do_syscall_64+0x103/0x610 [ 1340.396747][T27014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1340.402649][T27014] RIP: 0033:0x45a89a [ 1340.406550][T27014] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1340.426173][T27014] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1340.434602][T27014] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1340.442576][T27014] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1340.450548][T27014] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 03:51:15 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000196, 0x10400003) 03:51:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:15 executing program 3: r0 = socket(0x1f, 0x1, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mount$9p_xen(&(0x7f0000000000)='eth1bdev\xc0wlan0wlan1/&trusted,,^vboxnet1wlan1,+()\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x20, &(0x7f00000000c0)={'trans=xen,', {[{@access_any='access=any'}, {@version_u='version=9p2000.u'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@appraise='appraise'}]}}) [ 1340.458841][T27014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1340.466820][T27014] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1340.486470][T27014] FAT-fs (loop1): bogus number of reserved sectors 03:51:15 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="3810000031b57491de412492200060ab7afc3aabb704a5c35aab07c19bc27c4331e669a3154c0a57452a4e53696e4b504be0dd66ef5b562ef9ddc6b9cb728c6ebd2428c017e6c2ad1c698523b246ca4e070e8c65ec548a584c2861bae4959b1faa9d2b5a01627251c77adda5b5bc2d1b3f61313c8f9163615b8d3b57e4b9500c8d05d8ac09b35ef29c3813c1324a4e2487f690a1dacdb96be1875005ffbb0dd8dc1120c17e92705d1db084bd3d792a9cdca939cf71f3dae9e39c86f27bf6909443694729b83686e4214677ed6053e9a8ee307a4c57f91bafc9579e", @ANYRES16=r2, @ANYBLOB="000226bd7000fcdbdf25010000000800030000000000080002000a000000080001004e220000040005000800020002000000"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) inotify_init1(0x800) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, &(0x7f0000000180)={0xd8, ""/216}) [ 1340.525338][T27098] FAT-fs (loop4): bogus number of reserved sectors [ 1340.527719][T27014] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1340.531857][T27098] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:15 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000197, 0x10400003) 03:51:15 executing program 1 (fault-call:0 fault-nth:91): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:15 executing program 3: r0 = socket(0x2000000000001, 0x6, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd1e) setresuid(0x0, r1, 0x0) semget(0x1, 0x1, 0x220) [ 1340.729511][T27818] FAT-fs (loop4): bogus number of reserved sectors [ 1340.745748][T27818] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:15 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1340.836368][T27855] FAULT_INJECTION: forcing a failure. [ 1340.836368][T27855] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.850106][T27818] FAT-fs (loop4): bogus number of reserved sectors [ 1340.864354][T27818] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1340.879273][T27855] CPU: 1 PID: 27855 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1340.888393][T27855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.898447][T27855] Call Trace: [ 1340.901754][T27855] dump_stack+0x172/0x1f0 [ 1340.906105][T27855] should_fail.cold+0xa/0x15 [ 1340.910731][T27855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1340.916552][T27855] ? ___might_sleep+0x163/0x280 [ 1340.921410][T27855] __should_failslab+0x121/0x190 [ 1340.926354][T27855] should_failslab+0x9/0x14 [ 1340.930865][T27855] kmem_cache_alloc_trace+0x2d1/0x760 [ 1340.936250][T27855] ? enable_ptr_key_workfn+0x30/0x30 [ 1340.941539][T27855] ? reacquire_held_locks+0xfb/0x520 [ 1340.946838][T27855] ? alloc_super+0x158/0x890 [ 1340.951431][T27855] ? vfat_cmpi+0x440/0x440 [ 1340.955853][T27855] fat_fill_super+0xcf/0x3870 [ 1340.960527][T27855] ? vsnprintf+0x32f/0x19b0 [ 1340.965038][T27855] ? pointer+0x910/0x910 [ 1340.969285][T27855] ? fat_flush_inodes+0x1a0/0x1a0 [ 1340.974323][T27855] ? snprintf+0xbb/0xf0 [ 1340.978480][T27855] ? vsprintf+0x40/0x40 [ 1340.982640][T27855] ? wait_for_completion+0x440/0x440 [ 1340.987927][T27855] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1340.993646][T27855] ? set_blocksize+0x2bf/0x340 [ 1340.998415][T27855] vfat_fill_super+0x32/0x40 [ 1341.003010][T27855] mount_bdev+0x307/0x3c0 [ 1341.007391][T27855] ? vfat_mount+0x40/0x40 [ 1341.011724][T27855] vfat_mount+0x35/0x40 [ 1341.015885][T27855] ? setup+0x120/0x120 [ 1341.019961][T27855] legacy_get_tree+0xf2/0x200 [ 1341.024639][T27855] vfs_get_tree+0x123/0x450 [ 1341.029149][T27855] do_mount+0x1436/0x2c40 [ 1341.033520][T27855] ? copy_mount_string+0x40/0x40 [ 1341.038461][T27855] ? _copy_from_user+0xdd/0x150 [ 1341.043320][T27855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1341.049561][T27855] ? copy_mount_options+0x30e/0x440 [ 1341.054765][T27855] ksys_mount+0xdb/0x150 [ 1341.059022][T27855] __x64_sys_mount+0xbe/0x150 [ 1341.063709][T27855] do_syscall_64+0x103/0x610 [ 1341.068314][T27855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.074205][T27855] RIP: 0033:0x45a89a [ 1341.078100][T27855] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1341.097701][T27855] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1341.106111][T27855] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 000000000045a89a [ 1341.114080][T27855] RDX: 00007ff1c2082ad0 RSI: 00000000200000c0 RDI: 00007ff1c2082af0 [ 1341.122054][T27855] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 03:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000198, 0x10400003) [ 1341.130030][T27855] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1341.138000][T27855] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x12) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x8, 0x4) r2 = dup2(r0, r0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000040)={0x3, 0x8, 0x3ff, 0x5, 0xfffffffffffffff9, 0xfffffffffffffffa}) r3 = fcntl$dupfd(r0, 0x406, r0) write$P9_RUNLINKAT(r3, &(0x7f0000000000)={0x7, 0x4d, 0x2}, 0x7) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000240)) 03:51:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xfffffffffffffffc, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x3, 0x3, 0x4, 'queue1\x00', 0x8}) ioctl(r1, 0x1000008912, &(0x7f0000000440)="5c354e6a7d89567cc24d9eb1ca7cb6d84b21a7e3f630067ce4d85338643bdd318b0994c4d98af3348f583f7920044b1f5c9aedd0e55e9957ab251bb749da681129f6c97ee2216df17ba5ca0f4f24c3aaf6f90df105e89d49140f33cb9b52be180c45f34d0c2f93d26175c01b07d22f8313ef2797c0a35339b855f83ff29a983ae81a7a92fd82febae3ae5aa45836415a81e88c5bef51576f501588d6c0dc6178842a030572042233d3cc9334384df1c4b5fb333abb487a8c807d525afef2af9abb59fd") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000540)=ANY=[@ANYBLOB="020000000000000000000000000000000000000000000000000000080000000000000000646d4b81e6000000000000030000000000000000000000000000000000000000000000000000000000000000000000bf8547d69e2ce728269b38f30000000000"]) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000400)=0x7) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000080)=0x10000000000000) connect$bt_sco(r4, &(0x7f0000000100)={0x1f, {0x6, 0xffffffffffffffdd, 0x7ff, 0x7, 0x64ed, 0x200}}, 0x8) 03:51:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x1000000000000199, 0x10400003) 03:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1341.351618][T28457] FAT-fs (loop4): bogus number of reserved sectors [ 1341.392547][T28457] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x2, 0x0, 0x9fa6773000481032) 03:51:16 executing program 1 (fault-call:0 fault-nth:92): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) [ 1341.498396][T28457] FAT-fs (loop4): bogus number of reserved sectors [ 1341.520095][T28457] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019a, 0x10400003) 03:51:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:16 executing program 3: clock_gettime(0x4, &(0x7f00000000c0)) getgid() rt_sigtimedwait(&(0x7f0000000040)={0x1}, &(0x7f0000000240), &(0x7f0000000200)={0x0, 0x989680}, 0x8) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) nanosleep(&(0x7f0000000000)={0x0, 0x989680}, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) [ 1341.699318][T28915] FAT-fs (loop1): bogus number of reserved sectors [ 1341.733644][T28915] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:16 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000280)={0x5, 0x1, [{0x4}, {0x8, 0x0, 0x4}, {0x6, 0x0, 0x5c0}, {0x4, 0x0, 0xb37}, {0x1, 0x0, 0x95f}]}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x8, 0x0, 0xfffffffffffffffc, 0x0, 0x0}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x80800, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x3, 0x400, 0x0, 0x9d09, 0x1, 0x3, 0x2, 0xc}}) r3 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x800, 0x100) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000100)) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x0) ioctl$SIOCRSSCAUSE(r4, 0x89e1, &(0x7f0000000080)=0x1000100000000000) [ 1341.773221][T29082] FAT-fs (loop4): bogus number of reserved sectors [ 1341.788843][T29082] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:16 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019b, 0x10400003) [ 1341.840517][T28915] FAULT_INJECTION: forcing a failure. [ 1341.840517][T28915] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.871550][T28915] CPU: 0 PID: 28915 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1341.880672][T28915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.890724][T28915] Call Trace: [ 1341.894035][T28915] dump_stack+0x172/0x1f0 [ 1341.898379][T28915] should_fail.cold+0xa/0x15 [ 1341.902979][T28915] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1341.908816][T28915] ? ___might_sleep+0x163/0x280 [ 1341.913682][T28915] __should_failslab+0x121/0x190 [ 1341.918629][T28915] should_failslab+0x9/0x14 [ 1341.923215][T28915] kmem_cache_alloc_trace+0x2d1/0x760 [ 1341.928604][T28915] ? kernfs_put+0x372/0x600 [ 1341.933129][T28915] kobject_uevent_env+0x2fb/0x1030 [ 1341.938261][T28915] kobject_uevent+0x20/0x26 [ 1341.942785][T28915] __loop_clr_fd+0x4ee/0xc90 [ 1341.947382][T28915] lo_ioctl+0x37c/0x20d0 [ 1341.951622][T28915] ? __save_stack_trace+0x8a/0xf0 [ 1341.956664][T28915] ? lo_rw_aio+0x1530/0x1530 [ 1341.961272][T28915] blkdev_ioctl+0xee8/0x1c40 [ 1341.965869][T28915] ? blkpg_ioctl+0xa90/0xa90 [ 1341.970465][T28915] ? perf_trace_lock_acquire+0xf5/0x580 [ 1341.976023][T28915] ? save_stack+0x45/0xd0 [ 1341.980353][T28915] ? __kasan_slab_free+0x102/0x150 [ 1341.985464][T28915] ? kasan_slab_free+0xe/0x10 [ 1341.990146][T28915] ? __fget+0x35a/0x550 [ 1341.994311][T28915] ? find_held_lock+0x35/0x130 [ 1341.999095][T28915] ? __fget+0x35a/0x550 [ 1342.003293][T28915] block_ioctl+0xee/0x130 [ 1342.007623][T28915] ? blkdev_fallocate+0x410/0x410 [ 1342.012660][T28915] do_vfs_ioctl+0xd6e/0x1390 [ 1342.017256][T28915] ? kasan_check_read+0x11/0x20 [ 1342.022120][T28915] ? ioctl_preallocate+0x210/0x210 [ 1342.027253][T28915] ? __fget+0x381/0x550 [ 1342.031437][T28915] ? ksys_dup3+0x3e0/0x3e0 [ 1342.035859][T28915] ? kfree+0x173/0x230 [ 1342.039933][T28915] ? kfree+0x173/0x230 [ 1342.044007][T28915] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1342.049310][T28915] ? security_file_ioctl+0x93/0xc0 [ 1342.054433][T28915] ksys_ioctl+0xab/0xd0 [ 1342.058599][T28915] __x64_sys_ioctl+0x73/0xb0 [ 1342.063197][T28915] do_syscall_64+0x103/0x610 [ 1342.067825][T28915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.073726][T28915] RIP: 0033:0x457c97 [ 1342.077634][T28915] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.097246][T28915] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.105661][T28915] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 0000000000457c97 [ 1342.113631][T28915] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1342.121601][T28915] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1342.129569][T28915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 03:51:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019c, 0x10400003) 03:51:17 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400a80, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r1 = socket(0x10, 0x2, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000140)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) socketpair(0x1, 0xf, 0x4002cdbb, &(0x7f0000000000)) 03:51:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1342.137539][T28915] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:17 executing program 1 (fault-call:0 fault-nth:93): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1342.232648][T29082] FAT-fs (loop4): bogus number of reserved sectors [ 1342.246752][T29082] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1342.276873][T29523] FAT-fs (loop1): bogus number of reserved sectors [ 1342.294221][T29523] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:17 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1342.344455][T29523] FAULT_INJECTION: forcing a failure. [ 1342.344455][T29523] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.408555][T29523] CPU: 1 PID: 29523 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1342.417712][T29523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.427770][T29523] Call Trace: [ 1342.431087][T29523] dump_stack+0x172/0x1f0 [ 1342.435427][T29523] should_fail.cold+0xa/0x15 [ 1342.440027][T29523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1342.445843][T29523] ? ___might_sleep+0x163/0x280 [ 1342.450702][T29523] __should_failslab+0x121/0x190 [ 1342.455649][T29523] should_failslab+0x9/0x14 [ 1342.460662][T29523] kmem_cache_alloc+0x2be/0x710 [ 1342.465523][T29523] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1342.471342][T29523] ? lock_downgrade+0x880/0x880 [ 1342.476206][T29523] skb_clone+0x150/0x3b0 [ 1342.480458][T29523] netlink_broadcast_filtered+0x870/0xb20 [ 1342.486191][T29523] netlink_broadcast+0x3a/0x50 [ 1342.490967][T29523] kobject_uevent_env+0xa94/0x1030 [ 1342.496091][T29523] kobject_uevent+0x20/0x26 [ 1342.500607][T29523] __loop_clr_fd+0x4ee/0xc90 [ 1342.505207][T29523] lo_ioctl+0x37c/0x20d0 [ 1342.509453][T29523] ? __save_stack_trace+0x8a/0xf0 [ 1342.514486][T29523] ? lo_rw_aio+0x1530/0x1530 [ 1342.519083][T29523] blkdev_ioctl+0xee8/0x1c40 [ 1342.523682][T29523] ? blkpg_ioctl+0xa90/0xa90 [ 1342.528287][T29523] ? perf_trace_lock_acquire+0xf5/0x580 [ 1342.533845][T29523] ? save_stack+0x45/0xd0 [ 1342.538180][T29523] ? __kasan_slab_free+0x102/0x150 [ 1342.543293][T29523] ? kasan_slab_free+0xe/0x10 [ 1342.547986][T29523] ? __fget+0x35a/0x550 [ 1342.552150][T29523] ? find_held_lock+0x35/0x130 [ 1342.556914][T29523] ? __fget+0x35a/0x550 [ 1342.561082][T29523] block_ioctl+0xee/0x130 [ 1342.565413][T29523] ? blkdev_fallocate+0x410/0x410 [ 1342.570443][T29523] do_vfs_ioctl+0xd6e/0x1390 [ 1342.575042][T29523] ? kasan_check_read+0x11/0x20 [ 1342.579902][T29523] ? ioctl_preallocate+0x210/0x210 [ 1342.585013][T29523] ? __fget+0x381/0x550 [ 1342.589180][T29523] ? ksys_dup3+0x3e0/0x3e0 [ 1342.593595][T29523] ? kfree+0x173/0x230 [ 1342.597668][T29523] ? kfree+0x173/0x230 [ 1342.601744][T29523] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1342.607052][T29523] ? security_file_ioctl+0x93/0xc0 [ 1342.612174][T29523] ksys_ioctl+0xab/0xd0 [ 1342.616340][T29523] __x64_sys_ioctl+0x73/0xb0 [ 1342.620935][T29523] do_syscall_64+0x103/0x610 [ 1342.625537][T29523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.631429][T29523] RIP: 0033:0x457c97 [ 1342.635330][T29523] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:51:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019d, 0x10400003) 03:51:17 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x2, &(0x7f0000000080)=""/183) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="94000000", @ANYRES16=r3, @ANYBLOB="01002dbd7000fedbdf25030000002000130014000200766574683036746f5f68737200000000080004000600000008000400010000002000010008000b00736970e108000b00736970000c00070008000000250000003800030008000800dbf10000080007004e2000000100000000000000080007004e200000140002006c617062300000000000000000000000e86de76347b8f0815e6fcb89388662fa3434bdcc17a819fe06dd5eb376245b194e2bfe7c1ca09603a48e1a0c2d0e04dde023921ab8c9fc66b9c71604"], 0x94}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1342.654936][T29523] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.663346][T29523] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 0000000000457c97 [ 1342.671321][T29523] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1342.679298][T29523] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1342.687277][T29523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1342.695254][T29523] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:17 executing program 1 (fault-call:0 fault-nth:94): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1342.797418][T29916] FAT-fs (loop4): bogus number of reserved sectors [ 1342.825812][T29916] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019e, 0x10400003) [ 1342.899345][T29916] FAT-fs (loop4): bogus number of reserved sectors [ 1342.912694][T29916] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:17 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x6, @multicast1, 0x4e21, 0x1, 'wlc\x00', 0x21, 0x4, 0x27}, {@empty, 0x4e24, 0x2004, 0x1, 0xf41, 0xd933}}, 0x44) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) 03:51:17 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000016c0)={&(0x7f0000000140)={0x1564, 0x22, 0x301, 0x70bd2a, 0x25dfdbff, {0x3}, [@generic="be4b19b897341e28bc54b5dc5ccab613635e8f1ed76f2ed1de1a9c95cd629460aa8302f31305087a41bdeabf8d906ffdf66f9747cb4a26b178e2398e74f5ff64ec1b5eedd22f99b2afaf44c932944294596456f9c4175db093f880997555a81e62c32e1591c476365d", @typed={0x8, 0x75, @uid=r1}, @nested={0x260, 0x27, [@generic="b03ced1bf8533a132ebe65ba7d48b6755c7e822eeede97463aff84a164f82a1fe1e8bd933ffaf2042cfc7bcea8426896beb6baa4cf6c92ebd5b097be31aee7ec5246c2bd09a64f59fc60934406d30cc607118b3bcf6ef761a1c0383c52309d60857a4fd596ba1ac54d2d5f748dd07ad219585d37209f60594e5fb2a56292c645b7cf2d27760fb81afb0004a63f6289d1eb4ec87b02ff01f65a6359459834f1fa66466cf8f6b8821834edb1806be9943379800d6aeba379f6da5adb269f9eabf3f92d7e5a7c217b05819886a858afa60f489b6845497a52efcd6648f7ebee0d", @generic="5888a96de93eb62d57300239fc387c8adb235e94bc8b8ac4f459b6104338829f960382da084ac7277693", @generic="a08541fc31f1a8dc64f5fbc34b817d59b2b559a88db8e2", @generic="e94d6e1395b56569bc432993c78ee47daf84d7d82461535b969627fcb7da7a4f1d6888408f1db2768bcc25b83dda0c251408ac420db16a7a7d36e7541d9af6ddbe60ce3ff7bfb76cb38854b376ddade006f75bda469890d7a89a386e62a952553b130628d11da60c0488b1aa2d3558b1051f6a60f950", @generic="c2ff3d7caf6aae79914f9451b8e16a5a99537338ef7d80320f0a95c9c1b72e5cbe4f189c10b75674e538b39c331ab4d92404a37ae530908d0145f371683e4367c42499ff57aeb98479ac557a0de4db50fb37a34602b6a14b8d01b4042d0f3d84051ce148544a1bfac2eac84d580e83a9510fe6bc697c40c68c63afcd64eacf1ff4abe135710ef8388f1db0d7761dc9120a3c85397ce93f1f08af3142ab472ae0f3a04c93d34d09bcfb1a27c00b858436048adc6b2f989d7cf3149fba6fceee63a7c579"]}, @nested={0x125c, 0xc, [@generic="e9fcab24c5ec64d4f5625fc4c7", @generic="9f2947c74ea67b0aaa5bd49f9d43dd5646914d69a5014e7f02edf944b510bd70eccfc29158f98632b84449263e6cc057f760fe926e35de512ae6b6e48031b13e5bba302f0e8efe3cabe0a79ddb0f9cdb108b93deee78f65f16081a48ca79e1eaeae2009b135c94e030953341a87d43538c0be2c7239bf5b11212ca12e04775732b4749f2ef255e37a452cbf9ea4937a6904beff1bf5a3f2ea4f7206188734051", @generic="cd3162c1", @typed={0x10, 0x90, @str='\\+selinux\x00'}, @typed={0x8, 0x78, @u32=0x319}, @generic="05045235091e5e11fd15b22a6af88e241b398665e5b6f7c01410628bb65bf50feb94986d555745048dd750034eab37679189640739d7dbbd42d0735a7dd0805ce353da8fdd8af9b92f33adc3ff9738ecddb94921807b9d9c6a7639d4d3c233fbb9f47ace3205ac46c1f18b33efd63ad52d4853af082bbb0f8bb5f6db3fe81ef2e40ee4a5ec3bdf42a23c82e4739f7384aac3024198cb4c9a290f431ae81feeef7294aac949b446e650ff933af86318164f0b1f43d305a32ba4615e639929e0cec49bbc2bdea3df6ab35d60c2ac0165024e9a088dcf1295a28a2fd3febc8ef52b6106a84817925278160c62567b9420134a5cfe3d7de2ddc3efed85f619a21fe944593efaac25187da498040f173db8acd721e59a89543a58d3e8de0083787b38762a2043cf62f6be4c77c02fefa12b14049776cede64507e94ab87287a6c744a71cd0f9d832316fac5f202b505c4fa615083a06d632a93b6b5495a6dcf841b6ef06795b55019181a907f15f443a1b197a37e6e6c1e3bcf381548e684b6fcbf3781520e4014dd201d6f507c61f1df884739ac5c8a21f6e63b1741d9c5c1cae605d11469038f17ce39936ec453d7580bbdb103eca3507b6d8a2f763d00fb505a7915e179552124308ae188e29015d8859afff3a94b291b4ebf115038705f8711f0962c8981832e289dbdd3fa4de0a778d82bfc1904ddf7c2e7ac57b4e09ace212cf5117f99332ff4f08e01cdcd6b8dce673236496458e4ca6b499d824d46bdcd039cc8e040d9b7f9317935705240d5b57d3c435c8205ba77bd2d318a170c9b27637843bda9f21dda91ad10b8446c12b496e525777e15b63aad4ad0dc302f2d960066a2b8a98cc23c91cb6873c5665da936a877cd7a6c48d92d2bf20acc4f38b19c2c3bebc3c464405d0f654b3430ee6451c1e55a4817ef9b63eee2aafa31723c6b9a143b3a151ab0156ec404d95dfab6c3be1b35e97e2db438afcd4297150b54c5b22cd11ea8fdc22f7cbba92cd6362688c168918180dd33bc40d863217933ca69a8e3999587095ef1fb9334ab0fd20bbcb4986d214ccfc852ac00ede26cce97eb6cd6c563b923de12e64092ad43b3e571371555529fd75a9952ed6467f64c5c9202ef612807384e7dc9aa602f4eacc01b9da455b0526f5a84604d342de036001683e48c731457338ec9908705ac2dae72bf76803b8bd0e1c97f3306d1e78bfbf8f0241f24a32e33de454edff36ee7d96e224b3d41fec61a1079aa68f73ee2951f61c8bb9cdd620725a5ec21f96d7a4db533a209ca2814e2d508968dc5a1a438d61fd083de6b2eea6155f197b0be2cd48def3a819f64a9d0665ec932d45d7968a72b54d18602974844b8c4c28538c7a2f7432098f05a7735d77762405f29966da7dacfa8a55fa1fba20cbd395501017a0415056ebb8b6d447632d558f676f5d7ddd01e9bfc391a095cc07053c53a788c48ee587915df27ae0d8824408dfd9e2dfb52b06a7777d0623c21347d793f7ce65b86ab3a8b4456f75fce011ac0b7609d57482625d9de7a0c17575a9a14d5590f2c129de9696bd63edfe67d7022d4ce59a4843f10b36a80c070cb4c00725fb5f32e2f398878086e9a7c7cc89c26b13beb7536038b17f8f7f79445eafca9ccf35fd263bd4bc0565420345630042e9595dec5f8f14bfce802a590e5c0dbf9d8553b1efb964e9994a5db34313122c6dd552d3a2fa7e40e61a13a9cced28e983106b0111ff8cf3dcedcc47336c39011bee963cf332fe45c559ad4443dc397704d8de82e8d3418c095fa04ea85b6b76bc83d6d1518514083d53c82b33a37aeb6f02db996f806081a2aed53b82a020869d18e3d3e74c0772112a1572ac9325117c32326ee63e432ea55ab8ca2148555f6ad09e58f3f2041c194a247f3f303ad2992c21c52efb54871a9a7cdb917443d06e36c447c02d800a38c49e9251f792ab4d6ba3f90b9d992af8bc51a125d30b4f7bebb48f51d90628fb057eb6326ddf8ead27257881a8cb3dd86527c58e17917dce0cd09e2b6ef315f188ae2e9c5de36b05b43079e3c792dd7cccacc24c4eb92c385d44e2b421bbbf2c7c8842183102590aeb7c34f856de9e3d47cb1b34636c9cd7ac72611dadb94aca0d5016a5f58bdfe8c0b9f97713dfa0d70386fdddbcb893814866307ff111383ee7f5b5adc1c6776979cca5c509af0a52ca6a2e07c6c0b0c2f59d4e4eaca8c0bb172320c7dec8841307486815f0db1d2994879ce8d09927bad31cb01be0c8a918c504e985f4eda56f8270efb95aedbcd2ed81879c94bf9231f6aa0ed708bb2818cb2038d2a6a09777f6fb532d57beedfca3a57714a5f06285203b5924023510a7fed023b46daaaf373a517cea1581ca6e5a8b7ba64419daf4b6fc99faf3f659258936ad3b37b8eec35eff91c7fa0599d365669c96736010a7eb4e78bdd4c2d97588c3a9771c45df17878027d65ca94c460614401ea1f36d7cc992df9531185e1dbcb10f69d43df96c0d99989cf259ceb00c00a579a648752936ad19889bd39e21016c9549eb7c5628e50a45f9e4eaaa729cab48c8cfee345cbc4d6fa0334a85246674370b20b053d12df6af4dcb9075be776e568d00efd462a9343b9b0446a066c6e8cb7922579df0996605836d6cc1f8b913bd34f16b9a294653c264cd532b109b18c53b17802ea50d80099f378a5dc6fe06b2d8f32d3db06bcae2af34d9d0180216520a49b76ca4c79f21976720ea6b50b8f17c19cd157fd593556eee21ab0482d9caabe126a307167c2b954f7b10e3a254c8118f0827159796bfbf58043e6e61f7c894292ead7c5bd44a16570fcb85d729f97c725bc1cadc06e200dc75a451c4cc46bdee20a09492322478606ef0c345724f270b51fbf63cabc50790184b475e3aad036d014e2969b080e11b69406acdc3b8d40317a4a36dc7ce67b5940716faeec389db28f91fc8f145c68ec187ccef71a8aa77cd8800438f144d07165a831e8e045c18d0d8a52ca2bb4f6aa51db3fdc4c68821b5e8e666d9d5f69495abb9fe7ec17efb68d513f5ec28dc13d7a5f57ab9108c0bc84314325bcea637f83574ea1ece81a1773044f8c3e0d37a41f3749faf0f229361724fc177ab02600049bf703a4ef659bf3c97e0b54ca05c9af488960a666f6b8368a9a1254324506793ec03db377ec226702e00eac4177e35f0e213d91c6e949bb3cda7b5085c5b67a7ba55faee57271192fc1c48f10782a6d3feed30729ac7c91557913c2d287eb99489f9f2ad76efea255af5ce73bf1d29eba0bdfac120637db93977e27e65b3f4eed93e774ac519e23f2c33859e2b1101ea1d3b4afd657d4895b2b2a89676eedcef348dfeeb8cd861298599ec2c1696c5c66693c407ba948e0a0f52363b471308d61f10831eb1f477decde0acd3cad13f1838554747816d3fb59161559c5c26990c1c69b1c4413c5f99711ae1a99a46bdb6ace340abcf7175e9e979246ee51a2ab8ba6d6b18218a21520ba5c6fb087f320902c32d6f4061f3e872fbb32a1a0377ab9fa15b457def8a287629aab47aaebe3e81e2c6b42a9c0fd6ebe8e38a08e14e4e02f865e3562601307b5cc95c6f8d35c2f8735766f8244c81688f61b7df392dab66d8a7dc53c17ac03bc3bcc16ca39fad36eec2042c7f06ffbcf1a58dcbc34b885da8769eea5f00ea051dc1f8c5657f7ab60327e3bd20ebad0b3315867a90b553aee98208eb961ddd27e4e720f6e5df9034a6dd25e6ded46756316ee3bc2ee20d249140c764bbe2b773bfd31746b06363a3d2c95711c9992b3c95bf14896ee856132728c112aa665f8e82a71c1b2dae65fb8e125c3c1ec45fed003f2ea0a09130c53af7acb4a04a2b069c3473d99a37deb68f23e349e76317c8e58bbd8f9e1aec077194ac6aa93707de6f148f3df1b96d2648b1e7414622ae6ac1f840ec72e42328a0b14855a1dc44cfbfd9c7044ad4c2eda2079876b7984101e307dbbc7fc6f54322c24dc0b750d4722ddc12047a3db641714f0747e72a14616116d111d4377bb1121630d642ff250097c5ccfbf1b42d9c36b4d5237602de91ca161e543d0d39d0b0e18f1adeb3d7c944242d091174b430df6c2cc0b4bb757e54120f9fb08a699a27444405d0f42f5d24a52e00e60a92bb1f62612ad2651c2f563e48db3b9f4c921b2d9e7103f8c56ec223da258b4905815e248e4e6b40290227192dfaf81cd2f3ea699f349d3859f9c92c45c5667707d48932a24142aa597d4cc78b86e27046ff399dd5e7b1c6310875b9468ecea653414ec916199a6ec869340b70a5d6fdc5c6e80d032390ef93c94c7b92879a298116694c70c9db8bb5cde41ebed12f039f2048ca2912a819a3f6c8ee004afe78d9c8609202afb49fd3d03547f6157c25cd57acb6bcf6d20f904e1c15918fc012c96e77d630dcd619eb1df421ceae4a4fb726021a0afb24b67e3b6b16759b9a0005bd2817d9a357602c672afbf35636ccdb8ce8bbcfee4b74f7492b258ea33f5db1486c3b70c31cd0a12102a260e14c7e583b31ae5cb03bcc7a29e15f03ae4ab6554fba0edacf5cb103f88448ae7aeaeef7ef136700246c48681de9581013da885179c100506e09049e8b58bce864a7739b991550a75e23fa2e1950540e3bfa461429c890bfaf70ed02c6b78a42b57714b97a6a1febc07fe9ed4b104016ae544ce953d9444911e7f0cc93f86b1c3328dafecc0e06012114068241f257f859190dba1e442c040085bfd28982767d9e65ea705b5d1cfcbbe6bc7e42f4b485e7dee95c061983f80319706a62365cf20463f33b6a1fc03be2a91ae99ae7bb2609730d2d692d9a90b29375b8613346d2f5628f43388f75d891043be24a433d007d83fd1e5ccbeff3a7085fe658500c4762eaab0ed35ead01c3c241d148e6cf9e62957a1a8ee006c1d2b31a6e34300fa330bb849706214929b973347a481ca151cfff9f1fc75b3027b4efd1b6cc2ff8f7c09e342278ce151621623851b33076bdce7f4a3ebb0b867b89c330297447993f49db36e83f476711b3a8365bc4fa91bfddfe7ca6179ef85e470098fc14644e4b0ebb2730d3bd7878d64a31ea95c03e3082ba20bf87feb04743db6d73cf198deedac95ffcf3ac2a03c5d6b6b84842d9054c44c92bcf146326971aaf25a24e656a6ce594a034131ca798e2bd49b6ddc8e49c3df51994a6908a176e6ed8ddb9a69c451d022d663356bd38cc376c815f4391c16e4c47b3ca82259d30d81c179239527c934154bb0388e6c5b6a89df26de18c1775a41976a99f79d7edad5fd56aa56dd8b25c901ca8fb01f6993145c94ab5ab3d40c131bf2e0afc7129afab95441ff7989cdb1bf8831b1e7339d71ad1e1ae9c272e5f8c9eb44ed823021359545591580a4cd77560595836b7463d6a1ad34b477a003086a23e22267e64ac3ed00da90caabce66bb97eaf2cba8f78a6e56c845225970ca101e40dd681eae8cd4352a8a2d80645c9d4d8961e7b4df986c42327c9e920dd89b5946bd984b2d98d7fd2858e7c510e4395def033a67107fa45f26513cea9dee889785c3e9f89bf513211fa0c1d772cb127aab7b1ae1df0b0db25a1ffa542d7107192375742f89eb0ff07dcd1f7abee9794c0b73e0c59af2b00dc28212155ef576e3f0b8bf046210ad45f6ff5e00aa10e2946d57212f2c748478090bee0e5efc5cdb739ad956c51a289102dbb0dcc93f9b135069bf0ad0be9eed2448d8b85ab27e7e886b226d3203f7aee390176d23d22db3bb602aa64e35c3013f403fd74576665772b3af9c1b461aa1a868bf", @generic="6a7eb57eba9a2eef44b716f690c39dcbdb6f9a6640c9c4634d6de6454f069c9856f16fa3f48ba3c9bfdba1077122234f0d55b442fd1bb776dce5d62619520090cc11cb62f81cb0e9e880192538cf90725e28e2d47444f7d2c6e944d73dee5eab2a5f1f13288d174551170427cb64e36a4bfd7f", @generic="b81cfca69148cc8f54fdaccaba60d3df9b0e703c80d1926c0d7adbc07f74e58ab7f516976468506c606237a8ae6947ebd8fd7d8ad440c23e51445b4b9c0ecd081db94f1fe1ce5cbe30355f914747269ccd8d301cca1ef194a0447b4435a93dcd8c9138c1834c120ccda562b60cf5c68cf6122ad6c6a40772aebb3dc7aa59de047c4b8c6e581dcc64a14740f507921c43b077dbc6fb5c3dcb4405664b2d7d905494e84486b78f7f5d755c540d20829ade3b72826757a8b735fe65839bdff1d315c1390f19f121ab3f997a55a3d91fb660", @typed={0x4, 0x5a}, @generic="43df9deac211e3d107364c0a481bae7c6bcf65298e2f6630aeb86ec96b3d8731d619eb7a7ba132a730c180b7d55e66d49768255e2e222fdad967f056f28753ab0078730c98946896"]}, @typed={0xc, 0x1b, @u64=0x3}, @typed={0x8, 0x71, @fd=r2}, @generic, @nested={0xc, 0x3a, [@typed={0x8, 0x64, @u32=0x3}]}]}, 0x1564}, 0x1, 0x0, 0x0, 0x8000}, 0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x10010, r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1343.017799][T30286] FAT-fs (loop1): bogus number of reserved sectors [ 1343.048450][T30286] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1343.164040][T30286] FAULT_INJECTION: forcing a failure. [ 1343.164040][T30286] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.191666][T30286] CPU: 0 PID: 30286 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1343.200824][T30286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.210885][T30286] Call Trace: [ 1343.214191][T30286] dump_stack+0x172/0x1f0 [ 1343.218531][T30286] should_fail.cold+0xa/0x15 [ 1343.223131][T30286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1343.228953][T30286] ? ___might_sleep+0x163/0x280 [ 1343.233831][T30286] __should_failslab+0x121/0x190 [ 1343.238787][T30286] should_failslab+0x9/0x14 [ 1343.243303][T30286] kmem_cache_alloc_node+0x265/0x710 [ 1343.248595][T30286] ? find_held_lock+0x35/0x130 [ 1343.253369][T30286] __alloc_skb+0xd5/0x5e0 [ 1343.257706][T30286] ? skb_trim+0x190/0x190 [ 1343.262045][T30286] ? kasan_check_read+0x11/0x20 [ 1343.266906][T30286] alloc_uevent_skb+0x83/0x1e2 [ 1343.271679][T30286] kobject_uevent_env+0xa63/0x1030 [ 1343.276823][T30286] kobject_uevent+0x20/0x26 [ 1343.281327][T30286] __loop_clr_fd+0x4ee/0xc90 [ 1343.285931][T30286] lo_ioctl+0x37c/0x20d0 [ 1343.290179][T30286] ? __save_stack_trace+0x8a/0xf0 [ 1343.295208][T30286] ? lo_rw_aio+0x1530/0x1530 [ 1343.299827][T30286] blkdev_ioctl+0xee8/0x1c40 [ 1343.304426][T30286] ? blkpg_ioctl+0xa90/0xa90 [ 1343.309029][T30286] ? perf_trace_lock_acquire+0xf5/0x580 [ 1343.314576][T30286] ? save_stack+0x45/0xd0 [ 1343.318909][T30286] ? __kasan_slab_free+0x102/0x150 [ 1343.324035][T30286] ? kasan_slab_free+0xe/0x10 [ 1343.329210][T30286] ? __fget+0x35a/0x550 [ 1343.333366][T30286] ? find_held_lock+0x35/0x130 [ 1343.338131][T30286] ? __fget+0x35a/0x550 [ 1343.342299][T30286] block_ioctl+0xee/0x130 [ 1343.346629][T30286] ? blkdev_fallocate+0x410/0x410 [ 1343.351669][T30286] do_vfs_ioctl+0xd6e/0x1390 [ 1343.356265][T30286] ? kasan_check_read+0x11/0x20 [ 1343.361122][T30286] ? ioctl_preallocate+0x210/0x210 [ 1343.366233][T30286] ? __fget+0x381/0x550 [ 1343.370401][T30286] ? ksys_dup3+0x3e0/0x3e0 [ 1343.374830][T30286] ? kfree+0x173/0x230 [ 1343.378911][T30286] ? kfree+0x173/0x230 [ 1343.382980][T30286] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1343.388283][T30286] ? security_file_ioctl+0x93/0xc0 [ 1343.393401][T30286] ksys_ioctl+0xab/0xd0 [ 1343.397565][T30286] __x64_sys_ioctl+0x73/0xb0 [ 1343.402164][T30286] do_syscall_64+0x103/0x610 [ 1343.406764][T30286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.412672][T30286] RIP: 0033:0x457c97 [ 1343.416570][T30286] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1343.436171][T30286] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.444582][T30286] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 0000000000457c97 [ 1343.452553][T30286] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 03:51:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x100000000000019f, 0x10400003) 03:51:18 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = socket(0x0, 0x5, 0x200) sendto$inet6(r2, &(0x7f0000000200)="0c343492298296d206f428985e2e7ab6df44bce87cb1d5dc18c7a43c", 0x1c, 0x4, &(0x7f0000000bc0)={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xf952}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f0000000300)=0x0, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000b00)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000240)={0x0, 0x80000, 0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000480)={0x0, 0x6}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x9, 0xfffffffffffffffc, 0xfffffffffffffffb, 0x7fffffff, 0x80}, &(0x7f0000000840)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000880)={0x0, 0x8001}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000900)={0x0, 0x7fffffff}, &(0x7f0000000940)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000000a80)=[{&(0x7f00000002c0)=@in={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="1abcf6730b497bcca1e668241591794b3b1e3dda0c5c6fe7c116fd65371913d58c9b252b2a4616576447195bc81cdc694cb595769d824b8f8c39dc82ec6450a63da76df6d557ee172ae30d18c9cfc4077de09cbdb6c6580ce2b45998aea8fc852e4cbf0f19066126e31b0c1cf749975f04e0bad6986d3d7930f0c386efef5bc83c0b56ef7effb676b14d91f416f2c1fbd4ea32a79b0c2e0a98ac5379cb64872299ce614f99ff902e26403d88f33fa00115cc0dd51d4d579168ff530ad6a6bd064990f8715fe4557dc715d3d60a8ed16cbf6237bd2acdc1ebfc597ec47cdfde2bd875301102e5c7c93440df63836a9f15df07de1dce49ebdb", 0xf8}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="3000000000000000840000000100000005009cce008200000000010000000000ffff00000f8e124400000000", @ANYRES32=r5, @ANYBLOB="200000000000000084000000080000f6ffe4f040fb8931c5530e94ffffffffffff0000000000000000011800000000000000840000000700"], 0x68, 0x50}, {&(0x7f0000000580)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000005c0)="d01a2d3cefc2d41058aa2a8ad072796360c5c14ecba31a5b592545b3d44ddf30afb5a1f03ccb43c4f087ab09348bb99f695ea4c83c1e312effd8354105b0abad9c60519f4460b676518f4712e059fd0232948c9f83ae3edecfef7bb0c607d5b04c423e7567fa710e1431904bdb41bdf83ad7f702c4935e498cc771272fb97603d8267b07154c1c2036afeebe3b42d092efa0eae6123de2b7ad4b46a586b46743fd02021f3b6234a7b57136724b6d9b6e4f43400a2f01b4eb442591b4068e405f8a88dd39e1dee1c683261bf94668eee6d3", 0xd1}], 0x1, &(0x7f0000000980)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x9f5}}, @sndrcv={0x30, 0x84, 0x1, {0xffffffffffffcd24, 0xfffffffffffffff8, 0x8001, 0x9, 0xad, 0x2a2, 0x2, 0x3f, r6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndrcv={0x30, 0x84, 0x1, {0x10001, 0x68, 0x8, 0x10000, 0x7, 0x9, 0x9, 0x1, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndrcv={0x30, 0x84, 0x1, {0xfff, 0x8, 0x8, 0x8, 0x4, 0xff, 0x2, 0x3, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}], 0xf8, 0x40840}], 0x2, 0x4000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000000)={r4, 0x7fff9, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r9, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_FLINK(r11, 0xc008640a, &(0x7f00000000c0)={r10}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000280)={0x3}, 0x4) 03:51:18 executing program 3: r0 = socket(0x8000000000002010, 0x6, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x400, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x54, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @remote}, 0x7}, @in6={0xa, 0x4e20, 0x100000000, @empty, 0x100}, @in6={0xa, 0x4e20, 0x9, @mcast2, 0xd99f}]}, &(0x7f00000000c0)=0x10) syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="c9d0459813258eb199864919d093247929310324c5f7fafba054613e267f87a8c90fd1fdf20b6b7787dc0209e3da9b12bff819fe7e7d56a62b59da11fc9ea126ccd6d402649402c3d339ec37bcb7b7d2261a2f2b619863f7f6dedcecb9ecd4a5c4c820a563d5055c60bf8e69fbb77db66f8ef5d3fc9341d94b86244e60f2bb14f14bf459b6e19c157f72a9e8d13fcee6de0b09e60a00e1c49544f3c298da0e136dd8f3936c26959a37f6f5d85972cc6c4982d1f629b725c2b5f61016e8bd42625f77aa0c8f39ff1bcb271edb264939b3b352842a", 0xd4, 0x4}], 0x100002, &(0x7f0000000340)={[{@creator={'creator', 0x3d, "3e2e53ee"}}, {@nls={'nls', 0x3d, 'iso8859-5'}}, {@nobarrier='nobarrier'}, {@type={'type', 0x3d, "57a4821c"}}, {@gid={'gid', 0x3d, r4}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', r3}}, {@permit_directio='permit_directio'}]}) syz_open_procfs(r2, &(0x7f0000000140)='statm\x00') setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r5, 0x6b94a675}, 0xffffffffffffffcb) fchdir(r0) 03:51:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a0, 0x10400003) 03:51:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1343.460523][T30286] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1343.468491][T30286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1343.476467][T30286] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 [ 1343.510258][T30684] FAT-fs (loop4): bogus number of reserved sectors 03:51:18 executing program 1 (fault-call:0 fault-nth:95): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1343.552564][T30684] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a1, 0x10400003) [ 1343.657960][T30684] FAT-fs (loop4): bogus number of reserved sectors [ 1343.683518][T30684] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1343.720481][T31203] FAT-fs (loop1): bogus number of reserved sectors 03:51:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:18 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$rose(r0, &(0x7f0000000080)="d42382be151332c989c5fe363a7878b6e918c709e8923f50c2af2c3bc9dec5f522c5e134786d6dd998c30d4e362cc1346782f8bcd698a93c4a1426f9986e5732d1e63c6dcbfb39392a0d6316f0", 0x4d, 0x0, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") recvfrom$ax25(r0, &(0x7f0000000180)=""/248, 0xf8, 0x1, &(0x7f0000000280)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000040)={0x7, "2112bca2b7835eaccdf558cf1e9a97bf45b75ac179ce6d5bb4e5a3a3a899e7d1", 0x1, 0x8, 0x3, 0xf, 0xef3c27654bd4701b}) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1343.760889][T31203] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a2, 0x10400003) 03:51:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1343.876617][T31203] FAULT_INJECTION: forcing a failure. [ 1343.876617][T31203] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.908987][T31203] CPU: 1 PID: 31203 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1343.918111][T31203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.928172][T31203] Call Trace: [ 1343.931474][T31203] dump_stack+0x172/0x1f0 [ 1343.935819][T31203] should_fail.cold+0xa/0x15 [ 1343.940418][T31203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1343.946233][T31203] ? ___might_sleep+0x163/0x280 [ 1343.951095][T31203] __should_failslab+0x121/0x190 [ 1343.956043][T31203] should_failslab+0x9/0x14 [ 1343.960565][T31203] kmem_cache_alloc+0x2be/0x710 [ 1343.965427][T31203] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1343.971236][T31203] ? lock_downgrade+0x880/0x880 [ 1343.976096][T31203] skb_clone+0x150/0x3b0 [ 1343.980356][T31203] netlink_broadcast_filtered+0x870/0xb20 [ 1343.986092][T31203] netlink_broadcast+0x3a/0x50 [ 1343.990867][T31203] kobject_uevent_env+0xa94/0x1030 [ 1343.995998][T31203] kobject_uevent+0x20/0x26 [ 1344.000506][T31203] __loop_clr_fd+0x4ee/0xc90 [ 1344.005109][T31203] lo_ioctl+0x37c/0x20d0 [ 1344.009361][T31203] ? __save_stack_trace+0x8a/0xf0 [ 1344.014394][T31203] ? lo_rw_aio+0x1530/0x1530 [ 1344.018994][T31203] blkdev_ioctl+0xee8/0x1c40 [ 1344.023588][T31203] ? blkpg_ioctl+0xa90/0xa90 [ 1344.028187][T31203] ? perf_trace_lock_acquire+0xf5/0x580 [ 1344.033741][T31203] ? save_stack+0x45/0xd0 [ 1344.038260][T31203] ? __kasan_slab_free+0x102/0x150 [ 1344.043382][T31203] ? kasan_slab_free+0xe/0x10 [ 1344.048071][T31203] ? __fget+0x35a/0x550 [ 1344.052241][T31203] ? find_held_lock+0x35/0x130 [ 1344.057009][T31203] ? __fget+0x35a/0x550 [ 1344.061181][T31203] block_ioctl+0xee/0x130 [ 1344.065511][T31203] ? blkdev_fallocate+0x410/0x410 [ 1344.070546][T31203] do_vfs_ioctl+0xd6e/0x1390 [ 1344.075146][T31203] ? kasan_check_read+0x11/0x20 [ 1344.080000][T31203] ? ioctl_preallocate+0x210/0x210 [ 1344.085114][T31203] ? __fget+0x381/0x550 [ 1344.089325][T31203] ? ksys_dup3+0x3e0/0x3e0 [ 1344.093748][T31203] ? kfree+0x173/0x230 [ 1344.097828][T31203] ? kfree+0x173/0x230 [ 1344.101904][T31203] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1344.107208][T31203] ? security_file_ioctl+0x93/0xc0 [ 1344.112333][T31203] ksys_ioctl+0xab/0xd0 [ 1344.116510][T31203] __x64_sys_ioctl+0x73/0xb0 [ 1344.121109][T31203] do_syscall_64+0x103/0x610 [ 1344.125713][T31203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.131608][T31203] RIP: 0033:0x457c97 [ 1344.135503][T31203] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1344.155104][T31203] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1344.163519][T31203] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 0000000000457c97 [ 1344.171491][T31203] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1344.179461][T31203] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1344.187437][T31203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1344.195412][T31203] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:19 executing program 1 (fault-call:0 fault-nth:96): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1344.256645][T31378] FAT-fs (loop4): bogus number of reserved sectors [ 1344.296496][T31378] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:19 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xe5, 0x80) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000280)={0x3, 0x8000, [{0x0, 0x0, 0x6}, {0x3f, 0x0, 0x8de0}, {0x4, 0x0, 0x80000000}]}) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x800) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f00000000c0)=""/15) getsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000180)=""/236, &(0x7f0000000000)=0xec) 03:51:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a3, 0x10400003) [ 1344.400611][T31378] FAT-fs (loop4): bogus number of reserved sectors [ 1344.426638][T31378] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1344.441430][T31768] FAT-fs (loop1): bogus number of reserved sectors 03:51:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) semget(0x3, 0x4, 0x400) 03:51:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1344.476821][T31768] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:19 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)=0x100000000) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000700)={0x0, 0xfffffdcc, 0x0, 0x0, 0x0}) [ 1344.574196][T31768] FAULT_INJECTION: forcing a failure. [ 1344.574196][T31768] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.623482][T31768] CPU: 1 PID: 31768 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1344.632610][T31768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.642782][T31768] Call Trace: [ 1344.646085][T31768] dump_stack+0x172/0x1f0 [ 1344.650426][T31768] should_fail.cold+0xa/0x15 [ 1344.655025][T31768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1344.660855][T31768] ? ___might_sleep+0x163/0x280 [ 1344.665713][T31768] __should_failslab+0x121/0x190 [ 1344.670657][T31768] should_failslab+0x9/0x14 [ 1344.675163][T31768] __kmalloc+0x2dc/0x740 [ 1344.679415][T31768] ? kobject_uevent_env+0x2fb/0x1030 [ 1344.684706][T31768] ? rcu_read_lock_sched_held+0x110/0x130 [ 1344.690425][T31768] ? kobject_get_path+0xc4/0x1b0 [ 1344.695373][T31768] kobject_get_path+0xc4/0x1b0 [ 1344.700143][T31768] kobject_uevent_env+0x31f/0x1030 [ 1344.705270][T31768] kobject_uevent+0x20/0x26 [ 1344.709793][T31768] __loop_clr_fd+0x4ee/0xc90 [ 1344.714393][T31768] lo_ioctl+0x37c/0x20d0 [ 1344.718637][T31768] ? __save_stack_trace+0x8a/0xf0 [ 1344.723668][T31768] ? lo_rw_aio+0x1530/0x1530 [ 1344.728279][T31768] blkdev_ioctl+0xee8/0x1c40 [ 1344.732876][T31768] ? blkpg_ioctl+0xa90/0xa90 [ 1344.737475][T31768] ? perf_trace_lock_acquire+0xf5/0x580 [ 1344.743028][T31768] ? save_stack+0x45/0xd0 [ 1344.747357][T31768] ? __kasan_slab_free+0x102/0x150 [ 1344.752474][T31768] ? kasan_slab_free+0xe/0x10 [ 1344.757160][T31768] ? __fget+0x35a/0x550 [ 1344.761336][T31768] ? find_held_lock+0x35/0x130 [ 1344.766101][T31768] ? __fget+0x35a/0x550 [ 1344.770268][T31768] block_ioctl+0xee/0x130 [ 1344.774606][T31768] ? blkdev_fallocate+0x410/0x410 [ 1344.779640][T31768] do_vfs_ioctl+0xd6e/0x1390 [ 1344.784237][T31768] ? kasan_check_read+0x11/0x20 [ 1344.789095][T31768] ? ioctl_preallocate+0x210/0x210 [ 1344.794210][T31768] ? __fget+0x381/0x550 [ 1344.798377][T31768] ? ksys_dup3+0x3e0/0x3e0 [ 1344.802803][T31768] ? kfree+0x173/0x230 [ 1344.806887][T31768] ? kfree+0x173/0x230 [ 1344.810974][T31768] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1344.816270][T31768] ? security_file_ioctl+0x93/0xc0 [ 1344.821395][T31768] ksys_ioctl+0xab/0xd0 [ 1344.825564][T31768] __x64_sys_ioctl+0x73/0xb0 [ 1344.830163][T31768] do_syscall_64+0x103/0x610 [ 1344.834769][T31768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.840674][T31768] RIP: 0033:0x457c97 [ 1344.844572][T31768] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1344.864176][T31768] RSP: 002b:00007ff1c2082a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:51:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x5}, 0x4) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x103000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000001c0)=0xc3) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x20) pwrite64(r2, &(0x7f0000000100)="8fd5d7ecfcf427efbac27c7b92fa008c0ea18157d6726b4ddc6b727fd256ffe4eff63a04b5e9e650d7298924c382e0b14472cf6785746d1c5c6416a6cbc9ce9e09ebf01f9510c66d38babca7d844e402bfc6e40089e5b909e4fe5e0c9a7e7cfbff510fd7996e598e7ce0af888bed6fec9f55c1cd1ae599987ffadf500caf564ce628e07a96e750da3db96ab679897fd77c87c85632fc677668c0e97977f0c7ec7c97083a1b1e8b34965c3351c165c5e12216b54bd40bf290", 0xb8, 0x0) [ 1344.872588][T31768] RAX: ffffffffffffffda RBX: 00007ff1c2082b30 RCX: 0000000000457c97 [ 1344.880561][T31768] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1344.888530][T31768] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1344.896502][T31768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1344.904477][T31768] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a4, 0x10400003) 03:51:19 executing program 1 (fault-call:0 fault-nth:97): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1345.039283][T32281] FAT-fs (loop4): bogus number of reserved sectors [ 1345.065985][T32281] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xf7f4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0x5, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1345.155806][T32281] FAT-fs (loop4): bogus number of reserved sectors [ 1345.177752][T32489] FAT-fs (loop1): bogus number of reserved sectors [ 1345.181297][T32281] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:20 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000000c0)={0x1, 0x2, 0x2, 0xe343, &(0x7f0000000040)=[{}, {}]}) tee(r2, r2, 0x0, 0x1) setresuid(0x0, r1, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x88) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r2, 0x0, 0x3}, 0x14) [ 1345.205478][T32489] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a5, 0x10400003) 03:51:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1345.255218][T32489] FAULT_INJECTION: forcing a failure. [ 1345.255218][T32489] name failslab, interval 1, probability 0, space 0, times 0 03:51:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1345.358116][T32489] CPU: 1 PID: 32489 Comm: syz-executor.1 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1345.367271][T32489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.377339][T32489] Call Trace: [ 1345.380747][T32489] dump_stack+0x172/0x1f0 [ 1345.385099][T32489] should_fail.cold+0xa/0x15 [ 1345.389695][T32489] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1345.395517][T32489] ? ___might_sleep+0x163/0x280 [ 1345.400377][T32489] __should_failslab+0x121/0x190 03:51:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000080)="0adc1f121e0d3f3157d9f52592bb88a07069c5f8712719657e397b52c8ca84c1c4abe2313ccbf2041034f0") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 1345.405356][T32489] should_failslab+0x9/0x14 [ 1345.409896][T32489] __kmalloc+0x2dc/0x740 [ 1345.414143][T32489] ? __lock_acquire+0x55d/0x4710 [ 1345.419090][T32489] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1345.424554][T32489] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1345.429865][T32489] ? inotify_handle_event+0x206/0x6b0 [ 1345.435246][T32489] inotify_handle_event+0x206/0x6b0 [ 1345.440452][T32489] fsnotify+0x725/0xbc0 [ 1345.444644][T32489] ? fsnotify_first_mark+0x210/0x210 [ 1345.449948][T32489] ? __might_sleep+0x95/0x190 [ 1345.454635][T32489] __fput+0x560/0x8d0 [ 1345.458630][T32489] ____fput+0x16/0x20 [ 1345.462616][T32489] task_work_run+0x14a/0x1c0 [ 1345.467226][T32489] exit_to_usermode_loop+0x273/0x2c0 [ 1345.472527][T32489] do_syscall_64+0x52d/0x610 [ 1345.477140][T32489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.483044][T32489] RIP: 0033:0x411d31 [ 1345.486950][T32489] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 94 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:51:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a6, 0x10400003) [ 1345.506587][T32489] RSP: 002b:00007ff1c2082a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1345.515013][T32489] RAX: 0000000000000000 RBX: 00007ff1c2082b30 RCX: 0000000000411d31 [ 1345.522991][T32489] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1345.530962][T32489] RBP: 00000000200000c0 R08: 00007ff1c2082b30 R09: 00007ff1c2082ad0 [ 1345.538931][T32489] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1345.546905][T32489] R13: 0000000000000000 R14: 00000000004dbcb0 R15: 0000000000000003 03:51:20 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0x120) setresuid(0x0, r1, 0x0) semget(0x3, 0x0, 0x8) 03:51:20 executing program 1 (fault-call:0 fault-nth:98): syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1345.610999][ T536] FAT-fs (loop4): bogus number of reserved sectors [ 1345.651222][ T536] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:20 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0xfffffffffffffffc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000eeffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000280000000"], 0x68) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x0, 0x0, 0x40000000000, 0x0, 0x0}) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x1, 0x111000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000002c0)=0x3, 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x2000) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000100)={0x5014, 0x5, 0x1}) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 1345.755638][ T536] FAT-fs (loop4): bogus number of reserved sectors [ 1345.766689][ T742] FAT-fs (loop1): bogus number of reserved sectors [ 1345.783588][ T536] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1345.796389][ T742] FAT-fs (loop1): Can't find a valid FAT filesystem 03:51:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a7, 0x10400003) 03:51:20 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a8, 0x10400003) [ 1346.033526][ T1195] FAT-fs (loop1): bogus number of reserved sectors [ 1346.065600][ T1195] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1346.085961][ T1381] FAT-fs (loop4): bogus number of reserved sectors [ 1346.102142][ T1381] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000000)=""/45) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:21 executing program 3: r0 = socket(0xf, 0x7fffd, 0x77) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000040)={0xe, 0x8, 0x7fff, 0x6, 0x24, "c74d08d3146d8410fe3b509821682683e99fa5fe52de5f6ccd2bfc4a31a890d38ccc75a7"}, 0x30) 03:51:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='\nfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1346.211328][ T1381] FAT-fs (loop4): bogus number of reserved sectors [ 1346.234605][ T1381] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001a9, 0x10400003) 03:51:21 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x400) 03:51:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x3, 0x6f0879c0, 0x0}) 03:51:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1346.505895][ T1926] FAT-fs (loop4): bogus number of reserved sectors [ 1346.550035][ T1926] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='%fat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:21 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, r1) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001aa, 0x10400003) [ 1346.620175][ T1926] FAT-fs (loop4): bogus number of reserved sectors [ 1346.633407][ T1926] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000000c0)={0x2, 'syz0\x00'}) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0xfffffffffffffffd) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000180)={0x3, 0x0, 0xf0, 0x0, 0x0}) 03:51:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:21 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bond_slave_0\x00') 03:51:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ab, 0x10400003) 03:51:21 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x8000) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000080)=0x80000000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='v\nat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1346.954425][ T2650] FAT-fs (loop4): bogus number of reserved sectors [ 1346.985196][ T2650] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$session_to_parent(0x12) umount2(&(0x7f0000000140)='./file0\x00', 0x1) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) setresuid(0x0, r1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x7f, 0x30}, &(0x7f0000000100)=0xc) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x10}, 0x7ff, 0x0, 0xff, 0x4, 0x7, 0x3}, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ac, 0x10400003) [ 1347.256955][ T3081] FAT-fs (loop4): bogus number of reserved sectors [ 1347.280360][ T3277] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 1347.290431][ T3081] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d26ba7c7a7b4d3a8da5d82448f34b8bf7779ebab6f4d1440eda9f2c0c4e40bb432919dbf88ba19572a879d1d8997254f366220a8986b1116b0526f4cb15e08e52d9cfb43815bbeebad69c20157ab0ab9d2a5ce920db6703e967536f3cf8c140d74127588c82fa2ae6adb86acbfdc5900a612419f6a8b4376a1d1c24d", 0x7c, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r1, r3) setresuid(0x0, r1, 0x0) chown(&(0x7f0000000100)='./file0\x00', r1, r2) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='v%at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1347.397366][ T3081] FAT-fs (loop4): bogus number of reserved sectors [ 1347.417467][ T3081] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x8, 0xfffffec7, 0x20000000002, 0x80000000000000ff, 0x0}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0xf, 0x3}, 0x14) 03:51:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ad, 0x10400003) 03:51:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x1ff, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000280)=""/83) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2040, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f00000000c0)=0x84) ioctl$PPPIOCSNPMODE(r4, 0x4008744b, &(0x7f0000000300)={0xd1493c73b043f31e, 0x2}) r6 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='/dev/rtc0\x00', 0xfffffffffffffffd) r7 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r6, r7) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r5, 0xb1, 0x81, 0x9, 0x1, 0x4}, 0xe8fab37f) semget(0x1, 0x0, 0x9fa6773000481032) r8 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="07e58987cf743e4db1089f6df034a732cb04c6d8c0f77028655659fdb9c9bdb3c984cdd7", 0x24, 0xfffffffffffffffb) keyctl$chown(0x4, r8, r1, r2) 03:51:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='v.at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ae, 0x10400003) 03:51:22 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") 03:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) ppoll(&(0x7f0000000040)=[{r0, 0x1100}, {r1, 0x8000}, {r0, 0x5040}], 0x3, &(0x7f0000000080), &(0x7f00000000c0)={0x100}, 0x8) 03:51:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1347.800202][ T4153] FAT-fs (loop4): bogus number of reserved sectors [ 1347.835608][ T4153] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:22 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1347.932749][ T4153] FAT-fs (loop4): bogus number of reserved sectors [ 1347.969565][ T4153] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='v/at\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001af, 0x10400003) 03:51:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000080)={0x26, ""/38}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x10000, 0x0, &(0x7f00000000c0)=0x9}) close(r2) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:23 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'nr0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x10000) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b0, 0x10400003) [ 1348.249451][ T4762] FAT-fs (loop4): bogus number of reserved sectors [ 1348.274936][ T4762] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vf\nt\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1348.378423][ T4762] FAT-fs (loop4): bogus number of reserved sectors [ 1348.402029][ T4762] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = fcntl$getown(r1, 0x9) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000000)=r2) 03:51:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b1, 0x10400003) 03:51:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1348.623712][ T5306] FAT-fs (loop4): bogus number of reserved sectors [ 1348.656257][ T5306] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vf%t\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0xd1b5}, 0x28, 0x1) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1348.748070][ T5306] FAT-fs (loop4): bogus number of reserved sectors [ 1348.775827][ T5306] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:23 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x8001) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20800) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 03:51:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b2, 0x10400003) 03:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000040)={0x5, 0x6, 0x80, 0xffffffffffffffff, 0x3, 0x5}) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfa\n\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1349.094987][ T6017] FAT-fs (loop4): bogus number of reserved sectors [ 1349.123237][ T6017] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x7, 0x80000080001) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x60000, 0x0) bind$isdn(r1, &(0x7f0000000180)={0x22, 0x76, 0x10000, 0x9, 0x80000001}, 0x6) r2 = socket$inet(0x2, 0x800, 0x3) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x78) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:24 executing program 3: r0 = socket(0x10, 0x2, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, r1) semget(0x3, 0x0, 0x9fa6773000481032) 03:51:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b3, 0x10400003) [ 1349.222123][ T6017] FAT-fs (loop4): bogus number of reserved sectors [ 1349.238276][ T6017] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfa%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:24 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @random="9b23f8c148a8"}, 0x10) [ 1349.489060][ T6601] FAT-fs (loop4): bogus number of reserved sectors [ 1349.514297][ T6601] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b4, 0x10400003) 03:51:24 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x80) ioctl$PPPIOCDISCONN(r1, 0x7439) open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1349.574622][ T6601] FAT-fs (loop4): bogus number of reserved sectors [ 1349.591844][ T6601] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:24 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffff001, 0x400) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x191b}}}, &(0x7f00000006c0)=0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000780)=@assoc_id=r3, &(0x7f00000007c0)=0x4) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x927, 0x4, &(0x7f0000000380)=[{&(0x7f0000000180)="30d311e162a750ee7bc8762ca6144b027c24f3f64c2ff5e3176fb9f1685ebb50ad33318c34bdb524a91e3a2f6defdbd2bcab74a6a6361f40c012c94e3ec809f666db02f53c", 0x45}, {&(0x7f0000000200)="3c960440f56dc380f02a71f4ca3956a38825d8a8c84ff6b121ed01a9190c854df6f6b4643a1e7a689ab375216b7a52720a3248f85325a8d532cd1b43dbd127d2618a0ac565088f", 0x47, 0x8848}, {&(0x7f0000000280)="b872", 0x2, 0x9}, {&(0x7f00000002c0)="db74626d45212cbcfe05437cf39544a099a2894cf99c08c98894d924023548a5856c49c3421f7ad9d5c659626fbe2f211727fc47a856d508a55157bd8f8ebfb09316c3b3d5807c61778e49d22304aebf22bd9e753620303ac7dc3085adf68485cc7f97757f8666cb9b1034afa81297317fc931d7a4fa26fe8b152ddda5126528e888bb0313669dbe55e340d9b1cfdb41b138485397a6378d04f992628f5b50", 0x9f, 0x80000001}], 0x40, &(0x7f0000000540)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}], [{@fowner_lt={'fowner<', r2}}, {@subj_type={'subj_type', 0x3d, 'u'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '/dev/midi#\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/controlC#\x00'}}]}) ioctl$RTC_WIE_OFF(r0, 0x7010) r4 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b5, 0x10400003) 03:51:24 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "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"}, 0x1004) 03:51:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1349.851768][ T7172] FAT-fs (loop4): bogus number of reserved sectors [ 1349.876538][ T7172] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1349.963992][ T7208] jfs: Unrecognized mount option "fowner<00000000000000000000" or missing value [ 1349.985809][ T7172] FAT-fs (loop4): bogus number of reserved sectors [ 1349.992351][ T7172] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:24 executing program 3: r0 = socket(0xd, 0x2000000000001, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x3, 0x4, 0x9fa6773000481032) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000040)={0x0, 0x9, 0x400}) 03:51:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b6, 0x10400003) 03:51:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x10000}) 03:51:25 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) accept4$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14, 0x80800) accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) r8 = accept4$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xfffffffffffffe61) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000940)={@local, @multicast1, 0x0}, &(0x7f0000000980)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000009c0)={'lo\x00', 0x0}) accept4$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @multicast2, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(r8, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003d40)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@dev}}, &(0x7f0000003e40)=0xe8) accept$packet(r0, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003fc0)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000040c0)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000004100)={@remote, 0x0}, &(0x7f0000004140)=0x14) getpeername$packet(r0, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000041c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004200)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000004300)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000004340)={@initdev, @remote, 0x0}, &(0x7f0000004380)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000043c0)={0x0, @multicast1, @loopback}, &(0x7f0000004400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000004600)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000050c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000005080)={&(0x7f0000004640)=ANY=[@ANYBLOB='(\n\x00\x00', @ANYRES16=r1, @ANYBLOB="200428bd7000fcdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="5c02020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000300000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000010000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000900000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000100f700ff07000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000900000008000600", @ANYRES32=r6, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="ac00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000900000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000008000100", @ANYRES32=r10, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffffff7f08000100", @ANYRES32=r11, @ANYBLOB="e001020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff0700003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004006e1d271608000600", @ANYRES32=r13, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004007d08000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400060000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="6801020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff0700003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000800000240bfce623800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB, @ANYRES32=r19, @ANYBLOB="8401020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r20, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040008000400110b000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000004000008000600", @ANYRES32=r21, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r22, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="400002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r24, @ANYBLOB="8401020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000240004000700040908000000e1ea00019213000064009cff010000001f0000062c0700003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400190000007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c0004000900090406000000090005007f0000007d00cd4d0100000003000200b2f6ffff0700020051000000000008010080ffff0100ffe3ff000000ff7f800500000000a12dda000eed00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26], 0xa28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r27, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1350.330823][ T7659] FAT-fs (loop4): bogus number of reserved sectors [ 1350.355402][ T7659] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b7, 0x10400003) 03:51:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1000000000000200, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000440)={0x28, "0b597a27c15acf725095eb27699405c938baea7e9ce8262efb1c3d1a26ee9dd70005b871041bc9f447b4aae2473e5da17f59c2da613bd80b8e282200f2fbb935f6f370bf812658ea30d6bbac9fc752ad954f56e2af9da02f02f9bb80a74f28f34869540665669b0489e084de6d582b7922d232de1f1890765c25271fdba1d12f"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf32(r2, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x9, 0x8001, 0x3, 0x1, 0x3, 0x3, 0x3, 0x1ad, 0x38, 0x1a6, 0x1, 0x0, 0x20, 0x1, 0x7, 0x3, 0x3}, [{0x5, 0x0, 0x0, 0x80e, 0x4, 0x8, 0x0, 0xfff}], "ab86ec49f24c9723c256e73a3bf92f0e91db68f435e2264bd95950e0c23fd6293856b09b0e516775bca29625207ee8bcebe88944dab8d67ed811e5c2033dee57ddfc5a581f0435f9a19d5afd0dd2928eda1740fcb47cb167761eb306c374688a0641766a47d6241485925b2e50a4c1b0f7cdcb", [[]]}, 0x1cb) [ 1350.449528][ T7659] FAT-fs (loop4): bogus number of reserved sectors [ 1350.471371][ T7659] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={0xffffffffffffffff, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="00b701672e1b35346d26e295000000", @ANYRES16=r1, @ANYBLOB="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"], 0x19c}}, 0x24040011) setresuid(0x0, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x20) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000340)={r3, &(0x7f0000000300)=""/55}) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000540)={"03695933e5976be4b68639887288a3d9f690281fc83e07cf129b32d0809132b03148382b42814f588d605b50713f0ff44dead7bbe12925bd75ceeb5fc97dd50a6c1f5a478f87d05c97e69b7e7654f1427007292db03151b969739a10bb90f88ad8aac9921a64b0d4636b578873737e83c21eb71a7ed687a26f01d702b61b422354cf0724c78190f4a1c7a74e85b4c77306aff972f6d2e2d440a463841134b730ddfe4ea6dcf433892f7ef5e1fa48d73f65d3079cc9947f2b73d043e8e466f9c37b65960bafd1a263488aaa86e2120b3637dec8c32bef1ca07d5f8d6e1dd5597e1a1fb77e971fb19db360cebc0983aeafc33558b90072bc6770c812a65daa9a6c4041eb7e44b9ddb306b14490ed888dd377804e17878d27bbd74693b6f9d5eeb5464c2c1bcc86d968139d514be5918f819000821af819ff52a0d289359bd40bf5eb93cfcda1b2cb700e1082e839751b94cc21b44a0f64af27d80a821378e4add49b097be9e158f05abe63566aaf82e0e1433af09116fd65e244e644ce5dd8358757f6a3504728f759e7d93dcde1d01d65487af8990c8df46e499abde24c40aa1adbba8a252b4f7eb7488d184082b45c61d2fce3dc6899e28f96400ce0d10feca6c8703530363c8ddfcb515b9f0efcb7d0a84782e8bc921bd8b37ed0795eac69e877a6d822b4fc89d53d082ddaecae9e3f189c6e633149df24e7789e8e8c295bc06b8e5b65c5acadbb98570f852a25b0c5113dab83e70cd39f7bdc4a6a38ae2bca67fe06ac51e438c599eaa5f7bcc351c1adc7e6f352e49402a852a3c2625f3bf5389168b1362e4e6d798268b401b681c4ea3f00c90f089e81e451cc7a1b986d1ffd26549ae17b4866ae1193f49c1cbea364c3284428e82702f6f134d7fce132112a7b6633126656f243a036b50d6ccc83712eb1857a6de66d28d238064bb6da8a84a2c28721ddea8c54e41833373d831a2205e73b577d08e72ae29ed4d17b3e350c9b8efe41186d46fbedc980535093afc47f8bb406bedefce1a35412bb50200c9faf6c496a4d86bd9f5acd552e262070977119cef596d0ca79a08c3f0fa3de7c3e66424b5865d30ea3dc5a98d66468c094732b24fa44d7208cdb40f4ec23e82c2ba8495b558a701c2926632c7d44e563a830c1329c6d85b6252658c3cd16416be164467d1204824762770fac45100fff2a904a6923f295be368b29c55f9b23c205d5be4483ecbca43228e2b903a96ce49f4c3ddc27083720ad41c78cc98bd104f090dff5ca01503ba0473d1a698b63c312ad955f4c12b9f6c4ccd6d28a1861b71741fc533746ddf47eaabb717b664ba7ab39ecd1ebd105c297d7f89117e4111e239deec89347d8c74b814c4d56b25c8170fc2ca5fba6fbb22d40bb265889d8eaa668d0d3dcfe18c5d51f7036e2d8b66886974978d75ebbd0575c3d1995d841fb"}) 03:51:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b8, 0x10400003) 03:51:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1350.673696][ T8318] FAT-fs (loop4): bogus number of reserved sectors [ 1350.699305][ T8318] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3e, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="f2162d6df1c4443f3994045958568fcb35a388052f629ae8b1b4a84d1b8989651065ef0f580ed90b3a8781c7b79f0572514879c6bb8c307d3ffe2ae6b78614a6d17e96747c1780d48964522232d737728af8712f92b6ba294d38d13ab6e720c279fb671aaae29c7efc66987014d3e3557c8f0e1273c0fc74fa0cf0ff5a2b7103eaf8302009ed6ba5b824f254873c7021569e9d33d57342d75a8c11519d8a8af93d30a03dca95d306dcb318817b7c5d97951eebf223bb57baf74cad0ef2ac7b8ddb164cbed0a6aeeb9fa1ee9c91e51b986e4344dae5a8de4eba29e4fd3de579d41959860a013818dbe17f401596fa65a5df2bc8") ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1350.788445][ T8318] FAT-fs (loop4): bogus number of reserved sectors [ 1350.807817][ T8318] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:25 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffb000/0x4000)=nil], &(0x7f0000000040)=[0x8, 0xb7c9, 0x5, 0x6], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x05', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001b9, 0x10400003) [ 1351.090245][ T8956] FAT-fs (loop4): bogus number of reserved sectors 03:51:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x111000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:26 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x210000, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x100848, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1351.134680][ T8956] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ba, 0x10400003) 03:51:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x06', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f121e0d3f3188a070669fc9406a57bdaf580775f84f85a7fe03f3dc8b863dbc7fbe0754ba041dc4ddbde92b039c9c87f3507abb5a75553c2b590be7ac0b1366fb16c84e9f5389dd456e2de764af807306b25e4ddc45c843cc4453e0f41d22621918d9168b80c47eaecd92b71ccce87ad5e13b944c8108b286376a2cd932013e6665da000000000000003d7dfb8a9c66d0a8") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup(r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x6, @rand_addr="e33dff2d08826f78e268261d577e9f7f", 0xd776}, {0xa, 0x4e21, 0x2, @ipv4={[], [], @rand_addr=0x8f}, 0x7ff}, r3, 0x988}}, 0x48) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0x20) 03:51:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) syz_execute_func(&(0x7f0000000000)="c4627935c4c46131d1b7b0fe0000c4e1f556f60f01d847ddc8660f3a0b5a0000c40281988d0900000066430f6eaa00100002c481f157c8c4813173d400") r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7f, 0xa8080) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000080)={0x3, 0x0, @pic={0x7, 0x120000, 0x1, 0x40, 0x2, 0x7f, 0x1, 0x8f0d, 0x80000000, 0x7, 0x9, 0x505177a0, 0x10000, 0xffffffffffffffe1, 0x9, 0xf87}}) socket$rds(0x15, 0x5, 0x0) [ 1351.400636][ T9468] FAT-fs (loop4): bogus number of reserved sectors 03:51:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1351.446224][ T9468] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xaac7ecbe04375fab) setresuid(r1, r1, r1) readahead(r0, 0x6, 0x8000) semget(0x1, 0x0, 0x9fa6773000481032) [ 1351.519559][ T9468] FAT-fs (loop4): bogus number of reserved sectors [ 1351.526610][ T9468] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001bb, 0x10400003) 03:51:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0xfaf4, &(0x7f0000000140)="0adc1f121e0d3f70000000") r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x6, 0x7, 0x1, 0x1, 0x8, 0x1000, 0x80000000, 0x6, 0x0, 0x3, 0x6, 0xb1, 0x1, 0x7, 0x10, 0x1}}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000000c0)=r2) r3 = dup(r0) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000000000), 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000100)={0x7, 0x0, 0x2, "b344269bfff6961487014e0afad4b3aef57002e1d70849c7147dd4e3ac1ab59b", 0x31364d4e}) sync_file_range(r2, 0x4, 0x80, 0x7) arch_prctl$ARCH_SET_GS(0x1001, 0x6) 03:51:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\a', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1351.767354][ T9991] FAT-fs (loop4): bogus number of reserved sectors [ 1351.785261][ T9991] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1000, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1000}}, {@rq={'rq', 0x3d, 0xffffffff}}, {@rq={'rq', 0x3d, 0x5}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@pcr={'pcr', 0x3d, 0x20}}]}}) 03:51:26 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001bc, 0x10400003) 03:51:26 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x81, 0x241) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1351.894627][ T9991] FAT-fs (loop4): bogus number of reserved sectors [ 1351.911932][ T9991] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001bd, 0x10400003) 03:51:27 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/82, &(0x7f0000000080)=0x52) setresuid(r1, r1, r1) semget(0x1, 0x0, 0x9fa6773000481032) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:51:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x401) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1352.181118][T10597] FAT-fs (loop4): bogus number of reserved sectors [ 1352.201693][T10597] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1352.285182][T10597] FAT-fs (loop4): bogus number of reserved sectors [ 1352.309950][T10597] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001be, 0x10400003) 03:51:27 executing program 3: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) msgget(0x0, 0x20) setresuid(0x0, r2, r2) semget(0x3, 0x0, 0x9fa677300048102e) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000280)={0x1, 0x30000000, 0xe81, 0x1}) write$cgroup_pid(r3, &(0x7f0000000200)=r1, 0x12) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80000, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000100)={0x0, 0x7fff, 0x3}) prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/50) fstatfs(r4, &(0x7f0000000140)=""/55) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000040)={0x7, 0x200, 0x2, 0x1, 0xe9f}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 03:51:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1352.517460][T11145] FAT-fs (loop4): bogus number of reserved sectors [ 1352.540795][T11145] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001bf, 0x10400003) [ 1352.632559][T11145] FAT-fs (loop4): bogus number of reserved sectors [ 1352.649775][T11145] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:27 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000800)=@nat={'nat\x00', 0x19, 0x5, 0x790, [0x20000040, 0x0, 0x0, 0x200001c8, 0x200004f0], 0x0, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x808) semget(0x1, 0x0, 0x9fa6773000481032) fcntl$setown(r0, 0x8, r1) 03:51:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0), 0x10) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7ff, 0x20000) write$P9_RFLUSH(r3, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) 03:51:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\n', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x3f, 0x30, 0x2}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x4, 0xe}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r3 = open(&(0x7f0000000100)='./file0\x00', 0x400000, 0xa0) setxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:ptchown_exec_t:s0\x00', 0x24, 0x1) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000180)) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000340)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x5, 0x101, 0x7, "51f7593c6d695ff8fd9463aa0b6fd92553b8aa401ab1e72e0c5e6948172e9895575cb9840dd9a671fce9d3cc5981e81ee82de36704651e73915a3e60b6c86e", 0xc}, 0x60) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @multicast2}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x1, &(0x7f0000000380)=@raw=[@ldst={0x3, 0x3, 0x2, 0x2, 0x0, 0x6, 0x10}], &(0x7f00000003c0)='syzkaller\x00', 0x4, 0x4a, &(0x7f0000000400)=""/74, 0x41f00, 0x0, [], r4, 0xf}, 0x48) 03:51:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c0, 0x10400003) [ 1352.918448][T11814] FAT-fs (loop4): bogus number of reserved sectors 03:51:27 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x3, 0x4, 0x2a1) [ 1352.977089][T11814] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10, 0x80800) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) r4 = accept(r1, &(0x7f0000000200)=@alg, &(0x7f00000001c0)=0x80) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000180)={r1}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x10001, 0x8}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000280)={r5, 0xa769}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000000)='./file0\x00', 0x101000, 0xc0) [ 1353.127638][T11814] FAT-fs (loop4): bogus number of reserved sectors [ 1353.149199][T11814] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1005}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x8, @local, 0x3}, @in6={0xa, 0x4e21, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xfa}}}, 0x118) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') readv(r2, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x56}], 0x1) setresuid(0x0, r1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c1, 0x10400003) 03:51:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x0e', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1353.322438][T12478] [ 1353.324809][T12478] ====================================================== [ 1353.332304][T12478] WARNING: possible circular locking dependency detected [ 1353.339321][T12478] 5.0.0-rc6-next-20190214 #35 Not tainted [ 1353.345037][T12478] ------------------------------------------------------ [ 1353.352046][T12478] syz-executor.3/12478 is trying to acquire lock: [ 1353.358452][T12478] 000000007f9f4232 (&sig->cred_guard_mutex){+.+.}, at: do_io_accounting+0x1f4/0x830 [ 1353.367856][T12478] [ 1353.367856][T12478] but task is already holding lock: [ 1353.375212][T12478] 0000000066e1019d (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 1353.382683][T12478] [ 1353.382683][T12478] which lock already depends on the new lock. [ 1353.382683][T12478] [ 1353.393072][T12478] [ 1353.393072][T12478] the existing dependency chain (in reverse order) is: [ 1353.402080][T12478] [ 1353.402080][T12478] -> #2 (&p->lock){+.+.}: [ 1353.409274][T12478] __mutex_lock+0xf7/0x1310 [ 1353.414299][T12478] mutex_lock_nested+0x16/0x20 [ 1353.419592][T12478] seq_read+0x71/0x1130 [ 1353.424261][T12478] proc_reg_read+0x1fe/0x2c0 [ 1353.429369][T12478] do_iter_read+0x4a9/0x660 [ 1353.434416][T12478] vfs_readv+0xf0/0x160 [ 1353.439099][T12478] default_file_splice_read+0x475/0x890 [ 1353.445155][T12478] do_splice_to+0x12a/0x190 [ 1353.450174][T12478] do_splice+0xf85/0x1260 [ 1353.455019][T12478] __x64_sys_splice+0x2c6/0x330 [ 1353.460418][T12478] do_syscall_64+0x103/0x610 [ 1353.465537][T12478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.471948][T12478] [ 1353.471948][T12478] -> #1 (&pipe->mutex/1){+.+.}: [ 1353.478981][T12478] __mutex_lock+0xf7/0x1310 [ 1353.484001][T12478] mutex_lock_nested+0x16/0x20 [ 1353.489284][T12478] fifo_open+0x159/0xb00 [ 1353.494059][T12478] do_dentry_open+0x488/0x1160 [ 1353.499330][T12478] vfs_open+0xa0/0xd0 [ 1353.503831][T12478] path_openat+0x10e9/0x46e0 [ 1353.508934][T12478] do_filp_open+0x1a1/0x280 [ 1353.513955][T12478] do_open_execat+0x137/0x690 [ 1353.519150][T12478] __do_execve_file.isra.0+0x178d/0x23f0 [ 1353.525300][T12478] __x64_sys_execve+0x8f/0xc0 [ 1353.530493][T12478] do_syscall_64+0x103/0x610 [ 1353.535606][T12478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.542003][T12478] [ 1353.542003][T12478] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 1353.549728][T12478] lock_acquire+0x16f/0x3f0 [ 1353.554754][T12478] __mutex_lock+0xf7/0x1310 [ 1353.559792][T12478] mutex_lock_killable_nested+0x16/0x20 [ 1353.565859][T12478] do_io_accounting+0x1f4/0x830 03:51:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000080)=0x180) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f00000000c0)={{0xfff, 0x0, 0x6, 0x100000000, 0x3, 0xc2}}) [ 1353.571223][T12478] proc_tid_io_accounting+0x20/0x30 [ 1353.576937][T12478] proc_single_show+0xf6/0x170 [ 1353.582216][T12478] seq_read+0x4db/0x1130 [ 1353.586971][T12478] do_iter_read+0x4a9/0x660 [ 1353.591993][T12478] vfs_readv+0xf0/0x160 [ 1353.596670][T12478] do_readv+0xf6/0x290 [ 1353.601258][T12478] __x64_sys_readv+0x75/0xb0 [ 1353.606370][T12478] do_syscall_64+0x103/0x610 [ 1353.611480][T12478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.617879][T12478] [ 1353.617879][T12478] other info that might help us debug this: [ 1353.617879][T12478] [ 1353.628111][T12478] Chain exists of: [ 1353.628111][T12478] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 1353.628111][T12478] [ 1353.641034][T12478] Possible unsafe locking scenario: [ 1353.641034][T12478] [ 1353.648476][T12478] CPU0 CPU1 [ 1353.653836][T12478] ---- ---- [ 1353.659186][T12478] lock(&p->lock); [ 1353.662980][T12478] lock(&pipe->mutex/1); 03:51:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c2, 0x10400003) [ 1353.669822][T12478] lock(&p->lock); [ 1353.676139][T12478] lock(&sig->cred_guard_mutex); [ 1353.681156][T12478] [ 1353.681156][T12478] *** DEADLOCK *** [ 1353.681156][T12478] [ 1353.689299][T12478] 2 locks held by syz-executor.3/12478: [ 1353.694848][T12478] #0: 000000009e4510fe (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1353.703452][T12478] #1: 0000000066e1019d (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 1353.711349][T12478] [ 1353.711349][T12478] stack backtrace: [ 1353.717243][T12478] CPU: 0 PID: 12478 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190214 #35 [ 1353.726333][T12478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.736376][T12478] Call Trace: [ 1353.739673][T12478] dump_stack+0x172/0x1f0 [ 1353.744010][T12478] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1353.750070][T12478] __lock_acquire+0x2fca/0x4710 [ 1353.754927][T12478] ? mark_held_locks+0xf0/0xf0 [ 1353.759694][T12478] ? depot_save_stack+0x1de/0x460 [ 1353.764725][T12478] ? mark_held_locks+0xa4/0xf0 [ 1353.769488][T12478] lock_acquire+0x16f/0x3f0 03:51:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c3, 0x10400003) [ 1353.773991][T12478] ? do_io_accounting+0x1f4/0x830 [ 1353.779007][T12478] ? do_io_accounting+0x1f4/0x830 [ 1353.784028][T12478] __mutex_lock+0xf7/0x1310 [ 1353.788524][T12478] ? do_io_accounting+0x1f4/0x830 [ 1353.793541][T12478] ? do_io_accounting+0x1f4/0x830 [ 1353.798561][T12478] ? kasan_kmalloc+0x9/0x10 [ 1353.803065][T12478] ? kvmalloc_node+0x68/0x100 [ 1353.807738][T12478] ? seq_read+0x832/0x1130 [ 1353.812153][T12478] ? vfs_readv+0xf0/0x160 [ 1353.816481][T12478] ? do_readv+0xf6/0x290 [ 1353.820728][T12478] ? mutex_trylock+0x1e0/0x1e0 [ 1353.825495][T12478] ? mark_held_locks+0xf0/0xf0 [ 1353.830251][T12478] ? debug_smp_processor_id+0x3c/0x280 [ 1353.835710][T12478] ? perf_trace_lock_acquire+0xf5/0x580 [ 1353.841255][T12478] mutex_lock_killable_nested+0x16/0x20 [ 1353.846804][T12478] ? mutex_lock_killable_nested+0x16/0x20 [ 1353.852524][T12478] do_io_accounting+0x1f4/0x830 [ 1353.857376][T12478] ? proc_pid_stack+0x2c0/0x2c0 [ 1353.862224][T12478] ? kasan_check_read+0x11/0x20 [ 1353.867078][T12478] proc_tid_io_accounting+0x20/0x30 [ 1353.872273][T12478] proc_single_show+0xf6/0x170 [ 1353.877036][T12478] seq_read+0x4db/0x1130 [ 1353.881283][T12478] do_iter_read+0x4a9/0x660 [ 1353.885796][T12478] ? dup_iter+0x260/0x260 [ 1353.890127][T12478] vfs_readv+0xf0/0x160 [ 1353.894285][T12478] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1353.900349][T12478] ? kasan_check_read+0x11/0x20 [ 1353.905203][T12478] ? ksys_dup3+0x3e0/0x3e0 [ 1353.909619][T12478] ? kasan_check_read+0x11/0x20 [ 1353.914475][T12478] ? mutex_lock_nested+0x16/0x20 [ 1353.919410][T12478] do_readv+0xf6/0x290 [ 1353.923478][T12478] ? vfs_readv+0x160/0x160 [ 1353.927890][T12478] ? do_syscall_64+0x26/0x610 [ 1353.932562][T12478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.938621][T12478] ? do_syscall_64+0x26/0x610 [ 1353.943300][T12478] __x64_sys_readv+0x75/0xb0 [ 1353.947889][T12478] do_syscall_64+0x103/0x610 [ 1353.952477][T12478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.958366][T12478] RIP: 0033:0x457e29 [ 1353.962264][T12478] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1353.981864][T12478] RSP: 002b:00007fb404c25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1353.990272][T12478] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1353.998236][T12478] RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004 [ 1354.006208][T12478] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1354.014171][T12478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb404c266d4 03:51:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c4, 0x10400003) 03:51:28 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c5, 0x10400003) [ 1354.022136][T12478] R13: 00000000004c4950 R14: 00000000004d8470 R15: 00000000ffffffff [ 1354.043612][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.050762][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffef2) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1354.112159][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.129947][T13144] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.140248][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.150877][T13144] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.161744][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.169169][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.182539][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1354.190125][T13153] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.199739][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:51:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x40, 0x8000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x101802, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000240)={0x2, 0x800, 0x6, 0xfffffffffffffbff, 0x3f, 0x7fff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'broute\x00', 0x0, 0x4, 0x3b, [], 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000000c0)=""/59}, &(0x7f0000000100)=0x78) write$P9_RREAD(r2, &(0x7f0000000280)={0xde, 0x75, 0x2, {0xd3, "b7b8b8f1d49a57b84bbe53133f566fe04d1c997d87b0ed0e45ee576e18c107cff011eae443e5b66c8a54dcf84791bfc9dbd6ce5372aeb6f8bc15f5af4cb107468b93b42f85482142c9cfff49b00ec0d3a1f55561f52135f259315a0d354218c4ba88cfd061fcf446877c71f167ff543d13903604698dd71d5c67b2263896da16e6dddfd1335db17c134a070d52be828f21b703c6b5048197f436d3507cd63d2c9dcf76b25b193fbc5edd9ac9158ff136e8987ec9e27d7acacbb05305e1ce871206eeb01563f93da45c112d6837c0218ffb0b6a"}}, 0xde) 03:51:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1354.201777][T13153] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.214057][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1354.242843][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:51:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c6, 0x10400003) [ 1354.263591][T13144] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.263827][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1354.274978][T13144] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.286799][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1354.300017][T13153] FAT-fs (loop4): bogus number of reserved sectors [ 1354.308612][T13153] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1354.317505][T13144] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.325213][T13144] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.336724][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.347933][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.361568][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1354.378852][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1354.390680][T13153] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.413652][T13153] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.421133][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1354.440184][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1354.465211][T13153] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.472352][T13153] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.473765][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.497456][T13153] FAT-fs (loop4): bogus number of reserved sectors [ 1354.499161][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.504072][T13153] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1354.521501][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.528890][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.539366][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1354.546503][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1354.557000][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1354.564139][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1354.574747][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1354.581875][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1354.592338][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.599473][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$inet(0x2, 0x0, 0x4) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x7, 0x4d3a, 0x8, 0x3, 0x0, 0x401, 0x1000, 0x1, 0x3, 0x65d05177, 0x2, 0x1, 0x8, 0x855, 0xffffffff, 0x20, 0x0, 0xfffffffffffff000, 0x2, 0x3ff, 0x0, 0x8001, 0x7, 0x363, 0x3, 0x6, 0x3, 0xf8, 0x4, 0x6, 0xff, 0xff, 0x1, 0x400, 0x733, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x842d, 0x7f}, 0x14410, 0xfffffffffffffff9, 0x1, 0x9, 0x2, 0xfff, 0x1}, r1, 0xe, r3, 0x3) 03:51:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1, 0x0) 03:51:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c7, 0x10400003) 03:51:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x10', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1354.643501][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.650656][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.662995][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.671038][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.741510][T13924] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.750037][T13924] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:51:29 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a91853142a0810db3e17a38a7007f7b53f8396ff1ec5c19fd6ce9e6bd3258d0235a42527e1c377952cf3d1f0bdbc7e5ca00e1d3cce1d928abd352e097be39046f7c12c43e87aa8a11b23b710abb3fcc1818b436b7bc9e2cdcd5f5bbe90db00ec675b1b57dd90e3be748") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1354.794515][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.801673][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c8, 0x10400003) 03:51:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) r3 = dup2(r0, r0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000080)={r3, 0x0, 0x100004000, 0xfffffffffffff000}) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1354.852317][ T3873] kobject: 'nullb0' (000000007f85977a): kobject_uevent_env [ 1354.865760][ T3873] kobject: 'nullb0' (000000007f85977a): fill_kobj_path: path = '/devices/virtual/block/nullb0' [ 1354.878520][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.883423][T13924] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1354.886049][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1354.893012][T13924] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1354.943570][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1354.964687][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1354.966407][T14474] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1354.980740][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env 03:51:29 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001c9, 0x10400003) 03:51:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat#', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1354.990091][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1355.020929][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.023938][T14474] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.052020][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1355.085877][T14474] FAT-fs (loop4): bogus number of reserved sectors [ 1355.092047][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.097570][T14474] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1355.101203][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.113510][T14789] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.117223][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.127636][T14789] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.130666][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.131054][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.158262][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1355.168873][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1355.176525][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1355.187102][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1355.194327][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1355.224806][T14474] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.232093][T14474] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.247992][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.255157][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.313687][T14789] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.320945][T14789] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.336365][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.338323][T14789] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.346763][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.351185][T14789] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.375938][T14474] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.385237][T14474] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.385504][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.402701][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.414559][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.421685][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.447537][T14474] FAT-fs (loop4): bogus number of reserved sectors [ 1355.466178][T14474] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @remote}}, 0xbf22, 0xd844, 0x4fa0, 0x8c6, 0x8}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x1}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:30 executing program 3: r0 = socket(0x10, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000400)={{0x3f, @rand_addr=0x7, 0x4e21, 0x2, 'lblc\x00', 0x18, 0x64011181, 0x20}, {@rand_addr=0x2, 0x4e20, 0x0, 0x3, 0x3, 0x8001}}, 0x44) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000300)=[{&(0x7f0000000100)="aafd7c751d42fb0974b4805ccf9f5fde24abc3204ef988ec74dc52f2c78e9713e96098af436682af7706e88264c039595b3233cdef14fa4dfe2fac590a174c0b680cba5cfe8e82e01964adf6c4b7c0d44a65bd3b08dab828299a83683b1282020e5c8148d9178c2a76a978643aeb55e6033cdd49c8432058032501667d035ccb93ac9b87ec8b2794d99d4b1edd2a", 0x8e, 0x9}, {&(0x7f00000001c0)="8911d5da21459110c08268b70e1927be35dca14380ca3dfd71906071e6b65f8a9eb4b89f0ccf206aeddf489f59af5b06e5824ba3a22c6d2d3fc476339570330c944752c96d2b880e5dc365d428fe3e5cd4015f2769711c048f7034adfa9ac88270c4d1bdda46c6a4ee5c3fe6c5e5f4b0b203b475be", 0x75, 0x5}, {&(0x7f0000000240)="a9917266e244295cb14ed85b9c121f93901d7d31aa2d701822589ff1855610c034a0c93b5a9340bd62bad58469b0f8bcd1217491b51465a8c416c223ed88c2229a6c4002bc37516c4c832882c37b595609f4df1b940d8a42f931fd6a0684a29c9f9b78590f9b1873b4fd8f95414c0c64c8f66865053e3730f7748667753379906a5b67db28feae7e4d", 0x89, 0xfff}], 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB='nls=macromanian,disable_sparse=no,subj_type=},defcontext=system_u,subj_role=!,smackfvhat=_^system,dont_hash,\x00']) setresuid(0x0, r1, 0x0) r2 = semget(0x2, 0x3, 0x270) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000000)=""/78) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ca, 0x10400003) 03:51:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfatH', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1355.573543][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.581015][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.597088][T14904] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.601828][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.605960][T14904] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:51:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001cb, 0x10400003) [ 1355.628455][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.663346][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.670525][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x4ba, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) [ 1355.721304][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.732098][T15369] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.739535][T15369] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.750997][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:51:30 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:30 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001cc, 0x10400003) [ 1355.772036][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1355.797417][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1355.822940][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.824025][ T7743] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.834346][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.846692][ T7743] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1355.851658][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env 03:51:30 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x74, r3, 0x621, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe016}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40810}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x8000000000, 0x0}) [ 1355.877366][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1355.897671][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1355.905528][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1355.913967][T15369] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.922985][T15369] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.939062][T15475] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1355.946442][T15475] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1355.947240][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.967466][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1355.974960][T15475] FAT-fs (loop4): bogus number of reserved sectors [ 1355.980167][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1355.984383][T15369] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1355.994663][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1356.002795][T15369] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.016909][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1356.019261][T15475] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1356.026525][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1356.050674][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.058287][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.094435][T15475] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.102139][T15475] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.122063][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.147618][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.170765][T15475] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.181423][T15475] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.189168][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1356.211989][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1356.237613][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1356.253273][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.256545][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1356.260439][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.292566][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env 03:51:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1356.307587][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.334644][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.341831][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:51:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001cd, 0x10400003) 03:51:31 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000680)=0xc) setresuid(0x0, r1, 0x0) syz_read_part_table(0x7ff, 0x7, &(0x7f0000000580)=[{&(0x7f0000000000)="941dc10a16b8109a7452a9317c41d2b67e657634ca7f21649aefb7c50f5701c8d9e35b7aad3456203fd43595e421124ce62ef9281b32a06a8f4c3aad57912febce38de0f7e35919c3fecd5df7766534129819c2293be7c0a1af6ea674e18fe5dae403ff2ce69a714760879811ee40f1fe1f057860c7d1b798ecbe37ac01057496f561e4d8167255d32ec93cca4de53295f32aa89e67081529470ee7ba89452754e", 0xa1, 0xffffffffffffffe1}, {&(0x7f00000000c0)="59318381338ae731a900f3115ce98eb1572f3f15b59310bdcf2f36a2c2b1ad25e28facbe15ba44078adb11177c6f4d87916452e9d61c9dda8cc750505f06e48b537914377e1544fe2f1a9a2274a29e521feae1b1b70ec7c1b1a33255eeaa8d1fb32a89b8cc88040c90d93415e82d9de9149b2dcda9d7d19502a3ec35d328f955284996316e56bf0f7bca67f2ca954dde29b5d6cc79dc61ca1dd6f9ec99069a3ee07c632efa9d07aa365fb0ceb476e7e6f7aeedc10bd60edad86bea28c06d2c5c0cac29d84d764bb42c2756bd65fe4ef578b9280c20f9d99ab1c0013c707f07cae8f4ba6003926381fe3c17b639e3de3d71", 0xf1}, {&(0x7f00000001c0)="81ff68fc0b18ee6d599d82a748cde86a2cfcb9cc436ec09c725b6747c967082087ca610ff0d48e15a6e0ae9d54cf939fd36c402f59f4e4ab685cf72d42414709f8aa01dd4ffbcb99a960ed2d99578d19671613f0cb46c3769e52fb8bb2666db970a8e730fdb85220b80c7153237b7d535af5d5378c10b514dbcff90c18c9bf019c49f4290be421e736bbf3670f838b77c7311ebc138fbbe71adc71dda9c07748202e25161b0642f913b9", 0xaa, 0x100000000}, {&(0x7f0000000280)="8499eff6977247d305c2185e11c0ef6f4a43062019623881a440714d43a4578c4ec3b024f16c64aef1b230d1c561607e77fd3a34e3da9acc74f24ff301b5e3616cccbcbab5227923a52e3c7172ff34ceb4f625b8beb5d72f66d36a52623d407c7317010355bc729cdf55890dda3896a3ce424be742ba566b8729babf8e2c05e6db9dbcb809d6b637f70dabede1203b929d614587b14f46b0208c75ebd0f0692c5371c0e947423eb2637b6b5c293acd18e50aff381ca822d32f15999716ba63b9431a8b69aa50f82226e733384c82909898e83a3698a3888e0f", 0xd9, 0x3f}, {&(0x7f0000000380)="586bb24b88a4ca83ac5d173e17827dc3f81b0e612f13eff2eebea762bb5199b9ba5862e3f46bdb499f225b71eb9bc82f270eaac1fbff9f8dc625efebf5045777e0f035b490062b7b11064fe6918c6077bd054d3a03951c48723f4d8fc853480c4a185d98b1674551531911d7afd0fa7366fa9a3185a81e4235e6a7d1af02822bdd0baf6ca2993a3de2452acd28693ce1435e1002e64be956a0", 0x99}, {&(0x7f0000000440)="904160fbe2638b810354704f2e42565aa487a0fd90163a8a702cec1d37f1cb803f83f98c75f099d5cc1f6dcf5966376b602e42e4c5e5fb3063d68925f4995b53cb9bab780f699d961dba1ee11b72aa18a8a10f8afe9576f67bd30cb9c2c0f28ccde69ff59ab5d0500e66caf4dd8bb06d64f2151339b63e2111c6c42e52084dc4866eba615cbac6555fa82f504aec4e520cda116e54488e56c6f27c50462228d9e53bea7abb0817694cc8c138e01f0f3b99c727f0a8f815ae0689ce81044ea0ef32a42029ace03fddc0ba607c", 0xcc}, {&(0x7f0000000540)="bcec3fa6fa21d357b1336aea69fe6de1048b6b36a147a6", 0x17, 0xffff000000000}]) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x311600, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000080)={0x40, 0x0, 0x3, [{0x2, 0x10000, 0x13, 0x8, '/dev/snd/controlC#\x00'}]}, 0x40) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfatL', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1356.434043][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.441233][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1356.491669][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.501406][T15857] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.517824][T15857] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:51:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x101000) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x178, 0x5, 0x7fffffff, 0x400000000000000}, {0xd9e3, 0x5, 0x9, 0x25}]}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0}) 03:51:31 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x800) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000300)={0x0, 0x6000}) r1 = socket(0x10, 0xe, 0x0) setresuid(0x0, 0x0, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) ioctl$sock_netdev_private(r1, 0x89f8, &(0x7f0000000040)="2b21ecece8f038fd38d0bbdbc404282f5dad4ccd7d386fb5eab580a53a843d3e0e20c9c2dba63a0d5602e396935755ace724c7f61066d1b277c6c2f6a221e35cf3474b5f2137147f36e5a5ba42463cdf56342030fd7156ab3553c69c31aa7d3a01924637124dfca317dc348bd060ed766293098d06dabbb62b09907b30c28e13750de9df0b620f7dde7208cbcf743a96a46e9a52b867a74c13af95727bc20c1ec8e5038211980a41064f3d9cd32d9c671d1bcd4e9929a7b12620829735dfc85692bff37a6391f913c069e0a418315b91329c9b9871277980acffee19c1ebb2da0c7b") rt_sigtimedwait(&(0x7f0000000200)={0x9}, &(0x7f0000000240), &(0x7f00000001c0)={0x77359400}, 0x8) [ 1356.563207][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001ce, 0x10400003) [ 1356.619440][T16265] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.632269][T16265] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.640586][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1356.680308][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1356.720395][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env 03:51:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x4000000000000000, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f121e0d3f3188a070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 1356.730057][T15857] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.745887][T15857] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.770688][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1356.790680][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1356.802257][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1356.813870][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1356.821216][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1356.823302][T16265] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.832564][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1356.840663][T16265] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.846185][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1356.867262][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1356.874461][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1356.876426][T15857] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.885122][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.899077][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.909266][T15857] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.909771][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.928560][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.942511][T16265] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.955260][T16265] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1356.967241][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1356.974580][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1356.985300][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1356.992466][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.037911][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1357.045132][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:51:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:31 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001cf, 0x10400003) 03:51:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:31 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat`', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1357.103726][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1357.110910][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:51:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) semget(0x1, 0x0, 0x9fa6773000481032) [ 1357.159777][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.172183][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.191778][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.200210][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:51:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d0, 0x10400003) 03:51:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1357.217498][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.231763][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.270031][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.279693][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.290346][T16997] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.308932][T16997] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.320383][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1357.331918][T16999] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.342923][T16999] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.346657][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1357.374703][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1357.382037][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1357.397161][T16997] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.404553][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1357.411877][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1357.416650][T16997] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.440628][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.447945][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:51:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:32 executing program 3: r0 = socket(0x10, 0x2, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) sendto(r0, &(0x7f0000000000)="7bcb40299f0771ac959bcc38cddb6bd949ae737827d91cdedb058b82f94abf1d59bc5f4c66d4948c88d14c1aee51469807c4a2630a04f233d6ccb767081ba0a504b8207a6910eefcd244a7d9e21b5348cce38d7b71f80d65fa1dca13bbaad40aefa07154f704c8c874805b10c9afaa218e137e1cae49aae02ab9f1aa475c1663df8775c9b8a2b3a3cbc9dc8eed8e9678737c908fba2e761ac1043af4d56af763bd6ad0592143a2a4cd33d558fd4376", 0xaf, 0x40000, 0x0, 0x0) 03:51:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d1, 0x10400003) [ 1357.484023][T16999] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.497659][T16999] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.533418][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1357.546191][T16997] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.554227][T16997] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.562798][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1357.576939][T16999] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.588926][T16999] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.634901][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.642098][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.673596][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env 03:51:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) 03:51:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfath', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d2, 0x10400003) [ 1357.680747][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1357.692080][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.699265][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.710249][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.724968][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:32 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='@wlan0\x00', 0x7) [ 1357.727190][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.737219][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1357.742397][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.749624][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:51:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1357.781500][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1357.797564][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1357.814619][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.818588][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env 03:51:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d3, 0x10400003) [ 1357.822301][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.836504][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.855955][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env 03:51:32 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1357.879072][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1357.903700][T17800] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1357.910860][T17800] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1357.925864][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env 03:51:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1357.942840][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1357.955203][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1357.968818][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1357.982717][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env 03:51:32 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d4, 0x10400003) 03:51:32 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x9, 0x4) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1357.995505][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1358.009112][T17800] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.018627][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1358.029131][T17800] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.042669][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1358.058468][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.065975][T18059] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.073252][T18059] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.080879][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.099405][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1358.110714][T17800] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.116615][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1358.118296][T17800] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.137104][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1358.149551][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1358.152554][T18059] FAT-fs (loop4): bogus number of reserved sectors [ 1358.163993][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1358.168002][T18059] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1358.180611][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1358.191469][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.206479][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.313478][T18059] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.320660][T18059] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.335584][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1358.342713][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1358.353892][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.361009][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.393375][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.400536][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.415546][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.419515][T18059] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.422699][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.431981][T18059] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.455877][T18059] FAT-fs (loop4): bogus number of reserved sectors [ 1358.462637][T18059] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1358.472472][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.479668][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:33 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) 03:51:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d5, 0x10400003) 03:51:33 executing program 3: r0 = socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) semget(0x1, 0x0, 0x9fa6773000481032) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_targets\x00') ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x300, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000080) readahead(r0, 0x5, 0x800) 03:51:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfatl', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:33 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1358.566947][T18379] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.580139][T18379] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.627025][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.637437][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:33 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d6, 0x10400003) [ 1358.667581][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.675384][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) semget$private(0x0, 0x1, 0x101) setpgid(r3, r3) setresuid(0x0, r4, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1358.713361][T18379] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.723259][T18379] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.738896][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env 03:51:33 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1358.761658][T18728] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.770144][T18728] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.782114][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1358.799001][T18379] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.809155][T18379] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.812666][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1358.831977][T18728] FAT-fs (loop4): bogus number of reserved sectors [ 1358.842843][T18728] FAT-fs (loop4): Can't find a valid FAT filesystem 03:51:33 executing program 2: r0 = socket(0x0, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1358.860201][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1358.880907][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1358.892515][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1358.916052][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.923378][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.934053][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1358.937055][T18728] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1358.941178][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1358.941608][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1358.948665][T18728] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1358.958526][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1358.990505][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1358.998101][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.008709][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.013587][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.015878][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.026252][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.059671][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1359.062118][T18728] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.066852][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1359.067229][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1359.077583][T18728] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.084249][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1359.095974][T18728] FAT-fs (loop4): bogus number of reserved sectors [ 1359.101890][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.116234][T18728] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1359.118692][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.142231][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1359.149392][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.159825][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env 03:51:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d7, 0x10400003) 03:51:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfatt', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:34 executing program 3: r0 = socket(0x8, 0x6, 0xf66) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="dcde87eb5745e6a911c97feb02b665759bbe70279b5961b867476818dc801e6b24c7c71239247d70631f484d872185ae24916b38b6", 0x35}], 0x1) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r0, &(0x7f0000000040)={r3, r0, 0xfffffffffffffffc}) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400000) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:34 executing program 2: r0 = socket(0x0, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1359.166973][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:51:34 executing program 2: r0 = socket(0x0, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) 03:51:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000140)=0xffffffffffffff67) setresuid(0x0, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) semget(0x1, 0x40000000000, 0x9fa6773000481032) [ 1359.308258][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.320097][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.342222][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.347782][T19078] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env 03:51:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d8, 0x10400003) [ 1359.356598][T19078] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.362531][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.386891][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env 03:51:34 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1359.405265][T19318] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.412651][T19318] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.424027][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:51:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80002011}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'syz_tun\x00'}}}, [""]}, 0x2c}}, 0x20008041) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x100, 0x70bd2a, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) prctl$PR_SET_FPEMU(0xa, 0x1) setresuid(0x0, r2, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) [ 1359.472602][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1359.487225][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.487374][T19078] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.510019][T19078] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.510544][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1359.539877][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1359.551952][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1359.553986][T19318] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.559584][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.577117][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.582427][T19318] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.587669][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.614902][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1359.622208][T19078] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.622922][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1359.629687][T19078] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.644066][ T3873] kobject: 'loop5' (0000000081ce772c): kobject_uevent_env [ 1359.653273][T19318] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.665006][ T3873] kobject: 'loop5' (0000000081ce772c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1359.665110][T19318] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.693114][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1359.700663][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.711677][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env 03:51:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:51:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) 03:51:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001d9, 0x10400003) 03:51:34 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) 03:51:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) write$P9_RSTATu(r4, &(0x7f0000000080)={0x75, 0x7d, 0x1, {{0x0, 0x56, 0x9139, 0x4, {0x4, 0x3, 0x6}, 0x800000, 0x6, 0x6, 0xb0e, 0xa, '/dev/ptmx\x00', 0x5, 'Yeth1', 0xa, '/dev/ptmx\x00', 0xa, '/dev/ptmx\x00'}, 0xa, '/dev/ptmx\x00', r1, r2, r1}}, 0x75) ioctl$TIOCEXCL(r3, 0x540c) setresuid(0x0, r1, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) 03:51:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfatz', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1359.719181][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.730556][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.737918][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.748471][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.762593][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.773435][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env [ 1359.790009][ T3873] kobject: 'loop3' (000000006932a812): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1359.804869][ T7737] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env 03:51:34 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436220a86bb1bcf8360fd37fd8fb91af5f6fcf4494ca6583941dab3a5322f7ad0debc93eec5b328467851218811b35a"}], 0x158}, 0x4}], 0x3, 0x4000) [ 1359.825982][ T7737] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.867390][ T3873] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.874847][ T3873] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.899338][ T7746] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env 03:51:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r2, 0xf, "c54003", "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"}}, 0x110) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) semget(0x1, 0x0, 0x9fa6773000481032) 03:51:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000340)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') preadv(r0, &(0x7f0000000700), 0x10000000000001da, 0x10400003) 03:51:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f00000012c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000013c0)={r1, 0x7, 0x3f}, &(0x7f0000001400)={'enc=', 'raw', ' hash=', {'wp256-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}, &(0x7f0000001480)="62b2816db28e9a4c3b5a5a7a424666da6e8a35e3902a2378390931395113a9ba5a01e5721c56f720468dc826b9096169fc1c85665b47c3f2c6649ed79af1e56c6c253567018fc3bb380600884df4cad031dc20264cc3cacb1a4a662d10a0", 0x0) [ 1359.908086][ T7746] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.929325][ T3873] kobject: 'loop2' (000000003f9295bf): kobject_uevent_env [ 1359.945148][ T3873] kobject: 'loop2' (000000003f9295bf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1359.955857][T20052] kobject: 'loop1' (000000006d83f7bc): kobject_uevent_env [ 1359.963007][T20052] kobject: 'loop1' (000000006d83f7bc): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1359.973733][ T3873] kobject: 'loop4' (00000000ebbe7774): kobject_uevent_env [ 1359.980897][ T3873] kobject: 'loop4' (00000000ebbe7774): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1359.993676][ T3873] kobject: 'loop3' (000000006932a812): kobject_uevent_env 03:51:34 executing program 2: socket(0x10, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="0ccfe62c2f4441548f", 0x9}, {&(0x7f0000000040)="45897a8cb1d905fdd57b32c09e108a83fdc5ac05eda953c8e2a2a004192942d8a381826794ebf98b01196e02344ededfdbbf121f5b376150cf9aa73f9896e57d5f533d67dc507e9db3809b854bc75af65e0917122c43bded74b6c7e2bb2c54454844e89f88ace55a4d809cd2e1ff92ea6dcbed61fe4ba308d4810351e17416a2", 0x80}, {&(0x7f00000000c0)="f94f068d5ba6fc46cf1b7ed888ddc5f1fcf042b00d2cc77aeea3dc0efd084c389f7f85fb375a5ca743ee289574ed6c7039128fec51789cbffd78fc", 0x3b}, {&(0x7f0000000100)="679bdf2f6cd2df2f82ab1fb172d8b72fba1dd0dca3b1a1cb98de72807551db21f2a863fb888b4cbc7e047e6de1922639fb7099b40f15c0bae4c334dd4381d3b721d39b4fd273d4886e2b063a", 0x4c}], 0x4}, 0x7f}, {{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="05dc5111766dc727225d54c504efda01363022975bec051399a4bf34dd7fe211daa2a3fd8939721c7c", 0x29}], 0x1, &(0x7f0000000240)=[{0x88, 0x10f, 0xffffffffffffffc0, "a336f28cc9162eaf75649654c58169cd0dd0d69a47e952d286e2d18516ebdeef1c3b6d5a58a286863fa25f8ee0e454e1e6cb474ad91ce1f596326ed56e038e1f8db02a825a01868c433ef526f6928aa9c56b3b0d6b29bd0d507b49c75079c4d0bc5efcc20937eaa6f257a22e0f88508da0ea4bd79924"}], 0x88}, 0xfff}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000300)="0cae280ace8e5f41a4c09fe493a3e5920bf56cc9399e2c9c4e72607f3df2530455acf25d53f342c18894f7520fd1a560c068db2fcf89811f034123ade04e7043d90c2fab54b3a935bcec199441dd39472198eb164bbdf622db42be1d1f3070d96675d0f63535578db5f17e8d941b5455a106f0d94f33268844c05deb10421ce706888d6c230c51addc839c49e7583642477c10c6dcdab5630dea1da82309d227fa18", 0xa2}, {&(0x7f00000003c0)="d5391bceca1118054df251894c39346199a69bd9c1dfaf7ffc217f612cc7386f1f5c7282ec7321842aa5d9778578b80b9d9f6f82b2146b49518b81988f52b36da6add8282e219efa61a39e5e8fac7703d708f1a24637e30a53de825e627a578b9c1a05427de35cffd921", 0x6a}], 0x2, &(0x7f0000000480)=[{0x88, 0x12b, 0xffffffffffff0415, "15713eab2149a9bbdbe436422dea20e0c9c42c545175e670eececf1d5cd79228976b69b18bd620532f8c6e22b6b1c45f65718386d96d8ee52c204fbabd73740d09f420f2aa668f7a9b23aedebaf89b0af2a5ce0c9ccbb23871584f319922daa8fa22ce755bb795e5593b48576a436212662245db"}, {0xd0, 0x11f, 0x80, "550578ff0479f94fab49f32ae0ef964e1385ac51dd0e80cc958ce077d776828c89c65afd6b22d912f658999827609865419ca668810135c448337d395621611bdf78a586f4897e5e3e19ff8e169c10f8b73133fd42796780832b8cc5f11f25cc377e5b4c22cf88dbb080717b8d894ca07be6bc9213fe81767be858757279cc96da43b08266ed877272c36e8c9843320436