ffc0000 [ 2352.826414] kmem_cache_alloc+0x5b/0x310 [ 2352.826442] create_object.isra.0+0x3a/0xa20 [ 2352.826459] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2352.826485] kmem_cache_alloc_trace+0x151/0x320 [ 2352.826512] ? cap_capable+0x1cd/0x230 [ 2352.827709] audit: type=1326 audit(1738038027.489:3453): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34189 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2352.827972] alloc_fs_context+0x57/0x840 [ 2352.829336] audit: type=1326 audit(1738038027.492:3454): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34189 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2352.829911] path_mount+0x962/0x2120 [ 2352.831289] audit: type=1326 audit(1738038027.492:3455): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34189 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2352.835650] ? strncpy_from_user+0x9e/0x470 [ 2352.835670] ? finish_automount+0xa90/0xa90 [ 2352.835690] ? getname_flags.part.0+0x1dd/0x4f0 [ 2352.835724] __x64_sys_mount+0x282/0x300 [ 2352.860835] ? copy_mnt_ns+0xa00/0xa00 [ 2352.861736] do_syscall_64+0x33/0x40 [ 2352.862586] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2352.863753] RIP: 0033:0x7f9d60a23b19 [ 2352.864611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.868821] RSP: 002b:00007f9d5df99188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2352.870560] RAX: ffffffffffffffda RBX: 00007f9d60b36f60 RCX: 00007f9d60a23b19 [ 2352.872195] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2352.873820] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.875444] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000001 [ 2352.877084] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 [ 2352.904767] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2352.907046] FAT-fs (loop1): Filesystem has been set read-only 04:20:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0xfd}) 04:20:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x4000}) 04:20:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8903, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:20:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) (fail_nth: 6) 04:20:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:20:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:20:43 executing program 5: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) syz_open_pts(r0, 0x6040) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x6, 0x1f, 0x0, 0x7ffc0000}, {0x9, 0x5, 0x8e, 0x9}]}) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) 04:20:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000600)={{'\x00', 0x1}, {}, 0x85, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)="e5b19c24eda21de222dfdf93f6bcdc931c5cd0e65672c3e3f1a7088f1b4ddb5f46e01fbad639ab039e137bfddf2733c2a09bb53d764d85020d1a1d2ccf8e5152a14b4bb31c79a71ab8d9ef63525e", 0x4e, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x16e}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/251) r5 = fork() ptrace(0x10, r5) ioprio_set$pid(0x1, r5, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:20:43 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) [ 2368.698179] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2368.710800] FAULT_INJECTION: forcing a failure. [ 2368.710800] name failslab, interval 1, probability 0, space 0, times 0 [ 2368.713029] CPU: 0 PID: 34425 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 2368.714399] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2368.716035] Call Trace: [ 2368.716565] dump_stack+0x107/0x167 [ 2368.717403] should_fail.cold+0x5/0xa [ 2368.718157] ? legacy_init_fs_context+0x44/0xe0 [ 2368.719073] ? legacy_init_fs_context+0x44/0xe0 [ 2368.719992] should_failslab+0x5/0x20 [ 2368.720755] kmem_cache_alloc_trace+0x55/0x320 [ 2368.721655] ? lockdep_init_map_type+0x2c7/0x780 [ 2368.722599] legacy_init_fs_context+0x44/0xe0 [ 2368.723486] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2368.724467] alloc_fs_context+0x4fd/0x840 [ 2368.725303] path_mount+0x962/0x2120 [ 2368.726041] ? strncpy_from_user+0x9e/0x470 [ 2368.726894] ? finish_automount+0xa90/0xa90 [ 2368.727747] ? getname_flags.part.0+0x1dd/0x4f0 [ 2368.728675] __x64_sys_mount+0x282/0x300 [ 2368.729479] ? copy_mnt_ns+0xa00/0xa00 [ 2368.730258] do_syscall_64+0x33/0x40 [ 2368.730995] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2368.732008] RIP: 0033:0x7f9d60a23b19 [ 2368.732745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2368.736343] RSP: 002b:00007f9d5df99188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2368.737844] RAX: ffffffffffffffda RBX: 00007f9d60b36f60 RCX: 00007f9d60a23b19 [ 2368.739244] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2368.740642] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2368.742047] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000001 [ 2368.743446] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 [ 2368.745566] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:20:43 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) sendfile(r0, r0, &(0x7f0000000040)=0x4, 0x8) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) 04:20:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0xfd00}) [ 2368.760024] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2368.761678] FAT-fs (loop1): Filesystem has been set read-only 04:20:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8904, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:20:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:20:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400), 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:20:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000030000000000000400deffffffffffffff0000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2368.936276] kauditd_printk_skb: 13 callbacks suppressed [ 2368.936294] audit: type=1326 audit(1738038043.639:3469): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2368.958720] audit: type=1326 audit(1738038043.640:3470): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:20:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) (fail_nth: 7) 04:20:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8906, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2369.005177] audit: type=1326 audit(1738038043.649:3471): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=40 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:20:43 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:20:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2}) [ 2369.053254] audit: type=1326 audit(1738038043.649:3472): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:20:43 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r1 = add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="b7452fcee33d5e858ed5fd0943ced1039f90daf3eceb0024fa55ac108406074a199305ac6eb391d37b6813a1a61daff2672ed9b4e9f327c053c30b684e68b55c589ed2acbc5efa4b87319a4fb18442024ae898f2bb9f6382f7", 0x59, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$setperm(0x5, r2, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f00000002c0)={'fscrypt:', @desc3}, &(0x7f0000000300)={0x0, "06d9d5c1abf55ff69d64adf0c7a411ddd96a81de236c2b18df92ba13dcdedd8f9231092659f972d363c098232611c52b23f0f8b8bc8bd0a24697659ef05a2b9e", 0x31}, 0x48, 0xfffffffffffffffb) r4 = eventfd(0x3) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000380)={0x0, 0x3, r4, 0x2}) eventfd(0x1) r5 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="6a999e7079f21c07731efda590b3bb91f7d776df6f81fb7f0b1074253adf208b48c407a8c4234235e3a4ca363b82d7073edb9641778714112c5f6a72eb75c4571f8cabc9ceba98be20bfd0d4635a2d6cc9a5e5604ec943189d713cd3ef58506c56ac31158b937a6a910cebf291881f61450ac9eef2b5b95a1763386812c7d781121536eeb758ed8ef04e8519ddffa9249552d9d88e67c3309cb1847465d74a9a2eeaa13bd5055e8d333a63e7418b74d2ab96d81a3f98192f7d344b0e67b534ee2dedbcdc9ad8fb1199cabec3e0ed7504d276d9a85a6815", 0xd7, r3) add_key$fscrypt_v1(&(0x7f00000004c0), &(0x7f0000000500)={'fscrypt:', @desc3}, &(0x7f0000000540)={0x0, "416fcf9a36b0391dbf1738b066a76591a2591732ae1535fdad9177a1f4da115dce73f22f719d3549cfd5ecd0a57fbca2ca165df1d7c7a52d6c3beff412c78049", 0x3d}, 0x48, r5) [ 2369.082124] audit: type=1326 audit(1738038043.650:3473): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.088632] audit: type=1326 audit(1738038043.657:3474): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.092356] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2369.093545] audit: type=1326 audit(1738038043.657:3475): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.098793] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2369.099650] audit: type=1326 audit(1738038043.657:3476): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.100803] FAT-fs (loop1): Filesystem has been set read-only [ 2369.105335] audit: type=1326 audit(1738038043.658:3477): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.109270] audit: type=1326 audit(1738038043.658:3478): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34619 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2369.223907] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2369.229043] FAULT_INJECTION: forcing a failure. [ 2369.229043] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.230762] CPU: 0 PID: 34669 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 2369.231766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.232912] Call Trace: [ 2369.233282] dump_stack+0x107/0x167 [ 2369.233780] should_fail.cold+0x5/0xa [ 2369.234304] ? create_object.isra.0+0x3a/0xa20 [ 2369.234936] should_failslab+0x5/0x20 [ 2369.235462] kmem_cache_alloc+0x5b/0x310 [ 2369.236014] create_object.isra.0+0x3a/0xa20 [ 2369.236608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2369.237324] kmem_cache_alloc_trace+0x151/0x320 [ 2369.237961] ? lockdep_init_map_type+0x2c7/0x780 [ 2369.238608] legacy_init_fs_context+0x44/0xe0 [ 2369.239213] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2369.239891] alloc_fs_context+0x4fd/0x840 [ 2369.240466] path_mount+0x962/0x2120 [ 2369.240989] ? strncpy_from_user+0x9e/0x470 [ 2369.241574] ? finish_automount+0xa90/0xa90 [ 2369.242166] ? getname_flags.part.0+0x1dd/0x4f0 [ 2369.242805] __x64_sys_mount+0x282/0x300 [ 2369.243354] ? copy_mnt_ns+0xa00/0xa00 [ 2369.243889] do_syscall_64+0x33/0x40 [ 2369.244396] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.245093] RIP: 0033:0x7f9d60a23b19 [ 2369.245601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.248086] RSP: 002b:00007f9d5df99188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2369.249124] RAX: ffffffffffffffda RBX: 00007f9d60b36f60 RCX: 00007f9d60a23b19 [ 2369.250089] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2369.251048] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.252016] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000001 [ 2369.252994] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 04:20:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) keyctl$setperm(0x5, r0, 0x0) keyctl$read(0xb, r2, &(0x7f00000002c0)=""/198, 0xc6) 04:20:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:20:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4}) 04:20:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:20:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8907, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:20:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400), 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:20:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) (fail_nth: 8) 04:20:58 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() preadv(r0, &(0x7f0000001b40)=[{&(0x7f0000000880)=""/119, 0x77}, {&(0x7f0000000900)=""/123, 0x7b}, {&(0x7f0000000980)=""/160, 0xa0}, {&(0x7f0000000100)=""/9, 0x9}, {&(0x7f0000000a40)=""/244, 0xf4}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x6, 0x5, 0x1ff) ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) readv(r2, &(0x7f0000000780)=[{&(0x7f0000000200)=""/230, 0xe6}, {&(0x7f0000000400)=""/103, 0x67}, {&(0x7f0000000480)=""/198, 0xc6}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000580)=""/209, 0xd1}, {&(0x7f0000000680)=""/189, 0xbd}], 0x6) ptrace$getregset(0x4204, r3, 0x6, &(0x7f0000000080)={&(0x7f0000000800)=""/78, 0x4e}) [ 2383.341390] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2383.350454] kauditd_printk_skb: 34 callbacks suppressed [ 2383.350473] audit: type=1326 audit(1738038058.054:3513): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.363271] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2383.365114] FAT-fs (loop1): Filesystem has been set read-only [ 2383.370945] audit: type=1326 audit(1738038058.054:3514): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.377560] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2383.397054] audit: type=1326 audit(1738038058.065:3515): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.405316] FAULT_INJECTION: forcing a failure. [ 2383.405316] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.408294] CPU: 0 PID: 34789 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 2383.409844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2383.411683] Call Trace: [ 2383.412274] dump_stack+0x107/0x167 [ 2383.413089] should_fail.cold+0x5/0xa [ 2383.413948] ? mempool_alloc+0x148/0x360 [ 2383.414851] ? mempool_free_pages+0x20/0x20 [ 2383.415814] should_failslab+0x5/0x20 [ 2383.416663] kmem_cache_alloc+0x5b/0x310 [ 2383.417580] ? mempool_free_pages+0x20/0x20 [ 2383.418544] mempool_alloc+0x148/0x360 [ 2383.419414] ? SOFTIRQ_verbose+0x10/0x10 [ 2383.420318] ? mempool_resize+0x7d0/0x7d0 [ 2383.421247] ? lock_chain_count+0x20/0x20 [ 2383.422169] ? xas_start+0x14d/0x580 [ 2383.423002] ? xas_set_mark+0x282/0x2f0 [ 2383.423900] bio_alloc_bioset+0x36e/0x600 [ 2383.424825] ? bvec_alloc+0x2f0/0x2f0 [ 2383.425680] ? unlock_page_memcg+0x96/0x170 [ 2383.426640] ? lock_downgrade+0x6d0/0x6d0 [ 2383.427572] ? mark_held_locks+0x9e/0xe0 04:20:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfd}) [ 2383.428482] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2383.429765] __sync_dirty_buffer+0x16a/0x3e0 [ 2383.430748] fat_set_state+0x22b/0x310 04:20:58 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2383.431616] fat_remount+0x161/0x1e0 [ 2383.432505] ? fat_show_options+0xd80/0xd80 [ 2383.433500] legacy_reconfigure+0x11b/0x190 [ 2383.434483] reconfigure_super+0x414/0x9c0 [ 2383.435447] ? fs_umode_to_dtype+0xb0/0xb0 [ 2383.436416] path_mount+0x1ae0/0x2120 [ 2383.437300] ? strncpy_from_user+0x9e/0x470 [ 2383.437349] audit: type=1326 audit(1738038058.065:3516): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.438278] ? finish_automount+0xa90/0xa90 [ 2383.442339] ? getname_flags.part.0+0x1dd/0x4f0 [ 2383.443408] __x64_sys_mount+0x282/0x300 [ 2383.444331] ? copy_mnt_ns+0xa00/0xa00 [ 2383.445238] do_syscall_64+0x33/0x40 [ 2383.446087] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2383.447252] RIP: 0033:0x7f9d60a23b19 [ 2383.448097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.450404] audit: type=1326 audit(1738038058.065:3517): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.452281] RSP: 002b:00007f9d5df99188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2383.452303] RAX: ffffffffffffffda RBX: 00007f9d60b36f60 RCX: 00007f9d60a23b19 [ 2383.452315] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2383.452331] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2383.461683] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000001 [ 2383.463283] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 04:20:58 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) read(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) [ 2383.465475] audit: type=1326 audit(1738038058.066:3518): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.474955] audit: type=1326 audit(1738038058.066:3519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.497631] audit: type=1326 audit(1738038058.066:3520): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2383.515532] audit: type=1326 audit(1738038058.066:3521): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:20:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) (fail_nth: 9) [ 2383.529130] audit: type=1326 audit(1738038058.066:3522): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34781 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:20:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:20:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400), 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:20:58 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r3 = fork() ptrace(0x10, r3) 04:20:58 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = getuid() write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=r3], 0x40) r4 = fcntl$dupfd(r0, 0x0, r1) r5 = fork() ptrace(0x10, r5) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) close(r6) ioctl$BTRFS_IOC_QUOTA_RESCAN(r4, 0x4040942c, &(0x7f0000000000)={0x0, 0xe11, [0x0, 0x2, 0x0, 0x9, 0x4, 0x3]}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) write$9p(r6, &(0x7f00000002c0)="66bfcda8802bda62181edc4a0a56fec30ba83e0c40bc12dc470b7c", 0x1b) [ 2383.747126] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2383.787977] FAULT_INJECTION: forcing a failure. [ 2383.787977] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.791161] CPU: 0 PID: 35010 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 2383.792753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2383.794604] Call Trace: [ 2383.795196] dump_stack+0x107/0x167 [ 2383.796010] should_fail.cold+0x5/0xa 04:20:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x21cc, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="c480e72d13a8"}, 0x14) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x21cc, 0x4) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendto$packet(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="c480e72d13a8"}, 0x14) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000040)=0x21cc, 0x4) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendto$packet(r6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @random="c480e72d13a8"}, 0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="010028bd7000fddbdf25170000003000018008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000001400020076657468315f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=0x0, @ANYBLOB="080001004cf5728f0b7e", @ANYRES32=0x0, @ANYBLOB="148082007866726d300000000000000000000000080003000100000008000100", @ANYRES32=r2, @ANYBLOB="2000018008000100", @ANYRES32=r5, @ANYBLOB="1400020067656e657665300000000000000000001800018014000200766c616e3000000000000000000000002800018008000100", @ANYRES32=r8, @ANYBLOB="140002007465616d5f736c6176655f310000000008000100", @ANYRES32=r9, @ANYBLOB], 0xe8}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r10 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r10, 0x0) [ 2383.796857] ? ___slab_alloc+0x155/0x700 [ 2383.797929] ? create_object.isra.0+0x3a/0xa20 [ 2383.798953] should_failslab+0x5/0x20 [ 2383.799798] kmem_cache_alloc+0x5b/0x310 [ 2383.800694] create_object.isra.0+0x3a/0xa20 [ 2383.801679] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2383.802822] kmem_cache_alloc+0x159/0x310 [ 2383.803747] ? mempool_free_pages+0x20/0x20 [ 2383.804708] mempool_alloc+0x148/0x360 [ 2383.805591] ? SOFTIRQ_verbose+0x10/0x10 [ 2383.806494] ? mempool_resize+0x7d0/0x7d0 [ 2383.807422] ? lock_chain_count+0x20/0x20 [ 2383.808354] ? xas_set_mark+0x282/0x2f0 [ 2383.809266] bio_alloc_bioset+0x36e/0x600 [ 2383.810206] ? bvec_alloc+0x2f0/0x2f0 [ 2383.811059] ? unlock_page_memcg+0x96/0x170 [ 2383.812022] ? lock_downgrade+0x6d0/0x6d0 [ 2383.812950] ? mark_held_locks+0x9e/0xe0 [ 2383.813873] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2383.814979] __sync_dirty_buffer+0x16a/0x3e0 [ 2383.815965] fat_set_state+0x22b/0x310 [ 2383.816842] fat_remount+0x161/0x1e0 [ 2383.817685] ? fat_show_options+0xd80/0xd80 [ 2383.818654] legacy_reconfigure+0x11b/0x190 [ 2383.819620] reconfigure_super+0x414/0x9c0 [ 2383.820560] ? fs_umode_to_dtype+0xb0/0xb0 [ 2383.821514] path_mount+0x1ae0/0x2120 [ 2383.822373] ? strncpy_from_user+0x9e/0x470 [ 2383.823338] ? finish_automount+0xa90/0xa90 [ 2383.824305] ? getname_flags.part.0+0x1dd/0x4f0 [ 2383.825369] __x64_sys_mount+0x282/0x300 [ 2383.826277] ? copy_mnt_ns+0xa00/0xa00 [ 2383.827155] do_syscall_64+0x33/0x40 [ 2383.827988] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2383.829131] RIP: 0033:0x7f9d60a23b19 [ 2383.829970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.834126] RSP: 002b:00007f9d5df99188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2383.835836] RAX: ffffffffffffffda RBX: 00007f9d60b36f60 RCX: 00007f9d60a23b19 [ 2383.837448] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2383.839056] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2383.840665] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000001 [ 2383.842286] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 [ 2383.883681] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2383.895658] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2383.897542] FAT-fs (loop1): Filesystem has been set read-only 04:21:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) (fail_nth: 10) 04:21:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000}) 04:21:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x22, 0x40, 0x3, 0x9}, {0x1, 0xff, 0x0, 0x6}, {0xac, 0x15, 0x68, 0x9}, {0x90, 0x80, 0x80, 0x9}]}) keyctl$setperm(0x5, r0, 0x0) 04:21:12 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c29120000010000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000dc1b00d8f3dc73f426e0cdf7992315f598e4"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) 04:21:12 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:21:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffff", 0x6, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:12 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r3 = fork() ptrace(0x10, r3) [ 2398.247077] kauditd_printk_skb: 59 callbacks suppressed [ 2398.247097] audit: type=1326 audit(1738038072.950:3582): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.262156] audit: type=1326 audit(1738038072.964:3583): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.272818] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2398.281409] FAULT_INJECTION: forcing a failure. [ 2398.281409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2398.282856] CPU: 1 PID: 35242 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 2398.283664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2398.284623] Call Trace: [ 2398.284933] dump_stack+0x107/0x167 [ 2398.285355] should_fail.cold+0x5/0xa [ 2398.285818] _copy_to_user+0x2e/0x180 [ 2398.286262] simple_read_from_buffer+0xcc/0x160 [ 2398.286804] proc_fail_nth_read+0x198/0x230 [ 2398.287308] ? proc_sessionid_read+0x230/0x230 [ 2398.287840] ? security_file_permission+0xb1/0xe0 [ 2398.288398] ? proc_sessionid_read+0x230/0x230 [ 2398.288925] vfs_read+0x228/0x620 [ 2398.289332] ksys_read+0x12d/0x260 [ 2398.289741] ? vfs_write+0xb10/0xb10 [ 2398.290188] do_syscall_64+0x33/0x40 [ 2398.290625] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2398.291222] RIP: 0033:0x7f9d609d669c [ 2398.291649] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2398.293789] RSP: 002b:00007f9d5df99170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2398.294674] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9d609d669c [ 2398.295507] RDX: 000000000000000f RSI: 00007f9d5df991e0 RDI: 0000000000000003 [ 2398.296339] RBP: 00007f9d5df991d0 R08: 0000000000000000 R09: 0000000000000000 [ 2398.297170] R10: 0000000000010021 R11: 0000000000000246 R12: 0000000000000002 [ 2398.298003] R13: 00007ffff6a2f60f R14: 00007f9d5df99300 R15: 0000000000022000 [ 2398.317386] audit: type=1326 audit(1738038072.965:3584): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) [ 2398.350284] audit: type=1326 audit(1738038072.984:3585): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.356443] audit: type=1326 audit(1738038073.003:3586): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.359836] audit: type=1326 audit(1738038073.003:3587): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.366032] audit: type=1326 audit(1738038073.004:3588): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.370862] audit: type=1326 audit(1738038073.004:3589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.376292] audit: type=1326 audit(1738038073.031:3590): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2398.381758] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2398.384511] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2398.386428] FAT-fs (loop1): Filesystem has been set read-only [ 2398.453118] audit: type=1326 audit(1738038073.037:3591): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35237 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="a61435768a3e57e2a899331e19b2d75d72624c8226274ec5ddc3e1ce47e072b401d21713d35e08a89d009c60ee7f81f505253439a4cf63b9d1a808082370bab6a8f1436fafe9be38a27fcb910efc7875ae85481f6f1ed3d5b2f5e23ea154f8aa47a9128334f0289ad35748c59161851102b8554801a741ad35545cf30c36e09689d0cb1b92693ab5c77fe3b85287e3f7040e775e49ac7162b068b522fda299ee4c04370ef032e4e87b11ad", 0xab, r0) keyctl$setperm(0x5, r0, 0x0) 04:21:13 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:21:13 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) r0 = open(0x0, 0x212100, 0xd) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r3 = memfd_create(&(0x7f0000000200)='L+', 0x1) ioctl$BTRFS_IOC_ADD_DEV(r3, 0x5000940a, &(0x7f0000000780)={{}, "521e980c89fcd35f9205f54991bbe47e99ba6f661a3796633421228bb8fb9e8930f3bc8faa46fcc36c5e3ec471ce2861e86778ba21adaa1764df508c65a8ead2874307ce1c741a29396b6e3b58dd6e03e6bb2e07a0d3f5ca722dd347111d422f07fc2e5746a10b2004fb4e28e267d59bb3ce9d53e9341b402793953b2ded898280ba32a612b601c9174216babc398ea968368c903ea69974a2bae0813e93faf767268fc48d84a60f0cf2e7408c794bb445731de80657d2e2e6726f1d155f89bdf1be3e5f052fc5f69cf796bad3f8fb9acd3072efd4e198c79f8ea7ca39858b36355ae52ebd12aab3913ace925acb1dda7c4300bbfe2c116114a4f7bc19f9db49e8bfb4f3f1560e389d5929596836ec966b313974fe5c8e2591c55c4318ca8762f90c878c32e993a6a476e0c4bd356ad2dce3b2f69c61792661d97c97ac54e89bc4b080dd3a0ce51109dffc19cd79300ebad954b7eedacf266879ac9a2c65c9c8a8d5ddbfc0d4345a48c3767323ad4245799354391db3a8076d5cb0f83c65bd40b1ed4606d8942799671e2a37801c6b966c1d909971a81e2f4335333f41ce008e5546a2ba2e669e14e402e5cf467fdfe07f4fd48eebf7d6f325354576e24d9247f976fd8a6486eee76b211baf4ce959ada7ead22ab1e258bd2a4b515896c2797eb2ac49b8fc55e8169277e1f64e2e10140b0f1b040e4c316574f0ddfbdde3b124cdd3dd8695a007b7aa44ca51222ed78a0d886c7c38c008f0c699ce0d1ce708f1757401e72f78f63261a5efaef7fdf2aa3774d5070b19f4c024430668da4dc7f3b1aeb37532196fc4a59804707ab8741a254d368d9903be777c9c21fb629eb6822d53e5deb3c23a612c5ec33e5611e36383173bf8f65738687b6b4e2e6ec23673393623ff801a771565ab2122c664c7a5a72aa868b482ab8b79b7ab90e06aeef3da74ecac0e8bd1579bb1708c1dafd2e64a834d428d23311041b74af7ec89afe6ddada61a30f618daef735e27deb8e9451697c9e7bf7fc6157a015c499dd66cda67d991e5e1b3ac700041050e92256be2b53f3d875e96c98bd072f920894825773b9bd4a988b45c3d585b3069742898f698eabbe4de6882ed2a1a61dfb1abecc9484ce771acfdb7a5e85c54a2061882d622e763d5c9c73f95c008702934823428041ca39319b6cc85fbf3d56033f7274336b16ab2a2437b84689c551d6a55025cdada4128e3a83b5cd0a5f68a314f3421b366c8e43a42e7cb2689a2db09de74dc6f0aa46de189fddddf5b2f0b63d9951357eb2dbf60f940d8eee243cd76af008b562808e2749a93b56b75d1790a1079a9cc2e2bda87ddb23ad1474c9df1e6787abb27420d17c17d7ad3b82b6ea42fcf297931e7c4ced8fe85379f6b9a8d9cf89b325c9da27be6192d33a539dc65096cd9f7f873028dffe2efa5338046dd92b4c12957f96beefdaaae8db64140a06928a5c70f29bfa15fa781739dd212b70770916c9675206acc50ee0e45c9aec90b5993b41b76995305bae1f139b5ea657f9734836ba0602bb2ddd10da2febe5744973f382021b1df4a1c4076d8eeb244e41bf51713370053aafa25c833ee784c42df10e4465679e8ec9801f69eb312713a40aa96b54ef75c30744871163799d9fb89ac514512b086d54a2220e5c409592bcc46c10a615fd9cfbee571f353bd86ebca26d98cb6a1e6321110528d703317c093a6fdb20cdf9dc13edf989486a3aed44afb92f71f3965502af9e522e69a30dba208609d3068de45ed643158c231ff5442a0c6dbc45124277292e5df35194754fd464de3a5818e5f577da116bf9ef6af79fe447699878e1f0eec66d8ad2dc94f4f05536e2a59b6b93997f4d1c5b0cba14d8629367d349f30e1caf06b8f678435e5c06d4501574c0076ba23f6484710d1624c73c0f2fff6f43dae4406c387077dbcd2da0cc9aa663b88749ca64163dbdddab4dfd2f71668d597243f2a12a024380b285ccbb80377a092815e4a41b92bf3106291f98b17bf9cc63551e1406c1c0e248dc9f4d82b66535b4515f546f701816e03f72bbc04a254542782c711be128947a4001bb59a4a218fe1b64817a1834be2470cc5964721858d65683b708f8223b1b906366400c3622d0a55142e4a74c5eefaf38d5d91611f1edc46742639e1ffe098c8cfbd39ecb8dddd07b6583f2ac0fec97579be2c5e409929c5edb3b1856e2934258784b1490c99e2a59146525d9878c9373a32f832b43f71365f6b524dc33c80e3c6d8f91ab85e15702948f470f00fddb9e0478e572fef1beea43d25dac5928ba36d2be1fda1a2cb65864663f12f2283e204cc6b090ebcfb126eb9f96a4c6f474a54f262e2b8c4a66a09d8dbab7dccc043d3650c08328283bb1335a639c22894cd3259b6c99d6ed3d84fa098b0b44e5caeeba6b7768393d11d03a88bdb1d7685172f2c10ae9d7a1c5b71405d00f2992ceb57959d86e32385806a5b89dcc3f578fc5abdf37796cefe7ca0d44a8b0bd003ff18e7ebd60d844df0191e8775400baf0455ed3660200490cf9931ac24ab25b9247f71a36cfdc92f6a78ea6f00bd66fb7c81595bee9d1f32be4c916186cf6abc2c45c0e90174067e048b2c762d00a0d96768a2103e201870caf9916ba78f64035ba818fc218d4a43f4a6428f496d375cc15e62d5edafad9031ae4233d453c3d7013df4ba000b8e08a313b40fb3413575f10c5e832443a5b0ccd71f849ab8d2987dc8899292c483b411f9705c11913e3905452bb10c7eeda579035b46779b0f9b54c03250aa074cb2da9bd7a7166c87296978950cf3fef730785f678368b6d156580e4594e646c1b9476d1164960c1bf6f7a35a0c3d186481cfc123867dec26877287727c8f3ecb1fe0bc0cf158af9999f7d7444d3e32539a4236111f09e44402dbc15a8f8bb5488757e05744356b5026d4da19bbc5fbde8077811a6dbbe30473c013c87ae17b03876d2edb1385378971f39046834c2e7e5b9333d6a03c1bfa9466c4f9042f5cfc5fe5f032726b87272dd219e104b5fe6a52fa4ce66d504737acd67f8bc01687d8737ee45fc7a2fe88e95e86ef3ec69aed339ae96511a72c0a6db02404913863b5dc1038296d48d738b65f56c2a34bf0d9f4dd5aeee14d206ef7194dd383e1fb9adb49b728350b0a27b30980a12ff24dd2b13920fec8d739f0692e35e39f1aaffa099f3158d2cfd8fd1bab4b70274daaec2cc31f49bce262cc5fc95caf633ebf9c1f9405685d48a580f4bacc3d3c1afd12a36f8055bca5a70c47849d8fbbd0d203709eeac2ed3c7f6a5b3107d1092c05d2a3f8983e5837cf973b7d6977a09ee8805eead20bf631b05c01ce7d064011af7a7f284279671e553b888ada7c1c90d07b6e75b1bb4be147cbfee954fa5a2534edcbf9169d561e91414cac43bd4e017e2ed5cae4bce62bb643b32e2fdb795e35b996bf0f46e5960cbab42e1f70f0b2cc18f2bfc6609311480571d5533542b150d47fd5a1a4d1fcacda935e7753e3319634ce9a20ea384f847d2f557b23c1328e8bcc898beafc89cfe129f0fe3aa23a815675c5ed30b1090cafe1758cb808e2c060c6e1bfb6f28aa2707be334de03ebd15ffd26337b5a4d209cd2a4f50ebce22b651622f04bdff95840d5b4ec1de84366b0ec3e46276b292dd075bf1aaa82b9c8027bd0056e2aa30dd6c26a769cb74feebe191109fcd46452c58fded776b5b9026a50200e5988e25838ce8840fa967fdccf5a3c3433d217b7ef3260ce28bb4fe46bbea586d0c42f254aa7c044e3850f6ebb45ac505bd3c26eb71526c5fe8249e0ffa557e45277ca2f2a03c6f7aabcf562bd26c59a23cc1d1f7eae4574a2bc1e3128ac2595669caf0bdc6b36ce57649fadb0b96f07140f5923d9adad407c08e29be82e1b808d3a80863153afe03c39480b010ab1e9528cfb11b840afe03c013c28b5f15f2bfed7dd147a5f06791ef06b979c70ff0b2cfecac358cfd1a5d829f4c5c53d571515c97bbc17b51f7878efb77c07aecd4b2556e9200b4955561c10361618e90c3d0ffea41996feaba2b9c432b4d2a1ad29d73d02a029820edb9eea623b1b81385bc6de3731b28fec8e3bb5755522ff55886ba22d634cf29ac67d149491803eda92f1d97923ff73d0f089f88d535409a967730d449a807caf924d108be112b4ddeaa992a25aaa347f9e659c6bca3ee97862db84282631f881cd38bb6c70e2e5683f02412158a80888c191338d9a9f9d5de0e148e47a0ac6bf30287d998d79a9d00d5e33a09a7086f06a8e7e871071b313d767b8f0c33a60828a5a9b6f02a1c019f8cee999b5c5e75f20d0eecd551a75b8c0be1020e2864fb23bbccf4140177112a3dc28aba456b647248909c029935f5d414d644ef8ec6d31423aaa7e43499139b848ae25cb49fb478ff857918d8bded73cef190b53fa0b8b63aa9c84927ab360631c61df731c0db6ecde8abbc13941b5b4b514ffd3035684fb4a1de0da6b45efa06864fa6e3800dfb8aec17b457dbe8501fd1a064a99be8e7a7243c190cf250e1892171b1a5deaf34c4a9cff4afa23bed9bf0ee568ea890cf5541e9fd61b5ff7d2eabddc60f4b9397c64b7983bca1e1a9c1119f9118b08d7b07ce017f85944242ea4116d2e22cb0aa3b638eb55d225fa2be020a257b0964befecd75e86b6c898654f31e81ac701582d4750fd2c29675b3cc4eb0817640a5c01dcef20f6013f0a1e5c6e1cfc4ebc1d0a9f5c7df2fa867927b3354c855204f6c42c6ca5a857afe0eb7cceea7f4b9b4e6e7b83b57f4dfb7a8c4443c0de0bf9dc8490347f477eeb09d614cc2e85b30085a954163421027abe8d62e6243843edb28f16d34f81fe9157ca7d31d0168923cefceb029ae889389015f7528505b88d57fcc8e5d7942e89fc9500a2339c484461473fa4f793327c4ee55594b7449d6bc59136acd71bcb337e85b8f63f97f8d71847aac974c1d571e76374182129538f80b691f848187aa5b10b758b3df8845bf861a90a336c0103ac983ce9abedaad15d57b44119fd09af10a3bd837b4c8c2f35b18c58a29d6f2f2a73ea7757191348ce90e9b4c1df1291a65e7ee644b020ecccee35698abf935f1fec6640e826c20eed468739e9f69bca94d75a53cfbc0b426e8443b47c165c6a8647a46d9125e0ce26a909ea85574067f34975def985c66a19ac735e8a9abc36abc8e634afb4d4663c427896574b93141d9ab50e8b7bee8b113c99d6fce3e05cd3a52ecb29bd84bb6508a76946e37ac2f0d8c31c1dce01001d4f535972627206c6ebae0bf62ea8d4a80ce3c436724693e06a473508d3515358a41bf16e115c81e73499b8ca43ed7cd262658ba4df06c4114fc86f86592a33472f770c3dc6d700a7af267cd5d6b713d66ba56a9a03910f1b3eaf570408d89d1da8f4b48b1321c889cfb1a3eb65d5982589d02b2ebdfc67011531c6d84cd34cc5334881f08cfe2d2eb87777f7cfb9f79c49cf4d62e304b88ec4fdd46f0bf2cdb2a47e738ebc1c95f574f8fcab7f5357325b5ca23a33dff4d0d5788d88582638fb6df90717aebf9ca3b8357ef65d90226cf59c93548bd9c75508360331fe71f270db9ef68851d20c3bd1d00193dd7fe54f3ea83e7f5392c0484f73194b7458d229e18c5de993def44f351b83fa28c7dd84ae84d3a1f04e7bdcdbb8dd91a92f2d7dfc2317e639ed052043506c6d4bc104e36e786b726da2b44c65656acf5466bc79be65ff742d1897d909a14e743ee7812f0f144ea16c50d395a75159181e1b185a160f9dfecc7fe0"}) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000100)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r4 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r5 = fork() ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r6 = syz_open_dev$mouse(&(0x7f0000000000), 0xfff, 0x101080) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000080)=0x0) r8 = openat$cgroup_subtree(r1, &(0x7f00000002c0), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x810, &(0x7f0000000400)=ANY=[@ANYRES64=r2, @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYRESDEC=r5]) fcntl$setown(r6, 0x8, r7) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:21:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfd00}) 04:21:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8914, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffff", 0x6, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB='#']) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, 0x3f7, 0x400, 0x70bd2a, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x40c0}, 0x40800) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x4, 0x0) [ 2398.765603] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2398.770142] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2398.772054] FAT-fs (loop1): Filesystem has been set read-only 04:21:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8915, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r3 = fork() ptrace(0x10, r3) 04:21:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffff", 0x6, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x1000000}) 04:21:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='^h\x00', 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) 04:21:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:21:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x10021, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000140)='[}/:-*$!}%\x00', &(0x7f0000000180)='./file1\x00', r0) 04:21:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400000000000000000000000000000040000000000000000000000000000066b32ec5c44a1c9c00000000000000000057b66543280ee7"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280), 0x10) r6 = accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000080)=0x1c, 0x40000) close(r6) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2412.913389] kauditd_printk_skb: 12 callbacks suppressed [ 2412.913402] audit: type=1326 audit(1738038087.617:3604): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.924154] audit: type=1326 audit(1738038087.617:3605): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.937175] audit: type=1326 audit(1738038087.623:3606): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=249 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.951998] audit: type=1326 audit(1738038087.623:3607): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.956085] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2412.959925] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2412.961091] audit: type=1326 audit(1738038087.623:3608): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.973387] audit: type=1326 audit(1738038087.639:3609): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.978567] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 2412.980715] FAT-fs (loop1): Filesystem has been set read-only [ 2412.985287] audit: type=1326 audit(1738038087.639:3610): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2412.999390] audit: type=1326 audit(1738038087.640:3611): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2413.015422] audit: type=1326 audit(1738038087.645:3612): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2413.027932] audit: type=1326 audit(1738038087.645:3613): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35598 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2000000}) 04:21:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:21:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x86, 0x0, 0xff, 0x80000000}]}) keyctl$setperm(0x5, r0, 0x0) 04:21:27 executing program 4: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000040)=0xffffffff) 04:21:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8916, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:28 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = fork() ptrace(0x10, r4) 04:21:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000000}) 04:21:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) [ 2413.448521] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2413.457694] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000ff) [ 2413.459599] FAT-fs (loop1): Filesystem has been set read-only 04:21:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) chdir(&(0x7f0000000040)='./file0/../file0\x00') 04:21:42 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = fork() ptrace(0x10, r4) 04:21:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) clock_gettime(0x0, &(0x7f0000000d80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f00000001c0)=""/114, 0x72}], 0x2, &(0x7f0000000300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000340), 0x6e, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/111, 0x6f}], 0x1, &(0x7f0000000480)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000000580), 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000600)=""/21, 0x15}, {&(0x7f0000000640)=""/5, 0x5}, {&(0x7f0000000680)=""/45, 0x2d}, {&(0x7f00000006c0)=""/203, 0xcb}, {&(0x7f00000007c0)=""/225, 0xe1}], 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa0}}, {{&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000a80)=""/208, 0xd0}, {&(0x7f0000000b80)=""/147, 0x93}], 0x2}}], 0x4, 0x40, &(0x7f0000000dc0)={r1, r2+60000000}) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000e00)) 04:21:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:21:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x40000000}) 04:21:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8917, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2428.343215] kauditd_printk_skb: 34 callbacks suppressed [ 2428.343231] audit: type=1326 audit(1738038103.046:3648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.347557] audit: type=1326 audit(1738038103.047:3649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.354797] audit: type=1326 audit(1738038103.051:3650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.364625] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2428.406690] audit: type=1326 audit(1738038103.051:3651): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.421279] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2428.424101] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000ff) [ 2428.425712] FAT-fs (loop1): Filesystem has been set read-only [ 2428.436159] audit: type=1326 audit(1738038103.051:3652): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.456031] audit: type=1326 audit(1738038103.054:3653): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:43 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={r0, 0x3, 0x6, 0x5}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x1f, 0x0, 0x0, 0xfffffffb}]}) pipe(&(0x7f00000001c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x20, 0x8, 0xa0, 0x7, 0x2, 0x3, 0x8, 0x3b2, 0x40, 0x24f, 0x1, 0x3ebe, 0x38, 0x2, 0x2, 0xb392, 0x8}, [{0x6, 0x5, 0x6, 0x2, 0x0, 0xa7, 0xfff, 0xffffffffffffff7f}], "2606c0c3c5aa388df9be2ee9c2d9f9d91d165dcdee2276", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x88f) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x1f, 0x4, 0x9b, 0x1}, {0xfeff, 0x20, 0x1f, 0x1f}, {0x9, 0xc0, 0x4}, {0x9c65, 0x1f, 0x5, 0x3}, {0x8000, 0x81, 0x81, 0x67}]}) keyctl$setperm(0x5, r2, 0x0) 04:21:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:21:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfd000000}) 04:21:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000000040)="f8ffff0fffffff0fffffff0f", 0xc, 0x8000010000}], 0x1, &(0x7f0000011000)=ANY=[@ANYBLOB='@']) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) [ 2428.471176] audit: type=1326 audit(1738038103.054:3654): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:43 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = fork() ptrace(0x10, r4) [ 2428.481969] audit: type=1326 audit(1738038103.055:3655): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.492540] audit: type=1326 audit(1738038103.055:3656): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:21:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) creat(&(0x7f0000000080)='./file0\x00', 0x80) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2428.501576] audit: type=1326 audit(1738038103.056:3657): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2428.641722] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2428.644917] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000ff) [ 2428.646288] FAT-fs (loop1): Filesystem has been set read-only 04:21:43 executing program 5: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 04:21:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfdffffff}) [ 2428.681690] FAT-fs (loop4): Unrecognized mount option "@" or missing value [ 2428.711480] FAT-fs (loop4): Unrecognized mount option "@" or missing value 04:21:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff", 0xb, 0x10000}], 0x0, &(0x7f0000011000)) 04:21:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8918, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:21:57 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x1bc, 0x2d, 0x300, 0x70bd28, 0x25dfdbff, {0x1c}, [@generic="76cd9e81c5d5c8797c8c78f4c1d0d8950d276d27ec148ca1aab147254621374c78e6024fb7840454f45b7752e7f524d7a13b8938407a6e047062d02b2194a8c03046b12487119f617803afc0013ef3a3e6aa573780bd55", @generic="0f7e6e32f9ae4234c8245e62e95d28b339340d14ec96edc013a4cef1309871db56454b516878c06056f85251f882de6e7d6e2372864f8c9715b2a109824a2d705deb25a09287ef10a55c4cd9f158bf4f276ea668c60029ffd85296b2f5e6f932fbd8cc6355760efb1a52a4cabd9b7ab488554f303d3ddd4bada5965845d5a6a7a90a165311b52322b5c182b897b8848ae93cd390a6545d9411c255e48078c623825dce4e78efa243c8aea34a7b235a8f1e0a61e7a8d30eb79a6b8166e2a80254b21d6276241669c1f5c1f4392b44c8c2428598", @nested={0x7b, 0x5b, 0x0, 0x1, [@generic="90543a81780909b643c2fc32898c7d198b56390a3a213578845e6442f5ee87f723b79844fd5ac4e2dcd817a34631ff7e596f02e5cd80b6eeda18f50b215bb501734f0da924ffc24d239262dfd675a23d8e50e94be4a79c78bfb1c5f3a3071f685e06522cefb436e76573c99c", @typed={0x8, 0x53, 0x0, 0x0, @ipv4=@empty}, @generic="6c38ba"]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0xc880}, 0x4000000) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r4 = fcntl$dupfd(r1, 0x0, r3) r5 = fork() ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x30) ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0xffffffffffffff8d, 0x0) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000000780)=""/4119, 0x1017}) fcntl$setown(r0, 0x8, r5) r6 = signalfd4(r4, &(0x7f0000002c00)={[0x401]}, 0x8, 0x80000) write(r6, &(0x7f0000002c40)="1b339201b972e0b5398dae589b5a4bfb74747702049ea9129736b94342fade9ff69174ee47001b10ad7fc81c48f1bf2bed68737d9f5fc1dc72bdde7decff59573ab6f6ae7b5f784cc6e457b066658727ecbb27bfd0507a38bb0262603671b8a98000d055e3e555189ebf1c77bd799bd494e0a8888eabdf624186f45d73b22c1930897a219d47e834e732a7c580b1c1ef8cafeefe88714d1728413fb1abac002cf4b25fe580956c18fd295735b203e6f1a495", 0xb2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="010000002e2f66696c653000"]) sendmsg$inet6(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000240)="988311b0d825f3855adae2e2c2aa39272409db7663c2f3bf9741f68a0f7851d1967c9d226080ac341b1dc572230377c60e226cd88dfceaf2d6be61db79ab4622e02917be6803839bac5915d5efd1094a0003b7d2d3aa2fa094480604cd2ed4dc", 0x60}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000005c0)="e0c13b99aa76957b89c97a751cd551dc84aa4e454d55a3a53dac9e359c14a01e7c1ae9d78bbb21339e27b26540fc6b0fe9d201e82f861287b8517b31a079464e074f2f471a5131dffcca0023c361ec929fd357db1f29c3adf0eea7f2df76b18f2e3b308678e3b97d83d9d5f01d865ab19d680ccfa9b0e0fd969efb726d42208759a3cab84e1b232d17adf72bb91b36bf0530ec88f0e13fb57de2a98e2dfd8714df374ca0e3fe7b22ba002fd144c2a1c5beca6419735914e6c933cd93ec91364326a329500b7896100d6da17a13cfe7bacb111503700366", 0xd7}, {&(0x7f00000027c0)="45feabbd2fec8be885f1a3587e9f833af31230427e965ed5696c656627a8b8a8a941ce2960b3f781f130f37e4ef09bf44a3e794e8211931a18304f926ddc071d18925d1b293dce9c13d3d9e901d9e4755b7746b0c87499c5d6ac2feed7d6b5634041006970b599a0f42b6a269209ebc96d1faa62f87b1bcb2c20e1eae8207ece59092c8cf6d05cd24894d9f01be8072830e52a5a24b52276e1bfe923f4bf3f94f86357ad1d54909f5d3d2280e6d2ca04122e39f9ca0f7896060c6d29f1346c172b81df05366aa18bd4fd933969bd01a6f7a32b83946af3f9bfc2b880786f8a90bf3d5e136d54b858808b177ede8a", 0xee}, {&(0x7f00000028c0)="6f887f73747ce62b05d4ed489688a93f453aa3315f243ff3414844d9910601b8efbc45d6fea8a651dc5d20816efbf1cecd343ccdc0a22b07ba695291599abe837292297a05818562e9b76a9f0997274d44ca38bacd0fc94363bb8d90d84c88017262a56e12567567389e5771d3d47298835ffae2ff9d605738c56fa407762dc1ce7a80bca9d3703c3cf373b131e7f9529559f13ad83d5765d697776672eaf94476df7d697b7baa1896ea7d955994a65eccf9cb79a0d00b4d6c7a0a5792e7f2f939", 0xc1}, {&(0x7f00000029c0)="072692888dc335079e244635b3a87f48d15fa8de205d9e09edff6c3aefe3cc97d53df967f32756e659aba998d719dd13c3a6238038a572fdfb495f81ddc3b9c40abcc428293cf87b752827cf2fb1a807cc18479f7921f71a60437fd5f8617163368f10c8e32287fa5674af90e6ec435ab535f44734dad9433c6e2bc3138fd6028b8a06457b147e385a8c67516f04c86ca1a9abd66d624d7aad7738a16114b2f285de25ccb467229771c79187ac2f9292f9fbdb670a911cf6f50ec885c9", 0xbd}, {&(0x7f0000002a80)="41d507ccbc9eed185db0206f8ff8da34b32bc4a130ba42634c263237cce4dc02cdf25687b46905536d90028ba19208ba37178f7ef17feb567acff01da47cc23f1266a6b77c5a52e00cf52733faa3cf7856a71bbdf2b3553ff3689165df16a1fb649d8bc9bf0b45bf87bc5976667cda9cf3a7868d40e4423fee82dc8ec3323e92363987e2695b99323d9041c2d98ae10d55", 0x91}, {&(0x7f00000002c0)='J', 0x1}], 0x8, &(0x7f0000002b40)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0x0, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x3}, @jumbo={0xc2, 0x4, 0x4}]}}}, @tclass={{0x14, 0x29, 0x43, 0xc1e}}, @rthdr={{0x28, 0x29, 0x39, {0x2b, 0x2, 0x1, 0x3f, 0x0, [@remote]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @tclass={{0x14, 0x29, 0x43, 0x20}}], 0x98}, 0x4040044) 04:21:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffbfffc}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 04:21:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) rename(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:21:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfffffffd}) 04:21:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0xffffffffffffffff, r4) 04:21:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2443.199259] kauditd_printk_skb: 35 callbacks suppressed [ 2443.199278] audit: type=1326 audit(1738038117.902:3693): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36322 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffb0000 [ 2443.201193] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2443.230659] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2443.248155] FAT-fs (loop1): error, invalid access to FAT (entry 0x00ffffff) [ 2443.249849] FAT-fs (loop1): Filesystem has been set read-only 04:22:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff", 0xb, 0x10000}], 0x0, &(0x7f0000011000)) 04:22:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8919, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:22:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r4 = openat$cgroup_freezer_state(r0, &(0x7f0000000100), 0x2, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) statx(r0, &(0x7f00000002c0)='./file0\x00', 0x100, 0x100, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x402, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@nodevmap}, {@mmap}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@access_uid={'access', 0x3d, 0xee00}}, {@cache_loose}, {@debug={'debug', 0x3d, 0x100000000}}, {@cache_loose}, {@nodevmap}, {@cache_fscache}, {@nodevmap}], [{@euid_gt={'euid>', r5}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_appraise}, {@uid_lt={'uid<', r6}}, {@euid_gt={'euid>', 0xee01}}, {@fsname={'fsname', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:22:13 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:22:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x1000000000000}) 04:22:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:22:13 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0xffffffffffffffff, r4) 04:22:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) [ 2459.002852] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2459.008031] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2459.010509] FAT-fs (loop1): error, invalid access to FAT (entry 0x00ffffff) [ 2459.012205] FAT-fs (loop1): Filesystem has been set read-only 04:22:13 executing program 5: syz_io_uring_setup(0x124, &(0x7f00000002c0)={0x0, 0x9a85, 0x1, 0x3, 0x2b5}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000340)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000003c0)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)='./file0/file0\x00', 0x49, 0x14802, 0x23456}, 0x101) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x14880, 0xa) openat(r2, &(0x7f0000000040)='./file0/file0\x00', 0x5397c110d75952b9, 0xc7) keyctl$setperm(0x5, r1, 0x0) request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='keyring\x00', r1) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 04:22:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x100000000000000}) 04:22:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff", 0xb, 0x10000}], 0x0, &(0x7f0000011000)) 04:22:13 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:22:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380), 0x0, 0x5}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r5 = dup3(r3, r2, 0x80000) ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/202}) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2459.191137] audit: type=1326 audit(1738038133.894:3694): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2459.198882] audit: type=1326 audit(1738038133.900:3695): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2459.211105] audit: type=1326 audit(1738038133.901:3696): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2459.225505] audit: type=1326 audit(1738038133.901:3697): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x891a, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2459.240279] audit: type=1326 audit(1738038133.901:3698): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:13 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0xffffffffffffffff, r4) [ 2459.280127] audit: type=1326 audit(1738038133.901:3699): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2459.291167] audit: type=1326 audit(1738038133.901:3700): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2459.297636] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x200000000000000}) [ 2459.300664] FAT-fs (loop1): error, invalid access to FAT (entry 0x00ffffff) [ 2459.301754] FAT-fs (loop1): Filesystem has been set read-only [ 2459.309408] audit: type=1326 audit(1738038133.902:3701): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2459.323977] audit: type=1326 audit(1738038133.902:3702): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc}], 0x0, &(0x7f0000011000)) [ 2459.353203] audit: type=1326 audit(1738038133.902:3703): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36756 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=249 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="3e324934db2ac33e75798b8c982f91f69fa5fa11c4654d68e9d34a6345d71b05ab8343da7c779f98a14bccd75c32e8952b9b073ee1b6b464a3fbc7b331c91c3d6666214c467a3683707395cddbaab08a4d65dd5fc061a65355d189775cfb5fc501cb5d6cb4a26e073bd56118a9cc8301a56b57290055ee97", 0x78, r0) 04:22:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x400000000000000}) [ 2459.522630] FAT-fs (loop1): bogus number of reserved sectors [ 2459.524120] FAT-fs (loop1): Can't find a valid FAT filesystem 04:22:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:22:14 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x4, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0000}, {0x4, 0xc, 0x80, 0x7}, {0x3, 0x0, 0xb1}, {0x7, 0x7, 0x81, 0x4}]}) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x6, 0x4, 0x2}) r2 = getuid() keyctl$chown(0x4, r1, r2, 0x0) keyctl$setperm(0x5, r1, 0x10104) 04:22:14 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) fork() ptrace(0x10, 0x0) 04:22:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x891b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:22:30 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) fork() ptrace(0x10, 0x0) 04:22:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:22:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc}], 0x0, &(0x7f0000011000)) 04:22:30 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) ioctl$KDFONTOP_SET_DEF(r4, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x17, 0x1e, 0x164, &(0x7f0000000780)="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"}) r5 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200), 0x12820, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}, {@fscache}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@nodevmap}, {@fscache}, {@cache_loose}, {@cache_mmap}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 04:22:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000000000000000}) 04:22:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 04:22:30 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000002380)={0xffffffffffffffff, 0xba17, 0x4, 0x1}) r1 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r2) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x88, r3, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdf00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x393}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4080}, 0x8000) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000002640)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002600)={&(0x7f0000002400)={0x1f8, r3, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xede}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1a45}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffff000}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_SOCK={0x68, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffff9e}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfebd, @private1, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x42}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x14}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff60b}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x77}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000003c0), 0x4, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@uname={'uname', 0x3d, '\x00'}}, {@cache_loose}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@smackfstransmute}]}}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x101}], 0x0, &(0x7f0000000040)) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x10280, 0x0) mkdirat(r5, &(0x7f0000000180)='./file0\x00', 0x4) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x25) [ 2475.957525] kauditd_printk_skb: 39 callbacks suppressed [ 2475.957545] audit: type=1326 audit(1738038150.661:3743): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:30 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2475.974928] audit: type=1326 audit(1738038150.661:3744): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2475.985459] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2475.986745] FAT-fs (loop1): bogus number of reserved sectors [ 2475.988713] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2476.010129] audit: type=1326 audit(1738038150.674:3745): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.026404] FAT-fs (loop4): unable to read boot sector (logical sector size = 2048) 04:22:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfd00000000000000}) [ 2476.096808] audit: type=1326 audit(1738038150.674:3746): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.138550] FAT-fs (loop4): unable to read boot sector (logical sector size = 2048) [ 2476.149189] audit: type=1326 audit(1738038150.674:3747): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.182771] audit: type=1326 audit(1738038150.677:3748): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.205534] audit: type=1326 audit(1738038150.678:3749): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.233872] audit: type=1326 audit(1738038150.678:3750): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.257578] audit: type=1326 audit(1738038150.681:3751): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2476.279577] audit: type=1326 audit(1738038150.684:3752): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37033 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x891c, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:22:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 04:22:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) syz_io_uring_submit(0x0, r1, &(0x7f00000019c0)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r2, 0x0, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)="edaf3e650fe146c43613f4621d712557c932885182f6a8663c5b9f82609b5eefbab787853f759845b3f9b60aba9576169e2713a9498a88441f7fe5fd956ecb82251ef72819bc447c751d750252bdc43e6b0c4621e4fc620c88787d25c0dd0082580b2ad05ea1a75e357187b014147e5c3ffafb7ddd7ec3f2", 0x78}, {&(0x7f0000000240)="ebbde41d0631db40e8f8ef24caee3d5499a03c49126aa4ab9c6f42db8953925e08024e022324cbec3e5c16359c1df9e672e66c9d7d7dbb3616ac32d78c7dfaf33eeb02024111a0a85e2688de62ea55c43133a4", 0x53}, {&(0x7f00000002c0)="e1a7a2b954932f59228a4e35bcdecb50fb1ff795c0a3c3f87f70dcb3679e54074ed64211e1295bd59a31e1a268a7b29fc7b6e53d9e17d2e59ef3c81bb26d1a20b70972b961", 0x45}, {&(0x7f0000000340)="efd06ff04cb4ad76ff13db31695d0f099c00e34d6c891393e172804ce82a84b28b6c02bdfceadd9630dbb9848cf0369bd85513e48d542baf63e2e6ce2c10bd2428376f3ced9602c91baf5afdf925fced3d575aec03f0d45ac975e0c7f800fceb4be21b04c7fbfe9ab1ddfecd2dc0a752b875412c8b3adcb906322689160f31f0e3f024cfb01b6ea38d08287fe17d06efd7e8847094c716d14b2d8ea28825cf2dd4445f9071af5d63967a59512faf3719f9f3bfa3933ff62a9c3b91b4e672958b57c5db04741f5c93976abb724c585927cae6afa9835dd054f1d8ff28f587b3b7", 0xe0}, {&(0x7f0000000440)="3206489841f53f8adc236abb0ed802b1a6dd77275ee528c8e5b961adcfe0c39b780bba4b7261d2dfb7f4fbf5c390599cfc350576dae8b9c6e818ff6884f9937904edc97c0c0c77207c07", 0x4a}, {&(0x7f00000004c0)="5bb980a35369ad28460092dcf1c8c66e955b41ff940642dbedc8f2c815f146d1188a54e062445f34526c3151a65f61588dbfb7f54af2ab8be14fb555603db3f5a1569db17bde9a25ae5a27885671df2638b60baff80d60fbb12e4ce3cd92844f66e543e194ef867ae9afec24e1ee057e6cfda86271171f21fc1b8c3049e75b41b48459730fceef575f1458d7152121116ce5b0a3c09a71d16b843480d9b161d3e0f166174e878a013e33d9fd4ed6abec86d2e9feaca6829c413034155d91a5ad9d8bb6b7d084c653770bebbd", 0xcc}, {&(0x7f00000005c0)="b60117eeb3a81f89c806434f50c31b4c029311f63f471b002d19048b344b2455184dde8e59da015671f9e04f868bdbf8e8f4d646e1a241d0cbe24e8801a66381b4fe3c5be94a050874df2b3d30f4c4ad65625e76f46daf27fae5608154d454d236a1877ba19510ba5f482d9e9baeb568fd58700d247f5d858cfe619c9d80e4f03f61a413999b5874ca0067dfb3798c0cb77c4b9b990424bdc3dd98fd79f38bb7ad86d522307896b9a22a44ace649dedc43d5c6e9ab524571e997dce3853046d2a623cf89206e0d69a0355de18597bc73d986ad113cde9d547704920e4b900aa144c405c01632bc", 0xe7}, {&(0x7f00000000c0)="66b2bb7b54c583d40b", 0x9}, {&(0x7f00000001c0)}], 0x9, &(0x7f0000000780)=[{0x110, 0x10f, 0x5, "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"}, {0x1010, 0x115, 0xb4, "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"}, {0xa0, 0x109, 0xc4a, "e194c95b6e9ecaf5834a78413aa696011c502d85379e1ce6f7463c5817e4f991c2128b824d8cccafa8ba4e0b8c8ef975bb07428d3f4bf2c14e2e17df74f29775b359b0cd58fda46577db2c7b59235bb21376a4d796a225511c8033fee86f9486e50f69097fefd0ff29f4d31080bc21d0f0d2019a9f8c6b2c55aab4d7c2b50302520585e336c228ae69b1"}, {0x20, 0x116, 0x1c0, "481c17085bd5ee4976"}], 0x11e0}}, 0x7) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x46) 04:22:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) fork() ptrace(0x10, 0x0) 04:22:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfdffffff00000000}) 04:22:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xce}}, './file0\x00'}) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000000780)={0x0, "7bbc1e41b1f74f894fca37e82b3a4f44"}) ptrace$getregset(0x4204, r4, 0x1, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0x1009}) 04:22:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc}], 0x0, &(0x7f0000011000)) 04:22:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2491.570615] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2491.581559] FAT-fs (loop1): bogus number of reserved sectors [ 2491.582738] FAT-fs (loop1): Can't find a valid FAT filesystem 04:22:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x77e, 0x1, 0xb9, 0x7}]}) 04:22:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:22:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xffffffff00000000}) 04:22:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:22:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0x82, 0x2, &(0x7f0000000140)="8b640779338439f45a472ff15a9863e7f1e4d41cd876f99a33bf29322b64f9d2286278a45c0e2c5d0f1fccd36fc71c87e86950b7c7d6bfd81077e025a92d7abfa21847f120732328e10d73542000efc71705cdcc46e9e000ccf70ec70fd8313d3c8ca554a063ce99b67f756ce94c2c0b903eab1320143032fd6f5ddc95a84b9c32058993627470ec4d7ffe80b4", 0x0, 0x0, 0x1, {0x1}}, 0x3) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) [ 2491.851047] kauditd_printk_skb: 2 callbacks suppressed [ 2491.851065] audit: type=1326 audit(1738038166.554:3755): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.861133] audit: type=1326 audit(1738038166.555:3756): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.866134] audit: type=1326 audit(1738038166.558:3757): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.871249] audit: type=1326 audit(1738038166.558:3758): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.877097] audit: type=1326 audit(1738038166.562:3759): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.882571] audit: type=1326 audit(1738038166.573:3760): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.888735] audit: type=1326 audit(1738038166.573:3761): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.894103] audit: type=1326 audit(1738038166.582:3762): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.900814] audit: type=1326 audit(1738038166.582:3763): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 [ 2491.910150] audit: type=1326 audit(1738038166.586:3764): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37462 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4d5f5bb19 code=0x7ffc0000 04:22:46 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000002380)={0xffffffffffffffff, 0xba17, 0x4, 0x1}) r1 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r2) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x88, r3, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdf00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x393}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4080}, 0x8000) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000002640)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002600)={&(0x7f0000002400)={0x1f8, r3, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xede}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1a45}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffff000}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_SOCK={0x68, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffff9e}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfebd, @private1, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x42}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x14}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff60b}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x77}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000003c0), 0x4, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@uname={'uname', 0x3d, '\x00'}}, {@cache_loose}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@smackfstransmute}]}}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x101}], 0x0, &(0x7f0000000040)) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x10280, 0x0) mkdirat(r5, &(0x7f0000000180)='./file0\x00', 0x4) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x25) [ 2492.019173] FAT-fs (loop1): bogus number of reserved sectors [ 2492.020554] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2492.024638] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:22:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x2}) 04:22:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8934, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:22:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f0000000080)=@v3={0x3000000, [{0x8001, 0x2}, {0x5, 0x9}], 0xee01}, 0x18, 0x2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2492.057566] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:22:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x1154, 0x30, 0x2, 0x70bd2c, 0x25dfdbfb, {0x13}, [@generic="629f2b9a09fb48e5e455a8bd5f7ff4ea7c4ec327126ca454ffd4c8c1652b54b26e07ca73f68b788b62483e89b7732d1b88a08bda27a78fb0d487e03aba558de84f396231fb11929e62594328fc8c75c475e3926440d37017be5673e90f03b1ff6257d2cb9fd560554422a377b976012ba9192bda806876df1bcb409d282f4fb29c494301bfbef2b2ca8053185fbe5aabe14f43c1cca5749d894d00d0a9693f32c1b242679be5831a43265cbd5839e9a8797bd005e2599e29845fcd047166b2e65e9294b7a1e6f09786527675fdf4b983b1b0faedb1", @generic="5e2ded7e72cf9c9abf79d7c91020946727afbb74b0921a2c173144632eba1bb60e104350e092350443bd03295202aecaa634a276793ec9da9fc085c1269fb68fc267ecbb4881d4ce6705840ea2276451adc7342c5babfaa56ce56edee78fec0e11", @typed={0x8, 0x8, 0x0, 0x0, @ipv4=@private=0xa010100}, @generic="159b606ce62166d6cfec7d1ae772bb52edaa3fc45a6924ae0f452038e0834e1c8ee7c93c1cd5e4eef75da1726e9fc556e3e412920a26bd2b777f0817d9132243ec469b58957c1b446b059d7e37b6e00c41120ebdc83554a0d1d02450ca97c82efabb530798b7233d7e3c446bcbd9d274b480124012ac2275241e5983395b1f148c2a4a6ecad4da089687673960db4f2ce08e3042ec4df36d20a25b6e654ff62b69c7f1babc38e4177b669d87247cbdd5f6ed5c4b14a424c0a2c96f095e447825f09c22a1c307f14d01a458daa3b5daa4919619a9363655f749ef62fdbafe2748587672d572ccd54a9862be1cf4f2f997f0963028c93b97f394aaa05d8c3f8465a26438a4b06f945d8fdc0fa92bb4cee9e840356a672e074a2b78a9dc9adb5c38a1b0d25131ffbe2383d80785633536bd23595bc0c79460473635e659e59cbb4ef66fbf3a3a9ad692b357b9c36d67fb717c4e789769271a7d9daf2d990aac7a55efd3764e90394d12f744b934537b962b86cc86f2ddf80c685f21b3fee2cd057b8de05b92a8888c3e4065bb81b3880dbb5dcf2c092dbd86a488ea9fc7f7ba87317b244ffce861ea7dba207204d8a481b8ddab2f8da03f53273dd724f6c10e243650c7f33fa5b3cda81f6fcde16f112ad6b88554c488b49e77a0771a55ce5c388b558c83cb0a3297b425376dd4cc5698e6c1303f82f60733fdf953d66faf0e1e10c934f95ee2e5f1a604d7fa80efc243c722a68e8aa65f393b92325389e7f58e6daa6e025c091ebdc9b21733f25e6ea9c43d25be747996506beab70462315edba2a29238424fb4a37151d37d9c88c6f407caf51f6d97f6dc0d1b677dd3bbf3b0100dddbb5eb8cffdea6a1aca140cc6ff67002e98d1b8b5e75d58177c9ab8a19725135009a2c8c2e703c50193219ea723e960a07366b866b403bd497c9595d5ccfa01f928c1864901f1aa2668d77dd8c6c94389e118323c02bb4ddf703d9ca0d37c7330b3c745c37dd1638242efcf9382d9b7620705ecc728f2c678f3073c8e25b60102f41f9862bd35ff08b07a311e89191985cf6f18fda0b75681a6d223c38201aeb3eafcbbda1eae6397dbfbeb6ce315fe257f0e0206a6946f73e159c467e734644447519298ac3adfea0cf63ec29a2004c31738925f1607b91515edf085b7023baffb31414fe0e8cea9d4f8542af5cb39d3bb027ee7a8371cf2300adc0c2b966c029ad0dc2b536ce92a11a9878add98504247228dbf1a296213f764f069fea018d280c9d077d86b355f9ddfcfee5ebb7f6e10d13728091d38ab5a78be59f61a581fdbad008ff9685b760deafc904749487a9091e8a1c69fa1d8bf7384f82eb69dbad872517f4ff9ff0713c4b833cc5949fa2390c0522bdcf2168124bdd50f10b912f4b08e7806695781faa6904a4982862e0c21dc1e0746209fcfa835b950043d6982b7d0037b5bd8c9867e76a57b60addd418a3b0e025c85888d9c0910a233dcf16524c2d0afc5043d54506aee3ea0b9b808cf0630104db1f940db52774eefad878f216b29133b3f26e9e144886c78327b31f238744cda3ca5188306733abeff33319ee8708dac0f16721fcc20d44d3dfb8d412f1666e69f3cb4f99e16f88707539e50414b89cd40950655d39a2e3bc6d747fa5f21e3c3233ac2ce3daa91014eb8b06085da9a5bf1b648e33fb261c00f788d72a3dd9c14cfd84ac9ddaca1542603d84961e68b30b96bedcc39845f2ee5358b902739dca7117ca2cc665058dfa9529dec52a755f0de86381fcce1bf6fb12c79ad17437bc3b3d4178f7b5c444b7baeef936ade10b16c88764d80fc82938e1e82b4f4d2bec93a4906221f4921ee9160a5864db9e065dec8785d308ce95a95e4f751eceac3753ef74490de8fa53fa3aed8a032c3660f55627372fadc9168757cf6a81f0ce06abce5f80da5c78a1a2c1c77edcd5723b07118a003efea8839e47f4233a58e04fd1ff06f3787b4543892844c1fdadc5046d0ab32f2bc3936fc4b1f8b31af575242e25683f6db8a9c69ebc2088849400ab16cf73216f93375cad509ba2f472d12b64d21c125ef6a49cdc3aa496a9ef74a863ee182d153ba45f2976d2666087c0fed44b1cfdd363824780166fe5c08ffa51207af5b72bac50cd84dba23d4155cc48e9c39fff678c2fb178f8cd9793d10abd73ac0be1320c3a58dc50c3fd834317db1892cfcfb45aeb21f4d6690d33343ccbed14e0dbf55eba36ae9b4f165d87996d37c5fec3532409da26d8a9485c9f3541bf7399dd4db28122b6db0cfb5bf390986ae240aa82b4ae0ced2f734c7ab9a67b93442636fb2202737f86ea7b3fbcfb3a938ffb5aa13921d652a49a404045454093a7340d926c5550ef19b545250ea29023f1187856a0a28e483da40f75ac3939268cc38c87f4803cee41db441fd951a4656847b398a34f175fe06a7a39fd5d921cdc0418d45c4b886c851ec788005dde9c3f3db21e84b424c4536be67b1924950834a07a2776474eb4f49605e7debc2c84cc97e991c4cc75a90fe1aa9afafb7b645e51c3ea9d9820b901cff7d57da247bb084899cbfc118cb909e55a1bebf61371c77f8367fa5dc9855d9f7b70d10ebde3a731a740faecb4cbd86a0440c2e697459b47fb816f2b04ecfe638abc845b707ef0ec819311f748ed95d433a93cfeb750f25718aa5aedd6fed54ab289a6a64a2023a6583b9d40fb8989df5f56cdc349271b05ce636fcecb249219a91efc7c992017f041f69cb05f8bcc93c8616b6f97e65b3838261fb729e607a8360033b2e4f7761d9dd8f09622feb5b0a819921458c5ef7876a23136dd6f5403a4d31a3d3f8123df7c84299fc4a0b1570c655d04bae95f5e5975a1f488d6cd1676ebf04d52ba60740e22d13cd5fad58d2aa9e879d2ebf7fe077cc92179c634b2d62d6c26605d7060a0ca9f2a745b5d9869d74a260635d3256dc5705b3af39b7045e1dceaca5e9ec542e6ea41ddeff543500b7b222f38d96e5d5391b871807e15bb6a0d1bd05ad59abf77b12093fdba96075bc741cf1c7ae21e9ddd6ac3a9a1936776b118075a10b21b73857ce2bd67d28df6c672935f010faba6f5c3ff86d8a03cd6e02afb1f25ee58f26d49f5a3ddea7638444e2c0cb9e54df487bf773a88c7efbc01f3ca8a36f5caecc42c9449595422efb6bf46292dbd08cfeb6415b9e930f06504cca7e8c14a19afd4178971f99453ea185ad0d6c53171e8e97a8ede55f68c1b07fd38abf1d7b4fa28303cc67adc8c23252963ef7decfbf2b30e2b27c629acf40b9cef3b33ab86babbe0815a20beecd38b0e334c519944fd061797096a25206a2518c235638533e289952f9e6f81fb6f1661e30f0f08fcb93e28f6d2760b2b3eb797b6ebd0b2f022101761817218a0a65588703eaca9755d1fd1d9a5cda26b74fe0efcd76504be1aaf5a23dd9efbaf536cd499cec9941a05c15f02304ce3536f0574564a80b840a693aa9fc7f0ece10fcd87709667117fc81d6226e40758a70a93b4bd2ce94b885ffbd09d0d1ebc612caab944cce15fa015daab1b79941bddd995f0df69df85e8a610d6fdaf993887be285de3c2ee9fad897eaf4c2b9ba2b35056a18ae8d707280ea938f65b622e67e78aafd383e429fdd4b15216446ea0dccfd60a20da0d1bb5ec98e60ce0e86e433f186452deb3aa5dc7e1894fd56dd5820700ba9f671bde2d6e8ccac84850768a7d7eeff21193cd0ae5d7026beca4e66debac692c43730d3bcdf61413cc5f90a503b89a83aed9d83fc95389dda63458460cccc5d5f09f4d640477843d373e3789a5ab0444cffcc2da3e65ea5dcf4de4ed7c3e373328940c8b0447af4ef773aceece8124bd3fa8ee0be25f053b0dddac46fe2badd24621169920e8b16fe17a0eb46e4c62d1381f07d955cacf7a3ea076332234b213557efcc33582bd68834c1212944c295fe0698b2cde6a006dc64fc61f77e9136d19a147820ac374431a0601daf79e72be44de150bbfce10638f1341da79db553a1a79af16c1f145ab7f989190937f1c335e9705dba150be9fe611d8c357fbb04d1418cd5a31df7b0b4979c1bfaa61e18154988dc706d91ba91e4eec91926aa79bf3f958c7331613c8e6b93109831500589a306f0feecc213be9f60c94a09097d5c75a6082ebb9d4d40e55212bc11b00023789d44a7a2c1e8da75c5ea1bece6d49b85530b563c39588bd413943f3ee1136323180c5b92d3e71b4f29edb966638108de2a9002bf9c086bd268e42ac869bdc8effa673a902b2573d93e583b27d393a364ccd1288bfee9d093a4fc9aff6de80dcf998f2949494fda566af711818a273d0a8ba21c07909d85ea330c5dcff59a9c42b210faf7cea584a72bd0c7ebc5baf97906664f7805b1d824b847e853310121b6a29b4e16d1cbf3f8b766b36845e8612d47fabec785e5e292ea996fba5ef832ba3b646d8d11b96a6ec2d12064becca686bc09c604fdf671b4cb6c41c324e3b701de72d78852c58379795f0ef9d35ea55b5f65ba8c4d9022448393bad14f3768961b8287474f9aa41d3e7283c7baa771e15a742c734e456ee2de6dc109ec08eed7550168c663f722da3bf24e06d0a64a94f6d4ecbdd410ad145a7a29430f9e6fa66227253a5d766cb056c9b1f626c9c6bdc53aafb3d3ff995651d8b2eb6c1f926f916fb88730dbdeaee17cbf7d739f714e9749d4a33d39c6152457e023cc5d22cbea49c80d5b407b5fafa3ee17ad1afcaeab441f860ecdbd249271b48d18d83be9f79bc2fc70a99cdf87eb6a337467591182d5f47aed5900b519e1aa75fd43eff9e015e15fce614adff3e11700f12f9246335c10a4d2435aca8c724b0890a31987d67805a70b35e7a5d1720af616c58a51f34b92ece20abf0c93829600bd094716b8197bc5764bf140d1b81376d52178f46cbfa07ef8043140383818a1e0cff0fabdcbe1be2ee02a5cabf7946c82ab478364c832ca03f263b5ebd4239f0b5a4a5185f5c1aed192af0edea58433c06b1415af90e2c2889d5cbec313da62f6494264016cdd709bae745f416cc598c007a4e67ae7acf1dfbcaff24321bba191d6c2895af3dca78b5888f003debe44a5d53c4c5ced086416c613e344d96b58d47609f615e6d44aac81a6fb7cce988820bc3c07bb1f26c1e5403d41db21ead81c8236f2a0ac1e3dc9c7af6bad2b63359c3b4d7a9bfd1d71fc544c7eeb51b10d9b8e7244572e54df4a56ea859b535d10c2891c1fee26f00b59e359a0edb9c53cf7387c2ded426263b7d603767346ebdbe81e368f1077e100ab58dddbd94072726e08dcb459da4cb2386273f411599dd76e8655ad0483cfdfb49f94f5c9ecbbb94f3aad26f53b51858f876cdc15f9cdf7feb0b5a9b63f810e3ef3d732a19876d36a2802309836d8325d2cbb9a3147da9409682b9dd82ee02bb60a9053cd0275b2a1aedffae7e3ae10e90296eae491278b48dc6ab95e46b1b0b8396de36b2c21cde2147b9e74822766da82766aacf6cf91229b33cf31c499a84a45d8f7d42fba05a8b32bce7773a7579cc4ef1fbe9b9f5e778dd0ce3c75505b7790ddd4c28d4e2f92bf0738c4630a78b277b4fc22da685e27983c1e8976b462ad087b7df750e076e9fd7313bbb02260b5f5c2e18b57ed3aa35049ff02e1bc4fbdb88b1d571ebce91fd81817a5f2d6af62f637d1bdf14164a2014f10116a7e1ef5922dff665d622d7a880e2c250a2bda159b456567d3e2d27eda8ca0718827348f4e94005eabf98b0045c66ec23205f85a2f33a8eab50e4cf5e31d6eef39b4d1368f6d"]}, 0x1154}, 0x1, 0x0, 0x0, 0x800}, 0xc080) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x21cc, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="c480e72d13a8"}, 0x14) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8902bb64e5ee71b2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x40) keyctl$setperm(0x5, r0, 0x0) 04:22:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:22:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, 0x0, &(0x7f0000000180)) [ 2492.356834] FAT-fs (loop1): bogus number of reserved sectors [ 2492.358264] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4}) 04:23:01 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) move_mount(r1, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x20) tee(r1, r0, 0x8, 0x8) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x4007, @fd_index=0x6, 0x7, 0x9, 0x2, 0x1, 0x0, {0x3}}, 0x1) 04:23:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8935, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:23:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, 0x0, &(0x7f0000000180)) 04:23:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x2000) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:23:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x4, 0x0, 0x0, 0x7ffc0000}]}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 04:23:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) (fail_nth: 1) [ 2507.026807] FAT-fs (loop1): bogus number of reserved sectors [ 2507.027912] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2507.049110] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:23:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, 0x0, &(0x7f0000000180)) 04:23:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfd}) 04:23:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) 04:23:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="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", 0xff, 0x800}, {&(0x7f0000000240)="9162d36f09ee474ca8bd47d1148ce5cde770b342eb0acea2e4030cb51766a9153ccd24cfc853423fd0906bbef1921992f18bd57ad19bf489249baa6d0339125efac84440f80f34c89a95c56eaca738016366ec9d14d4a4db1629cd97b3f6a170326d3c24c53646a557a48481227a8179d180f10e35fefea21ff1b038fcdb85cdcda8f72722eb657e4af4fc2223fac83863aa3bc5b3166f1a9166dcff7022326b6bdfed903acc68185dbe6576", 0xac, 0x6}, {&(0x7f0000000300)="34fadb0fdd357a158e9d7c2b0f417fa3e6bbd7a2e86e1bd3e86647427b9323f319c645c223b35f6bd2bf98ecc9393be293bafa202d4a692040cb1dd921be8383b7a89d2c8ba8a067082031f67e99c59549455fb58ee76f816cd00c93a2a47930fcd699315ca9596f7ff7", 0x6a, 0x401}, {&(0x7f00000000c0)="a8804f0969ce1850ac", 0x9, 0x5}], 0x110084, &(0x7f0000000040)={[{@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'macroman'}}]}) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x12, 0xffffffffffffffff, 0x10000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_io_uring_setup(0x1fe5, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0xffffffff}, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r3 = io_uring_setup(0x20f1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0xa, 0x0, r4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd=r1, 0xff, 0x0, 0x1, 0x4, 0x1, {0x0, r4}}, 0x7) syz_io_uring_submit(0x0, r0, &(0x7f00000003c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)={0x0, 0x3938700}, 0x1, 0x1, 0x0, {0x0, r4}}, 0x6) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:23:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8940, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:23:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:23:02 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x2b9041, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000acdd2a49209fc1ded7234ea80fadfe68634f3394e2eff7a41fb82311513b66db987bcd91298f7cc97bc86400e56d9259f4fd3bb8f7d6ebd3fef3c560473f5ae2717898e13a7154e8f185037bdeffb95e42ecda47cb235513a8e7", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x1c, 0x800) signalfd(r2, &(0x7f0000000240)={[0x19]}, 0x8) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000000000000000f8030000000000000000000000000000004800000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r3, 0x0, r4) r5 = open(0x0, 0x212100, 0xd) r6 = open(0x0, 0x212100, 0xd) r7 = accept4$bt_l2cap(r6, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0xc020f509, &(0x7f0000000200)={r6, 0x7, 0x70d, 0x2}) getpeername$inet(r8, &(0x7f0000000400), &(0x7f0000000440)=0x10) accept4$bt_l2cap(r6, &(0x7f0000000280)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$TIOCCBRK(r5, 0x5428) r9 = fork() ptrace(0x10, r9) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r9, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:23:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000}) [ 2507.350724] FAT-fs (loop1): bogus number of reserved sectors [ 2507.351725] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 1) [ 2507.502667] FAULT_INJECTION: forcing a failure. [ 2507.502667] name failslab, interval 1, probability 0, space 0, times 0 [ 2507.505267] CPU: 0 PID: 37903 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2507.506932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2507.508785] Call Trace: [ 2507.509384] dump_stack+0x107/0x167 [ 2507.510234] should_fail.cold+0x5/0xa [ 2507.511121] should_failslab+0x5/0x20 [ 2507.511981] __kmalloc_track_caller+0x79/0x370 [ 2507.513001] ? strndup_user+0x74/0xe0 [ 2507.513884] memdup_user+0x22/0xd0 [ 2507.514684] strndup_user+0x74/0xe0 [ 2507.515508] __x64_sys_mount+0x133/0x300 [ 2507.516425] ? copy_mnt_ns+0xa00/0xa00 [ 2507.517326] do_syscall_64+0x33/0x40 [ 2507.518174] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2507.519325] RIP: 0033:0x7fe4d5f5bb19 [ 2507.520166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2507.524292] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2507.526009] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2507.527609] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2507.529206] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2507.530816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2507.532419] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:23:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 2) 04:23:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), 0x0) 04:23:16 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000000480)=""/224, 0xe0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000000000), 0x0, 0x0, 0x3) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000180)=0x6) dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x100010, r1, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x0, @multicast1}}) 04:23:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfd00}) 04:23:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8fff2b0ffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:23:16 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000000)=[r0], 0x1) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) fork() 04:23:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8941, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2522.014678] FAT-fs (loop1): bogus number of reserved sectors [ 2522.016078] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2522.020969] FAULT_INJECTION: forcing a failure. [ 2522.020969] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.022636] CPU: 1 PID: 38125 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2522.023637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2522.024837] Call Trace: [ 2522.025222] dump_stack+0x107/0x167 [ 2522.025751] should_fail.cold+0x5/0xa [ 2522.026311] ? create_object.isra.0+0x3a/0xa20 [ 2522.026971] should_failslab+0x5/0x20 [ 2522.027522] kmem_cache_alloc+0x5b/0x310 [ 2522.028112] create_object.isra.0+0x3a/0xa20 [ 2522.028745] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2522.029483] __kmalloc_track_caller+0x177/0x370 [ 2522.030160] ? strndup_user+0x74/0xe0 [ 2522.030711] memdup_user+0x22/0xd0 [ 2522.031219] strndup_user+0x74/0xe0 [ 2522.031749] __x64_sys_mount+0x133/0x300 [ 2522.032334] ? copy_mnt_ns+0xa00/0xa00 [ 2522.032899] do_syscall_64+0x33/0x40 [ 2522.033438] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2522.034183] RIP: 0033:0x7fe4d5f5bb19 [ 2522.034717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2522.037279] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.038351] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2522.039356] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2522.040349] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2522.041334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.042338] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2522.052362] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:23:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), 0x0) 04:23:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200001, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x28) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) chroot(&(0x7f0000000140)='./file1\x00') 04:23:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x1000000}) 04:23:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2522.285272] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:23:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x894c, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2522.390679] FAT-fs (loop1): bogus number of reserved sectors [ 2522.391440] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:17 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), 0x0) 04:23:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x3}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000004040001000000000000000000000000000060000000838000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) ptrace(0x10, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x400200, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x24, r5, 0xc0b, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_CQM={0x8, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_NAN(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="28c0d6ba38eb0f2eb31dbbab99c4f36395000000", @ANYRES16=r5, @ANYBLOB="000129bd7000ffdbdf257400000008000300", @ANYRES32=r8, @ANYBLOB="0c009900010100002f000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x2004) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:23:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8953, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:23:33 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) r4 = dup(r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) 04:23:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 3) 04:23:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x100000000, 0xa, &(0x7f00000008c0)=[{&(0x7f0000000240)="f753776bd044539e13f4e1ad3694ac2d918d669ce1693edc4f79d51762fb89bd7fd2962cfcd7b93ef1c5e9369f863c90de428c0c97c1fe37438e6b39cb8f6dcdc1640474e21956f1ad72187ca7998d01", 0x50, 0x5}, {&(0x7f00000002c0)="17e733ed005410ce07336913a9257df8c42af75d99cdc9ddb04d9c6804f5637298edf1df004570b9f76f349f91d587c7be3631dda3bb14022148dd05a4937c6bd96c", 0x42, 0x4}, {&(0x7f0000000340)="ba6e365bd369d5dad5bfd04bc1395c8cf7db0c1ce71305b998c943f3880e3198012705b0fa235ab6a0d01a781811b2efa86de5642029c7474bdd8f80dec1db2a1db05788f4d6146dccf75dae472f24735adb6c7d931df2083b8c70ad62c431d99eaf55aaf0ab4dd9a9be6a5ae32564941df63d3272bdfedd52b0798563e429faeffefd59d3e30b15125644ea97d35186e4423615a6e18691191264e25c3ce22925f3209d1dcad4eef0ef", 0xaa, 0x45f}, {&(0x7f0000000400)="4f1ab4d8a4624d72949c68ff9f28c2116edcd6bbedb7b5b62dd45d70c3553ac57cf3aebd2bcc0d201d65108f952de260a4c5649a93a981513308142f0d84c404b4f4ecf67c4ba9ace65bf04b51e864f7e128c2bc4b317515aacf25eadef4d1355834f92d7eb061f14e022c1e02bd4fac20099aa5c23f03bf82df9c05", 0x7c}, {&(0x7f0000000480)="ae9723cc3aab0e4ea9461f65507bbf6ea218ed92adaed0a34bc04ab831155b03e972efbe31c9dabf0c98f1c5c6b7b83a67af81e8b7fe2ba9bcd069dbd0889f5772b54611522675983fd21577ff438fff48cb4e428310fcbb27e84c9203aeec1fab26da7fdf35bcf3b7577cded3badd94f1bcd4a8e40b0f608b3116a6ee8223ffa885401674da1c3361031faf25c1a3b9c7cc850f830641c9f98c06c5a47aadb92635c2ce18b2b792dc435981369d36329f821402aca659f5efd1223a7922a3fda829ffe34de1a1d5d59311f9a71e0ae6996995c7", 0xd4, 0x10200000000000}, {&(0x7f00000001c0)="3fa9ef3832ca2579d65853f19df6b350f82325dc4a2fba2bb37aba6bc1451093a18796a1", 0x24, 0x1}, {&(0x7f0000000580)="61ee780abdc10bdf74c7874ead3096874bc3f9cde799db2ff44acd0b317a5eb9f7a68c9beb36d8a9433a806a2566b7e8a40dacdabd72d331f3", 0x39}, {&(0x7f00000005c0)="d519d6f4e255f843cfbf2964d96540acb87998290ad74a265ace2145ec27d8d740d586dac359eba28488c60f592f4d93c4f971f1ace5cf7d2c810ba83de9fe3a86c19799cffca967ef9afa9a3eb05158405122e3bf800b78460a7267303bb8f88a5f988785c3cb7d7aad65eb033d771e796e281823c74cb1e6f65fe889831be2f1c05744f691ed97fab97e2f4b517d19e98e48c2d2e28afbb6075cedae73fb1d9c999cbc91df2d60a4ef5f9e82e99aad8eb71aea610d23f032fd6794cbba48a89dcc660b752e353018f37352446ce491fe65a26cf7b33e568820aee23ff9817feb43a522", 0xe4, 0x5}, {&(0x7f00000006c0)="9c301c59528b2cfec09419b5890b3489839744697437512db57462351234b3f8506335850886590fd9c890ec1c0f0a6a37b382ab601208f55897adf038b8077df1e937e7238f71eae2ddadccdb60b551a1ce66c83e598ab12a2b14955166e4803651fab96816564936f142b1f07842c16f337d8366d04094b1e2074c59bbca1b6f225724058a8d0e85a730e9a5fc59e222dfbb95f3fd4d2905ac1484205acb026f4914b43289df427a439f172eae6f939a63ad559cc90f4feb7b99af100b390e9eb6a7ff01e241134a76b815f02ebda117305e2cf32fc454501c019038f2dea3c189ba8b6be216ee09081d57351365d414281a00f5", 0xf5}, {&(0x7f00000007c0)="1ed965223f33d309acccfec96238931d3f6f2e6e7388704af082df4eb8b83e91d33aefb43612fed4367d61c157fcf9d7517ee33427706fe7f7ff64cc9bd37060e4965818674909f7230bd6ddf173dce4838513af6c47f1dec91b0dd619b6560f16e1207707864e6d4c05656e9cfe4588c7d7abb0f9fcde8e81ec4b2c8be98581afa2a79ad4732a3be068699f882d2da628dc0f0796fb2f64da1167d1df93d26d2ec3683c522c4f59ec6e3ed5eb7c92b1a165734058484f3af320791277ed0606c9a809d14ab40695eeebf20e6c8712f51a7ea1", 0xd3, 0x46}], 0x20000, &(0x7f00000009c0)={[{@uni_xlate}], [{@seclabel}, {@uid_eq}, {@dont_hash}, {@permit_directio}, {@subj_type}]}) openat(r0, &(0x7f0000000a40)='./file0\x00', 0x202a41, 0x4) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x13, 0xffffffffffffffff, 0x8000000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd=r2, 0x548, 0x0, 0xe8, 0x4, 0x1}, 0x27ae) 04:23:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x2000000}) 04:23:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) (fail_nth: 1) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2538.738034] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2538.745781] FAULT_INJECTION: forcing a failure. [ 2538.745781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2538.749334] CPU: 1 PID: 38372 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2538.751474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2538.754020] Call Trace: [ 2538.754721] dump_stack+0x107/0x167 [ 2538.755681] should_fail.cold+0x5/0xa [ 2538.756671] _copy_from_user+0x2e/0x1b0 [ 2538.757699] memdup_user+0x65/0xd0 [ 2538.758641] strndup_user+0x74/0xe0 [ 2538.759584] __x64_sys_mount+0x133/0x300 [ 2538.760623] ? copy_mnt_ns+0xa00/0xa00 [ 2538.761638] do_syscall_64+0x33/0x40 04:23:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8955, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2538.762621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2538.764133] RIP: 0033:0x7fe4d5f5bb19 [ 2538.765089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2538.769822] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2538.771811] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2538.773658] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2538.775532] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2538.777509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2538.779388] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2538.805106] FAT-fs (loop1): bogus number of reserved sectors [ 2538.806712] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:23:33 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:23:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 4) [ 2539.088344] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2539.099362] FAULT_INJECTION: forcing a failure. [ 2539.099362] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.101858] CPU: 0 PID: 38593 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2539.103501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2539.105356] Call Trace: [ 2539.105950] dump_stack+0x107/0x167 [ 2539.106784] should_fail.cold+0x5/0xa [ 2539.107643] ? copy_mount_options+0x55/0x180 [ 2539.108630] should_failslab+0x5/0x20 [ 2539.109481] kmem_cache_alloc_trace+0x55/0x320 [ 2539.110503] ? _copy_from_user+0xfb/0x1b0 [ 2539.111444] copy_mount_options+0x55/0x180 [ 2539.112396] __x64_sys_mount+0x1a8/0x300 [ 2539.113307] ? copy_mnt_ns+0xa00/0xa00 [ 2539.114198] do_syscall_64+0x33/0x40 [ 2539.114904] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2539.116042] RIP: 0033:0x7fe4d5f5bb19 [ 2539.116874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2539.120950] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2539.122640] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2539.124232] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2539.125794] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2539.127372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2539.128933] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:23:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 5) 04:23:48 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x11002, 0x112) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:23:48 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000804000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 04:23:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000000}) 04:23:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0xfe32, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000000)=[0xfffffffa, 0xfff]) r5 = fork() ptrace(0x10, r5) 04:23:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:23:48 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8980, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2553.793159] FAULT_INJECTION: forcing a failure. [ 2553.793159] name failslab, interval 1, probability 0, space 0, times 0 [ 2553.794814] CPU: 0 PID: 38614 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2553.795795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2553.796947] Call Trace: [ 2553.797322] dump_stack+0x107/0x167 [ 2553.797834] should_fail.cold+0x5/0xa [ 2553.798374] ? create_object.isra.0+0x3a/0xa20 [ 2553.799013] should_failslab+0x5/0x20 [ 2553.799551] kmem_cache_alloc+0x5b/0x310 [ 2553.800131] create_object.isra.0+0x3a/0xa20 [ 2553.800744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2553.801460] kmem_cache_alloc_trace+0x151/0x320 [ 2553.802119] copy_mount_options+0x55/0x180 [ 2553.802715] __x64_sys_mount+0x1a8/0x300 [ 2553.803297] ? copy_mnt_ns+0xa00/0xa00 [ 2553.803862] do_syscall_64+0x33/0x40 [ 2553.804381] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2553.805094] RIP: 0033:0x7fe4d5f5bb19 [ 2553.805613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2553.808176] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2553.809240] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2553.810246] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2553.811243] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2553.812249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2553.813243] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2553.842408] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2553.843831] FAT-fs (loop1): bogus number of reserved sectors [ 2553.844684] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x40000000}) 04:23:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:23:48 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8981, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:23:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:23:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) statfs(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)=""/34) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:23:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:23:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfd000000}) 04:23:48 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) r1 = signalfd4(r0, &(0x7f0000000080)={[0x400]}, 0x8, 0x80000) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000000)={&(0x7f0000000080), 0x0, 0x200002}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2554.164557] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2554.173756] FAT-fs (loop1): bogus number of reserved sectors [ 2554.174459] FAT-fs (loop1): Can't find a valid FAT filesystem 04:23:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 6) [ 2554.376297] FAULT_INJECTION: forcing a failure. [ 2554.376297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2554.377656] CPU: 0 PID: 38973 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2554.378438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2554.379394] Call Trace: [ 2554.379707] dump_stack+0x107/0x167 [ 2554.380125] should_fail.cold+0x5/0xa [ 2554.380572] _copy_from_user+0x2e/0x1b0 [ 2554.381032] copy_mount_options+0x76/0x180 [ 2554.381515] __x64_sys_mount+0x1a8/0x300 [ 2554.381979] ? copy_mnt_ns+0xa00/0xa00 [ 2554.382440] do_syscall_64+0x33/0x40 [ 2554.382866] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2554.383463] RIP: 0033:0x7fe4d5f5bb19 [ 2554.383890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2554.385969] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2554.386836] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2554.387658] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2554.388470] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2554.389280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2554.390092] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:24:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 7) 04:24:11 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r4 = fcntl$dupfd(r2, 0x0, r3) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$F2FS_IOC_RESIZE_FS(r5, 0x4008f510, &(0x7f0000000040)=0x6) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r6 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r7 = fork() ptrace(0x10, r7) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 04:24:11 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000400)={'tunl0\x00', 0x0, 0x1, 0x8, 0x40, 0x7, {{0x50, 0x4, 0x3, 0x4, 0x140, 0x64, 0x0, 0x2, 0x2f, 0x0, @multicast1, @remote, {[@lsrr={0x83, 0x7, 0xb5, [@broadcast]}, @timestamp_addr={0x44, 0x4c, 0x3a, 0x1, 0x6, [{@remote, 0x1}, {@loopback, 0x1}, {@empty, 0x400}, {@rand_addr=0x64010100, 0x4}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x4}, {@local, 0x3f}, {@empty, 0x2}, {@remote, 0x3ff}, {@broadcast, 0x8001}]}, @cipso={0x86, 0x6b, 0x0, [{0x2, 0xb, "945d9c8dcd98686821"}, {0x2, 0x5, "163b33"}, {0x1, 0xc, "37a7d0d5abe5e95c4f3c"}, {0x0, 0xf, "3f71c8ca69630eec09dae985f8"}, {0x6, 0x10, "2e9ed6d44dfb058bace5fce69612"}, {0x2, 0x8, "5afd7a8ac245"}, {0x5, 0xf, "edae150933eff3981f54df5312"}, {0x1, 0xe, "ca5c57d479e860d0e83d736d"}, {0x0, 0x5, "7e1440"}]}, @cipso={0x86, 0x5f, 0x1, [{0x2dd2d621c95af04b, 0x9, "a636f5f20d4748"}, {0x6, 0xb, "8e7a3578f0fe5fd5c6"}, {0x2, 0xf, "ef437edd03c14d8b990a022e86"}, {0x6, 0x3, "bb"}, {0x5, 0xc, "df07711487da9526073b"}, {0x7, 0xa, "5748db84d4dcc994"}, {0xb2606e4b92739f1e, 0x7, "fddbff437c"}, {0x2, 0xf, "ee98103b337cffb3bb1c59e497"}, {0x7, 0x7, "3186e81dfb"}]}, @ssrr={0x89, 0xf, 0x59, [@local, @broadcast, @empty]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x4c, 0x0, 0x500, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8000}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x800}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40800}, 0x20000001) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:24:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB="db"]) r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) openat(r0, &(0x7f0000000040)='./file1\x00', 0x8200, 0x14) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8982, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000", 0x30}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfdffffff}) [ 2576.647837] FAULT_INJECTION: forcing a failure. [ 2576.647837] name failslab, interval 1, probability 0, space 0, times 0 [ 2576.650670] CPU: 0 PID: 39072 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2576.652267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2576.654166] Call Trace: [ 2576.654779] dump_stack+0x107/0x167 [ 2576.655623] should_fail.cold+0x5/0xa [ 2576.656513] ? getname_flags.part.0+0x50/0x4f0 [ 2576.657569] should_failslab+0x5/0x20 [ 2576.658443] kmem_cache_alloc+0x5b/0x310 [ 2576.659393] getname_flags.part.0+0x50/0x4f0 [ 2576.660412] ? _copy_from_user+0xfb/0x1b0 [ 2576.661373] user_path_at_empty+0xa1/0x100 [ 2576.662353] __x64_sys_mount+0x1e9/0x300 [ 2576.663285] ? copy_mnt_ns+0xa00/0xa00 [ 2576.664211] do_syscall_64+0x33/0x40 [ 2576.665061] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2576.666227] RIP: 0033:0x7fe4d5f5bb19 [ 2576.667078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2576.671262] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2576.673007] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2576.674644] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2576.676274] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2576.677898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2576.679519] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2576.691909] FAT-fs (loop4): Unrecognized mount option "Û" or missing value [ 2576.725649] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfffffffd}) [ 2576.763411] FAT-fs (loop4): Unrecognized mount option "Û" or missing value 04:24:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:11 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}}}, &(0x7f00000000c0)=0xe8) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100, 0x800, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000780)=ANY=[@ANYBLOB="fc120000410010002cbd7000ffdbdf25180000000800b500", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB='\b\x00]\x00', @ANYRES32=r1, @ANYBLOB="1c6973994963cfab67fdff0feba6537cd68ac0c7b22174894fcbecf485147acd04c3cf99de972200d271c324b4f03c0bd5bf697902c8dc42fc1777c8b14fae84ece490a586b4cd6113c554404dce56b4921aa99cef84b820f6f7c098f0e4f3413eeec71fd94b964c3f165201f831fde76150a5f5c75efc4bd88dce64619f877578158e4a8d397c334b7f64e590b888685c44d624f1fd70b6759604e4f727f266a6ce779bb3b9ecf6799be67f55d71dbaed5868ed6098066689347da83d3d899116a27487081024a4447354ccefa62d7d19c2b670f7e8be4c7906973c8a0f3dfca9a8a410af03c952f1848834a69bcc3ef888a82903ca6b166dc41342a60591c88744f23cae2cda3744fed2b15686119a85a4b3c497121058301a9f03cd8a277e9d8c23361919a06af3b85abb35a2bfc4128e44c3ada6f8f31a62344b71ebc8c187e140d77ef553c556e89cebae358711caba594f9e33047aeb926d6f2e40c68ff26cf1155af2fc99c73e3904db9e1317266948e9ebbbe928d920f93a29c662566402ba567eeab6bd83df5b135aa19fac9aa6b135dcef7625f79827f784465af599d8e4f82e9a61780949babfbcc2082bd0ccc2175700afb71975fcdc1e585d56d458d5c1d9e77b6d929c3105c90767088a39b111de671ea545b040ad9c9b606f48b335fe16ed9ae3bd4a324575e5ce9eb2927a67405c833f4ff286ae4f8f42b63bcb05d65301f5347d89270c27a634172f03c858ce9e5a1ccd1c18966d3f9693770fc49712e4c7c2d43f5c2d9a05f65a84e649a85283673a5f05efde3a937a6d4303c0cfc7e7f1c87f0a466e8b2b83be2b6d74237c95cb647757cb8adde61ea37b3e54a2b36dde6c78eaa2591582bd9d1ab233a336cf7c4b64b333bf19566c17daf50226800ebcbc9a9c45ad2a66d23716ce7bbd1e5a2cb3d4faa70d6308268b902a4b38eaa95089eb4bd87485dafbec104274d47de6bb576fcae1aaa4b003471a98ec9b62ee4deecd6c76f40d1b40bfa7794e9c1fd53353fa610192a4517ce01e18843e4a5b9a6a24a995d1662503bcb41fd726fc86a4107ac22e296d684b756c2a2e2d212c52fcda3671db856d4a2f0ea4b9666f59687e69fb326549b1384bbaa38bd068f3429e8f21e9073c9abdaf552e7fbc7fd03141c86c7be63cd802a00328f6f9ab1bd658bee83a957906d172f5ec2cc39932fd5e8d934dec731df30b031eaa224f56cd106249092110ef81a3482e03ecb5c3c60e8618ed6fe33d005a293de84cbdd6396f04bf6f6962d81a7fa61fb9b0cd7902d61ecee8b799f228591856a6fab27221829b71e55642ea1af146ea7aea6bee233c1c58ba07b58c6aed580157cec779808296a9cfbd49b7c72ab16281d8574c16260fc7a6a0bb7072a5c161d0cc87d692b63355755c3444fd1687d04e602ec08192024ca11918c11b9c95981805c15dffae593481ebec76931c412e41862ed0e36b72d7129034e3c41f87e365924deac6fa1b9a01fc6cb1bac2856cb569388799884fd0cf85a29d0a05638a2d95a91ab3ef8cfbb1f1cb0b77b4327d9036552f5b264b44968925bbbc0d3dfbc380c58f677be8b49f7493a834230fcb7679c1aa739a2c7ae07661a782f8b20cc515d07d859a4de2458874da98854073e63bcf24119975f49ea9fcdc465e8266ee8098be4181e1653d74e21db153c78d7a228f7ed697da67fbc33d608e96309a8c2d584a5a9c26beb2d0897229849f8ca48e9e43c5e536c969e813b6cfa21fb48802e61308b0c35575d0078da888743d1eef27b48a67b1da62d8655bcf8e41d30838097f4a6cdedbc167f413ad2bdf096d95ec7cb56f783adf269bf0bdaeb42ec9a4747bbfb1d7e8cc20ac75a26b98d5808568813ec15c1d2ca54de891d8db09aaffc5d3f1be32e4a135aba65abe243ab1291c4e2a2eb1ba251e591680e3de61aab163a72c365cbd201cf670ebcbb1f66132d92d0dd1761a1ae826ccf4efc69a9cde6d034802bc15821d101e56d72732c945e502be4e06c9c88261777a9bad376d9156a67ccf81af8917b0ce4f3b4aae2a88b3961cce142e52b191d628b47171b0c9795c8f39e1e3880bb2be03d6c4338642f01e59e0b4142d950e8acd53c288d96265d8b2caa5a532cbc12d3575c2d864557be9ea267fab0c0ec22fe7c1df1a37d161483725d89731a4c2804c1678bbbd74262dbb66c599e376f35f01062d37d8340f6cff4b1847f829dd631a6e10360621f08aa2cf797d8988911e1a64cd69a2085cfb387116d17960e94bff18a82a6ad9bf4666f40ad3feb9f6c742ef573c4073861cfc836333a61194ed33c21220e7d98147139e0d6f4e55ffba8f72af1789af1da027296b78178699e08f795b7b04d565068c98d28b9b25ba1b24ba6254c8735f99f14b49b7ba938ed82bac183e6ec2c1b1ccc8141739afd36cdc8c370d2eef181b110483b4a3e559c6f93880e7eb7173ecf6bbb4c159e9b235b7b6e3894957bf76b8a7c3fa9ca270a6100ec6a8c3a986767127be434f2fa8078bb7dcb159fd14bd6bcb8bbc20ee2b7483af4e593dc65038df118dd45a6e0551167db005e815be81cae12477696de91ce3a093d2c67677d451351482300cdfac0639239938ed34f83b6524ee4e901639a78ea1ec58cabce662e94c79a9debbb9d940ebb16274580ab344cfcb3bf2cda4f322f8c4d22def3b8b75be42594101529be7f0dcc45b5441f9eb87da90facaa2262848309cf1305b618346981d646f2bb96b82067bc9a956c4be7c74c147cb15d948f5137de4c18ac7a3066ed614aa0fbc0a0ec3efd16aede7288535332f1fbe378d83983f081c26ec881f9d9cc9b14db5c0d31dc65875bcefb3d137de6a08090ddee9accf2e597ec5be708b7dfd19ea41bd45333a1a4f0346f2d7485bfffef743d666073a0d93308c80f9dd6db1c45428f521fe23b623df72c1f415e00d2d0927dab13747d93318627ef5520d78f8b76fa6296c342b4e2a9ff6db474ef2391422c81287efb4d61e1fba1131fd11bffdfb86a9d8bdba13f30c3b807e1d6b5f08d051fba82589a2137078ddb3422e51ceab205ad1f8e199ef87a4bdb66c36a51bc1ab1ef6fdb5e6f610726810622119e406f391eb38f9ed68cd7755bff907af6e436295eddf3b100f4bce927b2eb70e0e04308535860300be0d2ad6ac806b01ddd1ce2af59c71197e8bf598d48a33eaaf31e6a50d475da8444f5800362436aa41c7103bd7f32b5f0155c13e6d5c99852cc46f32b11f2ec84bc90f762b1f0bd6459759fcb4f6fbcc1bcb5b0a10f72f6bda847ae394f75229a53510349dc3c777bd8da9dc0c7097a31a9b27824eff9342e5c00a64fa8e074fecbf257992f47d1e08c5364eed16baa2c0525d3a2a76f7fac5ccff7a6c85037242eaaa77311f298543ac4adfe69f0df3f3049910dbec23bd75858056e4bde40a6cf595f047202c4b356f3ef220476fb6eb259c26eec34be3ab55e44556e431ad215c3560b7a1785bc073a8dfeab6f4df4f521af0fe9eb5c189af2f13f7613845c3531b9acd6dfb5c0231fdf55763763f8c33cc6d2fee81bd9cc5c2aaef50f1b2126912cf28ce54d611d77a1641ff78b90ac896f01e9b936263ac4a16b7a19c8223bfd236ffb528ae5e75b983b096e1b990eecf7e4d3fca1a924fa51ceb8561e8b34451903d4017eda3680813239d1478152d55add16675152d7e60c7a364e55492cd6c5e61b8089d4fc3a9b73329e88515ab30b1f68f0e685fc60b6a880765bde8b229a5952a75ee3e9c3206b4791834fec2e388e5e3e47dae38cd48039dc2ed66b4f9aff0e91a2ce45036b89dbdf1fd6debebe7fdbf18e3bbdb98ab264b969a55e200e374e0fd600673686c340bba50ccdc6d675dc8617656461d809da5c9e8ec8bd3980e6afdbe91daabd73980034cb63c31cedcfbbfc907228bceed39fd66c730f083d966939d7e48e3b8a7a436e8c384d2233149e739dd0468654f3bece087821d55ea264b02a5c54137f6f2b2abcdf2524d64b7c437b38ffaef09b497a0c6bbc57cfeb841a7ec607a9ab85c9fdf74a9dc251a712ac61f8a0d165b804659c86e2e8cd20811b6dc3eba37bacec3e6a9540bdabbfb3d3461bff65ad762f1344f24215cd1016653ffb8c2bf6084d3818843bd399dc4964f734bac5aa20a5715dab99a40dd888d3747af832cffecefb53147a50dddbc93647ddb7bdd20a8f12a85c1e0ed56ecb31c2b5a6bdbc22c05edd4f1387dfc3a77539f86864da422a0260320ab99bced859baf853227734312308f951d8b70414b2c79ee08478b6356de4625493ef2628d3a9cd9525744f9e589c4aaa5a8ad85e4531c431a3c33a1731cf49fe7d4b1d5d938982f3876ffe88d1fbb6013c668b184525280f423d39328f46a7f75dd6dae0b6aebaa0fb248877805f46f473c9d99a04f15d33a50215e5f4c27656a7462265571d95651e7a67b8a0b8fe3a99ca91a42a7f0b91b81231fa26f9b9b1cf8a3a5d5ad45c16c87c5dad4fa79b4b239b87ccca364127fb8ebbfbcc8e7c0c288206b1fb83e9eeed3aaf4ec9900b7207cc395a7e85a2f2a2288ed445a0deae33de6b45cb38d279dd6091558b256cf5a195e5e0ca24e096c7bbf1e0038826b04fbdcf0e92aa1e398ff71e6358c989f5e0bc37acace4d861bf85b2d322a3806ec02d1d1f23af7adf745cb8c47cbbf438650b25acec245572a1f34b26043512520fceeca0681f8e52c06c806398286f25d79af5cad12b89c7beeb231b6691b7a2a1be8f380728b4fe6bb53c417025bfd1df4255067b30f2192d3371aaaaa4edba9244006fef08a02b4c1d23fb449727367103f005d4b648b021edaf8c8efc2531b5d2ca3094c5b8859e23de89ba127dc4308591e3f8e0ae4a1e130a2ffef6ca47ad1c3c6922724aa6b4827194b8ed0f8779ec6daa3d98702859727b6cfa7943dec823bbaf07e4b4c647a47aa49165c733de3f6a973bc3761a8261ac64ff576ec1fced2de250aa9f1c7d68ab69f4be5dd0e0f53f1caa2c4e2c0208da82ee410c59f4bfb78ac11735a64d78bbfaa0ea6162794f4fb57b41be403e4f8e8b8a1379a06b255a02fc0fac35465978751e7ca9ec9439c15ce262d91a2198c64b5bfb4ae66a18ce0eb4230440cbd39dfaaa57262706362fd9f96cf7a38711eaaa35d28a43c0f57b38a038d6279d7cd1ca36f54f48356a925591b33a53ee762455ba9e85a4818e514dbf67a9c01020767188450d51a830eb1f55ccd4fab2d7566dd05219dbab0b664892b381a96e968a9a7f35eb3e0176a6416a8fa5efa8da6866673f43a6dd9c51b4c7c30d8ea2b13b2c15fb63dda959c7e61e13866ce8799e919e5b2796be188cb56b87ea4e86e00eec1c9a92926d84a9f82891d28a9b296477e870ca7652e7a72a90941b3b56b1579422e9c314163e1a26106419e7decc5d01ab7f889530e4950aee4dbb8bb0cfa509a0e7191b4651162427dca663f138397c0d353cf9aa633863f6f09c59114ffc2f04e5e13ba291c57ae39c94b3c67ea6b0ae3ac5e65413454379643c7bf03fe667662a1aef5ee6a2675d05bb781ad892e60f59475f07221afa652005fac06ee9cc7e29b45d4f77592279493f68ab434bdd134ff7af102778e2381acb30afff18d6938033e92df011d18984ccaedcd041253f6cf08d7211d6954a0aaaf20cdcc5bcfd9e75c4aa87c2367b00833f7c524dca283b2a69b0739a6cabd6991490b70348a40c2f581c4ffc859619d20851910ffdd2d6e24faea9eddc70800920005000000f0d6d3e3a379396aa45b7c9001e760d761d558d89fb3c394de6344976fdd53ff1625f3fbe42529aa94ea0000000000000004a5fac5a1bbeaa881a8ea525e814677848846e99682132804b7332f752fbd581ae24c0a36fe2c3d60f259cd2aa9b82f03980c15bebf714d3aacdd7ca6382988f3927b3409edc2b7f33ce14f3b654fb485c2052e16175788ee5d0b47559a7c09f6f25e8fe243ad14471e4ffb7fb35913202db2aeaff399f09617f4150e758c8b2ef2dec39413f03a2168aa26c6c08a141844d31147aaf04c1690595f41076bb70735fa98ff5c43315561405804ceaac1101ae899414d723a4de13daaeb70e40b3654a50886c4783eb20d72add116b0d6d2c3a0b0f5af69f92e04eb13c860e09975b778fb5bf2ba8f4a2b03b7869a9fa415079e2f9ec10fa3fcb012a737ad68bbbbe7248f20f78b40d22eb80f085c7c5d7c732be94a9d161ddbc58031edc985e8f214004f00ff01000000000000000000000000000100006c4acfa238dcb0af4c1715b04cda863dea6f5ca75641213f5c69020e0015aec244b97059cfa355307125fce272260b3d27d296da2fae06a3af00bb173a3166f601000000f6c63c1ceb5d2b9de639f0b58f725b17bc6f6f13ac104702dea0c2"], 0x12fc}, 0x1, 0x0, 0x0, 0x880}, 0x40) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r5 = fcntl$dupfd(r1, 0x0, r2) ioctl$AUTOFS_IOC_READY(r5, 0x9360, 0xb7) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e2975a6a25c06"], &(0x7f0000000240)=""/163, 0xa3) r6 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) r7 = dup3(r6, r6, 0x80000) unlinkat(r7, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r8 = fork() ptrace(0x10, r8) 04:24:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8983, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 8) 04:24:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="13d8222d564f21e3c8cc3ae8ae681eb8c30c0e4960b6ea55164f4ed4a5a06687c75de20d4d9bd5b1cc202300fcddcd973cf1887bd9be85b22fd7a9bce77271dd28d20fa4a4b3eac8c9434b90429cae4f32d2602b9afcc311f566f604a918b60e3b55f33495a0bcada2d78dd288211ac8622b5fe4711c"]) chdir(&(0x7f0000000040)='./file0/file0\x00') r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) openat(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x101042, 0x90) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000", 0x30}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x1000000000000}) 04:24:11 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000040000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) fcntl$notify(r0, 0x402, 0x1) [ 2577.121128] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x5, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2577.167079] FAT-fs (loop4): Unrecognized mount option "Ø"-VO!ãÈÌ:è®h¸Ã I`¶êUONÔ¥ f‡Ç]âM›Õ±Ì #" or missing value [ 2577.210863] FAULT_INJECTION: forcing a failure. [ 2577.210863] name failslab, interval 1, probability 0, space 0, times 0 [ 2577.213512] CPU: 0 PID: 39315 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2577.215052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2577.216902] Call Trace: [ 2577.217497] dump_stack+0x107/0x167 [ 2577.218321] should_fail.cold+0x5/0xa [ 2577.219181] ? create_object.isra.0+0x3a/0xa20 [ 2577.220223] should_failslab+0x5/0x20 [ 2577.221081] kmem_cache_alloc+0x5b/0x310 [ 2577.222006] create_object.isra.0+0x3a/0xa20 [ 2577.222992] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2577.224147] kmem_cache_alloc+0x159/0x310 [ 2577.225089] getname_flags.part.0+0x50/0x4f0 [ 2577.226073] ? _copy_from_user+0xfb/0x1b0 [ 2577.227014] user_path_at_empty+0xa1/0x100 [ 2577.227991] __x64_sys_mount+0x1e9/0x300 [ 2577.228908] ? copy_mnt_ns+0xa00/0xa00 [ 2577.229810] do_syscall_64+0x33/0x40 [ 2577.230717] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2577.231938] RIP: 0033:0x7fe4d5f5bb19 [ 2577.232792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2577.236939] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2577.238645] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2577.240274] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2577.241916] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2577.243531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2577.245160] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:24:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x100000000000000}) 04:24:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000000002000000", 0x30}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2577.276714] FAT-fs (loop4): Unrecognized mount option "Ø"-VO!ãÈÌ:è®h¸Ã I`¶êUONÔ¥ f‡Ç]âM›Õ±Ì #" or missing value 04:24:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r1 = open(0x0, 0x212100, 0xd) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000140)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2006, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}], [{@seclabel}, {@uid_lt={'uid<', r2}}]}}) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) unlinkat(r3, &(0x7f0000000240)='./file0\x00', 0x0) [ 2577.506557] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2577.524264] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x89a0, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 9) 04:24:27 executing program 4: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x2, 0x3}) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x200000000000000}) 04:24:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000040)={&(0x7f0000000000), &(0x7f0000000480)=""/140, 0x8c}) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:24:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:24:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2592.623931] FAULT_INJECTION: forcing a failure. [ 2592.623931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2592.626849] CPU: 1 PID: 39555 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2592.628305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2592.630064] Call Trace: [ 2592.630619] dump_stack+0x107/0x167 [ 2592.631382] should_fail.cold+0x5/0xa [ 2592.632195] strncpy_from_user+0x34/0x470 [ 2592.633098] getname_flags.part.0+0x95/0x4f0 [ 2592.634019] ? _copy_from_user+0xfb/0x1b0 [ 2592.634899] user_path_at_empty+0xa1/0x100 [ 2592.635784] __x64_sys_mount+0x1e9/0x300 [ 2592.636654] ? copy_mnt_ns+0xa00/0xa00 [ 2592.637487] do_syscall_64+0x33/0x40 [ 2592.638265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2592.639339] RIP: 0033:0x7fe4d5f5bb19 [ 2592.640126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2592.644003] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2592.645624] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2592.647129] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2592.648656] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2592.650154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2592.651655] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2592.656318] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2592.710541] FAT-fs (loop1): bogus number of reserved sectors [ 2592.712007] FAT-fs (loop1): Can't find a valid FAT filesystem 04:24:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x89a1, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x400000000000000}) 04:24:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 10) 04:24:27 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x8, 0x200) ioctl$CDROMREADMODE2(r0, 0x530c, &(0x7f0000000240)={0x92, 0x1, 0x3f, 0x9e, 0x80, 0x1f}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x7, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x40049409, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2592.947427] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400975b000000000000000000000000400000000000000000000000000000000000000000003a000000000000000000", @ANYRESDEC=r3], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000480)=""/4096) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB="737c7374656d2e39bdde7859baa591559f29bc544c52a5f6e6ca549ff6c7322c66ffc8ae99a359316be40b4b077f867dc1f37eaf10c359c51fdd444d6aa5d5059fb446f5f604601f3a45a5be9c2d482fa56af8a03711464463f1c0243bc2232f134abe930adc3bc6dfabafd2f977cccfa6c171afcffc0ca2777cf85e481e35b9b6b1bf23a9782bd74585d45c61d194140000000000"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = fork() umount2(&(0x7f00000000c0)='./file0\x00', 0x3) ptrace(0x10, r5) [ 2592.969890] FAULT_INJECTION: forcing a failure. [ 2592.969890] name failslab, interval 1, probability 0, space 0, times 0 [ 2592.972775] CPU: 1 PID: 39784 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2592.974274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2592.976429] Call Trace: [ 2592.977002] dump_stack+0x107/0x167 [ 2592.977858] should_fail.cold+0x5/0xa [ 2592.978677] ? alloc_fs_context+0x57/0x840 [ 2592.979793] should_failslab+0x5/0x20 [ 2592.980641] kmem_cache_alloc_trace+0x55/0x320 [ 2592.981832] alloc_fs_context+0x57/0x840 [ 2592.982711] path_mount+0xaa3/0x2120 [ 2592.983520] ? strncpy_from_user+0x9e/0x470 [ 2592.984465] ? finish_automount+0xa90/0xa90 [ 2592.985399] ? getname_flags.part.0+0x1dd/0x4f0 [ 2592.986400] ? _copy_from_user+0xfb/0x1b0 [ 2592.987278] FAT-fs (loop1): bogus number of reserved sectors [ 2592.987292] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2592.988558] __x64_sys_mount+0x282/0x300 [ 2592.988578] ? copy_mnt_ns+0xa00/0xa00 [ 2592.988611] do_syscall_64+0x33/0x40 [ 2592.992056] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2592.993414] RIP: 0033:0x7fe4d5f5bb19 [ 2592.994285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2592.998839] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2593.000497] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2593.002031] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2593.003560] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2593.005112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2593.006642] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:24:42 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000e1ffffff00000000000000380000000000000000008898c61951b7fe97b5bdcd33720d3e252d0af9fe96385d353f1308294eb38dc2e83e7d6c8898dfa05954b985ba2f86d67ff349bc390c84b93da7d67f67ca1dfc0b62ba7fc4b891dcae624f199bc838a5b50c44e988"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:24:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000eeffffffffffff5c00000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:24:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 11) 04:24:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="37d5fc8f55a824ad3313d747cf849d381eed724499e4ff7437a1ba9fbc02c5d48462f2df48428e06bddba06727fa2261d07313fcaaf7ca10a225fa9d5b0b8e2fd2dc4c095c2655ef3796dd80c8a7d37a4abcfb2887018377d62be1bf", 0x5c, 0x2}], 0x1022044, &(0x7f0000000240)={[{@mblk_io_submit}], [{@subj_user={'subj_user', 0x3d, '$'}}]}) 04:24:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000000000000000}) 04:24:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x40086602, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:42 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2607.755092] FAULT_INJECTION: forcing a failure. [ 2607.755092] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.757479] CPU: 0 PID: 39914 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2607.758942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.760666] Call Trace: [ 2607.761246] dump_stack+0x107/0x167 [ 2607.762021] should_fail.cold+0x5/0xa [ 2607.762823] ? create_object.isra.0+0x3a/0xa20 [ 2607.763792] should_failslab+0x5/0x20 [ 2607.764593] kmem_cache_alloc+0x5b/0x310 [ 2607.765473] create_object.isra.0+0x3a/0xa20 [ 2607.766394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2607.767479] kmem_cache_alloc_trace+0x151/0x320 [ 2607.768468] alloc_fs_context+0x57/0x840 [ 2607.769356] path_mount+0xaa3/0x2120 [ 2607.770159] ? strncpy_from_user+0x9e/0x470 [ 2607.771085] ? finish_automount+0xa90/0xa90 [ 2607.772015] ? getname_flags.part.0+0x1dd/0x4f0 [ 2607.773003] ? _copy_from_user+0xfb/0x1b0 [ 2607.773898] __x64_sys_mount+0x282/0x300 [ 2607.774764] ? copy_mnt_ns+0xa00/0xa00 [ 2607.775604] do_syscall_64+0x33/0x40 [ 2607.776399] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2607.777487] RIP: 0033:0x7fe4d5f5bb19 [ 2607.778271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.782315] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2607.783924] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2607.785434] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2607.786940] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2607.788442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.789959] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2607.797209] FAT-fs (loop1): bogus number of reserved sectors [ 2607.798069] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2607.799786] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfd00000000000000}) 04:24:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x40087602, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:42 executing program 4: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) [ 2608.078747] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000", 0x18}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x9, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:57 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3, 0x81}}, './file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r3 = eventfd2(0x1, 0x800) poll(&(0x7f0000000080)=[{r1, 0x1250}, {r0, 0x80}, {r2, 0x6224}, {r0, 0x312a}, {r3, 0x4281}, {r0, 0x12}, {r0, 0x400c}, {r0, 0x2424}], 0x8, 0xffff) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_SET_CQM(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r4, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x6a}}}}, [@NL80211_ATTR_CQM={0x54, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x10001}, @NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x5]}, @NL80211_ATTR_CQM_RSSI_THOLD={0x20, 0x1, [0x20, 0x3, 0xc41, 0x1c, 0x9, 0x1, 0x1000]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x3}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x59d}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x5}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0xfffff68f}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20040050}, 0x4008001) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) write$binfmt_elf64(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r5, 0x0, r6) r7 = fork() ptrace(0x10, r7) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r7, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:24:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 12) 04:24:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/13], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:24:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfdffffff00000000}) 04:24:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x4020940d, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB="02"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r3}}, 0x1) [ 2622.389990] FAT-fs (loop1): bogus number of FAT sectors [ 2622.390646] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2622.405730] FAULT_INJECTION: forcing a failure. [ 2622.405730] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.408144] CPU: 0 PID: 40154 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2622.409554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2622.411234] Call Trace: [ 2622.411776] dump_stack+0x107/0x167 [ 2622.412536] should_fail.cold+0x5/0xa [ 2622.413366] ? legacy_init_fs_context+0x44/0xe0 [ 2622.414328] should_failslab+0x5/0x20 [ 2622.415103] kmem_cache_alloc_trace+0x55/0x320 [ 2622.416030] ? lockdep_init_map_type+0x2c7/0x780 [ 2622.417009] legacy_init_fs_context+0x44/0xe0 [ 2622.417932] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2622.418938] alloc_fs_context+0x4fd/0x840 [ 2622.419799] path_mount+0xaa3/0x2120 [ 2622.420573] ? strncpy_from_user+0x9e/0x470 [ 2622.421462] ? finish_automount+0xa90/0xa90 [ 2622.422342] ? getname_flags.part.0+0x1dd/0x4f0 [ 2622.423283] ? _copy_from_user+0xfb/0x1b0 [ 2622.424150] __x64_sys_mount+0x282/0x300 [ 2622.424980] ? copy_mnt_ns+0xa00/0xa00 [ 2622.425811] do_syscall_64+0x33/0x40 [ 2622.426578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2622.427616] RIP: 0033:0x7fe4d5f5bb19 [ 2622.428373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.432103] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2622.433658] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2622.435112] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2622.436560] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2622.438014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2622.439461] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2622.464351] FAT-fs (loop4): Unrecognized mount option "" or missing value 04:24:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xffffffff00000000}) [ 2622.565835] FAT-fs (loop4): Unrecognized mount option "" or missing value 04:24:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000", 0x18}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x80086601, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:24:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 13) 04:24:57 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x0, 0xfffffffc}}, './file0\x00'}) r5 = getgid() fsetxattr$system_posix_acl(r4, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x1}, {0x2, 0x0, 0xee01}, {0x2, 0x6}], {0x4, 0x2}, [{0x8, 0x0, r5}, {0x8, 0x1, 0xffffffffffffffff}, {}], {0x10, 0x1}, {0x20, 0x4}}, 0x54, 0x1) r6 = fork() ptrace(0x10, r6) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r6, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:24:57 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) vmsplice(r1, &(0x7f0000000400)=[{&(0x7f0000000140)="86a8101ecf8ab3ca139e52856b049e5277e09a9a9ec1711584d4521c7336ac6f3892a8e022edc179e1761b414223e764e2ebffb380eccddc559957258be5bf36213f1b953023fd6e32c28e5a69f5be6f2ec8056f4dd5e6f9352c99a5c6", 0x5d}, {&(0x7f0000000240)="a2f612dc7ec9b382490e36f3a4fbe3ce2bf027a8592b8fb82af7738a311511152038b20c03816b91a141000b36f4148f81cea148156e56bd57f4fd7064251cb3dd50519ea719", 0x46}, {&(0x7f00000002c0)="925acaccaeb108cb58328c1c7a217874e21d6c819a40399e239d8e32ad153e51a9ce94322fdae31332b619de6f8da69b2f7aa3ad5dafa1b5f551c735cbaf4bf69c1a329adefc7a3e66b214400d68b84c7be574d0f6768f11f96d061ce56e7b97b3e41e9446e1b407e534f577ec7f860fef46b0867b329308258060f84d9643797c6a2a61aa6cfdec1b3ba701cd52b0388da845bcc8dde0222089976d9a1b377b8cfae0e471c97f0edd32af51728491676c1ace0f447ceb", 0xb7}, {&(0x7f00000001c0)="81ace7c2ee66bf8fc3803022d470abf1f8920628419f5d96ef7e", 0x1a}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="91fb07a76e6454c6949947a16a957bbd8bbaadd849f9987145c453d31ef568bc0b5697c34eec9bb0b1e9401d2d0c02a5f50a88883c6a19", 0x37}], 0x6, 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) faccessat(r2, &(0x7f00000000c0)='./file1\x00', 0x4) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:24:57 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="de07106b54243ae43a2e99ed3313b2f820000000e57057c572127e"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) [ 2622.750742] FAULT_INJECTION: forcing a failure. [ 2622.750742] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.752255] CPU: 1 PID: 40382 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2622.753034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2622.753978] Call Trace: [ 2622.754281] dump_stack+0x107/0x167 [ 2622.754703] should_fail.cold+0x5/0xa [ 2622.755151] ? create_object.isra.0+0x3a/0xa20 [ 2622.755682] should_failslab+0x5/0x20 [ 2622.756118] kmem_cache_alloc+0x5b/0x310 [ 2622.756583] create_object.isra.0+0x3a/0xa20 [ 2622.757079] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2622.757666] kmem_cache_alloc_trace+0x151/0x320 [ 2622.758195] ? lockdep_init_map_type+0x2c7/0x780 [ 2622.758742] legacy_init_fs_context+0x44/0xe0 [ 2622.759252] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2622.759815] alloc_fs_context+0x4fd/0x840 [ 2622.760293] path_mount+0xaa3/0x2120 [ 2622.760720] ? strncpy_from_user+0x9e/0x470 [ 2622.761211] ? finish_automount+0xa90/0xa90 [ 2622.761708] ? getname_flags.part.0+0x1dd/0x4f0 [ 2622.762238] ? _copy_from_user+0xfb/0x1b0 [ 2622.762715] __x64_sys_mount+0x282/0x300 [ 2622.763173] ? copy_mnt_ns+0xa00/0xa00 [ 2622.763623] do_syscall_64+0x33/0x40 [ 2622.764050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2622.764633] RIP: 0033:0x7fe4d5f5bb19 [ 2622.765056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.767153] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2622.768021] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2622.768838] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2622.769651] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2622.770466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2622.771282] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2622.799621] FAT-fs (loop1): bogus number of FAT sectors [ 2622.801029] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2622.801314] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:24:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000", 0x18}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:24:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25, 0x4}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0xfffd}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:24:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2622.970385] FAT-fs (loop1): bogus number of FAT sectors [ 2622.971117] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2623.009197] FAT-fs (loop4): invalid media value (0x00) [ 2623.009855] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2623.040394] FAT-fs (loop4): invalid media value (0x00) [ 2623.041093] FAT-fs (loop4): Can't find a valid FAT filesystem 04:25:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:25:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 14) 04:25:11 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1014861, 0x0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0xeb2, 0x20}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder-control\x00', 0x800, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd=r0, 0x0, 0x0, 0x20, 0x1, 0x0, {0x0, r5, r6}}, 0x10001) 04:25:11 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x34, 0x0, 0x7, 0x201, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xd}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x24000094) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r6, r7, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x0, r7}}, './file0\x00'}) ptrace(0x10, r5) write$binfmt_elf64(r3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1243], 0x4db) 04:25:11 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYRES32=r0], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000000)={'U+'}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:25:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:25:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x80087601, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x300, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2637.215119] FAT-fs (loop1): bogus number of FAT sectors [ 2637.216417] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2637.217573] FAT-fs (loop4): bogus number of reserved sectors [ 2637.218712] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2637.224324] FAULT_INJECTION: forcing a failure. [ 2637.224324] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.226862] CPU: 0 PID: 40633 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2637.228389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2637.230224] Call Trace: [ 2637.230818] dump_stack+0x107/0x167 [ 2637.231635] should_fail.cold+0x5/0xa [ 2637.232483] ? v9fs_mount+0x5a/0x8f0 [ 2637.233315] should_failslab+0x5/0x20 [ 2637.234172] kmem_cache_alloc_trace+0x55/0x320 [ 2637.235190] ? v9fs_write_inode+0x60/0x60 [ 2637.236105] v9fs_mount+0x5a/0x8f0 [ 2637.236900] ? v9fs_write_inode+0x60/0x60 [ 2637.237821] legacy_get_tree+0x105/0x220 [ 2637.238740] vfs_get_tree+0x8e/0x300 [ 2637.239566] path_mount+0x1429/0x2120 [ 2637.240423] ? strncpy_from_user+0x9e/0x470 [ 2637.241382] ? finish_automount+0xa90/0xa90 [ 2637.242351] ? getname_flags.part.0+0x1dd/0x4f0 [ 2637.243381] ? _copy_from_user+0xfb/0x1b0 [ 2637.244324] __x64_sys_mount+0x282/0x300 [ 2637.245224] ? copy_mnt_ns+0xa00/0xa00 [ 2637.246124] do_syscall_64+0x33/0x40 [ 2637.246953] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2637.248090] RIP: 0033:0x7fe4d5f5bb19 [ 2637.248918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2637.252964] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2637.254652] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2637.256216] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2637.257776] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2637.259352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2637.260912] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:25:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 2637.327289] FAT-fs (loop4): bogus number of reserved sectors [ 2637.328199] FAT-fs (loop4): Can't find a valid FAT filesystem 04:25:12 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x37f, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 15) 04:25:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x80108906, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x500, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xfd}) 04:25:26 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0014e664890f51846c002e5d3a90020fc002324378e86b62d3d3a75151f9d08b73b07eb26d396d4f7abe6bff6b9b49972baf9e77e5d8ae6f5e1dbf26eaaa550684a18e87c55a36e6f2931caf9419aba4ca97c1d232a5962eeb24dfeb96dcaa1b540a9efe56e281dc0c366a9267601a57df9316e5907856093a5218f08e2d842726c10f639828d2220cb0dfbf3c713cf02b3e07dd2a2b5957f9b34df48af1352855b610b37a1dedb9ae18a4cfd075b83612755655ab3d0b0368cb6de44783febd74717e6b"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x7, 0x5) 04:25:26 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, r1, &(0x7f0000000000)=0x3, 0x7c7b000) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:25:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:25:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2652.298812] FAULT_INJECTION: forcing a failure. [ 2652.298812] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.300480] CPU: 1 PID: 40863 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2652.301482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.302692] Call Trace: [ 2652.303079] dump_stack+0x107/0x167 [ 2652.303607] should_fail.cold+0x5/0xa [ 2652.304162] ? create_object.isra.0+0x3a/0xa20 [ 2652.304823] should_failslab+0x5/0x20 [ 2652.305378] kmem_cache_alloc+0x5b/0x310 [ 2652.305967] ? cred_has_capability.isra.0+0x152/0x2b0 [ 2652.306724] create_object.isra.0+0x3a/0xa20 [ 2652.307361] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.308101] kmem_cache_alloc_trace+0x151/0x320 [ 2652.308776] ? v9fs_write_inode+0x60/0x60 [ 2652.309371] v9fs_mount+0x5a/0x8f0 [ 2652.309885] ? v9fs_write_inode+0x60/0x60 [ 2652.310501] legacy_get_tree+0x105/0x220 [ 2652.311091] vfs_get_tree+0x8e/0x300 [ 2652.311631] path_mount+0x1429/0x2120 [ 2652.312188] ? strncpy_from_user+0x9e/0x470 [ 2652.312813] ? finish_automount+0xa90/0xa90 [ 2652.313441] ? getname_flags.part.0+0x1dd/0x4f0 [ 2652.314114] ? _copy_from_user+0xfb/0x1b0 [ 2652.314723] __x64_sys_mount+0x282/0x300 [ 2652.315308] ? copy_mnt_ns+0xa00/0xa00 [ 2652.315878] do_syscall_64+0x33/0x40 [ 2652.316420] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2652.317162] RIP: 0033:0x7fe4d5f5bb19 [ 2652.317702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.320370] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2652.321474] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2652.322512] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2652.323545] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2652.324581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2652.325616] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2652.342336] FAT-fs (loop1): bogus number of FAT sectors [ 2652.343216] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2652.364429] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:25:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x80108907, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:25:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:25:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x600, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x101000, 0x106) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:25:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x0) keyctl$get_security(0x11, r3, 0x0, 0x0) r4 = getuid() keyctl$chown(0x4, r3, r4, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="c4aa26d1440ea4eb4ec47d1062421034db4becb3e59d12af2dbcd4788a3a7aa2a2b76114de67e59401370ad805f40abcd854b3a3c8e760d979bb42cba79b3fe0b6e928fd4830253dceecd0b326e373716062d8ae3b5d9d94304d684f99d3c1e9a170e1a1f46d2a283c9a06f343", @ANYBLOB="d83e4956408c2646c116d047604522723fe03e5f3184dfca1c1f13f9ae921596d8cf0394cb241174c3375f4aff0a73f847406bbc21a9039fa55b30f9abd7e2030ea4077bf319817483668ebdbc1279c963e9bea85af8e449dd736d936265d2d5641b6d512cffd535162d33ea39ca33aaff50fca1eaf36d", @ANYRESDEC=r3, @ANYBLOB="94f59aefc24d116c0a21bb0322530dfe9b2c61a1c3e31eab81520df4095245403ea3dd293b0f9d1ad08b4bfafd968728b2f0f83a849c42693bda487ec7f76347253714d0f96d7be4bee60f42ec3411cc73c0564031c25745440795e442d2f6d68e6a2c07066228b47e8b8cfbac12092b32ae3debf00c174a936d27e2c76d59ac8b5bdb005506e801cb2666fd4a2a8fa46838da445d333f750b0f6fc6cd68a8687228890433ab08b2baf4b591f607fecdb0d60802e370037d082be5b62be7df2a9f49c520f1a424ad16c579715ad7fd1b"], &(0x7f0000000200)=""/179, 0xb3) r5 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) [ 2652.619097] FAT-fs (loop1): bogus number of FAT sectors [ 2652.620514] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2652.638713] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:25:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 16) 04:25:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc0045878, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xf24, 0x5, &(0x7f0000000480)=[{&(0x7f0000000240)="874499bcf326da4b9ddecb3aa0921f0a10550a875fc006861cb9abb14aa72e445d1642bfa55c06f75a582da8c93dc43bce6bd06943371b95d1c0cc83bf992088ff67f7f1ea5302ef06090c87085986756f5a752b39563fc13617466fee31ec94272d3d6d48c692a9b31bbb57e828cb45c6d112720b9873d36ac8c97796534fc188b1e3e76caa13a37ad7f88762cacfcc892c0bf5b38e61112cc023bf2da40e6bd121a8e84808476e76289ac2da1bd043aa7774593e47d4a28e3dca6ddf850ab246fc9c0b8e38d2a35282597135", 0xcd, 0x9}, {&(0x7f0000000140)="0ee12f3332f5a9a418896365d89c2ddd70d469b8031fb6db752c8ff8ea72224fa8d4210b07ba3e433c27ad34f79f21fb79fc5bdf09bc4034616af205c3661f6a913d7d04bedf6b4822266693f2e6cb90ed20d1521ee3a183751265ac59", 0x5d, 0x2}, {&(0x7f0000000580)="31acff2e61757fc53b3009dc0b1d10a3d3ad16b6da3a2135f9e3668c32edcfd8eee8b303226b2661be71dd7f2aa210638cfcc23283b19a48bf2aa657865f53cf38f5bb542163e6e7e28fe7a552eb51e4f173350d200f335bb8f4e54d5d61bba552dd84746dd0ce476e42f57aeecbee0f1867e418fae07c33676c56e27449f2941bebaf02f5a4f34c554276cc41a54dbb000000", 0x93, 0x40000000000000}, {&(0x7f0000000340)="04490b71b1330f79e819b5e8ba19d562", 0x10, 0xec}, {&(0x7f0000000380)="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", 0xfe, 0x1}], 0x4000, &(0x7f0000000500)={[{@nonumtail}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'none'}}, {@shortname_lower}, {@utf8}, {@nonumtail}, {@utf8no}, {@shortname_winnt}]}) 04:25:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xfd00}) 04:25:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x700, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c6600000000040000000100000004000000000000000000000000000000400000000000003800"/64], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fsmount(r0, 0x0, 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r5 = fork() ptrace(0x10, r5) ptrace$getregset(0x4204, r5, 0x207, &(0x7f0000000080)={&(0x7f00000017c0)=""/4109, 0x100d}) [ 2652.826853] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2652.854243] FAULT_INJECTION: forcing a failure. [ 2652.854243] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.856813] CPU: 0 PID: 41208 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2652.858347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2652.860187] Call Trace: [ 2652.860784] dump_stack+0x107/0x167 [ 2652.861602] should_fail.cold+0x5/0xa [ 2652.862481] should_failslab+0x5/0x20 [ 2652.863334] __kmalloc_track_caller+0x79/0x370 [ 2652.864348] ? v9fs_session_init+0xa7/0x1680 [ 2652.865326] ? kernel_text_address+0xf2/0x120 [ 2652.866339] kstrdup+0x36/0x70 [ 2652.867069] v9fs_session_init+0xa7/0x1680 [ 2652.868017] ? lock_release+0x680/0x680 [ 2652.868906] ? find_held_lock+0x2c/0x110 [ 2652.869827] ? kmem_cache_alloc_trace+0x151/0x320 [ 2652.870910] ? v9fs_show_options+0x690/0x690 [ 2652.871914] ? trace_hardirqs_on+0x5b/0x180 [ 2652.872880] ? kasan_unpoison_shadow+0x33/0x50 [ 2652.873895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2652.875038] v9fs_mount+0x79/0x8f0 [ 2652.875835] ? v9fs_write_inode+0x60/0x60 [ 2652.876760] legacy_get_tree+0x105/0x220 [ 2652.877674] vfs_get_tree+0x8e/0x300 [ 2652.878510] path_mount+0x1429/0x2120 [ 2652.879370] ? strncpy_from_user+0x9e/0x470 [ 2652.880332] ? finish_automount+0xa90/0xa90 [ 2652.881294] ? getname_flags.part.0+0x1dd/0x4f0 [ 2652.882327] ? _copy_from_user+0xfb/0x1b0 [ 2652.883280] __x64_sys_mount+0x282/0x300 [ 2652.884185] ? copy_mnt_ns+0xa00/0xa00 [ 2652.885083] do_syscall_64+0x33/0x40 [ 2652.885912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2652.887058] RIP: 0033:0x7fe4d5f5bb19 [ 2652.887887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.891952] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2652.893644] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2652.895229] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2652.896807] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2652.898383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2652.899971] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:25:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="0d074eea72066d1f18e57c1491daca1a6a3580594b051bd2d43611ca3a09de256d7edfb5594ed1520ad67db936ebbdb36b8b91a06be9cb5639f5f5ff5c2affe59edbced1a46e3af284ff", 0x4a, 0x8}], 0x810009, &(0x7f0000000240)={[{@user_xattr}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x401}}, {@prjquota}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@fsmagic={'fsmagic', 0x3d, 0x40}}, {@context={'context', 0x3d, 'user_u'}}, {@appraise}]}) 04:25:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCNOTTY(r1, 0x5422) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000180)={'U+', 0x8}, 0x16, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000000), 0x9, 0x220040) write$binfmt_elf64(r4, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x96, 0x6, 0x5, 0x8, 0x9683, 0x2, 0x3e, 0x7fff, 0xd1, 0x40, 0x389, 0xffffffff, 0x8001, 0x38, 0x0, 0x0, 0x7f, 0x2}, [{0x4, 0x10001, 0xffffffff, 0x6, 0x6, 0x8, 0x5, 0x2}], "4be835545ce920ec50985e583faa11270accde8b3f8d4976a15015e0148855ae352f840762b9b9849593ed62b088e607331812e8fc", ['\x00', '\x00', '\x00']}, 0x3ad) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:25:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x900, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc0045878, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 17) 04:25:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:25:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000000000", 0x2a}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2668.680762] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2668.697789] FAULT_INJECTION: forcing a failure. [ 2668.697789] name failslab, interval 1, probability 0, space 0, times 0 [ 2668.699968] CPU: 1 PID: 41338 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2668.701249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2668.702696] Call Trace: [ 2668.703228] dump_stack+0x107/0x167 [ 2668.703903] should_fail.cold+0x5/0xa [ 2668.704697] ? create_object.isra.0+0x3a/0xa20 [ 2668.705684] should_failslab+0x5/0x20 [ 2668.706414] kmem_cache_alloc+0x5b/0x310 [ 2668.707137] create_object.isra.0+0x3a/0xa20 [ 2668.707902] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2668.708928] __kmalloc_track_caller+0x177/0x370 [ 2668.709852] ? v9fs_session_init+0xa7/0x1680 [ 2668.710781] ? kernel_text_address+0xf2/0x120 [ 2668.711667] kstrdup+0x36/0x70 [ 2668.712226] v9fs_session_init+0xa7/0x1680 [ 2668.712990] ? lock_release+0x680/0x680 [ 2668.713775] ? find_held_lock+0x2c/0x110 [ 2668.714639] ? kmem_cache_alloc_trace+0x151/0x320 [ 2668.715703] ? v9fs_show_options+0x690/0x690 [ 2668.716482] ? trace_hardirqs_on+0x5b/0x180 [ 2668.717234] ? kasan_unpoison_shadow+0x33/0x50 [ 2668.718028] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2668.718912] v9fs_mount+0x79/0x8f0 [ 2668.719548] ? v9fs_write_inode+0x60/0x60 [ 2668.720270] legacy_get_tree+0x105/0x220 [ 2668.720978] vfs_get_tree+0x8e/0x300 [ 2668.721626] path_mount+0x1429/0x2120 [ 2668.722295] ? strncpy_from_user+0x9e/0x470 [ 2668.723056] ? finish_automount+0xa90/0xa90 [ 2668.723814] ? getname_flags.part.0+0x1dd/0x4f0 [ 2668.724627] ? _copy_from_user+0xfb/0x1b0 [ 2668.725361] __x64_sys_mount+0x282/0x300 [ 2668.726067] ? copy_mnt_ns+0xa00/0xa00 [ 2668.726761] do_syscall_64+0x33/0x40 [ 2668.727417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2668.728306] RIP: 0033:0x7fe4d5f5bb19 [ 2668.728953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.732183] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2668.733514] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2668.734820] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2668.736362] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2668.737698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2668.739198] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:25:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc0189436, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2668.764791] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:25:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf00, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 04:25:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB=' ']) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:25:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:25:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc020660b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000000)={0x6, 'gre0\x00', {}, 0x2}) [ 2669.010501] FAT-fs (loop4): Unrecognized mount option " " or missing value [ 2669.043492] FAT-fs (loop4): Unrecognized mount option " " or missing value [ 2669.081617] FAT-fs (loop1): bogus number of FAT sectors [ 2669.082543] FAT-fs (loop1): Can't find a valid FAT filesystem 04:25:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() readv(r2, &(0x7f0000000000)=[{&(0x7f0000000200)=""/95, 0x5f}], 0x1) ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:25:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}) 04:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x2, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 18) 04:25:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x7f03, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x30, 0xffffffffffffffff, 0x10000000) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) syz_io_uring_submit(0x0, r0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x0, 0x0, r1, 0x0, r2, 0x2, 0x0, 0x1}, 0x1) 04:25:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:25:59 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c680000000000000000000000000400000000000000000000146b4150482a525a0000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050140)={0x1c, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x20, "aaa88f8b99a169"}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/178, 0xb2) r6 = dup(0xffffffffffffffff) r7 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r7, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$BTRFS_IOC_QGROUP_LIMIT(r7, 0x8030942b, &(0x7f0000000000)={0x8, {0x28, 0xffffffff, 0x100000001, 0x3ff, 0x1}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r8 = fork() ptrace(0x10, r8) [ 2684.524160] FAULT_INJECTION: forcing a failure. [ 2684.524160] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.525786] CPU: 1 PID: 41590 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2684.526626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2684.527642] Call Trace: [ 2684.527970] dump_stack+0x107/0x167 [ 2684.528414] should_fail.cold+0x5/0xa [ 2684.528885] should_failslab+0x5/0x20 [ 2684.529352] __kmalloc_track_caller+0x79/0x370 [ 2684.529923] ? v9fs_session_init+0xe9/0x1680 [ 2684.530616] ? kernel_text_address+0xf2/0x120 [ 2684.531184] kstrdup+0x36/0x70 [ 2684.531589] v9fs_session_init+0xe9/0x1680 [ 2684.532111] ? lock_release+0x680/0x680 [ 2684.532599] ? find_held_lock+0x2c/0x110 [ 2684.533100] ? kmem_cache_alloc_trace+0x151/0x320 [ 2684.533686] ? v9fs_show_options+0x690/0x690 [ 2684.534229] ? trace_hardirqs_on+0x5b/0x180 [ 2684.534761] ? kasan_unpoison_shadow+0x33/0x50 [ 2684.535316] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2684.535955] v9fs_mount+0x79/0x8f0 [ 2684.536506] ? v9fs_write_inode+0x60/0x60 [ 2684.537161] legacy_get_tree+0x105/0x220 [ 2684.537796] vfs_get_tree+0x8e/0x300 [ 2684.538278] path_mount+0x1429/0x2120 [ 2684.538864] ? strncpy_from_user+0x9e/0x470 [ 2684.539554] ? finish_automount+0xa90/0xa90 [ 2684.540232] ? getname_flags.part.0+0x1dd/0x4f0 [ 2684.540960] ? _copy_from_user+0xfb/0x1b0 [ 2684.541623] __x64_sys_mount+0x282/0x300 [ 2684.542267] ? copy_mnt_ns+0xa00/0xa00 [ 2684.542900] do_syscall_64+0x33/0x40 [ 2684.543518] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2684.544405] RIP: 0033:0x7fe4d5f5bb19 [ 2684.544866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2684.547920] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2684.549112] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2684.550182] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2684.551247] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2684.552434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2684.553297] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x4, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:25:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) [ 2684.594722] FAT-fs (loop1): bogus number of FAT sectors [ 2684.595454] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2684.608365] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:25:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:25:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 19) 04:25:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x3, 0x2007, @fd_index, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="4df4d034a9fd03099abc212ed72977be675f09de7a550a87777e04b7638c3cf7cb031155c893b41372b2579d36d78636f73d867bbeb2dbbeaa8ef596215126b6f56c96385745f2dcd46e30c002", 0x4d}, {&(0x7f0000000240)="736c2130654cf7a36e41eee787fdbaf14e67c0f79921639bb68cac16ade81c0375694d4425ed63be878b7421ed321ef7e690b28d413a9f8c2c83f74f7492b9bd78bc6fff00028c9308977c796312d4fa49c4e4f8c6f79a2924003d2808204e4a69dae7c5cd64a9ea971d840c5469357421854f506ac4fde0bb9a734dacc38ead1b8aea2c70dcbae7cbd54720362eb3e62c5aba50315084bbb9ef9d97f305901f3d5348cf09c9df91fe41f72e962e7364205fe71e978ac60d127ee54d76ce0443d6611eff4766dbf409", 0xc9}, {&(0x7f0000000040)="cb1828bc547dca7e6bfd", 0xa}, {&(0x7f0000000340)="5b9d83979b523dd9b1fbcd9c9671e156ff09c1a8b9fad65f651a811c84d79eafb5c285426db808b7bca846685796b1c12b02167d966bd57c489bbbd9646a394043d38124f224322a3cf197f666000a2d5e992d227def57d4aa17976e5a9fb7a908633fd0f81a9764f1f8697273a1b1700f17beb1399551189e21da3cd98f46ebf231304b9e6380d52d28aae7b991f6bdb4486efd75b17627400f57112b65f9bca82f68106dea7da31587edc60f154512ab2618425adadd22fb8cda123810aa524539be58fe8d3a4475692b9a95d0099d5d3c0aae0f5c5b5712d8b788937db5354eaf12ba1893574c0a41dba75e08d0e35d6ba380bebbe97d83", 0xf9}], 0x4, 0x8, 0x0, {0x3, r2}}, 0x3) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:25:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYRESDEC=r1], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, r4, &(0x7f0000000200), 0x1, &(0x7f0000000280)) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:25:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfd, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2684.876434] FAULT_INJECTION: forcing a failure. [ 2684.876434] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.879338] CPU: 0 PID: 41811 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2684.880953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2684.882781] Call Trace: [ 2684.883381] dump_stack+0x107/0x167 [ 2684.884210] should_fail.cold+0x5/0xa [ 2684.885071] ? create_object.isra.0+0x3a/0xa20 [ 2684.886095] should_failslab+0x5/0x20 [ 2684.886948] kmem_cache_alloc+0x5b/0x310 [ 2684.887880] create_object.isra.0+0x3a/0xa20 [ 2684.888867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2684.890024] __kmalloc_track_caller+0x177/0x370 [ 2684.891061] ? v9fs_session_init+0xe9/0x1680 [ 2684.892051] ? kernel_text_address+0xf2/0x120 [ 2684.893073] kstrdup+0x36/0x70 [ 2684.893796] v9fs_session_init+0xe9/0x1680 [ 2684.894744] ? lock_release+0x680/0x680 [ 2684.895638] ? find_held_lock+0x2c/0x110 [ 2684.896561] ? kmem_cache_alloc_trace+0x151/0x320 [ 2684.897639] ? v9fs_show_options+0x690/0x690 [ 2684.898646] ? trace_hardirqs_on+0x5b/0x180 [ 2684.899628] ? kasan_unpoison_shadow+0x33/0x50 [ 2684.900647] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2684.901784] v9fs_mount+0x79/0x8f0 [ 2684.902590] ? v9fs_write_inode+0x60/0x60 [ 2684.903525] legacy_get_tree+0x105/0x220 [ 2684.904446] vfs_get_tree+0x8e/0x300 [ 2684.905283] path_mount+0x1429/0x2120 [ 2684.906146] ? strncpy_from_user+0x9e/0x470 [ 2684.907109] ? finish_automount+0xa90/0xa90 [ 2684.908098] ? getname_flags.part.0+0x1dd/0x4f0 [ 2684.909133] ? _copy_from_user+0xfb/0x1b0 [ 2684.910086] __x64_sys_mount+0x282/0x300 [ 2684.910993] ? copy_mnt_ns+0xa00/0xa00 [ 2684.911912] do_syscall_64+0x33/0x40 [ 2684.912764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2684.913932] RIP: 0033:0x7fe4d5f5bb19 [ 2684.914790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2684.919004] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2684.920767] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2684.922394] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2684.924027] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2684.925661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2684.927287] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:25:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd00}) 04:25:59 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) lseek(r0, 0x7, 0x2) r3 = fcntl$dupfd(r1, 0x0, r2) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="73898174656d2e0700000059babbd992f4686875ecccaf377aac25b0e657326f157d927e0f48ed6653ac0fbf677d719f0cdb70f909b34ac8"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/43, 0x2b}) r5 = fork() ptrace(0x10, r5) [ 2684.979392] FAT-fs (loop1): bogus number of FAT sectors [ 2684.980774] FAT-fs (loop1): Can't find a valid FAT filesystem 04:25:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000", 0x27}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2685.127575] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:25:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x30000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:25:59 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x3ff}}, './file0\x00'}) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0xa6) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x60030, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x40, 0x3, &(0x7f0000000480)=[{&(0x7f0000000240)="955a25d64a49184a459e9e8591f7ae0f04fb2950af654f7520a1d019fec40208be39ce8626337cfd88dad9b92e0690b1e89524c1cb4a5547826acbf557197927df7484354474e9ec8430ca1d9a2f64d00d55a3c828669b42c80afb9baafb18529992fa8ddc9fcc1842cebe9cd12df9d7ff296e302335bff509da86442afd59c6353ed8a51b327e14d2b95a047cf08cb5dc9b5aaba0a43ec46b56aa17670f6cd67467b06d1701e8e5809137899a906122c1693e835e835fb3ad88766d543074bbf50969ef29fe83c2e8f747057c35b97ef0b65a3798bd5dc57121e385a5d23092671b8738b82060", 0xe7, 0x7fff}, {&(0x7f0000000340)="50ff0493134cdbe53d55c793d25f9ec4a031092e509c8bd172c646a389ff7f134cb0dc425b21e8c7000824e1f249ff65ccad4291a7461610a022b74eaf6a9a7f5159f5a8ea916dbd415c5cfdac5238baeeda2d1a28cb5582a51b97ed7246714dd2f70cf38fe42c92f4e8709b15b5c7c9c206bf153cc9170c51dfc8acd4404d30f1bb6d36666be5b80a74ff0a3b34adcf0427d355e9b42b7ca9524983badc7380064595e9d1802c3a", 0xa8, 0x7}, {&(0x7f0000000400)="30cb638921bab5ea516f926eed7241ec8fd20041c2a627ac3a2ab950908828cba6972b94d9192e8dfc10ea92247db08bcccecec0f282a6b4b910980a021e0f8d068831920195a08e4023dcc5644461bbad156455ce39d2cbaa8118a7caa0e8ce6097a10d03360d0ac6c5b7a568", 0x6d, 0x2}], 0x100000, &(0x7f0000000500)={[{@huge_within_size}, {@huge_never}, {@huge_always}], [{@smackfsfloor={'smackfsfloor', 0x3d, '$\'!%!\'#.C'}}]}) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000580)='pipefs\x00', &(0x7f00000005c0)='./file0\x00', 0xffffffffffffff9c) 04:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x3fe, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2685.374186] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2685.507289] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:26:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 20) 04:26:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) syz_mount_image$nfs4(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7fff, 0xa, &(0x7f0000000800)=[{&(0x7f0000000240)="2577d82c7e74f3d400a6473291b71942707d5ffa3a1d350459ca046f95e15af7ddc4a2356accd32a84155089a6c67207a98b6334e32e7c7dc410408e748c270ccf07eae4181fb753e2186d2f81ea9d7fa146af3f2093f76aaa72ac0590a374eff950", 0x62, 0x7}, {&(0x7f00000002c0)="d739f6978f2f73d0a6a5129d25b22ed062f416c6840bdce5cc80087142a35f1922a9d4307cd601063bb3700fbf03a76b5b9ecbf28b42982ccff31b11fe73f6e3f4bac1a3d8976886320a4fe6e5191b27571a", 0x52, 0xac}, {&(0x7f0000000340)="542d069fad7edbabb81d2719ec0b2378d3e4bf72df9b311a4205356bf9af6393102846da91f3e98029a393380b5cb6a10ab221755975888640ddf87376a997fa7994431d83d68b7d10f477e31ba1e9f9a14af1e53287884bdfab35c876f387556cbfabf2113c051ea68bcf309fe3134bd7bc9b316d565fc0faea53d457cf293a2d93548e08d8e4ef8390ce1c8327760b563a2eb14ed80ce6f893b550507bab8c5c35e38c5de43eedcf07d78034a55c11efd98b7751418a35c11241e8f12a90e21614c7758abfa73d46efde73c42b6cd79ef45ddebb6e301b8f5020991f361f3f3f3fe03fd0c0db2b0fb75adc42f0667e78800a50320ae8", 0xf7, 0x4}, {&(0x7f00000001c0)="1e60f7a546a4460b30fb47f4796dde62054c08a0383baa7c01a2dc03397485b34fa27ad17e539206162f7fe325b99ace3abe2bcafb212c1aea065cd305", 0x3d, 0xffffffff}, {&(0x7f0000000440)="dac101b398e281e91582548b6f95d0dfaa7eb812dd366409c67c2b35a75c661184e4ff88054a510607e3150c6f7dcc2ed078b914292ae2f450c0c91f9387a71a751da3e1f3340a02380c3bbb014d72d4f222a3f71d9bf2f4945b53f4804a0e2e57950a9e9e11d525cdb075e6a992393c566254d4ce2afeb545d7dac6dec204108da2ca30fc331aea74555f731092928b86cb4d1cc96dfcae7baf1084f655483ff7289eb2062cd0c1e0ce753fd337a98bb17dc66bce84a7532c43d401aaedd45d276b01807a15af2313f050bb86aad41606", 0xd1, 0x5}, {&(0x7f0000000540)="395e6b778fac00525e5351321eb2043faf38245f617d79e9ae30d209bac17c52888eea4bbc9ec1de16e7db8edef43b8c892f36af81d3385129f5c0e6fe6a4bb0169079a8b875347d5e8629713004505115e9f5ff1967ce46acb5fe428d3b", 0x5e, 0xffffffffffffb182}, {&(0x7f00000005c0)="f8e3b7bd63ee500662d3d1b4fc008ffda3e3beeba781acd006b54f446bf6aa7ea0b4eb947f0d957d55f43f722f41b6e0e0e94ad4da4b195505e2a555844b795c80fb5f9e5a9e985822b18279f47166ec63c41b4f0871ba9d8f8c0765219b646bbad1ac988a7fd5f1ba67bf25079618040f9645bb7c213c8b5bd274b6c30770f06a9573a505dcf88855c3da3665259eb1a1c292bbfda14da3d366d04d1f5ed5ae7868e65ec6958aa636096bec8bbbc18e6ee0823f4c2376ce7764", 0xba, 0x4}, {&(0x7f0000000680)="e1c1149ebf42ee0c62ccc7eef3e9fed1c1ca306086caa7902e55c8787e5d5af007da77d82a131cdd8249f1b0defa602806746979d505648c6fd098ba614cc2e57e26b3f45019f029a2f130d784780cc055b6bd1388d619a31bf0fb86", 0x5c, 0xffffffffffff70e3}, {&(0x7f0000000700)="754a2024157563917eeb509e468ac1b3fd51a683b326b568e6339cdbe22f2e61755f718354c33370aa254293aa5e6277b6382a936a8f09cd56f92551417ef55990da793913be0862d76d9f8c1edb28e63bb1cd545e2b22a3aea81b", 0x5b, 0x3}, {&(0x7f0000000780)="aef31a69c4c538bf715b4ab3d24e3386de46f2c768e29df6aca571f6ac16e4f962d9a52a23ca42d5e20c41449b2b2d5fb32c82e45f41750d52002cf2eb0d4b9b48ce6fc66ff52a666868ca0316efb750a024165fea7e4cd6795374771a6216d829df7fb9", 0x64, 0x7}], 0x1, &(0x7f0000000900)={[{'vfat\x00'}], [{@measure}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}]}) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 04:26:18 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) r5 = fcntl$getown(r3, 0x9) ptrace$getregset(0x4204, r5, 0x2, &(0x7f0000000000)={&(0x7f0000000200)=""/169, 0xa9}) 04:26:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x4000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:18 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b30, &(0x7f00000000c0)) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) r5 = fork() ptrace(0x10, r5) 04:26:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000010000", 0x27}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:26:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x34000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:26:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) [ 2703.494354] FAULT_INJECTION: forcing a failure. [ 2703.494354] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.496325] CPU: 0 PID: 42054 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2703.497462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.498795] Call Trace: [ 2703.499229] dump_stack+0x107/0x167 [ 2703.499830] should_fail.cold+0x5/0xa [ 2703.500470] ? p9_client_create+0xaf/0x1230 [ 2703.501170] should_failslab+0x5/0x20 [ 2703.501793] kmem_cache_alloc_trace+0x55/0x320 [ 2703.502552] ? find_held_lock+0x2c/0x110 [ 2703.503222] p9_client_create+0xaf/0x1230 [ 2703.503903] ? lock_downgrade+0x6d0/0x6d0 [ 2703.504611] ? p9_client_flush+0x430/0x430 [ 2703.505304] ? trace_hardirqs_on+0x5b/0x180 [ 2703.506000] ? lockdep_init_map_type+0x2c7/0x780 [ 2703.506755] ? __raw_spin_lock_init+0x36/0x110 [ 2703.507507] v9fs_session_init+0x1dd/0x1680 [ 2703.508219] ? lock_release+0x680/0x680 [ 2703.508881] ? kmem_cache_alloc_trace+0x151/0x320 [ 2703.509669] ? v9fs_show_options+0x690/0x690 [ 2703.510405] ? trace_hardirqs_on+0x5b/0x180 [ 2703.511103] ? kasan_unpoison_shadow+0x33/0x50 [ 2703.511854] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.512701] v9fs_mount+0x79/0x8f0 [ 2703.513277] ? v9fs_write_inode+0x60/0x60 [ 2703.513933] legacy_get_tree+0x105/0x220 [ 2703.514611] vfs_get_tree+0x8e/0x300 [ 2703.515213] path_mount+0x1429/0x2120 [ 2703.515840] ? strncpy_from_user+0x9e/0x470 [ 2703.516557] ? finish_automount+0xa90/0xa90 [ 2703.517253] ? getname_flags.part.0+0x1dd/0x4f0 [ 2703.518015] ? _copy_from_user+0xfb/0x1b0 [ 2703.518702] __x64_sys_mount+0x282/0x300 [ 2703.519357] ? copy_mnt_ns+0xa00/0xa00 [ 2703.520010] do_syscall_64+0x33/0x40 [ 2703.520630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2703.521457] RIP: 0033:0x7fe4d5f5bb19 [ 2703.522068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2703.525015] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2703.526251] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2703.527400] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2703.528549] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2703.529685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2703.530829] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2703.568798] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2703.617827] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:26:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfd00, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:26:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 21) 04:26:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2004010, 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) [ 2703.781264] FAULT_INJECTION: forcing a failure. [ 2703.781264] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.783875] CPU: 1 PID: 42259 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2703.785396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2703.787235] Call Trace: [ 2703.787874] dump_stack+0x107/0x167 [ 2703.788793] should_fail.cold+0x5/0xa [ 2703.789627] ? create_object.isra.0+0x3a/0xa20 [ 2703.790742] should_failslab+0x5/0x20 [ 2703.791661] kmem_cache_alloc+0x5b/0x310 [ 2703.792568] ? kernel_text_address+0xf2/0x120 [ 2703.793609] create_object.isra.0+0x3a/0xa20 [ 2703.794675] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.795832] kmem_cache_alloc_trace+0x151/0x320 [ 2703.796843] ? find_held_lock+0x2c/0x110 [ 2703.797739] p9_client_create+0xaf/0x1230 [ 2703.798634] ? lock_downgrade+0x6d0/0x6d0 [ 2703.799550] ? p9_client_flush+0x430/0x430 [ 2703.800476] ? trace_hardirqs_on+0x5b/0x180 [ 2703.801451] ? lockdep_init_map_type+0x2c7/0x780 [ 2703.802732] ? __raw_spin_lock_init+0x36/0x110 [ 2703.803829] v9fs_session_init+0x1dd/0x1680 [ 2703.804929] ? lock_release+0x680/0x680 [ 2703.805851] ? kmem_cache_alloc_trace+0x151/0x320 [ 2703.807078] ? v9fs_show_options+0x690/0x690 [ 2703.808117] ? trace_hardirqs_on+0x5b/0x180 [ 2703.809202] ? kasan_unpoison_shadow+0x33/0x50 [ 2703.810307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2703.811644] v9fs_mount+0x79/0x8f0 [ 2703.812529] ? v9fs_write_inode+0x60/0x60 [ 2703.813407] legacy_get_tree+0x105/0x220 [ 2703.814273] vfs_get_tree+0x8e/0x300 [ 2703.815072] path_mount+0x1429/0x2120 [ 2703.815896] ? strncpy_from_user+0x9e/0x470 [ 2703.816830] ? finish_automount+0xa90/0xa90 [ 2703.817755] ? getname_flags.part.0+0x1dd/0x4f0 [ 2703.818748] ? _copy_from_user+0xfb/0x1b0 [ 2703.819655] __x64_sys_mount+0x282/0x300 [ 2703.820543] ? copy_mnt_ns+0xa00/0xa00 [ 2703.821384] do_syscall_64+0x33/0x40 [ 2703.822175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2703.823278] RIP: 0033:0x7fe4d5f5bb19 [ 2703.824078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2703.828550] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2703.830458] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2703.832256] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2703.834035] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2703.835814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2703.837627] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2703.900338] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:26:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 22) 04:26:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="b1c035496b352a236732ed8c41a1a6fd1184aaa9d54670e4925ebc4d6cedad229c301d25aee10f0a3e0c0cee838367fa9fd7941759e9f96d76eabf25d71a10f3a2d684d1ad7b50acdf2a2dfdedff1e600f86391d491afe3e10e4f577da6061e133ff02ea5266494487f4f6873189733db74dbe82015f4f3e60310568d06b"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000300), 0x800004, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x0) 04:26:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) 04:26:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x80000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:26:35 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x3098c1, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="73797376656d7f39bd59a4641553bbd1e5ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) ioctl$BTRFS_IOC_QUOTA_CTL(r3, 0xc0109428, &(0x7f0000000040)={0x2, 0xffffffffffffffc1}) 04:26:35 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) syz_io_uring_setup(0x3df4, &(0x7f0000000200)={0x0, 0xf93b, 0x4, 0x3, 0x3a0, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000080)) syz_io_uring_setup(0x2162, &(0x7f0000000280)={0x0, 0x852c, 0x1, 0x3, 0x76, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000540), &(0x7f0000000300)=0x0) r6 = openat2(r0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x82080, 0x8, 0x14}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_io_uring_setup(0x1fe5, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r9 = io_uring_setup(0x20f1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r9, 0xa, 0x0, r10) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd=r7, 0xff, 0x0, 0x1, 0x4, 0x1, {0x0, r10}}, 0x7) syz_io_uring_submit(r4, r5, &(0x7f00000004c0)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r0, &(0x7f0000000400)={0x8}, r6, 0x3, 0x0, 0x0, {0x0, r10}}, 0x8) 04:26:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfe03, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2720.672349] FAT-fs (loop4): Unrecognized mount option "±À5Ik5*#g2íŒA¡¦ý„ª©ÕFpä’^¼Mlí­"œ0%®á [ 2720.672349] > gúŸ×”Yéùmvê¿%×ó¢Ö„Ñ­{P¬ß*-ýíÿ`†9Iþ>äõwÚ`aá3ÿêRfID‡ôö‡1‰s=·M¾‚_O>`1hÐk" or missing value [ 2720.700585] FAULT_INJECTION: forcing a failure. [ 2720.700585] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.703095] CPU: 1 PID: 42305 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2720.704592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2720.706406] Call Trace: [ 2720.706981] dump_stack+0x107/0x167 [ 2720.707771] should_fail.cold+0x5/0xa [ 2720.708737] should_failslab+0x5/0x20 [ 2720.709565] __kmalloc_track_caller+0x79/0x370 [ 2720.710557] ? p9_client_create+0x41d/0x1230 [ 2720.711519] kstrdup+0x36/0x70 [ 2720.712217] p9_client_create+0x41d/0x1230 [ 2720.713145] ? lock_downgrade+0x6d0/0x6d0 [ 2720.714272] ? p9_client_flush+0x430/0x430 [ 2720.715306] ? trace_hardirqs_on+0x5b/0x180 [ 2720.716242] ? lockdep_init_map_type+0x2c7/0x780 [ 2720.717281] ? __raw_spin_lock_init+0x36/0x110 [ 2720.718276] v9fs_session_init+0x1dd/0x1680 [ 2720.719209] ? lock_release+0x680/0x680 [ 2720.720079] ? kmem_cache_alloc_trace+0x151/0x320 [ 2720.721134] ? v9fs_show_options+0x690/0x690 [ 2720.722267] ? trace_hardirqs_on+0x5b/0x180 [ 2720.723346] ? kasan_unpoison_shadow+0x33/0x50 [ 2720.724406] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2720.725517] v9fs_mount+0x79/0x8f0 [ 2720.725620] FAT-fs (loop1): bogus number of FAT sectors [ 2720.726284] ? v9fs_write_inode+0x60/0x60 [ 2720.726306] legacy_get_tree+0x105/0x220 [ 2720.726328] vfs_get_tree+0x8e/0x300 [ 2720.727000] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2720.727862] path_mount+0x1429/0x2120 [ 2720.731187] ? strncpy_from_user+0x9e/0x470 [ 2720.732119] ? finish_automount+0xa90/0xa90 [ 2720.733062] ? getname_flags.part.0+0x1dd/0x4f0 [ 2720.734069] ? _copy_from_user+0xfb/0x1b0 [ 2720.734972] __x64_sys_mount+0x282/0x300 [ 2720.735847] ? copy_mnt_ns+0xa00/0xa00 [ 2720.736709] do_syscall_64+0x33/0x40 [ 2720.737529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2720.738637] RIP: 0033:0x7fe4d5f5bb19 [ 2720.739441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2720.743425] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2720.745098] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2720.746946] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2720.748740] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2720.750520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2720.752365] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:26:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x40000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2720.758052] SELinux: Context system_u:object_r:crond_unit_file_t:s0 is not valid (left unmapped). 04:26:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:26:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x400300, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:26:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:26:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ed800000000000000000001600"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40, 0x28) 04:26:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 23) 04:26:35 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'wg2\x00', {0x4}, 0x401}) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:26:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x1000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:35 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) fcntl$setlease(r3, 0x400, 0x2) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000ea7f062fccdb200000000000000000040f2ffffff000000000000000000006019000000000038000000000000000000"], 0x40) r4 = fcntl$dupfd(r1, 0x0, r2) r5 = fork() ptrace(0x10, r5) ioctl$KDSETLED(r4, 0x4b32, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2721.002024] FAT-fs (loop1): bogus number of FAT sectors [ 2721.002902] FAT-fs (loop1): Can't find a valid FAT filesystem 04:26:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf0ffff, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2721.031406] FAT-fs (loop4): Unrecognized mount option "í€" or missing value [ 2721.057736] FAULT_INJECTION: forcing a failure. [ 2721.057736] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.060183] CPU: 1 PID: 42539 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2721.061687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2721.063481] Call Trace: [ 2721.064057] dump_stack+0x107/0x167 [ 2721.064858] should_fail.cold+0x5/0xa [ 2721.065685] ? create_object.isra.0+0x3a/0xa20 [ 2721.066677] should_failslab+0x5/0x20 [ 2721.067499] kmem_cache_alloc+0x5b/0x310 [ 2721.068380] ? lock_downgrade+0x6d0/0x6d0 [ 2721.069293] create_object.isra.0+0x3a/0xa20 [ 2721.070242] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2721.071346] __kmalloc_track_caller+0x177/0x370 [ 2721.072352] ? p9_client_create+0x41d/0x1230 [ 2721.073318] kstrdup+0x36/0x70 [ 2721.074017] p9_client_create+0x41d/0x1230 [ 2721.074934] ? lock_downgrade+0x6d0/0x6d0 [ 2721.075838] ? p9_client_flush+0x430/0x430 [ 2721.076763] ? trace_hardirqs_on+0x5b/0x180 [ 2721.077700] ? lockdep_init_map_type+0x2c7/0x780 [ 2721.078730] ? __raw_spin_lock_init+0x36/0x110 [ 2721.079726] v9fs_session_init+0x1dd/0x1680 [ 2721.080663] ? lock_release+0x680/0x680 [ 2721.081543] ? kmem_cache_alloc_trace+0x151/0x320 [ 2721.082587] ? v9fs_show_options+0x690/0x690 [ 2721.083551] ? trace_hardirqs_on+0x5b/0x180 [ 2721.084487] ? kasan_unpoison_shadow+0x33/0x50 [ 2721.085484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2721.086588] v9fs_mount+0x79/0x8f0 [ 2721.087360] ? v9fs_write_inode+0x60/0x60 [ 2721.088260] legacy_get_tree+0x105/0x220 [ 2721.089150] vfs_get_tree+0x8e/0x300 [ 2721.089959] path_mount+0x1429/0x2120 [ 2721.090791] ? strncpy_from_user+0x9e/0x470 [ 2721.091727] ? finish_automount+0xa90/0xa90 [ 2721.092665] ? getname_flags.part.0+0x1dd/0x4f0 [ 2721.093686] ? _copy_from_user+0xfb/0x1b0 [ 2721.094596] __x64_sys_mount+0x282/0x300 [ 2721.095475] ? copy_mnt_ns+0xa00/0xa00 [ 2721.096331] do_syscall_64+0x33/0x40 [ 2721.097148] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2721.098260] RIP: 0033:0x7fe4d5f5bb19 [ 2721.099065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2721.103067] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2721.104719] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2721.106279] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2721.107827] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2721.109384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2721.110930] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2721.151610] FAT-fs (loop4): Unrecognized mount option "í€" or missing value 04:26:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd000000}) 04:26:49 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000001c40)=ANY=[@ANYRESDEC=r2, @ANYBLOB="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", @ANYRES64=r3, @ANYRESOCT, @ANYRESOCT], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) 04:26:49 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400000000000000000001000000000040000000000000e52b1ff1b9684335000000000000003800000000000000000057029fccab50382ee6ce7f1f784f2704adda28233664a4836026805399416fefe45bde4969c4ab67a58bae73b148b5383f3c8175994d73c4efa831d8f3bbd91a6bc386d4a50297c2e7fe4ab6beaeaa40a05978e51d80797cdcb83b89008fe9d77e30889566d495234220e2337e6341da09416a3ea5bc57aadfb74a77aa23048ced78c29b99d6cb331c6264ac88"], 0x40) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = fork() ptrace(0x10, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:26:49 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) r1 = openat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x400000, 0x20) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x9, 0x91}}, './file0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000012003106000000000000001bccef000000000100410edb44115c66a965a80ddfbe55f841b65430090000005ef6a651"], 0x20}}, 0x0) r5 = openat2(r3, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)={0x2100, 0x0, 0xb}, 0x18) sendmsg$nl_generic(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x400c050}, 0x0) sendfile(r2, r0, &(0x7f00000000c0)=0x5, 0x2) fspick(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x1) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x93b9b34456ffacb3, 0x2a) r7 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r7, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) fcntl$dupfd(r6, 0x406, r7) 04:26:49 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x1000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:26:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 24) 04:26:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x2000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2735.252583] FAULT_INJECTION: forcing a failure. [ 2735.252583] name failslab, interval 1, probability 0, space 0, times 0 [ 2735.255035] CPU: 0 PID: 42773 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2735.256515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2735.258297] Call Trace: [ 2735.258875] dump_stack+0x107/0x167 [ 2735.259670] should_fail.cold+0x5/0xa [ 2735.260508] should_failslab+0x5/0x20 [ 2735.261339] __kmalloc_track_caller+0x79/0x370 [ 2735.262325] ? p9_client_create+0x51e/0x1230 [ 2735.263295] kmemdup_nul+0x2d/0xa0 [ 2735.264068] p9_client_create+0x51e/0x1230 [ 2735.265010] ? p9_client_flush+0x430/0x430 [ 2735.265940] ? trace_hardirqs_on+0x5b/0x180 [ 2735.266881] ? lockdep_init_map_type+0x2c7/0x780 [ 2735.267916] ? __raw_spin_lock_init+0x36/0x110 [ 2735.268892] v9fs_session_init+0x1dd/0x1680 [ 2735.269835] ? lock_release+0x680/0x680 [ 2735.270722] ? kmem_cache_alloc_trace+0x151/0x320 [ 2735.271768] ? v9fs_show_options+0x690/0x690 [ 2735.272742] ? trace_hardirqs_on+0x5b/0x180 [ 2735.273688] ? kasan_unpoison_shadow+0x33/0x50 [ 2735.274679] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.275783] v9fs_mount+0x79/0x8f0 [ 2735.276559] ? v9fs_write_inode+0x60/0x60 [ 2735.277469] legacy_get_tree+0x105/0x220 [ 2735.278357] vfs_get_tree+0x8e/0x300 [ 2735.279169] path_mount+0x1429/0x2120 [ 2735.280007] ? strncpy_from_user+0x9e/0x470 [ 2735.280939] ? finish_automount+0xa90/0xa90 [ 2735.281880] ? getname_flags.part.0+0x1dd/0x4f0 [ 2735.282888] ? _copy_from_user+0xfb/0x1b0 [ 2735.283805] __x64_sys_mount+0x282/0x300 [ 2735.284687] ? copy_mnt_ns+0xa00/0xa00 [ 2735.285563] do_syscall_64+0x33/0x40 [ 2735.286356] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2735.287433] RIP: 0033:0x7fe4d5f5bb19 [ 2735.288220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2735.292080] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2735.293699] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2735.295194] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2735.296688] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2735.298194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2735.299687] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2735.310015] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:26:50 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r3, 0x40089413, &(0x7f0000000000)=0x9) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_link_settings={0x4c, 0x2, 0x7f, 0x7f, 0x3, 0x1, 0x6, 0x80, 0x40, 0x4, [0x81, 0x8, 0x6, 0x3, 0x2, 0x800, 0x71, 0xd8], [0x0]}}) 04:26:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}) [ 2735.414479] FAT-fs (loop1): bogus number of FAT sectors [ 2735.416077] FAT-fs (loop1): Can't find a valid FAT filesystem 04:26:50 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x2000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:26:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 25) 04:26:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x4000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:26:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000000240)="f8ffff0fffffeb0f83a8260d2ab06b405572f1ff00a4c0a99b42a5b1655efcdfd49ad6f1fe4420b3e9da1cb3841bedd30710f3e50a137ab6465d0bbad171e91bda68f65617f06674ee10a015d320c45f7e4c7b0a14a5d52f82808bb9dc7555c24a381892b4fb1db9c7da7cc814a8c7b950f011629b12a9cad921ebdab0af03567ea629aa6cdbc648853056688bd35034fef4f5c75fe0f1401fdb0e9dd2102f47a765f7ca87ed6d34e897cb9810bf78ff4d662cb33281e7920013dc4c007bd235c41e8042", 0xc4, 0x10000}], 0x2000000, &(0x7f0000000040)=ANY=[@ANYBLOB="20220000000000000004"]) r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) write$P9_RREADLINK(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="100000020000000000000066696c6530"], 0x10) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0xa4) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) chmod(&(0x7f00000001c0)='./file0\x00', 0x8) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x1) creat(&(0x7f0000000400)='./file0\x00', 0x134) [ 2735.636538] FAT-fs (loop4): Unrecognized mount option " "" or missing value [ 2735.643240] FAULT_INJECTION: forcing a failure. [ 2735.643240] name failslab, interval 1, probability 0, space 0, times 0 [ 2735.644591] CPU: 1 PID: 43022 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2735.645409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2735.646368] Call Trace: [ 2735.646677] dump_stack+0x107/0x167 [ 2735.647101] should_fail.cold+0x5/0xa [ 2735.647550] ? create_object.isra.0+0x3a/0xa20 [ 2735.648088] should_failslab+0x5/0x20 [ 2735.648530] kmem_cache_alloc+0x5b/0x310 [ 2735.649001] ? lock_downgrade+0x6d0/0x6d0 [ 2735.649490] create_object.isra.0+0x3a/0xa20 [ 2735.649998] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.650591] __kmalloc_track_caller+0x177/0x370 [ 2735.651133] ? p9_client_create+0x41d/0x1230 [ 2735.651654] kstrdup+0x36/0x70 [ 2735.652028] p9_client_create+0x41d/0x1230 [ 2735.652522] ? lock_downgrade+0x6d0/0x6d0 [ 2735.653005] ? p9_client_flush+0x430/0x430 [ 2735.653505] ? trace_hardirqs_on+0x5b/0x180 [ 2735.654006] ? lockdep_init_map_type+0x2c7/0x780 [ 2735.654568] ? __raw_spin_lock_init+0x36/0x110 [ 2735.655103] v9fs_session_init+0x1dd/0x1680 [ 2735.655604] ? lock_release+0x680/0x680 [ 2735.656070] ? kmem_cache_alloc_trace+0x151/0x320 [ 2735.656631] ? v9fs_show_options+0x690/0x690 [ 2735.657148] ? trace_hardirqs_on+0x5b/0x180 [ 2735.657658] ? kasan_unpoison_shadow+0x33/0x50 [ 2735.658188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.658777] v9fs_mount+0x79/0x8f0 [ 2735.659187] ? v9fs_write_inode+0x60/0x60 [ 2735.659671] legacy_get_tree+0x105/0x220 [ 2735.660146] vfs_get_tree+0x8e/0x300 [ 2735.660580] path_mount+0x1429/0x2120 [ 2735.661024] ? strncpy_from_user+0x9e/0x470 [ 2735.661527] ? finish_automount+0xa90/0xa90 [ 2735.662026] ? getname_flags.part.0+0x1dd/0x4f0 [ 2735.662564] ? _copy_from_user+0xfb/0x1b0 [ 2735.663044] __x64_sys_mount+0x282/0x300 [ 2735.663509] ? copy_mnt_ns+0xa00/0xa00 [ 2735.663963] do_syscall_64+0x33/0x40 [ 2735.664396] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2735.664985] RIP: 0033:0x7fe4d5f5bb19 [ 2735.665426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2735.667543] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2735.668416] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2735.669239] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2735.670066] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2735.670890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2735.671710] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2735.703518] FAT-fs (loop4): Unrecognized mount option " "" or missing value 04:27:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 26) 04:27:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f800002000400000000000000000000100", 0x26}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:27:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}, {&(0x7f0000000000), 0x0, 0xfffffffffffffff9}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:27:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000000000000000004b0000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="de1c00d9b500000022c58fa5301bda"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)={0x1090, 0x11, 0x100, 0x70bd25, 0x25dfdbff, {0x1}, [@generic="b9f7f18c7ce9a2bb903bdc43541fd09b87df02b2d7cc3def3fbd499bb5bc8d51fcbad6ac94e21568afd19c055fa410a9b7919a193a8b0e309b44969536a51ac94795f38e88de812b7a13d039a79ca023162490db0bb8a1c6f76d0a358c3c2438ef5374fe0df7251849c01f64d1b7c0cad388bbe7712d70082c", @generic="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"]}, 0x1090}, 0x1, 0x0, 0x0, 0x814}, 0x11) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:27:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}) 04:27:06 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x3000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x40000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:06 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) preadv2(r3, &(0x7f00000002c0)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000200)=""/171, 0xab}, {&(0x7f0000000000)=""/56, 0x38}, {&(0x7f0000000400)=""/159, 0x9f}, {&(0x7f00000004c0)=""/193, 0xc1}], 0x5, 0x7fff, 0x6, 0xe) fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) fork() [ 2751.796355] FAULT_INJECTION: forcing a failure. [ 2751.796355] name failslab, interval 1, probability 0, space 0, times 0 [ 2751.799275] CPU: 1 PID: 43119 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2751.799288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2751.799296] Call Trace: [ 2751.799330] dump_stack+0x107/0x167 [ 2751.799355] should_fail.cold+0x5/0xa [ 2751.799380] ? create_object.isra.0+0x3a/0xa20 [ 2751.799407] should_failslab+0x5/0x20 [ 2751.799428] kmem_cache_alloc+0x5b/0x310 [ 2751.799458] create_object.isra.0+0x3a/0xa20 [ 2751.799476] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2751.799507] __kmalloc_track_caller+0x177/0x370 [ 2751.799528] ? p9_client_create+0x51e/0x1230 [ 2751.799561] kmemdup_nul+0x2d/0xa0 [ 2751.799585] p9_client_create+0x51e/0x1230 [ 2751.799620] ? p9_client_flush+0x430/0x430 [ 2751.799644] ? trace_hardirqs_on+0x5b/0x180 [ 2751.799670] ? lockdep_init_map_type+0x2c7/0x780 [ 2751.799696] ? __raw_spin_lock_init+0x36/0x110 [ 2751.799726] v9fs_session_init+0x1dd/0x1680 [ 2751.799750] ? lock_release+0x680/0x680 [ 2751.799784] ? kmem_cache_alloc_trace+0x151/0x320 [ 2751.799806] ? v9fs_show_options+0x690/0x690 [ 2751.799839] ? trace_hardirqs_on+0x5b/0x180 [ 2751.799862] ? kasan_unpoison_shadow+0x33/0x50 [ 2751.799882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 04:27:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2751.799908] v9fs_mount+0x79/0x8f0 [ 2751.799930] ? v9fs_write_inode+0x60/0x60 [ 2751.799955] legacy_get_tree+0x105/0x220 [ 2751.799979] vfs_get_tree+0x8e/0x300 [ 2751.800000] path_mount+0x1429/0x2120 [ 2751.800029] ? strncpy_from_user+0x9e/0x470 [ 2751.800051] ? finish_automount+0xa90/0xa90 [ 2751.800073] ? getname_flags.part.0+0x1dd/0x4f0 [ 2751.800094] ? _copy_from_user+0xfb/0x1b0 04:27:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}) [ 2751.800127] __x64_sys_mount+0x282/0x300 [ 2751.800148] ? copy_mnt_ns+0xa00/0xa00 [ 2751.800184] do_syscall_64+0x33/0x40 [ 2751.800205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 04:27:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0xc4400, &(0x7f0000000180)='vfat\x00') 04:27:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfd000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2751.800220] RIP: 0033:0x7fe4d5f5bb19 [ 2751.800241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:27:06 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x4000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 27) [ 2751.800253] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2751.800277] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2751.800290] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2751.800303] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2751.800316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2751.800329] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2751.833882] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2751.867011] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2752.053442] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:27:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:27:06 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c4600000000000000000000000004000000000000000005ffffffffdf000000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000000500), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRESOCT=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRESDEC=r5, @ANYBLOB="1c005a8018000180140007", @ANYRES32=r2, @ANYRES16, @ANYRES16, @ANYRESDEC, @ANYRESHEX=r3], 0x38}}, 0x0) r10 = fork() ptrace(0x10, r10) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x48, r7, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x5dd, 0x2e}}}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x800, 0x3, 0x3, 0x0, {0x7, 0xff, 0x0, 0xdb, 0x0, 0x1, 0x0, 0x3}, 0x1, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x8010}, 0x20044000) [ 2752.271335] FAULT_INJECTION: forcing a failure. [ 2752.271335] name failslab, interval 1, probability 0, space 0, times 0 [ 2752.273762] CPU: 0 PID: 43349 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2752.275055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2752.276359] Call Trace: [ 2752.276806] dump_stack+0x107/0x167 [ 2752.277390] should_fail.cold+0x5/0xa [ 2752.278010] ? create_object.isra.0+0x3a/0xa20 [ 2752.278552] should_failslab+0x5/0x20 [ 2752.278986] kmem_cache_alloc+0x5b/0x310 [ 2752.279452] ? legacy_get_tree+0x105/0x220 [ 2752.279930] ? vfs_get_tree+0x8e/0x300 [ 2752.280383] create_object.isra.0+0x3a/0xa20 [ 2752.280883] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2752.281468] __kmalloc_track_caller+0x177/0x370 [ 2752.282009] ? parse_opts.part.0+0x8e/0x340 [ 2752.282509] kstrdup+0x36/0x70 [ 2752.282879] parse_opts.part.0+0x8e/0x340 [ 2752.283364] ? p9_fd_show_options+0x1c0/0x1c0 [ 2752.283885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2752.284482] ? quarantine_put+0x8b/0x1a0 [ 2752.284943] ? trace_hardirqs_on+0x5b/0x180 [ 2752.285435] ? kfree+0xd7/0x340 [ 2752.285831] p9_fd_create+0x98/0x4a0 [ 2752.286264] ? p9_conn_create+0x510/0x510 [ 2752.286729] ? p9_client_create+0x798/0x1230 [ 2752.287226] ? kfree+0xd7/0x340 [ 2752.287598] ? do_raw_spin_unlock+0x4f/0x220 [ 2752.288102] p9_client_create+0x7ff/0x1230 [ 2752.288595] ? p9_client_flush+0x430/0x430 [ 2752.289081] ? trace_hardirqs_on+0x5b/0x180 [ 2752.289566] ? lockdep_init_map_type+0x2c7/0x780 [ 2752.290116] ? __raw_spin_lock_init+0x36/0x110 [ 2752.290648] v9fs_session_init+0x1dd/0x1680 [ 2752.291140] ? lock_release+0x680/0x680 [ 2752.291604] ? kmem_cache_alloc_trace+0x151/0x320 [ 2752.292147] ? v9fs_show_options+0x690/0x690 [ 2752.292659] ? trace_hardirqs_on+0x5b/0x180 [ 2752.293151] ? kasan_unpoison_shadow+0x33/0x50 [ 2752.293668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2752.294255] v9fs_mount+0x79/0x8f0 [ 2752.294662] ? v9fs_write_inode+0x60/0x60 [ 2752.295137] legacy_get_tree+0x105/0x220 [ 2752.295605] vfs_get_tree+0x8e/0x300 [ 2752.296028] path_mount+0x1429/0x2120 [ 2752.296468] ? strncpy_from_user+0x9e/0x470 [ 2752.296965] ? finish_automount+0xa90/0xa90 [ 2752.297453] ? getname_flags.part.0+0x1dd/0x4f0 [ 2752.297982] ? _copy_from_user+0xfb/0x1b0 [ 2752.298463] __x64_sys_mount+0x282/0x300 [ 2752.298923] ? copy_mnt_ns+0xa00/0xa00 [ 2752.299380] do_syscall_64+0x33/0x40 [ 2752.299801] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2752.300380] RIP: 0033:0x7fe4d5f5bb19 [ 2752.300807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2752.302880] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2752.303740] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2752.304550] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2752.305353] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2752.306166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.306970] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2752.324045] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2752.365178] FAT-fs (loop1): bogus number of FAT sectors [ 2752.365825] FAT-fs (loop1): Can't find a valid FAT filesystem 04:27:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/187, 0xbb}], 0x2) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x40) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:dhcpc_var_run_t:s0\x00', 0x25, 0x3) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:27:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x4000000000000010, 0xffff}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:27:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 28) 04:27:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x5000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x7, 0x2}}, './file0\x00'}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x2, @broadcast}, 0x142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0xfffffffffffffffc, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="6002106c00080120000200004000f800002000400000000000000080000100000000000000", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f4", @ANYRES32=r0]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bond_slave_1\x00', 0x10) 04:27:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:27:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:27:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfdffffff, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2768.989623] FAULT_INJECTION: forcing a failure. [ 2768.989623] name failslab, interval 1, probability 0, space 0, times 0 [ 2768.991495] CPU: 1 PID: 43475 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2768.992729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2768.994022] Call Trace: [ 2768.994426] dump_stack+0x107/0x167 [ 2768.995014] should_fail.cold+0x5/0xa [ 2768.995703] should_failslab+0x5/0x20 [ 2768.996352] __kmalloc_track_caller+0x79/0x370 [ 2768.997179] ? match_number+0xaf/0x1d0 [ 2768.997842] kmemdup_nul+0x2d/0xa0 [ 2768.998366] match_number+0xaf/0x1d0 [ 2768.998921] ? match_u64+0x190/0x190 [ 2768.999463] ? __kmalloc_track_caller+0x2c6/0x370 [ 2769.000176] ? memcpy+0x39/0x60 [ 2769.000663] parse_opts.part.0+0x1f3/0x340 [ 2769.001290] ? p9_fd_show_options+0x1c0/0x1c0 [ 2769.001948] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2769.002712] ? trace_hardirqs_on+0x5b/0x180 [ 2769.003335] ? kfree+0xd7/0x340 [ 2769.003821] p9_fd_create+0x98/0x4a0 [ 2769.004369] ? p9_conn_create+0x510/0x510 [ 2769.004992] ? p9_client_create+0x798/0x1230 [ 2769.005621] ? kfree+0xd7/0x340 [ 2769.006108] ? do_raw_spin_unlock+0x4f/0x220 [ 2769.006859] p9_client_create+0x7ff/0x1230 [ 2769.007628] ? p9_client_flush+0x430/0x430 [ 2769.008400] ? trace_hardirqs_on+0x5b/0x180 [ 2769.009019] ? lockdep_init_map_type+0x2c7/0x780 [ 2769.009695] ? __raw_spin_lock_init+0x36/0x110 [ 2769.010363] v9fs_session_init+0x1dd/0x1680 [ 2769.010982] ? lock_release+0x680/0x680 [ 2769.011561] ? kmem_cache_alloc_trace+0x151/0x320 [ 2769.012250] ? v9fs_show_options+0x690/0x690 [ 2769.012888] ? trace_hardirqs_on+0x5b/0x180 [ 2769.013506] ? kasan_unpoison_shadow+0x33/0x50 [ 2769.014158] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2769.014894] v9fs_mount+0x79/0x8f0 [ 2769.015425] ? v9fs_write_inode+0x60/0x60 [ 2769.016021] legacy_get_tree+0x105/0x220 [ 2769.016606] vfs_get_tree+0x8e/0x300 [ 2769.017143] path_mount+0x1429/0x2120 [ 2769.017696] ? strncpy_from_user+0x9e/0x470 [ 2769.017992] FAT-fs (loop4): Unrecognized mount option "ô" or missing value [ 2769.018326] ? finish_automount+0xa90/0xa90 [ 2769.020377] ? getname_flags.part.0+0x1dd/0x4f0 [ 2769.021078] ? _copy_from_user+0xfb/0x1b0 [ 2769.021701] __x64_sys_mount+0x282/0x300 [ 2769.022284] ? copy_mnt_ns+0xa00/0xa00 [ 2769.022861] do_syscall_64+0x33/0x40 [ 2769.023407] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2769.024144] RIP: 0033:0x7fe4d5f5bb19 [ 2769.024679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.027607] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2769.028909] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2769.029956] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2769.030999] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2769.032010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.033133] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2769.063067] FAT-fs (loop1): bogus number of FAT sectors [ 2769.063865] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2769.079631] 9pnet: Insufficient options for proto=fd [ 2769.112506] FAT-fs (loop4): Unrecognized mount option "ô" or missing value 04:27:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 29) 04:27:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x6000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfe030000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 04:27:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:27:23 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x940, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c03a1b45845a3fc52000000200047fda34e3981cd072169171c040000130000000000000000000000004000"/64], 0x40) fcntl$dupfd(r0, 0x0, r1) r2 = fork() ptrace(0x10, r2) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000100)={0xa000000, 0x8, 0xe8, 0x8, 0x2, 0x100}) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x4000081}, 0x16, 0x0) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:27:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="601c6d6b646f730004000000000000000200004000f800002000400000000000005d92fde24b2300000001", 0x2b}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}, {&(0x7f0000000240)="24b35526a27c14c24aa904353c91498c55f6a2f5f920563242bcad7e1a229660a4dc520edc0fcabcc65152a55cd5bc5ec8844477b565b5a880973030d95954ebda1ab0bc512a80a6951b922f73853ba056eae4e65f6fdceb502b5fed8fb778b93db09d38348f468b0583b3ae433e989edee2b4e68801fe3027f265e8f5d979061159578cdc6ba7cd18250512c937333d90d390762fa63e0953d79a32180c5d0015c3dd6a1c02f665aa9babf55c01ede8e8e47a4f19071fa1458e5d3e522c5739479690b692ffc614bdd334b3a75b7d877b368a8d760b8790894e5de2ebd1a485cbca4d9d493e2f6cc1154701168ef9", 0xef, 0x4}, {&(0x7f0000000340)="aaf73f0bb6829c9017948d3d2fd9ae4f53a32704608e75c8babd07e33eb2b1363efcaf2d00d935e228b48a05cde90212ce394c7ade9369afcb1216d0399202aa27ad27d42c235173520488f831ff038a14d6286e00c0bc4b8e09d7cc9af72d12e28c1fe445a766c32597f3e221f682d08dcf2c37003684d084a3fce640dcf6abb53009bade78cb0f87c2641d25878c8a13acb94144b1708246e9efdfe93141cac8edbd03679fd40289d3fee67041fef68edee3cfd5aacf99cea9668e463c61899c6874418240c3e122fc23974087e2e0aa3a7e732ee3e2887b2f48aa18e1c723261e245f6542b715beb2ef9e75fd7c903a6cb1", 0xf3, 0x4}, {&(0x7f0000000140)="79f2ca1f43d2b3f2c863dba4dca6e08bc289d722cf303501dedf32dd87c5aaca5a3f9e1970e886e50d38816662188c396f7a4e54f5fa031993268e17201b8c5cd8b494", 0x43, 0x1}], 0xf8080, &(0x7f0000011000)) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x4, &(0x7f0000000740)=[{&(0x7f00000004c0)="3a4e876e4f47a995daed41339444e9711d0ac46d21039f9b3a5cc1715e085032da240fa2dfbee2cccfb1dbe2df0a43bc656247530b5904c77acba814a1eb27efc67e5b8001dfd87dc988e010d22de45b23bc5c8f8c889f36f54d6ff03f4429", 0x5f, 0x1}, {&(0x7f0000000540)="7f14a5a4ba998e434bd7a814bc2f0607575ce62139385d8e745937a6ca8fc86f3dd8f029eed27a8f3c1d850adefff260eaf6311936fd44b841eb28c2e09f086ff908c4607d8a8c68f00979e8c4a057272552ded10e0d5e2f73e8fc20572694114dcc24eeeb1287b449051bc71c67999939bb8a98d6bef268b7c10c9d92b54197fbdfa473b1", 0x85, 0x2}, {&(0x7f0000000600)="6164da805b80db2de6114f496a6d1fc9252d47f8b9e2f8c6136e8f51af7fb1aea18cf74878a9986501185b0344a92e6899ce44ee9e97c94c3e4e90434df8999e4aa696c2dfd94e9f3eab0e160a794135e6ea4ff29ae0bd2681d91d5bcaa0bbd5051ee51e", 0x64, 0xfffffffffffff001}, {&(0x7f0000000680)="cba503467f6b71d077c0155cae42abc8453103be5135f5c0139c33997d5d19f5a641e36696954e93be6fbea2ac9e11b41c19c9c6b360afc4bbd1d42851edbe1f000e850d479c79ccbe54405521a41e83a23e80928ea6e5f684549ae93c31f7f868a8da081a4af14596b08401d6c20b18c4a300e2e81de8709b5523ecf066e7278ce172e6c2d937532c731fbbcb2aea1e24242acc24", 0x95, 0x5}], 0x0, &(0x7f00000007c0)={[{@nobarrier}], [{@obj_role={'obj_role', 0x3d, '#\\{}'}}, {@subj_type={'subj_type', 0x3d, '^!+}@*\xb2'}}, {@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) r1 = openat(r0, &(0x7f0000000200)='./file0\x00', 0x800, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000840), 0x6e, &(0x7f0000000dc0)=[{&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/158, 0x9e}, {&(0x7f0000000a00)=""/204, 0xcc}, {&(0x7f0000000b00)=""/253, 0xfd}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/67, 0x43}, {&(0x7f0000000d40)=""/101, 0x65}], 0x7}, 0x10122) getdents64(r1, &(0x7f0000000e80)=""/211, 0xd3) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:27:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0xffffffff}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x30, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000040)) dup2(r4, r5) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) syz_io_uring_submit(r3, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r6, 0x0, 0x0, 0x0, {0x8000}}, 0x8) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f00000001c0)=ANY=[@ANYBLOB="9c45cb289520a000000000000003ff4477258c59b47e45f5af7c6cc58be2912302a30a941821400c62f07f0d7da90830e4106ca54d64133ef17d282b6c60cfc0d7e9809d843becbf9f45447d1d03292cc66d4f40da3d4f18f164c340d9f2e3cb1be7a1e79c63edf5295e9b9f5cf71c3556d8d1d0e0bde6f33ed0e759b269705d1d60e77474c68805ca9675f46ecb4ac49f4f25ff22d3d60e44dda2c3b1e4174ae124b65c9404918e15065591b541ae477b3d69b3e2c5f7dd7905fae3e023"]) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r7, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r7) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) [ 2769.245875] FAULT_INJECTION: forcing a failure. [ 2769.245875] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.247771] CPU: 1 PID: 43694 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2769.248797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2769.249913] Call Trace: [ 2769.250264] dump_stack+0x107/0x167 [ 2769.250758] should_fail.cold+0x5/0xa [ 2769.251290] ? create_object.isra.0+0x3a/0xa20 [ 2769.252014] should_failslab+0x5/0x20 [ 2769.252614] kmem_cache_alloc+0x5b/0x310 [ 2769.253270] create_object.isra.0+0x3a/0xa20 [ 2769.253929] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2769.254625] __kmalloc_track_caller+0x177/0x370 [ 2769.255237] ? match_number+0xaf/0x1d0 [ 2769.255753] kmemdup_nul+0x2d/0xa0 [ 2769.256226] match_number+0xaf/0x1d0 [ 2769.256726] ? match_u64+0x190/0x190 [ 2769.257222] ? __kmalloc_track_caller+0x2c6/0x370 [ 2769.257858] ? memcpy+0x39/0x60 [ 2769.258301] parse_opts.part.0+0x1f3/0x340 [ 2769.258874] ? p9_fd_show_options+0x1c0/0x1c0 [ 2769.259611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2769.260430] ? trace_hardirqs_on+0x5b/0x180 [ 2769.261184] ? kfree+0xd7/0x340 [ 2769.261618] p9_fd_create+0x98/0x4a0 [ 2769.262107] ? p9_conn_create+0x510/0x510 [ 2769.262647] ? p9_client_create+0x798/0x1230 [ 2769.263215] ? kfree+0xd7/0x340 [ 2769.263646] ? do_raw_spin_unlock+0x4f/0x220 [ 2769.264239] p9_client_create+0x7ff/0x1230 [ 2769.264800] ? p9_client_flush+0x430/0x430 [ 2769.265354] ? trace_hardirqs_on+0x5b/0x180 [ 2769.265922] ? lockdep_init_map_type+0x2c7/0x780 [ 2769.266542] ? __raw_spin_lock_init+0x36/0x110 [ 2769.267149] v9fs_session_init+0x1dd/0x1680 [ 2769.267843] ? lock_release+0x680/0x680 [ 2769.268403] ? kmem_cache_alloc_trace+0x151/0x320 [ 2769.269231] ? v9fs_show_options+0x690/0x690 [ 2769.269875] ? trace_hardirqs_on+0x5b/0x180 [ 2769.270451] ? kasan_unpoison_shadow+0x33/0x50 [ 2769.271048] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2769.271721] v9fs_mount+0x79/0x8f0 [ 2769.272191] ? v9fs_write_inode+0x60/0x60 [ 2769.272729] legacy_get_tree+0x105/0x220 [ 2769.273266] vfs_get_tree+0x8e/0x300 [ 2769.273761] path_mount+0x1429/0x2120 [ 2769.274260] ? strncpy_from_user+0x9e/0x470 [ 2769.274831] ? finish_automount+0xa90/0xa90 [ 2769.275406] ? getname_flags.part.0+0x1dd/0x4f0 [ 2769.276013] ? _copy_from_user+0xfb/0x1b0 [ 2769.276562] __x64_sys_mount+0x282/0x300 [ 2769.277092] ? copy_mnt_ns+0xa00/0xa00 [ 2769.277686] do_syscall_64+0x33/0x40 [ 2769.278206] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2769.279087] RIP: 0033:0x7fe4d5f5bb19 [ 2769.279671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.282066] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2769.283064] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2769.284120] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2769.285054] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2769.285971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.286899] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:27:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfffffffd, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2769.410805] FAT-fs (loop1): bogus number of FAT sectors [ 2769.411522] FAT-fs (loop1): Can't find a valid FAT filesystem 04:27:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 30) [ 2769.446090] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}) 04:27:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, 0x0) [ 2769.554297] FAULT_INJECTION: forcing a failure. [ 2769.554297] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.555620] CPU: 1 PID: 43820 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2769.556402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2769.557334] Call Trace: [ 2769.557639] dump_stack+0x107/0x167 [ 2769.558067] should_fail.cold+0x5/0xa [ 2769.558523] should_failslab+0x5/0x20 [ 2769.558959] __kmalloc_track_caller+0x79/0x370 [ 2769.559474] ? match_number+0xaf/0x1d0 [ 2769.559913] ? kfree+0xd7/0x340 [ 2769.560292] kmemdup_nul+0x2d/0xa0 [ 2769.560694] match_number+0xaf/0x1d0 [ 2769.561125] ? match_u64+0x190/0x190 [ 2769.561547] ? __kmalloc_track_caller+0x2c6/0x370 [ 2769.562114] ? memcpy+0x39/0x60 [ 2769.562503] parse_opts.part.0+0x1f3/0x340 [ 2769.562986] ? p9_fd_show_options+0x1c0/0x1c0 [ 2769.563504] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2769.564104] ? trace_hardirqs_on+0x5b/0x180 [ 2769.564594] ? kfree+0xd7/0x340 [ 2769.564976] p9_fd_create+0x98/0x4a0 [ 2769.565397] ? p9_conn_create+0x510/0x510 [ 2769.565864] ? p9_client_create+0x798/0x1230 [ 2769.566362] ? kfree+0xd7/0x340 [ 2769.566749] ? do_raw_spin_unlock+0x4f/0x220 [ 2769.567264] p9_client_create+0x7ff/0x1230 [ 2769.567755] ? p9_client_flush+0x430/0x430 [ 2769.568236] ? trace_hardirqs_on+0x5b/0x180 [ 2769.568723] ? lockdep_init_map_type+0x2c7/0x780 [ 2769.569269] ? __raw_spin_lock_init+0x36/0x110 [ 2769.569790] v9fs_session_init+0x1dd/0x1680 [ 2769.570285] ? lock_release+0x680/0x680 [ 2769.570750] ? kmem_cache_alloc_trace+0x151/0x320 [ 2769.571298] ? v9fs_show_options+0x690/0x690 [ 2769.571799] ? trace_hardirqs_on+0x5b/0x180 [ 2769.572297] ? kasan_unpoison_shadow+0x33/0x50 [ 2769.572813] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2769.573390] v9fs_mount+0x79/0x8f0 [ 2769.573792] ? v9fs_write_inode+0x60/0x60 [ 2769.574262] legacy_get_tree+0x105/0x220 [ 2769.574725] vfs_get_tree+0x8e/0x300 [ 2769.575146] path_mount+0x1429/0x2120 [ 2769.575588] ? strncpy_from_user+0x9e/0x470 [ 2769.576080] ? finish_automount+0xa90/0xa90 [ 2769.576572] ? getname_flags.part.0+0x1dd/0x4f0 [ 2769.577098] ? _copy_from_user+0xfb/0x1b0 [ 2769.577572] __x64_sys_mount+0x282/0x300 [ 2769.578032] ? copy_mnt_ns+0xa00/0xa00 [ 2769.578495] do_syscall_64+0x33/0x40 [ 2769.578918] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2769.579499] RIP: 0033:0x7fe4d5f5bb19 [ 2769.579921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.582015] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2769.582890] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2769.583700] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2769.584515] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2769.585325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.586131] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2769.587011] 9pnet: Insufficient options for proto=fd [ 2769.761741] EXT4-fs (sda): re-mounted. Opts: (null) 04:27:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x8000}) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:27:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, 0x0) 04:27:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x7000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000010000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) fcntl$dupfd(r4, 0x406, r1) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:27:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x7}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:27:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 31) 04:27:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x1000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 2783.353485] FAT-fs (loop4): bogus number of reserved sectors [ 2783.354816] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2783.370310] FAULT_INJECTION: forcing a failure. [ 2783.370310] name failslab, interval 1, probability 0, space 0, times 0 [ 2783.372002] CPU: 1 PID: 43954 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2783.372990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2783.374179] Call Trace: [ 2783.374565] dump_stack+0x107/0x167 [ 2783.375107] should_fail.cold+0x5/0xa [ 2783.375665] ? create_object.isra.0+0x3a/0xa20 [ 2783.376323] should_failslab+0x5/0x20 [ 2783.376867] kmem_cache_alloc+0x5b/0x310 [ 2783.377456] create_object.isra.0+0x3a/0xa20 [ 2783.378086] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2783.378816] __kmalloc_track_caller+0x177/0x370 [ 2783.379490] ? match_number+0xaf/0x1d0 [ 2783.380064] kmemdup_nul+0x2d/0xa0 [ 2783.380590] match_number+0xaf/0x1d0 [ 2783.381123] ? match_u64+0x190/0x190 [ 2783.381656] ? __kmalloc_track_caller+0x2c6/0x370 [ 2783.382347] ? memcpy+0x39/0x60 [ 2783.382825] parse_opts.part.0+0x1f3/0x340 [ 2783.383441] ? p9_fd_show_options+0x1c0/0x1c0 [ 2783.384088] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2783.384836] ? trace_hardirqs_on+0x5b/0x180 [ 2783.385453] ? kfree+0xd7/0x340 [ 2783.385935] p9_fd_create+0x98/0x4a0 [ 2783.386462] ? p9_conn_create+0x510/0x510 [ 2783.387055] ? p9_client_create+0x798/0x1230 [ 2783.387676] ? kfree+0xd7/0x340 [ 2783.388143] ? do_raw_spin_unlock+0x4f/0x220 [ 2783.388769] p9_client_create+0x7ff/0x1230 [ 2783.389380] ? p9_client_flush+0x430/0x430 [ 2783.389979] ? trace_hardirqs_on+0x5b/0x180 [ 2783.390591] ? lockdep_init_map_type+0x2c7/0x780 [ 2783.391273] ? __raw_spin_lock_init+0x36/0x110 [ 2783.391924] v9fs_session_init+0x1dd/0x1680 [ 2783.392546] ? kmem_cache_alloc_trace+0x151/0x320 [ 2783.393295] ? v9fs_show_options+0x690/0x690 [ 2783.394001] ? trace_hardirqs_on+0x5b/0x180 [ 2783.394704] ? kasan_unpoison_shadow+0x33/0x50 [ 2783.395363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2783.396086] v9fs_mount+0x79/0x8f0 [ 2783.396592] ? v9fs_write_inode+0x60/0x60 [ 2783.397182] legacy_get_tree+0x105/0x220 [ 2783.397760] vfs_get_tree+0x8e/0x300 [ 2783.398292] path_mount+0x1429/0x2120 [ 2783.398837] ? strncpy_from_user+0x9e/0x470 [ 2783.399456] ? finish_automount+0xa90/0xa90 [ 2783.400067] ? getname_flags.part.0+0x1dd/0x4f0 [ 2783.400728] ? _copy_from_user+0xfb/0x1b0 [ 2783.401324] __x64_sys_mount+0x282/0x300 [ 2783.401901] ? copy_mnt_ns+0xa00/0xa00 [ 2783.402465] do_syscall_64+0x33/0x40 [ 2783.403027] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2783.403752] RIP: 0033:0x7fe4d5f5bb19 [ 2783.404285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2783.406902] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2783.407983] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2783.408995] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2783.410001] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2783.411009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2783.412015] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:27:38 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x9000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd00000000000000}) [ 2783.476027] FAT-fs (loop4): bogus number of reserved sectors [ 2783.477579] FAT-fs (loop4): Can't find a valid FAT filesystem 04:27:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x4000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, 0x0) 04:27:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 32) 04:27:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x100000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:52 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r2 = fork() ptrace(0x10, r2) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80800) ioctl$MON_IOCT_RING_SIZE(r3, 0x9204, 0xf95d6) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) getpgrp(r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:27:52 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3, 0x2a63}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)={0x64, 0x6f, 0x2, {0x7, [{0x8, 0x1}, {0x20, 0x0, 0x8}, {0x1, 0x0, 0x8}, {0x40, 0x3, 0x6}, {0x80, 0x3, 0x2}, {0x20, 0x3, 0x8}, {0x10, 0x2, 0x5}]}}, 0x64) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000200000000000000000000000000401c0000a20000003800"/41], 0x40) fcntl$dupfd(r1, 0x0, r3) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) 04:27:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="601c6d6b646f736602106c00080120000200004000f80000200041000000000000000000016683608ed48dd733779acaa58cdd78a6553548e1db5c9d1295e6d3457f994b154cfd8d0000000000000003ed282d8708a00d25d8e01071a6d866d0e8e1904a1b43bf8e32c95126f5d99a89289e7c2c846c316ae06547acd0696c627063740d1513e004c3323c1dc4a9b052290333c1b46237e20b48e463e1f3bf6d8a2030b11d2c1d22d85b19c736a8a20e25957194af59027122cd284fa7b714dbe5e48651864fbc49a4c5bab2ad3391aec9458fac7528d738f257a256eceff88aae072481e07ddfec1e4e0af36cb391cf3b9ede384c44", 0xf6}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:27:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf000000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:27:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}) 04:27:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfffffffd, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2798.303704] FAULT_INJECTION: forcing a failure. [ 2798.303704] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.305245] FAT-fs (loop4): bread failed, FSINFO block (sector = 36005) [ 2798.307376] CPU: 1 PID: 44184 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2798.309522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.311251] Call Trace: [ 2798.311815] dump_stack+0x107/0x167 [ 2798.312576] should_fail.cold+0x5/0xa [ 2798.313381] should_failslab+0x5/0x20 [ 2798.314180] __kmalloc_track_caller+0x79/0x370 [ 2798.315141] ? match_number+0xaf/0x1d0 [ 2798.315973] ? kfree+0xd7/0x340 [ 2798.316666] kmemdup_nul+0x2d/0xa0 [ 2798.317415] match_number+0xaf/0x1d0 [ 2798.318211] ? match_u64+0x190/0x190 [ 2798.318990] ? __kmalloc_track_caller+0x2c6/0x370 [ 2798.320021] ? memcpy+0x39/0x60 [ 2798.320718] parse_opts.part.0+0x1f3/0x340 [ 2798.321622] ? p9_fd_show_options+0x1c0/0x1c0 [ 2798.322582] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2798.323705] ? trace_hardirqs_on+0x5b/0x180 [ 2798.324622] ? kfree+0xd7/0x340 [ 2798.325340] p9_fd_create+0x98/0x4a0 [ 2798.326137] ? p9_conn_create+0x510/0x510 [ 2798.327035] ? p9_client_create+0x798/0x1230 [ 2798.327995] ? kfree+0xd7/0x340 [ 2798.328706] ? do_raw_spin_unlock+0x4f/0x220 [ 2798.329671] p9_client_create+0x7ff/0x1230 [ 2798.330592] ? p9_client_flush+0x430/0x430 [ 2798.331475] ? trace_hardirqs_on+0x5b/0x180 [ 2798.332381] ? lockdep_init_map_type+0x2c7/0x780 [ 2798.333375] ? __raw_spin_lock_init+0x36/0x110 [ 2798.334344] v9fs_session_init+0x1dd/0x1680 [ 2798.335250] ? lock_release+0x680/0x680 [ 2798.336101] ? kmem_cache_alloc_trace+0x151/0x320 [ 2798.337106] ? v9fs_show_options+0x690/0x690 [ 2798.338030] ? trace_hardirqs_on+0x5b/0x180 [ 2798.338931] ? kasan_unpoison_shadow+0x33/0x50 [ 2798.339885] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2798.340944] v9fs_mount+0x79/0x8f0 [ 2798.341688] ? v9fs_write_inode+0x60/0x60 [ 2798.342562] legacy_get_tree+0x105/0x220 [ 2798.343422] vfs_get_tree+0x8e/0x300 [ 2798.344244] path_mount+0x1429/0x2120 [ 2798.345194] ? strncpy_from_user+0x9e/0x470 [ 2798.346280] ? finish_automount+0xa90/0xa90 [ 2798.347377] ? getname_flags.part.0+0x1dd/0x4f0 [ 2798.348527] ? _copy_from_user+0xfb/0x1b0 [ 2798.349566] __x64_sys_mount+0x282/0x300 [ 2798.350582] ? copy_mnt_ns+0xa00/0xa00 [ 2798.351587] do_syscall_64+0x33/0x40 [ 2798.352522] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2798.353798] RIP: 0033:0x7fe4d5f5bb19 [ 2798.354722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.359291] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2798.361166] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2798.362914] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2798.364658] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2798.366399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2798.368165] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2798.370283] 9pnet: Insufficient options for proto=fd 04:27:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x200000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2798.420461] FAT-fs (loop4): bread failed, FSINFO block (sector = 36005) 04:27:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}) 04:27:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x400000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="002d000000f0e03fa1bc587548ad389680e9aaece8cce929abbac6ca1487dea21d7e07b74b2f2f8af4c245135b7d014ce2040ecece27ced96b86477dafe2f18c6e765e04644824729580a2fe375d8855e52901eab1aa6fb2798b3a4c847ab6782702c0798ebd49fd4b3c65342bba1c0a11ea2692d6a877a4446f60ea3bcae2cf1e05c0790138d2fec5fa16fb5873a4cc2087ad2ece22c02279be3d4cb74674cbe1e1ffa1c9d52725c6881a4ead09d019244fec585a7d0bf2f2d77628879f229eb70103198bd8"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) r1 = getuid() keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$setperm(0x5, r2, 0x0) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = getuid() keyctl$chown(0x4, r2, r3, 0x0) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x120000, &(0x7f0000000340)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@fscache}, {@rq={'rq', 0x3d, 0xffffffffffffff81}}, {@sq={'sq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0xce}}, {@common=@version_9p2000}, {@rq={'rq', 0x3d, 0x1}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r3}}, {@subj_role}, {@audit}, {@permit_directio}, {@appraise_type}, {@uid_gt={'uid>', 0xee01}}]}}) 04:27:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x7f030000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2798.560567] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:27:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:27:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 33) 04:27:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x4000000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:27:53 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ftruncate(r1, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) [ 2798.662963] FAT-fs (loop1): bogus number of FAT sectors [ 2798.664214] FAT-fs (loop1): Can't find a valid FAT filesystem 04:27:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfd00000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2798.738469] FAULT_INJECTION: forcing a failure. [ 2798.738469] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.741041] CPU: 0 PID: 44435 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2798.742534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.744284] Call Trace: [ 2798.744859] dump_stack+0x107/0x167 [ 2798.745654] should_fail.cold+0x5/0xa [ 2798.746486] ? create_object.isra.0+0x3a/0xa20 [ 2798.747486] should_failslab+0x5/0x20 [ 2798.748310] kmem_cache_alloc+0x5b/0x310 [ 2798.749189] ? p9_fd_show_options+0x1c0/0x1c0 [ 2798.750171] create_object.isra.0+0x3a/0xa20 [ 2798.751120] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2798.752233] kmem_cache_alloc_trace+0x151/0x320 [ 2798.753254] p9_fd_create+0x161/0x4a0 [ 2798.754077] ? p9_conn_create+0x510/0x510 [ 2798.754968] ? p9_client_create+0x798/0x1230 [ 2798.755926] ? kfree+0xd7/0x340 [ 2798.756638] ? do_raw_spin_unlock+0x4f/0x220 [ 2798.757608] p9_client_create+0x7ff/0x1230 [ 2798.758543] ? p9_client_flush+0x430/0x430 [ 2798.759477] ? trace_hardirqs_on+0x5b/0x180 [ 2798.760414] ? lockdep_init_map_type+0x2c7/0x780 [ 2798.761448] ? __raw_spin_lock_init+0x36/0x110 [ 2798.762450] v9fs_session_init+0x1dd/0x1680 [ 2798.763396] ? lock_release+0x680/0x680 [ 2798.764274] ? kmem_cache_alloc_trace+0x151/0x320 [ 2798.765318] ? v9fs_show_options+0x690/0x690 [ 2798.766291] ? trace_hardirqs_on+0x5b/0x180 [ 2798.767230] ? kasan_unpoison_shadow+0x33/0x50 [ 2798.768226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2798.769325] v9fs_mount+0x79/0x8f0 [ 2798.770100] ? v9fs_write_inode+0x60/0x60 [ 2798.771001] legacy_get_tree+0x105/0x220 [ 2798.771892] vfs_get_tree+0x8e/0x300 [ 2798.772698] path_mount+0x1429/0x2120 [ 2798.773533] ? strncpy_from_user+0x9e/0x470 [ 2798.774466] ? finish_automount+0xa90/0xa90 [ 2798.775409] ? getname_flags.part.0+0x1dd/0x4f0 [ 2798.776418] ? _copy_from_user+0xfb/0x1b0 [ 2798.777335] __x64_sys_mount+0x282/0x300 [ 2798.778215] ? copy_mnt_ns+0xa00/0xa00 [ 2798.779084] do_syscall_64+0x33/0x40 [ 2798.779897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2798.781002] RIP: 0033:0x7fe4d5f5bb19 [ 2798.781806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.785759] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2798.787412] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2798.788955] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2798.790493] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2798.792045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2798.793585] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:28:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 34) 04:28:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:28:08 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400000000000000000000000000000040000000000000000000000000ffff0000000000000038000000000000100000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="d7328fe88c80cc99cae4e273ac217579"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x0) keyctl$get_security(0x11, r5, 0x0, 0x0) r6 = getuid() keyctl$chown(0x4, r5, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40000, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@uname={'uname', 0x3d, '/dev/full\x00'}}, {@mmap}, {@version_L}, {@cache_loose}, {@fscache}, {@access_any}, {@version_9p2000}, {@aname={'aname', 0x3d, '&#$}#/#@'}}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/hpet\x00'}}, {@obj_role={'obj_role', 0x3d, 'trusted.overlay.upper\x00'}}, {@hash}, {@subj_user={'subj_user', 0x3d, '+('}}, {@appraise_type}, {@euid_lt={'euid<', r6}}]}}) 04:28:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x8000, 0x76}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000010}, 0x40c0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2814.033388] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=44549 comm=syz-executor.4 [ 2814.043416] FAULT_INJECTION: forcing a failure. [ 2814.043416] name failslab, interval 1, probability 0, space 0, times 0 [ 2814.046084] CPU: 0 PID: 44546 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2814.047734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2814.049716] Call Trace: [ 2814.050334] dump_stack+0x107/0x167 04:28:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x9effffff, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:28:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYRES32=r3], 0x40) fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:28:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfdffffff00000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2814.051165] should_fail.cold+0x5/0xa [ 2814.052280] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 2814.053473] should_failslab+0x5/0x20 [ 2814.054328] kmem_cache_alloc+0x5b/0x310 [ 2814.055269] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2814.056440] p9_client_rpc+0x220/0x1370 [ 2814.057342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2814.058544] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2814.059759] ? pipe_poll+0x21b/0x7f0 [ 2814.060601] ? p9_fd_close+0x4a0/0x4a0 [ 2814.061478] ? anon_pipe_buf_release+0x280/0x280 [ 2814.062545] ? p9_fd_poll+0x1e0/0x2c0 [ 2814.063417] ? p9_fd_create+0x357/0x4a0 [ 2814.064321] ? p9_conn_create+0x510/0x510 [ 2814.065259] ? p9_client_create+0x798/0x1230 [ 2814.066248] ? kfree+0xd7/0x340 [ 2814.066995] ? do_raw_spin_unlock+0x4f/0x220 [ 2814.067007] FAT-fs (loop1): bogus number of FAT sectors [ 2814.067027] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2814.068024] p9_client_create+0xa76/0x1230 [ 2814.068072] ? p9_client_flush+0x430/0x430 [ 2814.071968] ? trace_hardirqs_on+0x5b/0x180 [ 2814.072937] ? lockdep_init_map_type+0x2c7/0x780 [ 2814.074011] ? __raw_spin_lock_init+0x36/0x110 [ 2814.075061] v9fs_session_init+0x1dd/0x1680 [ 2814.076053] ? lock_release+0x680/0x680 [ 2814.076975] ? kmem_cache_alloc_trace+0x151/0x320 [ 2814.078070] ? v9fs_show_options+0x690/0x690 [ 2814.079082] ? trace_hardirqs_on+0x5b/0x180 [ 2814.080069] ? kasan_unpoison_shadow+0x33/0x50 [ 2814.081100] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2814.082249] v9fs_mount+0x79/0x8f0 [ 2814.083059] ? v9fs_write_inode+0x60/0x60 [ 2814.084006] legacy_get_tree+0x105/0x220 [ 2814.084935] vfs_get_tree+0x8e/0x300 [ 2814.085777] path_mount+0x1429/0x2120 [ 2814.086653] ? strncpy_from_user+0x9e/0x470 [ 2814.087627] ? finish_automount+0xa90/0xa90 [ 2814.088613] ? getname_flags.part.0+0x1dd/0x4f0 [ 2814.089685] ? _copy_from_user+0xfb/0x1b0 [ 2814.090656] __x64_sys_mount+0x282/0x300 [ 2814.091589] ? copy_mnt_ns+0xa00/0xa00 [ 2814.092513] do_syscall_64+0x33/0x40 [ 2814.093370] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2814.094538] RIP: 0033:0x7fe4d5f5bb19 [ 2814.095379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2814.099530] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2814.101279] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2814.102879] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2814.104489] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2814.106082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2814.107668] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:28:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xf0ffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2814.154506] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2814.163382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=44549 comm=syz-executor.4 04:28:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 04:28:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}) 04:28:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xfe03000000000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="011c000001000005008000004d4f11c037e4118fa44715c9835321ce7d46e8ceb867ece58a4ae910c2", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r5 = fork() ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:28:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 35) 04:28:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xfcffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2828.956933] FAULT_INJECTION: forcing a failure. [ 2828.956933] name failslab, interval 1, probability 0, space 0, times 0 [ 2828.958645] CPU: 1 PID: 44789 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2828.959631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2828.960811] Call Trace: [ 2828.961181] dump_stack+0x107/0x167 [ 2828.961701] should_fail.cold+0x5/0xa [ 2828.962242] ? create_object.isra.0+0x3a/0xa20 [ 2828.962898] should_failslab+0x5/0x20 [ 2828.963445] kmem_cache_alloc+0x5b/0x310 [ 2828.964035] create_object.isra.0+0x3a/0xa20 [ 2828.964690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2828.965410] kmem_cache_alloc+0x159/0x310 [ 2828.966019] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2828.966734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2828.967476] p9_client_rpc+0x220/0x1370 [ 2828.968025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2828.968798] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2828.969568] ? pipe_poll+0x21b/0x7f0 [ 2828.970093] ? p9_fd_close+0x4a0/0x4a0 [ 2828.970641] ? anon_pipe_buf_release+0x280/0x280 [ 2828.971312] ? p9_fd_poll+0x1e0/0x2c0 [ 2828.971860] ? p9_fd_create+0x357/0x4a0 [ 2828.972439] ? p9_conn_create+0x510/0x510 [ 2828.973041] ? p9_client_create+0x798/0x1230 [ 2828.973678] ? kfree+0xd7/0x340 [ 2828.974140] ? do_raw_spin_unlock+0x4f/0x220 [ 2828.974757] p9_client_create+0xa76/0x1230 [ 2828.975380] ? p9_client_flush+0x430/0x430 [ 2828.975983] ? trace_hardirqs_on+0x5b/0x180 [ 2828.976619] ? lockdep_init_map_type+0x2c7/0x780 [ 2828.977300] ? __raw_spin_lock_init+0x36/0x110 [ 2828.977964] v9fs_session_init+0x1dd/0x1680 [ 2828.978569] ? lock_release+0x680/0x680 [ 2828.979125] ? kmem_cache_alloc_trace+0x151/0x320 [ 2828.979829] ? v9fs_show_options+0x690/0x690 [ 2828.980476] ? trace_hardirqs_on+0x5b/0x180 [ 2828.981107] ? kasan_unpoison_shadow+0x33/0x50 [ 2828.981768] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2828.982503] v9fs_mount+0x79/0x8f0 [ 2828.983015] ? v9fs_write_inode+0x60/0x60 [ 2828.983605] legacy_get_tree+0x105/0x220 [ 2828.984202] vfs_get_tree+0x8e/0x300 [ 2828.984731] path_mount+0x1429/0x2120 [ 2828.985263] ? strncpy_from_user+0x9e/0x470 [ 2828.985874] ? finish_automount+0xa90/0xa90 [ 2828.986485] ? getname_flags.part.0+0x1dd/0x4f0 [ 2828.987157] ? _copy_from_user+0xfb/0x1b0 [ 2828.987763] __x64_sys_mount+0x282/0x300 [ 2828.988343] ? copy_mnt_ns+0xa00/0xa00 [ 2828.988921] do_syscall_64+0x33/0x40 [ 2828.989474] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2828.990217] RIP: 0033:0x7fe4d5f5bb19 [ 2828.990753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2828.993322] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2828.994389] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2828.995400] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2828.996414] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2828.997400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2828.998423] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2829.004804] FAT-fs (loop1): bogus number of FAT sectors [ 2829.005664] FAT-fs (loop1): Can't find a valid FAT filesystem 04:28:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="001c31496161669512874bf9758fbe6fd8bdcfeaa2641dbf4b43cdcd9ee8871a21c1f3ce7a8f4327785eed6c6dcf25b973d5e5f09d432167000027f5608251bca3d2a0be4f659aa5d67592d20c7dab473bb6f5fd31b1a1df6cce6846a2aedb3a36ac6a2d2767df6b497acd66d342ac04f1161623a0b891d7a4c66ec0c06aa2a4756e02d277a351a2d9191a94a330932f2743657467cbfec87e58f04e9777486538b2bb0eaceeed33a2c593a07ec0b55895"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x1400, &(0x7f0000000300)={'trans=unix,', {[{@version_L}, {@fscache}, {@version_9p2000}], [{@seclabel}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x62, 0x63, 0x39, 0x38, 0x33, 0x33, 0x36], 0x2d, [0x32, 0x64, 0x62, 0x65], 0x2d, [0x37, 0x35, 0x64, 0x39], 0x2d, [0x33, 0x65, 0x63, 0x65], 0x2d, [0x39, 0x34, 0x62, 0x0, 0x32, 0x65, 0x38, 0x39]}}}]}}) 04:28:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r4 = dup(r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) r5 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) unlinkat(r5, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) [ 2829.036930] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:28:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0xffffffff00000000, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000100000000000000000038000000000000000000221d2ba872b6e049efa49566821771a94163b5295da14ba268fd9494d68a82681eb0335a1a3a1ecb42e40b3a3f61995be626e596bb9279eb0a3f61c77ddc508fa57c13967eaee635458d7b855be0eaac4587b216174a0b5893409b077531e4b8318ef9dea59317e0009b351740f2347f5855cdb43efe4eca45cd5d9c46e1ec311d60dffd4a9d21c3dfd8389dc782560b34"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() r5 = fork() ptrace(0x10, r5) ptrace(0x8, r5) ptrace(0x10, r4) 04:28:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:28:23 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) linkat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x3800) 04:28:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xfffff000, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:28:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd00}) [ 2829.314756] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:28:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7359ba00000000000000000000e083e1a9c729249d088cf329245d821292dbafa43c71f3b5e12ca9491a9e638bfcf4b798506323f159ff9b87c86c01e7f1f348ded8b1d460db4d882c2c326117af3f91658b32dab2220441a374abac7f2955374450cf2619"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) dup2(r3, r6) ptrace(0x10, r5) 04:28:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xffffff7f, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:28:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:28:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x1000000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@version_9p2000}, {@cache_none}, {@privport}, {@cache_fscache}, {@posixacl}, {@uname={'uname', 0x3d, '%'}}, {@privport}], [{@hash}, {@smackfsroot}, {@smackfsdef}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '%].\x1e]-@.&:/+'}}]}}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:28:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x4, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 36) 04:28:37 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x84) 04:28:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 2843.321475] FAULT_INJECTION: forcing a failure. [ 2843.321475] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.324158] CPU: 1 PID: 45144 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2843.325716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2843.327572] Call Trace: [ 2843.328167] dump_stack+0x107/0x167 [ 2843.328993] should_fail.cold+0x5/0xa [ 2843.329849] ? p9_fcall_init+0x97/0x290 [ 2843.330741] should_failslab+0x5/0x20 [ 2843.331592] __kmalloc+0x72/0x390 [ 2843.332376] p9_fcall_init+0x97/0x290 [ 2843.333246] p9_client_prepare_req.part.0+0x8c/0xac0 [ 2843.334387] p9_client_rpc+0x220/0x1370 [ 2843.335277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2843.336459] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2843.337660] ? pipe_poll+0x21b/0x7f0 [ 2843.338493] ? p9_fd_close+0x4a0/0x4a0 [ 2843.339363] ? anon_pipe_buf_release+0x280/0x280 [ 2843.340429] ? p9_fd_poll+0x1e0/0x2c0 [ 2843.341304] ? p9_fd_create+0x357/0x4a0 [ 2843.342196] ? p9_conn_create+0x510/0x510 [ 2843.343126] ? p9_client_create+0x798/0x1230 [ 2843.344109] ? kfree+0xd7/0x340 [ 2843.344846] ? do_raw_spin_unlock+0x4f/0x220 [ 2843.345847] p9_client_create+0xa76/0x1230 [ 2843.346805] ? p9_client_flush+0x430/0x430 [ 2843.347759] ? trace_hardirqs_on+0x5b/0x180 04:28:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x8, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2843.348728] ? lockdep_init_map_type+0x2c7/0x780 [ 2843.350038] ? __raw_spin_lock_init+0x36/0x110 [ 2843.351074] v9fs_session_init+0x1dd/0x1680 [ 2843.352040] ? lock_release+0x680/0x680 [ 2843.352947] ? kmem_cache_alloc_trace+0x151/0x320 [ 2843.354025] ? v9fs_show_options+0x690/0x690 [ 2843.355017] ? trace_hardirqs_on+0x5b/0x180 [ 2843.355985] ? kasan_unpoison_shadow+0x33/0x50 [ 2843.357013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2843.358149] v9fs_mount+0x79/0x8f0 [ 2843.358939] ? v9fs_write_inode+0x60/0x60 [ 2843.359866] legacy_get_tree+0x105/0x220 [ 2843.360776] vfs_get_tree+0x8e/0x300 [ 2843.361614] path_mount+0x1429/0x2120 [ 2843.362479] ? strncpy_from_user+0x9e/0x470 [ 2843.363444] ? finish_automount+0xa90/0xa90 [ 2843.364408] ? getname_flags.part.0+0x1dd/0x4f0 [ 2843.365459] ? _copy_from_user+0xfb/0x1b0 [ 2843.366414] __x64_sys_mount+0x282/0x300 [ 2843.367324] ? copy_mnt_ns+0xa00/0xa00 [ 2843.368207] do_syscall_64+0x33/0x40 [ 2843.369050] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2843.370193] RIP: 0033:0x7fe4d5f5bb19 [ 2843.371025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2843.375136] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2843.376836] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2843.378437] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2843.380032] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2843.381628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2843.383221] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2843.413949] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:28:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:28:38 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0xa, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 37) 04:28:38 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xffffff9e, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2843.522297] FAULT_INJECTION: forcing a failure. [ 2843.522297] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.523774] CPU: 0 PID: 45315 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2843.524627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2843.525646] Call Trace: [ 2843.525977] dump_stack+0x107/0x167 [ 2843.526433] should_fail.cold+0x5/0xa [ 2843.526906] ? p9_fcall_init+0x97/0x290 [ 2843.527398] should_failslab+0x5/0x20 [ 2843.527864] __kmalloc+0x72/0x390 [ 2843.528301] p9_fcall_init+0x97/0x290 [ 2843.528774] p9_client_prepare_req.part.0+0x8c/0xac0 [ 2843.529412] p9_client_rpc+0x220/0x1370 [ 2843.529898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2843.530548] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2843.531207] ? pipe_poll+0x21b/0x7f0 [ 2843.531666] ? p9_fd_close+0x4a0/0x4a0 [ 2843.532142] ? anon_pipe_buf_release+0x280/0x280 [ 2843.532725] ? p9_fd_poll+0x1e0/0x2c0 [ 2843.533210] ? p9_fd_create+0x357/0x4a0 [ 2843.533699] ? p9_conn_create+0x510/0x510 [ 2843.534207] ? p9_client_create+0x798/0x1230 [ 2843.534750] ? kfree+0xd7/0x340 [ 2843.535154] ? do_raw_spin_unlock+0x4f/0x220 [ 2843.535701] p9_client_create+0xa76/0x1230 [ 2843.536233] ? p9_client_flush+0x430/0x430 [ 2843.536756] ? trace_hardirqs_on+0x5b/0x180 [ 2843.537301] ? lockdep_init_map_type+0x2c7/0x780 [ 2843.537886] ? __raw_spin_lock_init+0x36/0x110 [ 2843.538454] v9fs_session_init+0x1dd/0x1680 [ 2843.538983] ? lock_release+0x680/0x680 [ 2843.539480] ? kmem_cache_alloc_trace+0x151/0x320 [ 2843.540074] ? v9fs_show_options+0x690/0x690 [ 2843.540626] ? trace_hardirqs_on+0x5b/0x180 [ 2843.541163] ? kasan_unpoison_shadow+0x33/0x50 [ 2843.541722] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2843.542343] v9fs_mount+0x79/0x8f0 [ 2843.542779] ? v9fs_write_inode+0x60/0x60 [ 2843.543286] legacy_get_tree+0x105/0x220 [ 2843.543784] vfs_get_tree+0x8e/0x300 [ 2843.544237] path_mount+0x1429/0x2120 [ 2843.544709] ? strncpy_from_user+0x9e/0x470 [ 2843.545247] ? finish_automount+0xa90/0xa90 [ 2843.545774] ? getname_flags.part.0+0x1dd/0x4f0 [ 2843.546343] ? _copy_from_user+0xfb/0x1b0 [ 2843.546859] __x64_sys_mount+0x282/0x300 [ 2843.547352] ? copy_mnt_ns+0xa00/0xa00 [ 2843.547842] do_syscall_64+0x33/0x40 [ 2843.548304] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2843.548932] RIP: 0033:0x7fe4d5f5bb19 [ 2843.549392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2843.551614] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2843.552536] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2843.553401] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2843.554260] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2843.555118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2843.555973] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:28:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x14, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:38 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000000)={0x5, 0x4, 0x9}) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) 04:28:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB="e8"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x1fe5, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r2 = io_uring_setup(0x20f1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd=r0, 0xff, 0x0, 0x1, 0x4, 0x1, {0x0, r3}}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x1, @remote}}, 0x0, 0x0, 0x1, {0x0, r3}}, 0x7) [ 2843.732068] FAT-fs (loop4): Unrecognized mount option "è" or missing value [ 2858.793021] FAULT_INJECTION: forcing a failure. [ 2858.793021] name failslab, interval 1, probability 0, space 0, times 0 [ 2858.794683] CPU: 1 PID: 45503 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2858.795665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2858.796782] Call Trace: [ 2858.797146] dump_stack+0x107/0x167 [ 2858.797647] should_fail.cold+0x5/0xa [ 2858.798166] ? p9_fcall_init+0x97/0x290 [ 2858.798714] should_failslab+0x5/0x20 [ 2858.799233] __kmalloc+0x72/0x390 [ 2858.799707] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2858.800406] p9_fcall_init+0x97/0x290 [ 2858.800958] p9_client_prepare_req.part.0+0xf4/0xac0 [ 2858.801699] p9_client_rpc+0x220/0x1370 [ 2858.802244] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2858.802961] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2858.803686] ? pipe_poll+0x21b/0x7f0 [ 2858.804192] ? p9_fd_close+0x4a0/0x4a0 [ 2858.804725] ? anon_pipe_buf_release+0x280/0x280 [ 2858.805369] ? p9_fd_poll+0x1e0/0x2c0 [ 2858.805932] ? p9_fd_create+0x357/0x4a0 [ 2858.806487] ? p9_conn_create+0x510/0x510 [ 2858.807054] ? p9_client_create+0x798/0x1230 [ 2858.807713] ? kfree+0xd7/0x340 [ 2858.808186] ? do_raw_spin_unlock+0x4f/0x220 [ 2858.808816] p9_client_create+0xa76/0x1230 [ 2858.809403] ? p9_client_flush+0x430/0x430 [ 2858.809981] ? trace_hardirqs_on+0x5b/0x180 [ 2858.810565] ? lockdep_init_map_type+0x2c7/0x780 [ 2858.811204] ? __raw_spin_lock_init+0x36/0x110 [ 2858.811821] v9fs_session_init+0x1dd/0x1680 [ 2858.812403] ? lock_release+0x680/0x680 [ 2858.812954] ? kmem_cache_alloc_trace+0x151/0x320 [ 2858.813615] ? v9fs_show_options+0x690/0x690 [ 2858.814545] ? trace_hardirqs_on+0x5b/0x180 [ 2858.815133] ? kasan_unpoison_shadow+0x33/0x50 [ 2858.815747] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2858.816435] v9fs_mount+0x79/0x8f0 [ 2858.816916] ? v9fs_write_inode+0x60/0x60 [ 2858.817493] legacy_get_tree+0x105/0x220 04:28:53 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600000000000000000000000004000000000000000000000000000000400000000000000000000000000000000020000000003800000000000000000046e92f8e337b6601cbb531a4605d4067e99662c8e5b3a4cee02583304ff42156bff43d6cbcb846b2f621df4f175fc8929772d35e31e7247c35fdb54a5e9d5f99ec8dcb70edee"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYRESDEC=r6], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) read(r5, &(0x7f0000000540)=""/133, 0x85) 04:28:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:53 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', r0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:28:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) 04:28:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) r4 = fork() ptrace(0x10, r4) syz_open_procfs(r4, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:28:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 38) 04:28:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xfffffff0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2858.818050] vfs_get_tree+0x8e/0x300 [ 2858.818700] path_mount+0x1429/0x2120 [ 2858.819238] ? strncpy_from_user+0x9e/0x470 [ 2858.819852] ? finish_automount+0xa90/0xa90 [ 2858.820460] ? getname_flags.part.0+0x1dd/0x4f0 [ 2858.821086] ? _copy_from_user+0xfb/0x1b0 [ 2858.821664] __x64_sys_mount+0x282/0x300 [ 2858.822218] ? copy_mnt_ns+0xa00/0xa00 [ 2858.822752] do_syscall_64+0x33/0x40 [ 2858.823284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2858.823979] RIP: 0033:0x7fe4d5f5bb19 [ 2858.824481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2858.827035] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2858.828074] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2858.829035] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2858.830054] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2858.831016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2858.831978] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2858.861712] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:28:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:28:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) 04:28:53 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB="02"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee00}}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="c1f552d7075e6f561e404bb8913eabd2be5ab76e271a9dc332c5d9497d5dc9fabc1e780550dbadb4e75f874b6d515a3a11889df3deb3519613163fffb31e1e99fede90cf65654fb4f9084393246daf5fd09b348c5d4dc6509e77bcec3859a19d01373c06b6369b9b18cd305cda3da66511118b1d3035eaac989d4d9f3b3bbf2c4fd672df7137277e86dc722c6c5aad136a96f85b09a0005bd023b811a589f113d4b8c90d6090c941135931e423fbbc56f5f5f178607c8d5b33970eca499db51d4768eb933aa558dd", 0xc8, 0x179b25ef}, {&(0x7f0000000140)="9d9c8e4394f47934b7cb6d08dab0ca618117cb5b161338724d1aa144dcd173f67ff0f0d644f4e446083e3b2b474ef97428b83fa02a76648c6726cf4de15475", 0x3f, 0x3}, {&(0x7f0000000340)="c9532b0aed2d5f2c4807309d74ee48f929fd3e1a7582006c088b61bca7683f2375bbca57cd6ad200e9718f58af4270583e7bd168996d5a333585576848b36b24cedeca704820b2016baa05ce6cdb4278fae9c5443550221eb21278a1404320b695e668dcf2c7eba69754bf254a80b7f2f47078de4cc5fb0cd808c1dfbd1b3ba27f14a61d14a05737811bf50dc105f9f6cb729776e3efdb9bec42d19a575e29b10559b144d729ffa06750a1c75436e639709bcaa1b649e0e00cd6164323a365e8d22078e7e21ab429267f73ebd09bddc1720b04caa8676e9390ef152267ebf414d39d1f182bcc325da5a77f", 0xeb, 0xe80}], 0x10041, &(0x7f0000000480)={[{@gid={'gid', 0x3d, 0xee01}}, {@huge_never}, {@size={'size', 0x3d, [0x32, 0x34, 0x74, 0x45, 0x78, 0x38, 0x70, 0x6d]}}], [{@smackfsdef}, {@euid_lt={'euid<', r1}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '['}}, {@subj_role={'subj_role', 0x3d, 'vfat\x00'}}]}) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:28:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x2, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xfffffffc, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2859.023406] FAT-fs (loop4): Unrecognized mount option "" or missing value 04:28:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 39) 04:28:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011000)) 04:28:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd000000}) [ 2859.083515] FAULT_INJECTION: forcing a failure. [ 2859.083515] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.086193] CPU: 0 PID: 45740 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2859.087724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2859.089616] Call Trace: [ 2859.090211] dump_stack+0x107/0x167 [ 2859.091045] should_fail.cold+0x5/0xa [ 2859.091905] ? create_object.isra.0+0x3a/0xa20 [ 2859.092955] should_failslab+0x5/0x20 [ 2859.093814] kmem_cache_alloc+0x5b/0x310 [ 2859.094750] create_object.isra.0+0x3a/0xa20 [ 2859.095737] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2859.096893] __kmalloc+0x16e/0x390 [ 2859.097724] p9_fcall_init+0x97/0x290 [ 2859.098601] p9_client_prepare_req.part.0+0xf4/0xac0 [ 2859.099764] p9_client_rpc+0x220/0x1370 [ 2859.100661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2859.101880] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2859.103088] ? pipe_poll+0x21b/0x7f0 [ 2859.103932] ? p9_fd_close+0x4a0/0x4a0 [ 2859.104809] ? anon_pipe_buf_release+0x280/0x280 [ 2859.105890] ? p9_fd_poll+0x1e0/0x2c0 [ 2859.106790] ? p9_fd_create+0x357/0x4a0 [ 2859.107690] ? p9_conn_create+0x510/0x510 [ 2859.108627] ? p9_client_create+0x798/0x1230 [ 2859.109622] ? kfree+0xd7/0x340 [ 2859.110363] ? do_raw_spin_unlock+0x4f/0x220 [ 2859.111371] p9_client_create+0xa76/0x1230 [ 2859.112348] ? p9_client_flush+0x430/0x430 [ 2859.113314] ? trace_hardirqs_on+0x5b/0x180 [ 2859.114304] ? lockdep_init_map_type+0x2c7/0x780 [ 2859.115378] ? __raw_spin_lock_init+0x36/0x110 [ 2859.116428] v9fs_session_init+0x1dd/0x1680 [ 2859.117414] ? lock_release+0x680/0x680 [ 2859.118332] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2859.119534] ? trace_hardirqs_on+0x5b/0x180 [ 2859.120512] ? v9fs_show_options+0x690/0x690 [ 2859.121537] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 2859.122686] ? kasan_unpoison_shadow+0x33/0x50 [ 2859.123719] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2859.124861] v9fs_mount+0x79/0x8f0 [ 2859.125676] ? v9fs_write_inode+0x60/0x60 [ 2859.126606] legacy_get_tree+0x105/0x220 [ 2859.127522] vfs_get_tree+0x8e/0x300 [ 2859.128356] path_mount+0x1429/0x2120 [ 2859.129211] ? strncpy_from_user+0x9e/0x470 [ 2859.130199] ? finish_automount+0xa90/0xa90 [ 2859.131170] ? getname_flags.part.0+0x1dd/0x4f0 [ 2859.132218] ? _copy_from_user+0xfb/0x1b0 [ 2859.133174] __x64_sys_mount+0x282/0x300 [ 2859.134093] ? copy_mnt_ns+0xa00/0xa00 [ 2859.134997] do_syscall_64+0x33/0x40 [ 2859.135832] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2859.136980] RIP: 0033:0x7fe4d5f5bb19 [ 2859.137831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2859.141887] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2859.143587] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2859.145160] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2859.146761] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2859.148352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2859.149960] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:28:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:28:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400000000000000000000000000000040000000000000000000000000000000000000000000380002e615cff4ff97e40227892a32fa0000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) sendmsg$IPSET_CMD_TYPE(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x24, 0xd, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x8014}, 0x10) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:29:09 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x105300, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000df47513efe2e4e392618ee8dff70bd20006044e3a580713d6414183fffff000000f7745f58000020000000000000001c992363a3126a915e2277d5ecedad381047b653085795445ab089ca0a041c597004e06ef80d711a206b5102abdc55aa68"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYRES16], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) r4 = open(0x0, 0x212100, 0xd) open(0x0, 0x212100, 0xd) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x20082, 0x0) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000000)=0xe, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) 04:29:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0xffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}) 04:29:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 40) 04:29:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011000)) 04:29:09 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x201, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0x1009}) r4 = fork() ptrace(0x10, r4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x24, 0x8, 0x0, 0x4, 0x0, 0x0, 0x8610a, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0xffffffff80000000, 0x64, 0x4, 0xd1f8, 0x25, 0x2, 0x0, 0x406a, 0x0, 0x2}, r4, 0x1, r0, 0x2) 04:29:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0xfd, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x77baea28dc8b509d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r0, r1, 0x1000) r2 = getgid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x0, &(0x7f0000000140), 0x1, &(0x7f0000000240)={[{@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x80}}, {@gid={'gid', 0x3d, r2}}, {@huge_never}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x37, 0x30]}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@size={'size', 0x3d, [0x65, 0x37, 0x70, 0x6d, 0x6d, 0x74]}}], [{@pcr={'pcr', 0x3d, 0x2f}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@smackfstransmute}, {@subj_user={'subj_user', 0x3d, '-'}}]}) [ 2875.049967] FAULT_INJECTION: forcing a failure. [ 2875.049967] name failslab, interval 1, probability 0, space 0, times 0 [ 2875.052652] CPU: 0 PID: 45862 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2875.054103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2875.055861] Call Trace: [ 2875.056427] dump_stack+0x107/0x167 [ 2875.057204] should_fail.cold+0x5/0xa [ 2875.058024] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2875.059251] should_failslab+0x5/0x20 [ 2875.060066] kmem_cache_alloc+0x5b/0x310 [ 2875.060962] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2875.062195] idr_get_free+0x4b5/0x8f0 [ 2875.063053] idr_alloc_u32+0x170/0x2d0 [ 2875.063904] ? __fprop_inc_percpu_max+0x130/0x130 [ 2875.064951] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2875.066128] ? lock_release+0x680/0x680 [ 2875.067005] idr_alloc+0xc2/0x130 [ 2875.067843] ? idr_alloc_u32+0x2d0/0x2d0 [ 2875.067895] ? rwlock_bug.part.0+0x90/0x90 [ 2875.067946] p9_client_prepare_req.part.0+0x612/0xac0 [ 2875.067990] p9_client_rpc+0x220/0x1370 [ 2875.068012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2875.068055] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2875.068089] ? pipe_poll+0x21b/0x7f0 [ 2875.068112] ? p9_fd_close+0x4a0/0x4a0 [ 2875.068133] ? anon_pipe_buf_release+0x280/0x280 [ 2875.068164] ? p9_fd_poll+0x1e0/0x2c0 [ 2875.068206] ? p9_fd_create+0x357/0x4a0 [ 2875.068231] ? p9_conn_create+0x510/0x510 [ 2875.068250] ? p9_client_create+0x798/0x1230 [ 2875.068274] ? kfree+0xd7/0x340 [ 2875.068290] ? do_raw_spin_unlock+0x4f/0x220 [ 2875.068332] p9_client_create+0xa76/0x1230 [ 2875.068378] ? p9_client_flush+0x430/0x430 [ 2875.068409] ? trace_hardirqs_on+0x5b/0x180 [ 2875.068439] ? lockdep_init_map_type+0x2c7/0x780 [ 2875.068471] ? __raw_spin_lock_init+0x36/0x110 [ 2875.068510] v9fs_session_init+0x1dd/0x1680 [ 2875.068536] ? lock_release+0x680/0x680 [ 2875.068579] ? kmem_cache_alloc_trace+0x151/0x320 [ 2875.068603] ? v9fs_show_options+0x690/0x690 [ 2875.068659] ? trace_hardirqs_on+0x5b/0x180 [ 2875.091081] ? kasan_unpoison_shadow+0x33/0x50 04:29:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000011000)) [ 2875.091104] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2875.091136] v9fs_mount+0x79/0x8f0 [ 2875.091163] ? v9fs_write_inode+0x60/0x60 [ 2875.091191] legacy_get_tree+0x105/0x220 [ 2875.091221] vfs_get_tree+0x8e/0x300 [ 2875.091245] path_mount+0x1429/0x2120 [ 2875.091279] ? strncpy_from_user+0x9e/0x470 [ 2875.091305] ? finish_automount+0xa90/0xa90 [ 2875.091330] ? getname_flags.part.0+0x1dd/0x4f0 [ 2875.091352] ? _copy_from_user+0xfb/0x1b0 [ 2875.091397] __x64_sys_mount+0x282/0x300 [ 2875.091420] ? copy_mnt_ns+0xa00/0xa00 [ 2875.091471] do_syscall_64+0x33/0x40 [ 2875.091493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2875.091508] RIP: 0033:0x7fe4d5f5bb19 [ 2875.091528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:29:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0xf, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2875.091540] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2875.091565] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 04:29:09 executing program 4: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) r1 = getuid() r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = getuid() keyctl$chown(0x4, r2, r3, 0x0) add_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="d7faee57b4e6d7b80a5a21339164f5b4c808f44157913317fa157e12924c55b22e8afaf09bf7de7c4957a64d8913cffededdcad4fd240f4ea83a27f16e787036f3e67408787b818bb664793bfed0d6f1f7df07fa84692441fa7591390b597ee2771d2665a0f8f824bcd4f4eb2f4c294e2ac32e7406d69f0a49d53a02ca3d055514baae0b7216b27348ad9f2455fafb005f322be89673edb5d7da8bd84590ca4e9294fad033a371c93f90cb7fbad240dab4af1491c2d0d8a649ec4e3048a5547ef8bb11", 0xc3, r0) r4 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x0) keyctl$get_security(0x11, r4, 0x0, 0x0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0x0) add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r4) r6 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f00000000c0)={[{@fat=@discard}, {@fat=@tz_utc}], [{@fowner_lt={'fowner<', r1}}, {@obj_type={'obj_type', 0x3d, 'tz=UTC'}}]}) unlinkat(r6, &(0x7f0000000040)='./file0\x00', 0x200) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) [ 2875.091579] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2875.091592] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2875.091605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2875.091619] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2875.105402] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:29:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}], 0x0, &(0x7f0000011000)) 04:29:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 41) 04:29:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x3fe, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2875.307544] FAULT_INJECTION: forcing a failure. [ 2875.307544] name failslab, interval 1, probability 0, space 0, times 0 [ 2875.308967] CPU: 1 PID: 46061 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2875.309813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2875.310851] Call Trace: [ 2875.311180] dump_stack+0x107/0x167 [ 2875.311634] should_fail.cold+0x5/0xa [ 2875.312111] ? create_object.isra.0+0x3a/0xa20 [ 2875.312684] should_failslab+0x5/0x20 [ 2875.313155] kmem_cache_alloc+0x5b/0x310 [ 2875.313668] create_object.isra.0+0x3a/0xa20 [ 2875.314222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2875.314854] kmem_cache_alloc+0x159/0x310 [ 2875.315371] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2875.316065] idr_get_free+0x4b5/0x8f0 [ 2875.316548] idr_alloc_u32+0x170/0x2d0 [ 2875.317035] ? __fprop_inc_percpu_max+0x130/0x130 [ 2875.317629] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2875.318294] ? lock_release+0x680/0x680 [ 2875.318776] idr_alloc+0xc2/0x130 [ 2875.319198] ? idr_alloc_u32+0x2d0/0x2d0 [ 2875.319692] ? rwlock_bug.part.0+0x90/0x90 [ 2875.320221] p9_client_prepare_req.part.0+0x612/0xac0 [ 2875.320848] p9_client_rpc+0x220/0x1370 [ 2875.321336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2875.322001] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2875.322660] ? pipe_poll+0x21b/0x7f0 [ 2875.323118] ? p9_fd_close+0x4a0/0x4a0 [ 2875.323599] ? anon_pipe_buf_release+0x280/0x280 [ 2875.324173] ? p9_fd_poll+0x1e0/0x2c0 [ 2875.324644] ? p9_fd_create+0x357/0x4a0 [ 2875.325136] ? p9_conn_create+0x510/0x510 [ 2875.325644] ? p9_client_create+0x798/0x1230 [ 2875.326191] ? kfree+0xd7/0x340 [ 2875.326593] ? do_raw_spin_unlock+0x4f/0x220 [ 2875.327143] p9_client_create+0xa76/0x1230 [ 2875.327669] ? p9_client_flush+0x430/0x430 [ 2875.328184] ? trace_hardirqs_on+0x5b/0x180 [ 2875.328710] ? lockdep_init_map_type+0x2c7/0x780 [ 2875.329292] ? __raw_spin_lock_init+0x36/0x110 [ 2875.329862] v9fs_session_init+0x1dd/0x1680 [ 2875.330398] ? lock_release+0x680/0x680 [ 2875.330886] ? kmem_cache_alloc_trace+0x151/0x320 [ 2875.331482] ? v9fs_show_options+0x690/0x690 [ 2875.332031] ? trace_hardirqs_on+0x5b/0x180 [ 2875.332558] ? kasan_unpoison_shadow+0x33/0x50 [ 2875.333123] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2875.333740] v9fs_mount+0x79/0x8f0 [ 2875.334187] ? v9fs_write_inode+0x60/0x60 [ 2875.334699] legacy_get_tree+0x105/0x220 [ 2875.335194] vfs_get_tree+0x8e/0x300 [ 2875.335647] path_mount+0x1429/0x2120 [ 2875.336112] ? strncpy_from_user+0x9e/0x470 [ 2875.336632] ? finish_automount+0xa90/0xa90 [ 2875.337154] ? getname_flags.part.0+0x1dd/0x4f0 [ 2875.337717] ? _copy_from_user+0xfb/0x1b0 [ 2875.338227] __x64_sys_mount+0x282/0x300 [ 2875.338728] ? copy_mnt_ns+0xa00/0xa00 [ 2875.339205] do_syscall_64+0x33/0x40 [ 2875.339657] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2875.340284] RIP: 0033:0x7fe4d5f5bb19 [ 2875.340735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2875.342990] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2875.343898] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2875.344763] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2875.345621] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2875.346483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2875.347345] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2875.377920] FAT-fs (loop1): bogus number of reserved sectors [ 2875.379371] FAT-fs (loop1): Can't find a valid FAT filesystem 04:29:24 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x210000}], 0x0, &(0x7f0000011000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x401, 0x5, &(0x7f0000000500)=[{&(0x7f0000000200)="e758ede27a2e3cb7e9c9eab5073057c1b95a6e6f86a38df670cfeec2c21d398affe38d10a19afc3f2a94f737c3cdf2d8eeb6cf8476bb4139e568613d9d149377c3720eab2284fc7edd8574a96bb9803fb702cf176dfcb7a3ce4cec98", 0x5c, 0x1}, {&(0x7f0000000280)="b72058dadc9775858d2febe04ad16eaaf64c164075f8ad4fee074f1aa10a769ee9fca436161678134356e97157f5a0f4a59da46fb86b7f0684c53c23dd947096c24084451eef9d", 0x47, 0x101}, {&(0x7f0000000300)="ea4c263cdc05ca7ef13f57683d9ba211c020214135690babc1277039182376aeb597fb9c633a6e96da7bd975b4803051288ac8660bc46c0320d9139e7ea756562f6c2c80f05bb88b6549e68f98540b02ef99dd0c79e1e6e338fcd5412d9d3fea21fa7543baca7b153f6736bb", 0x6c, 0x1}, {&(0x7f0000000380)="fa3443f9e3bec0a1fa045efc079c5e49d52431990d676eb6b467e1673250102d1fba74e338372e94f39a7248dc32ed1cfa8eb7e8def38be2d6a7a557fbc73c2ad0ac8ffd9916e71cec94f8992ae7c16a2d14df62b38ae344a58e5644855c6a95c3e09a4ea74bef66814689a0e98c9ed47ec2ef5c08de92e87d6b282843656fdc353b382552475f7aeb386e56416e688971934f3842b95bfb2f6ff876eeef6599f31194fc6b58f69701de7b03b67349ce2bbd0084735ac8c2eef8cdf590e2fac2c7e32cf4d76a9b90afea297c3c9ae54b", 0xd0, 0x2}, {&(0x7f0000000480)="fa55f09d47e065f01843f4dc1800c7228d748672f262fdfbf480b53762c92864752447b99ab0b345a94720d4235775e6aa3ad36282e612f0ce8f47fbdf6a44bd73b17299dd91e219ee9e0359311e1bfc17b3", 0x52}], 0x4404, &(0x7f0000000600)={[{',{'}, {'^'}], [{@dont_measure}, {@fowner_gt={'fowner>', r1}}, {@subj_type}, {@audit}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@smackfsdef}, {@audit}, {@dont_hash}]}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="010003000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:29:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4000, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 42) 04:29:24 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x8000, @mcast1}, 0x1c) syncfs(0xffffffffffffffff) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x12) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) write$9p(0xffffffffffffffff, &(0x7f00000000c0)="0fb865562069ab2f32beb83e263962827b00d7d8b791e504b65c5ed26e6688d67a9796c1aedca0de65d21b4796fd1b3df0ccedf9739e29f6b965de85433255da7945b7a842ba5fa3dbe88cd26fc9b1b807bc2d59e5a9f2c2bdaccdb839190141ba0151232669cb02b3b076251c024d73f501a54d959dac7cdb3fc324ab47f2a3e1ef12691eac5cab96860e948ea4", 0x8e) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r3) 04:29:24 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) dup(0xffffffffffffffff) r3 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x9, 0x1fff, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:29:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}) 04:29:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}], 0x0, &(0x7f0000011000)) [ 2889.636252] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2889.641466] FAULT_INJECTION: forcing a failure. [ 2889.641466] name failslab, interval 1, probability 0, space 0, times 0 [ 2889.644299] CPU: 1 PID: 46115 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2889.646049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2889.648163] Call Trace: [ 2889.648837] dump_stack+0x107/0x167 [ 2889.649765] should_fail.cold+0x5/0xa [ 2889.650908] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2889.652152] should_failslab+0x5/0x20 [ 2889.652973] kmem_cache_alloc+0x5b/0x310 [ 2889.653857] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2889.655081] idr_get_free+0x4b5/0x8f0 [ 2889.655917] idr_alloc_u32+0x170/0x2d0 [ 2889.656762] ? __fprop_inc_percpu_max+0x130/0x130 [ 2889.657806] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2889.658964] ? lock_release+0x680/0x680 [ 2889.659822] idr_alloc+0xc2/0x130 [ 2889.660572] ? idr_alloc_u32+0x2d0/0x2d0 [ 2889.661443] ? rwlock_bug.part.0+0x90/0x90 [ 2889.662369] p9_client_prepare_req.part.0+0x612/0xac0 [ 2889.663498] p9_client_rpc+0x220/0x1370 [ 2889.664352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2889.665482] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2889.666638] ? pipe_poll+0x21b/0x7f0 [ 2889.667438] ? p9_fd_close+0x4a0/0x4a0 [ 2889.668268] ? anon_pipe_buf_release+0x280/0x280 [ 2889.669287] ? p9_fd_poll+0x1e0/0x2c0 [ 2889.670109] ? p9_fd_create+0x357/0x4a0 [ 2889.670972] ? p9_conn_create+0x510/0x510 [ 2889.671854] ? p9_client_create+0x798/0x1230 [ 2889.672791] ? kfree+0xd7/0x340 [ 2889.673493] ? do_raw_spin_unlock+0x4f/0x220 [ 2889.674445] p9_client_create+0xa76/0x1230 [ 2889.675369] ? p9_client_flush+0x430/0x430 [ 2889.676282] ? trace_hardirqs_on+0x5b/0x180 [ 2889.677210] ? lockdep_init_map_type+0x2c7/0x780 [ 2889.678229] ? __raw_spin_lock_init+0x36/0x110 [ 2889.679223] v9fs_session_init+0x1dd/0x1680 [ 2889.680148] ? lock_release+0x680/0x680 [ 2889.681011] ? kmem_cache_alloc_trace+0x151/0x320 [ 2889.682046] ? v9fs_show_options+0x690/0x690 [ 2889.683008] ? trace_hardirqs_on+0x5b/0x180 [ 2889.683930] ? kasan_unpoison_shadow+0x33/0x50 [ 2889.684907] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2889.685993] v9fs_mount+0x79/0x8f0 [ 2889.686770] ? v9fs_write_inode+0x60/0x60 [ 2889.687658] legacy_get_tree+0x105/0x220 [ 2889.688529] vfs_get_tree+0x8e/0x300 [ 2889.689323] path_mount+0x1429/0x2120 [ 2889.690148] ? strncpy_from_user+0x9e/0x470 [ 2889.691083] ? finish_automount+0xa90/0xa90 [ 2889.692005] ? getname_flags.part.0+0x1dd/0x4f0 [ 2889.692996] ? _copy_from_user+0xfb/0x1b0 [ 2889.693893] __x64_sys_mount+0x282/0x300 [ 2889.694770] ? copy_mnt_ns+0xa00/0xa00 [ 2889.695622] do_syscall_64+0x33/0x40 [ 2889.696423] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2889.697522] RIP: 0033:0x7fe4d5f5bb19 [ 2889.698326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2889.702285] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2889.703925] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2889.705457] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2889.706996] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2889.708533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2889.710066] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2889.711325] FAT-fs (loop1): bogus number of reserved sectors [ 2889.712499] FAT-fs (loop1): Can't find a valid FAT filesystem 04:29:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0xfd00, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0xc0, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}], 0x0, &(0x7f0000011000)) 04:29:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0xfe03, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}) 04:29:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140), 0x100002, 0x0) 04:29:24 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000002, 0x2010, r0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r3 = fork() ptrace(0x10, r3) 04:29:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0xec0, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2889.917181] FAT-fs (loop1): bogus number of reserved sectors [ 2889.918541] FAT-fs (loop1): Can't find a valid FAT filesystem 04:29:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20280, 0x182) 04:29:40 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="135dc3550e73796300400000390c258fc102a0b68ec0f64ab88883f949d9eaa10742842bfef211ed5ea983980c45f506fd631d7383abe3c3d9a3c16575710203451dadf5d08fb83c92411f2c610e2d26facc0a624b515f26681acb080fb784b28d97268cebfa2c35215fc6d2"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0x148, 0x10, 0x1, 0x0, 0x0, {{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffff, 0x32}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}]}, 0x148}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r1, &(0x7f0000000540)={[0x9]}, 0x8, 0x800) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x20, 0x0, 0xe9, 0x0, 0x7fff, 0x82000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x10022, 0x10001, 0x2, 0x0, 0x9, 0xe388, 0x400, 0x0, 0x400, 0x0, 0x400}, 0x0, 0xe, r6, 0x1) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x1}, 0x14}}, 0x0) ptrace(0x10, r4) 04:29:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x2, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:29:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:29:40 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380), 0x0, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = syz_mount_image$nfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x231, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="b7ee4f140c392e1a9a5244720e7f4af93e45db59b39027a2571f8181bf1ef91a6fc2b09fc33718003d94bfe7bf2deb363f066a898d41b60de6cf6b7f71d613f57592cb468fbd9d6a0857fbcfbbc76f6ad337787536865c9bc42389493852d77ff0d1269f41ad3f92760e", 0x6a, 0x5}, {&(0x7f0000000400)="b427aaca866f7ad74e83c2c2d175ef1bd1286ba7e275e92c7231b49eb483aebc251f6bf140f8caee002989f39e661021ed73af495dc4d7acfb6e475a623f73ed2b14699b257af61401a252b96586838079ed7f2774383faec5387c3b674e60a800007541a566c4e6e4ca88b182b0a0f3386c844e17d199f6df27b381a787ac4b00c9", 0x82, 0x100}, {&(0x7f00000004c0)="5627e2f839047c", 0x7, 0x48c}], 0x2828051, &(0x7f0000000580)={[{'\xeb*!]&'}, {'+'}, {}, {'&@*'}, {'/dev/full\x00'}, {'trusted.overlay.nlink\x00'}, {'}!('}, {'/dev/full\x00'}], [{@pcr={'pcr', 0x3d, 0x13}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', 0xee00}}, {@hash}, {@appraise}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0x64, r3, &(0x7f0000000640)=0x7ff, 0x8, 0x0) r4 = fcntl$dupfd(r1, 0x0, r2) r5 = fork() ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r6 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r6, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$sock_inet_udp_SIOCINQ(r6, 0x541b, &(0x7f0000000000)) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x77baea28dc8b509d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r7, r8, 0x1000) fchownat(r4, &(0x7f0000000380)='./file0\x00', 0xee01, r8, 0x400) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:29:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x33fe0, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 43) [ 2906.182334] FAT-fs (loop1): bogus number of FAT sectors [ 2906.183187] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2906.189109] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2906.221221] FAULT_INJECTION: forcing a failure. [ 2906.221221] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.222864] CPU: 0 PID: 46477 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2906.223867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2906.225063] Call Trace: [ 2906.225451] dump_stack+0x107/0x167 [ 2906.225984] should_fail.cold+0x5/0xa [ 2906.226566] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2906.227412] should_failslab+0x5/0x20 [ 2906.227972] kmem_cache_alloc+0x5b/0x310 [ 2906.228569] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2906.229390] idr_get_free+0x4b5/0x8f0 [ 2906.229958] idr_alloc_u32+0x170/0x2d0 [ 2906.230524] ? __fprop_inc_percpu_max+0x130/0x130 [ 2906.231231] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2906.232009] ? lock_release+0x680/0x680 [ 2906.232586] idr_alloc+0xc2/0x130 [ 2906.233085] ? idr_alloc_u32+0x2d0/0x2d0 [ 2906.233667] ? rwlock_bug.part.0+0x90/0x90 [ 2906.234296] p9_client_prepare_req.part.0+0x612/0xac0 [ 2906.235060] p9_client_rpc+0x220/0x1370 [ 2906.235632] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2906.236397] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2906.237169] ? pipe_poll+0x21b/0x7f0 [ 2906.237704] ? p9_fd_close+0x4a0/0x4a0 [ 2906.238264] ? anon_pipe_buf_release+0x280/0x280 [ 2906.238947] ? p9_fd_poll+0x1e0/0x2c0 [ 2906.239519] ? p9_fd_create+0x357/0x4a0 [ 2906.240092] ? p9_conn_create+0x510/0x510 [ 2906.240687] ? p9_client_create+0x798/0x1230 [ 2906.241322] ? kfree+0xd7/0x340 [ 2906.241797] ? do_raw_spin_unlock+0x4f/0x220 [ 2906.242443] p9_client_create+0xa76/0x1230 [ 2906.243072] ? p9_client_flush+0x430/0x430 [ 2906.243686] ? trace_hardirqs_on+0x5b/0x180 [ 2906.244311] ? lockdep_init_map_type+0x2c7/0x780 [ 2906.244995] ? __raw_spin_lock_init+0x36/0x110 [ 2906.245665] v9fs_session_init+0x1dd/0x1680 [ 2906.246287] ? lock_release+0x680/0x680 [ 2906.246871] ? kmem_cache_alloc_trace+0x151/0x320 [ 2906.247590] ? v9fs_show_options+0x690/0x690 [ 2906.248261] ? trace_hardirqs_on+0x5b/0x180 [ 2906.248902] ? kasan_unpoison_shadow+0x33/0x50 04:29:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 2906.249571] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2906.250474] v9fs_mount+0x79/0x8f0 [ 2906.250986] ? v9fs_write_inode+0x60/0x60 [ 2906.251580] legacy_get_tree+0x105/0x220 [ 2906.252136] vfs_get_tree+0x8e/0x300 [ 2906.252652] path_mount+0x1429/0x2120 [ 2906.253181] ? strncpy_from_user+0x9e/0x470 [ 2906.253769] ? finish_automount+0xa90/0xa90 [ 2906.254377] ? getname_flags.part.0+0x1dd/0x4f0 [ 2906.255017] ? _copy_from_user+0xfb/0x1b0 [ 2906.255623] __x64_sys_mount+0x282/0x300 [ 2906.256176] ? copy_mnt_ns+0xa00/0xa00 [ 2906.256734] do_syscall_64+0x33/0x40 [ 2906.257243] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2906.257942] RIP: 0033:0x7fe4d5f5bb19 [ 2906.258448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2906.260949] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2906.262002] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2906.262972] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2906.263981] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2906.264968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2906.265941] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:29:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {0x0}], 0x0, &(0x7f0000011000)) 04:29:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x3, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x20000264, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f7366023a40ff000000000000000001", 0x15}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x800000, &(0x7f0000011000)=ANY=[]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:29:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x4, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2906.395995] FAT-fs (loop1): bogus number of reserved sectors [ 2906.396798] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2906.428690] FAT-fs (loop4): bogus number of reserved sectors [ 2906.429488] FAT-fs (loop4): Can't find a valid FAT filesystem 04:29:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}) 04:29:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x7ffff000, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 44) [ 2906.480945] FAT-fs (loop4): bogus number of reserved sectors [ 2906.481665] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2906.574607] FAULT_INJECTION: forcing a failure. [ 2906.574607] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.575924] CPU: 0 PID: 46713 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2906.576712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2906.577695] Call Trace: [ 2906.578010] dump_stack+0x107/0x167 [ 2906.578441] should_fail.cold+0x5/0xa [ 2906.578894] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2906.579582] should_failslab+0x5/0x20 [ 2906.580027] kmem_cache_alloc+0x5b/0x310 [ 2906.580524] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2906.581192] idr_get_free+0x4b5/0x8f0 [ 2906.581655] idr_alloc_u32+0x170/0x2d0 [ 2906.582120] ? __fprop_inc_percpu_max+0x130/0x130 [ 2906.582692] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2906.583337] ? lock_release+0x680/0x680 [ 2906.583807] idr_alloc+0xc2/0x130 [ 2906.584213] ? idr_alloc_u32+0x2d0/0x2d0 [ 2906.584693] ? rwlock_bug.part.0+0x90/0x90 [ 2906.585202] p9_client_prepare_req.part.0+0x612/0xac0 [ 2906.585824] p9_client_rpc+0x220/0x1370 [ 2906.586293] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2906.586913] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2906.587548] ? pipe_poll+0x21b/0x7f0 [ 2906.587994] ? p9_fd_close+0x4a0/0x4a0 [ 2906.588441] ? anon_pipe_buf_release+0x280/0x280 [ 2906.588996] ? p9_fd_poll+0x1e0/0x2c0 [ 2906.589448] ? p9_fd_create+0x357/0x4a0 [ 2906.589914] ? p9_conn_create+0x510/0x510 [ 2906.590393] ? p9_client_create+0x798/0x1230 [ 2906.590908] ? kfree+0xd7/0x340 [ 2906.591294] ? do_raw_spin_unlock+0x4f/0x220 [ 2906.591814] p9_client_create+0xa76/0x1230 [ 2906.592319] ? p9_client_flush+0x430/0x430 [ 2906.592819] ? trace_hardirqs_on+0x5b/0x180 [ 2906.593321] ? lockdep_init_map_type+0x2c7/0x780 [ 2906.593885] ? __raw_spin_lock_init+0x36/0x110 [ 2906.594430] v9fs_session_init+0x1dd/0x1680 [ 2906.594937] ? lock_release+0x680/0x680 [ 2906.595422] ? kmem_cache_alloc_trace+0x151/0x320 [ 2906.595985] ? v9fs_show_options+0x690/0x690 [ 2906.596511] ? trace_hardirqs_on+0x5b/0x180 [ 2906.597028] ? kasan_unpoison_shadow+0x33/0x50 [ 2906.597564] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2906.598158] v9fs_mount+0x79/0x8f0 [ 2906.598575] ? v9fs_write_inode+0x60/0x60 [ 2906.599055] legacy_get_tree+0x105/0x220 [ 2906.599548] vfs_get_tree+0x8e/0x300 [ 2906.599979] path_mount+0x1429/0x2120 [ 2906.600425] ? strncpy_from_user+0x9e/0x470 [ 2906.600923] ? finish_automount+0xa90/0xa90 [ 2906.601420] ? getname_flags.part.0+0x1dd/0x4f0 [ 2906.601964] ? _copy_from_user+0xfb/0x1b0 [ 2906.602455] __x64_sys_mount+0x282/0x300 [ 2906.602928] ? copy_mnt_ns+0xa00/0xa00 [ 2906.603402] do_syscall_64+0x33/0x40 [ 2906.603842] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2906.604466] RIP: 0033:0x7fe4d5f5bb19 [ 2906.604919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2906.607072] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2906.607995] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2906.608849] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2906.609683] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2906.610511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2906.611336] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:29:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 45) 04:29:59 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB="04"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) r2 = getuid() keyctl$chown(0x4, r1, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x200400, 0xa) keyctl$get_security(0x11, r3, 0x0, 0x0) keyctl$chown(0x4, r3, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$setperm(0x5, r4, 0x0) keyctl$get_security(0x11, r4, 0x0, 0x0) r5 = getuid() keyctl$chown(0x4, r4, r5, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x0, &(0x7f0000000180), 0x10808, &(0x7f0000000240)=ANY=[@ANYBLOB="696e697401000000626c653d3078303030303030303030342c666f776e65723e", @ANYRESDEC=r2, @ANYBLOB=',uid>', @ANYRESDEC=0xee01, @ANYBLOB=',mask=^MAY_READ,dont_measure,fowner<', @ANYRESDEC, @ANYBLOB=',fsmagic=0x00000000000001ff,fowner>', @ANYRESDEC=r5, @ANYBLOB=',appraise_type=imasig,smackfshat=vfat\x00,\x00']) 04:29:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0xfffffdef, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:29:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000780)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000fa8ec2e0682202a704000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000d88b1f80ee30308b8102d4f1d50000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:29:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {0x0}], 0x0, &(0x7f0000011000)) 04:29:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x5, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:29:59 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x77baea28dc8b509d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r1, r2, 0x1000) recvmmsg$unix(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000140), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/167, 0xa7}, {&(0x7f0000000780)=""/210, 0xd2}, {&(0x7f0000000880)=""/120, 0x78}, {&(0x7f0000000900)=""/127, 0x7f}, {&(0x7f0000000980)=""/209, 0xd1}, {&(0x7f0000000a80)=""/108, 0x6c}], 0x6, &(0x7f0000000d00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000f8e70000000001bb046f0200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="da98c029f384e9bf5a2077eadc95a64ef3e24ad5ecefe9a8efa35abde6e0037360458ef1daa7bda0ba2af46525b457dd3c459e28b4c653721180ac349c80b220012b7efb55fc279ca66a6d06c79f9e145def264b7aad181ddef235887340ff07ff9f4a49bd8d47c096989fe852e3f44056bb47e119bfa172140b959bf2e5"], 0xc0}}, {{&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000e40)=""/70, 0x46}, {&(0x7f0000000400)=""/64, 0x40}, {&(0x7f0000001c40)=""/4096, 0x1000}], 0x3, &(0x7f0000000ec0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x2, 0x42, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0x20001, &(0x7f0000000c40)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_loose}, {@loose}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@noextend}], [{@fowner_gt={'fowner>', r3}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r4, 0x0, r5) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/vmallocinfo\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r6 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000480)) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r7 = fork() ptrace(0x10, r7) 04:29:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 2925.176433] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 2925.183545] FAULT_INJECTION: forcing a failure. [ 2925.183545] name failslab, interval 1, probability 0, space 0, times 0 [ 2925.185944] CPU: 0 PID: 46726 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2925.187423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2925.189217] Call Trace: [ 2925.189794] dump_stack+0x107/0x167 [ 2925.190588] should_fail.cold+0x5/0xa [ 2925.191425] ? create_object.isra.0+0x3a/0xa20 [ 2925.192425] should_failslab+0x5/0x20 [ 2925.193248] kmem_cache_alloc+0x5b/0x310 [ 2925.194139] create_object.isra.0+0x3a/0xa20 [ 2925.195088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2925.196199] kmem_cache_alloc+0x159/0x310 [ 2925.197115] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2925.198331] idr_get_free+0x4b5/0x8f0 [ 2925.199186] idr_alloc_u32+0x170/0x2d0 [ 2925.200048] ? __fprop_inc_percpu_max+0x130/0x130 [ 2925.200324] FAT-fs (loop1): bogus number of reserved sectors [ 2925.201091] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2925.201125] ? lock_release+0x680/0x680 [ 2925.201156] idr_alloc+0xc2/0x130 [ 2925.202432] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2925.203511] ? idr_alloc_u32+0x2d0/0x2d0 [ 2925.203532] ? rwlock_bug.part.0+0x90/0x90 [ 2925.203581] p9_client_prepare_req.part.0+0x612/0xac0 [ 2925.209183] p9_client_rpc+0x220/0x1370 [ 2925.210034] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2925.211176] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2925.212333] ? pipe_poll+0x21b/0x7f0 [ 2925.213132] ? p9_fd_close+0x4a0/0x4a0 [ 2925.213967] ? anon_pipe_buf_release+0x280/0x280 [ 2925.214993] ? p9_fd_poll+0x1e0/0x2c0 [ 2925.215835] ? p9_fd_create+0x357/0x4a0 [ 2925.216689] ? p9_conn_create+0x510/0x510 [ 2925.217580] ? p9_client_create+0x798/0x1230 [ 2925.218521] ? kfree+0xd7/0x340 [ 2925.219225] ? do_raw_spin_unlock+0x4f/0x220 [ 2925.220197] p9_client_create+0xa76/0x1230 [ 2925.221129] ? p9_client_flush+0x430/0x430 [ 2925.222042] ? trace_hardirqs_on+0x5b/0x180 [ 2925.222971] ? lockdep_init_map_type+0x2c7/0x780 [ 2925.224001] ? __raw_spin_lock_init+0x36/0x110 [ 2925.224998] v9fs_session_init+0x1dd/0x1680 [ 2925.225926] ? lock_release+0x680/0x680 [ 2925.226799] ? kmem_cache_alloc_trace+0x151/0x320 [ 2925.227845] ? v9fs_show_options+0x690/0x690 [ 2925.228812] ? trace_hardirqs_on+0x5b/0x180 [ 2925.229744] ? kasan_unpoison_shadow+0x33/0x50 [ 2925.230723] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2925.231831] v9fs_mount+0x79/0x8f0 [ 2925.232601] ? v9fs_write_inode+0x60/0x60 [ 2925.233497] legacy_get_tree+0x105/0x220 [ 2925.234377] vfs_get_tree+0x8e/0x300 [ 2925.235180] path_mount+0x1429/0x2120 [ 2925.236018] ? strncpy_from_user+0x9e/0x470 [ 2925.236947] ? finish_automount+0xa90/0xa90 [ 2925.237873] ? getname_flags.part.0+0x1dd/0x4f0 [ 2925.238869] ? _copy_from_user+0xfb/0x1b0 [ 2925.239793] __x64_sys_mount+0x282/0x300 [ 2925.240667] ? copy_mnt_ns+0xa00/0xa00 [ 2925.241529] do_syscall_64+0x33/0x40 [ 2925.242330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2925.243423] RIP: 0033:0x7fe4d5f5bb19 [ 2925.244229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2925.248199] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2925.249851] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2925.251388] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2925.252939] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2925.254476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2925.256023] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:29:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x6, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x6, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2925.334989] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:30:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040000000000000000000", 0x24}, {0x0}], 0x0, &(0x7f0000011000)) 04:30:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x7, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2925.407422] FAT-fs (loop4): Unrecognized mount option "" or missing value 04:30:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd00000000000000}) 04:30:00 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) fsetxattr$security_evm(r3, &(0x7f0000000000), &(0x7f0000000080)=@ng={0x4, 0x10, "a4ac4d0706b6bf043c02a570"}, 0xe, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) r5 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r6 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x0) keyctl$get_security(0x11, r6, 0x0, 0x0) r7 = getuid() keyctl$chown(0x4, r6, r7, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)={0x494, 0x1f, 0x400, 0x70bd29, 0x25dfdbfc, {0x1b}, [@typed={0x8, 0x73, 0x0, 0x0, @uid=r7}, @typed={0xc, 0x20, 0x0, 0x0, @u64=0x7}, @generic, @generic="baabe1e91670e62c69fa1ad7328058f7251358957573f4a7bc77c5eb13098e674562755132ab9d2f7f2b92424e0f0c36008d9f1ec55322502a8950af3ccb743941ef590539b0caa44fdebc56abbc565853fabb250e9096a571bbf404267637c9e65abe8835", @generic="e21e", @typed={0x8, 0x13, 0x0, 0x0, @pid=r8}, @nested={0xd1, 0x6e, 0x0, 0x1, [@generic="152f442460289ebe86f77130e840cb005d", @generic="c83ce3d3c3db9e9c6f29ed1e6d770248c4f8a5563f21ada618d9d501d4a78c122d585447587d93d4c35c921cb0cb1fa40e69d8c6739897ccdb53fcd46fd0720f3d23542c707698dd9357c5c06044affb4ce5952e7da13a38eff20ff14d52121185e9d07c5f95676b50751ae8c2dab8e5ef6320ef20ffe91c308d7c35f81181cad776534bd1f3e2b9575bb46cddfa2fc5cfb4781c63784c248e21aae9970b462b3967578393cbb08f0497bb38a2a8ca9918f89091f74767a5c8089840"]}, @nested={0x2ac, 0x2b, 0x0, 0x1, [@generic="29b7403c58ab34333d96cee8d31ea03437925b53810b740de121e69c6e9ac6ba554e116449b84ec02ed3ae2e49dc21818192a776fdcd49621e884dc7c764a2d371b140726ab034c17a13839e4f73d8d4369c9eda28469be47142cb54781f1ba660ab2f09305c651c52adad1e0d4e38cb8af08c148f0d49f033d9ed56dd016fc59aa84e44f716e6aca9a8c662efce8ad7b1cf861bdfa5ba7be7c124f175634dc0b34f74da0f4c4a587adce0caededa8ebf1c365cfca4a4cb5b7c84f9469b8a8064b406438c514f425696c19c20f7873fef32ff817bab9529c81863b3690330266b80e16edda1f1bed44dfc9f6e431249d5c53ab822f69", @typed={0x8, 0x74, 0x0, 0x0, @pid=r4}, @generic="8cb40bd03b8c2c916e034864b268291036e32bd734c4317a19d42ec5376b7195d8390ffffb45a7179df982f3100d9005da06327ad57c4dcd858e64efd3d97d52ee3d9c6bb9cc70c9a7488b36a398126eb5943f5302826097392e46b6eb18fd30305a415be18d083aa4b77ccc5776f9e1f51e64680fae51b4b34d93416164c12e22de5efec356708a28cadac24a4618f0500e3b01daf9947fc035e5db288ed9fdc67737f54cc57dcd2e56a5c8ec4ea03c5c0a9e730b96d2cfa890bde44c83a3a2903d2878795a7d888cf1856bbe47007188d0d9b7adef7cddace836f4d6ba762d4682805479c99400bd567fb155af303e10ccf4ff56", @generic="a31f8976a77d720ff9308101b988e0", @generic="f8c8d54048c2a9f89105ff005be10a8b67c1b1d7f74abb1f7a361d5ffe98d19c68fa75c670095111dcb7c9955e9fa82ef1c95ab5d5989d1b9e29c8ec6200aed058dd91dc5228cf5734c522f908c874dc7bc8cd7281e68d56c876e65dd5e2a3ad3b28d7d1b56bcbf71496a9f3f152f2f377aba006a542bd17a0e6fab7254f82fdb0b2caaf2b8992c4b1d0af04c9db3a5c8b54d6cde4676428e2729d78d4bdc55c1a561df4e252"]}, @generic="cead299473f775996dad8b95d5286497ab61dcf281f1be3ada81a30002c320c79f759e739d2f1484aaf03f12a88a87340a5b8366641eb5fbabeb91934234a4eda4a44d08affa8e357a1d2bb9b8e5c3bc120d59efd4403ef611dbc8a137cc411dc0a530f5cc6235ee03573b1df78535f718159a5c27e947ed0e877ebd"]}, 0x494}, 0x1, 0x0, 0x0, 0x2400d000}, 0x20000040) [ 2925.484430] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2925.498032] FAT-fs (loop1): bogus number of reserved sectors [ 2925.499348] FAT-fs (loop1): Can't find a valid FAT filesystem 04:30:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x8, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) ioctl$KDSETMODE(r3, 0x4b3a, 0x1) 04:30:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}) 04:30:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x25, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 46) 04:30:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r2, 0x0, r3) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73ba00"/13], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) 04:30:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:14 executing program 4: mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') [ 2939.943836] FAULT_INJECTION: forcing a failure. [ 2939.943836] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.946760] CPU: 1 PID: 47083 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2939.946952] FAT-fs (loop1): bogus number of reserved sectors [ 2939.948454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2939.948463] Call Trace: [ 2939.948493] dump_stack+0x107/0x167 [ 2939.948518] should_fail.cold+0x5/0xa [ 2939.949331] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2939.951343] ? p9pdu_readf+0xadb/0x1d40 [ 2939.951370] should_failslab+0x5/0x20 [ 2939.956734] __kmalloc+0x72/0x390 [ 2939.957589] p9pdu_readf+0xadb/0x1d40 [ 2939.958523] ? pipe_poll+0x21b/0x7f0 [ 2939.959432] ? p9pdu_writef+0x100/0x100 [ 2939.960413] ? p9_fd_poll+0x1e0/0x2c0 [ 2939.961350] ? p9_fd_create+0x357/0x4a0 [ 2939.962319] ? p9_conn_create+0x510/0x510 [ 2939.963318] ? p9_client_create+0x798/0x1230 [ 2939.964386] ? kfree+0xd7/0x340 [ 2939.965180] ? do_raw_spin_unlock+0x4f/0x220 [ 2939.966250] p9_client_create+0xaee/0x1230 [ 2939.967282] ? p9_client_flush+0x430/0x430 [ 2939.968312] ? trace_hardirqs_on+0x5b/0x180 [ 2939.969356] ? lockdep_init_map_type+0x2c7/0x780 [ 2939.970499] ? __raw_spin_lock_init+0x36/0x110 [ 2939.971607] v9fs_session_init+0x1dd/0x1680 [ 2939.972657] ? lock_release+0x680/0x680 [ 2939.973626] ? kmem_cache_alloc_trace+0x151/0x320 [ 2939.974787] ? v9fs_show_options+0x690/0x690 [ 2939.975857] ? trace_hardirqs_on+0x5b/0x180 [ 2939.976914] ? kasan_unpoison_shadow+0x33/0x50 [ 2939.978013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2939.979237] v9fs_mount+0x79/0x8f0 [ 2939.980095] ? v9fs_write_inode+0x60/0x60 [ 2939.981106] legacy_get_tree+0x105/0x220 [ 2939.982088] vfs_get_tree+0x8e/0x300 [ 2939.982995] path_mount+0x1429/0x2120 [ 2939.983025] ? strncpy_from_user+0x9e/0x470 [ 2939.983047] ? finish_automount+0xa90/0xa90 [ 2939.983069] ? getname_flags.part.0+0x1dd/0x4f0 [ 2939.983091] ? _copy_from_user+0xfb/0x1b0 [ 2939.983124] __x64_sys_mount+0x282/0x300 [ 2939.983144] ? copy_mnt_ns+0xa00/0xa00 [ 2939.983181] do_syscall_64+0x33/0x40 [ 2939.990490] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2939.990505] RIP: 0033:0x7fe4d5f5bb19 [ 2939.990527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.990539] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2939.998307] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2939.998320] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2939.998333] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2939.998351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.004380] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:30:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x9, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="601c6d6b646f736602106c00080120000200004000f80000200040000040000000000000013b46d1e9671d8e95852d3026113e4d8cf4887e4bd7c3ccd8a398d5e71963f619e023f837fdda9bd5bcf0532669113b5ac0cb9a", 0x58}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x20000, &(0x7f0000000040)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:30:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x117, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}) 04:30:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xa, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:14 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x6}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x10) ptrace(0x10, r5) 04:30:14 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[r0, r0], 0x2) fcntl$setown(r2, 0x8, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000004f4ffffff0000000000000000000000400000000000000000000000000000000000000000003800000000000000000099e765e7d7a3be14948aabbd25bf1c673db52af3059429dca7acd4e3f6ef5fbb598762745f9e7c5739617ba22c7474d34cda672bf73be79c0ff74f74c405c75a167ec1c0a0e5a6d4f0ac2f7da451429746fb03e372acca546498e5715297cf7d49e7d582dc99044fd5a4176ce9b0e0523144db299e1357e2ea62bc6c31b232989ca0be37d0012c551b844cb04daa669a3b960747ef8762a0cd04a2ce43b0d1fbf159a4a336e736ddab57d8a9e3f1f835"], 0x40) fcntl$dupfd(r1, 0x0, r3) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x2, 0x3f, 0x5, 0x6, 0x0, 0x5, 0x248, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000300), 0x9}, 0x2041, 0x3f76, 0x695, 0x1, 0x10000, 0x2, 0x8000, 0x0, 0xfffffff9, 0x0, 0x10001}, 0x0, 0x8, r4, 0x2) r5 = fork() ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:30:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xb, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 47) [ 2940.209055] FAT-fs (loop1): bogus number of reserved sectors [ 2940.210415] FAT-fs (loop1): Can't find a valid FAT filesystem 04:30:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xc, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2940.297695] FAULT_INJECTION: forcing a failure. [ 2940.297695] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.299327] CPU: 0 PID: 47339 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2940.300264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2940.301258] Call Trace: [ 2940.301574] dump_stack+0x107/0x167 [ 2940.302002] should_fail.cold+0x5/0xa [ 2940.302444] ? create_object.isra.0+0x3a/0xa20 [ 2940.302967] should_failslab+0x5/0x20 [ 2940.303428] kmem_cache_alloc+0x5b/0x310 [ 2940.303952] create_object.isra.0+0x3a/0xa20 [ 2940.304509] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2940.305133] __kmalloc+0x16e/0x390 [ 2940.305586] p9pdu_readf+0xadb/0x1d40 [ 2940.306078] ? pipe_poll+0x21b/0x7f0 [ 2940.306550] ? p9pdu_writef+0x100/0x100 [ 2940.307022] ? p9_fd_poll+0x1e0/0x2c0 [ 2940.307484] ? p9_fd_create+0x357/0x4a0 [ 2940.307930] ? p9_conn_create+0x510/0x510 [ 2940.308418] ? p9_client_create+0x798/0x1230 [ 2940.308935] ? kfree+0xd7/0x340 [ 2940.309313] ? do_raw_spin_unlock+0x4f/0x220 04:30:15 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x129, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2940.309833] p9_client_create+0xaee/0x1230 [ 2940.310528] ? p9_client_flush+0x430/0x430 [ 2940.311033] ? trace_hardirqs_on+0x5b/0x180 [ 2940.311537] ? lockdep_init_map_type+0x2c7/0x780 [ 2940.312093] ? __raw_spin_lock_init+0x36/0x110 [ 2940.312621] v9fs_session_init+0x1dd/0x1680 [ 2940.313101] ? lock_release+0x680/0x680 [ 2940.313546] ? kmem_cache_alloc_trace+0x151/0x320 [ 2940.314076] ? v9fs_show_options+0x690/0x690 [ 2940.314566] ? trace_hardirqs_on+0x5b/0x180 [ 2940.315076] ? kasan_unpoison_shadow+0x33/0x50 [ 2940.315611] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2940.316208] v9fs_mount+0x79/0x8f0 [ 2940.316650] ? v9fs_write_inode+0x60/0x60 [ 2940.317141] legacy_get_tree+0x105/0x220 [ 2940.317619] vfs_get_tree+0x8e/0x300 [ 2940.318056] path_mount+0x1429/0x2120 [ 2940.318504] ? strncpy_from_user+0x9e/0x470 [ 2940.319008] ? finish_automount+0xa90/0xa90 [ 2940.319519] ? getname_flags.part.0+0x1dd/0x4f0 [ 2940.320070] ? _copy_from_user+0xfb/0x1b0 [ 2940.320568] __x64_sys_mount+0x282/0x300 [ 2940.321041] ? copy_mnt_ns+0xa00/0xa00 [ 2940.321511] do_syscall_64+0x33/0x40 [ 2940.321951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2940.322546] RIP: 0033:0x7fe4d5f5bb19 [ 2940.322983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2940.325152] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2940.326056] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2940.326888] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2940.327729] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2940.328563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.329397] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:30:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:29 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 48) 04:30:29 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x1}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c4600000000000000000000e8ffffff00000000000000400000000000000000000000000000000000000000003800"/64], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x0, 0x1) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bd09000000"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000480)={0x1, 0x0, 0x400}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000640)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) syz_io_uring_submit(r5, 0x0, &(0x7f0000000600)=@IORING_OP_WRITEV={0x2, 0x5, 0x4000, @fd_index=0x9, 0x3f, &(0x7f0000000580)=[{&(0x7f0000000180)="0159170fc52dae4e5bc7405360a93bb1e09103ec80d88d203d2a5fea3e835f538cd3cbe8ba01ebb1f2d5765d8407", 0x2e}, {&(0x7f0000000300)="4c8842e09204f8b928e882a2b23804e5d9bec95aa623f318f87f860be306ac6e9a5d31", 0x23}, {&(0x7f0000000400)="59d45216d5155dc7538d555adee5198c5354", 0x12}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="fa1b0248fdec9e83b898802dbb86d9e497c740d55e5f3fb13fd91f8c70f998ab9f4170be6903bfbe99516e8db0c8932e56598eb74541121a4f31", 0x3a}, {&(0x7f0000000500)="4c16da0d4de4a583446b70947ae1cd97bab84531457681b0014f8889a85eabc8268fa8d0787915a36884a1172643f0bba3b8ad1581516214ace0d5dfbbb5e1ff3897543f48742460a53b0399bd258067aa", 0x51}], 0x6, 0x1}, 0x2) r7 = fork() ptrace(0x10, r7) syz_io_uring_setup(0x521f, &(0x7f0000000000)={0x0, 0x6fde, 0x8, 0x3, 0x1c7, 0x0, r3}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) 04:30:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xd, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:30:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) socket$packet(0x11, 0x3, 0x300) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:30:29 executing program 4: r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r2, r1, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r2) sendmsg$DEVLINK_CMD_RATE_SET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x804) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x148, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x148}, 0x1, 0x0, 0x0, 0x8080}, 0x40001) r4 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) getdents64(r4, &(0x7f0000000040)=""/15, 0xf) [ 2955.088291] FAT-fs (loop1): bogus number of reserved sectors [ 2955.089265] FAT-fs (loop1): Can't find a valid FAT filesystem 04:30:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xe, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2955.113803] FAULT_INJECTION: forcing a failure. [ 2955.113803] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.116562] CPU: 1 PID: 47550 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2955.118140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2955.120013] Call Trace: [ 2955.120614] dump_stack+0x107/0x167 [ 2955.121449] should_fail.cold+0x5/0xa [ 2955.122321] should_failslab+0x5/0x20 [ 2955.123186] __kmalloc_track_caller+0x79/0x370 [ 2955.124221] ? kasprintf+0xbb/0xf0 [ 2955.125038] ? __delete_object+0xb3/0x100 [ 2955.125986] kvasprintf+0xb5/0x150 [ 2955.126796] ? bust_spinlocks+0xe0/0xe0 [ 2955.127697] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2955.128909] kasprintf+0xbb/0xf0 [ 2955.129674] ? kvasprintf_const+0x1a0/0x1a0 [ 2955.130664] ? kmem_cache_free+0x249/0x2d0 [ 2955.131638] ? p9_client_create+0xbfa/0x1230 [ 2955.132644] p9_client_create+0xc1b/0x1230 [ 2955.133617] ? p9_client_flush+0x430/0x430 [ 2955.134568] ? trace_hardirqs_on+0x5b/0x180 [ 2955.135519] ? lockdep_init_map_type+0x2c7/0x780 [ 2955.136574] ? __raw_spin_lock_init+0x36/0x110 [ 2955.137604] v9fs_session_init+0x1dd/0x1680 [ 2955.138555] ? lock_release+0x680/0x680 [ 2955.139462] ? kmem_cache_alloc_trace+0x151/0x320 [ 2955.140544] ? v9fs_show_options+0x690/0x690 [ 2955.141550] ? trace_hardirqs_on+0x5b/0x180 [ 2955.142522] ? kasan_unpoison_shadow+0x33/0x50 [ 2955.143540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2955.144681] v9fs_mount+0x79/0x8f0 [ 2955.145493] ? v9fs_write_inode+0x60/0x60 [ 2955.146427] legacy_get_tree+0x105/0x220 [ 2955.147340] vfs_get_tree+0x8e/0x300 [ 2955.148174] path_mount+0x1429/0x2120 [ 2955.149047] ? strncpy_from_user+0x9e/0x470 [ 2955.150014] ? finish_automount+0xa90/0xa90 [ 2955.150985] ? getname_flags.part.0+0x1dd/0x4f0 [ 2955.152027] ? _copy_from_user+0xfb/0x1b0 [ 2955.152982] __x64_sys_mount+0x282/0x300 [ 2955.153891] ? copy_mnt_ns+0xa00/0xa00 [ 2955.154780] do_syscall_64+0x33/0x40 [ 2955.155617] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2955.156770] RIP: 0033:0x7fe4d5f5bb19 [ 2955.157607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2955.161726] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2955.163437] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2955.165053] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2955.166649] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2955.168260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2955.169859] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2955.175103] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2955.193492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=47559 comm=syz-executor.4 04:30:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) [ 2955.231256] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:30:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 2955.264780] FAT-fs (loop1): bogus number of reserved sectors [ 2955.266261] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2955.276172] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2955.300417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=47559 comm=syz-executor.4 04:30:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd}) 04:30:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0xf, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000100000000000000004000000000000000000000000000000000000000002c6958dd00000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="737973740113d5835b8b0e23ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:30:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000140)=""/193, 0xc1}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/2, 0x2}, {&(0x7f0000001400)=""/218, 0xda}], 0x7}, 0x4}], 0x1, 0x40000002, &(0x7f00000015c0)) 04:30:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 49) 04:30:45 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000000)) openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c460021a820dc41def97e0010f3a51f6a1745fd940000feffffff0000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r2 = fork() ptrace(0x10, r2) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:30:45 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x2, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2971.119044] FAT-fs (loop1): bogus number of reserved sectors [ 2971.120558] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2971.133629] FAULT_INJECTION: forcing a failure. [ 2971.133629] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.136072] CPU: 1 PID: 47797 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2971.137450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2971.139086] Call Trace: [ 2971.139617] dump_stack+0x107/0x167 [ 2971.140337] should_fail.cold+0x5/0xa [ 2971.141100] ? create_object.isra.0+0x3a/0xa20 [ 2971.142019] should_failslab+0x5/0x20 [ 2971.142771] kmem_cache_alloc+0x5b/0x310 [ 2971.143572] ? vsnprintf+0x4ba/0x1600 [ 2971.144323] create_object.isra.0+0x3a/0xa20 [ 2971.145182] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.146199] __kmalloc_track_caller+0x177/0x370 [ 2971.147112] ? kasprintf+0xbb/0xf0 [ 2971.147831] kvasprintf+0xb5/0x150 [ 2971.148529] ? bust_spinlocks+0xe0/0xe0 [ 2971.149320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2971.150359] kasprintf+0xbb/0xf0 [ 2971.150985] ? kvasprintf_const+0x1a0/0x1a0 [ 2971.151718] ? kmem_cache_free+0x249/0x2d0 [ 2971.152437] ? p9_client_create+0xbfa/0x1230 [ 2971.153177] p9_client_create+0xc1b/0x1230 [ 2971.153907] ? p9_client_flush+0x430/0x430 [ 2971.154617] ? trace_hardirqs_on+0x5b/0x180 [ 2971.155345] ? lockdep_init_map_type+0x2c7/0x780 [ 2971.156144] ? __raw_spin_lock_init+0x36/0x110 [ 2971.156917] v9fs_session_init+0x1dd/0x1680 [ 2971.157658] ? lock_release+0x680/0x680 [ 2971.158343] ? kmem_cache_alloc_trace+0x151/0x320 [ 2971.159153] ? v9fs_show_options+0x690/0x690 [ 2971.159905] ? trace_hardirqs_on+0x5b/0x180 [ 2971.160635] ? kasan_unpoison_shadow+0x33/0x50 [ 2971.161417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.162280] v9fs_mount+0x79/0x8f0 [ 2971.162886] ? v9fs_write_inode+0x60/0x60 [ 2971.163585] legacy_get_tree+0x105/0x220 [ 2971.164270] vfs_get_tree+0x8e/0x300 [ 2971.164891] path_mount+0x1429/0x2120 [ 2971.165550] ? strncpy_from_user+0x9e/0x470 [ 2971.166278] ? finish_automount+0xa90/0xa90 [ 2971.167009] ? getname_flags.part.0+0x1dd/0x4f0 [ 2971.167790] ? _copy_from_user+0xfb/0x1b0 [ 2971.168499] __x64_sys_mount+0x282/0x300 [ 2971.169184] ? copy_mnt_ns+0xa00/0xa00 [ 2971.169857] do_syscall_64+0x33/0x40 [ 2971.170493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2971.171362] RIP: 0033:0x7fe4d5f5bb19 [ 2971.171992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.175130] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2971.176419] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2971.177632] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2971.178835] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2971.180041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2971.181250] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2971.191437] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:30:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 50) 04:30:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x10, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:30:46 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00940aec87035581cf86de235e57d125ad58c7171ab78db6e9791256038e2d255188abf84f54969e46e97384a2ef4103fec6faaf7f18d5b64a551f1c391cc51c8d977588913e1c5c59d51fab412ecd003ab994756ba60e9a320f1c8eb108082f80229753680c615bd1455a38ee2b6209f2429e4b704f29221092e3a526060aa0948d33fca0d3b763032d6f202d7898814ae3e767e1d8ab674d59350bbe82e63fd0c451b0464c1647af692bc4e3d57be91628a2634f37c4b788268b9628"]) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1e0) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x10, 0xffffffffffffffff, 0x8000000) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) connect$unix(r1, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) [ 2971.374513] FAULT_INJECTION: forcing a failure. [ 2971.374513] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.374940] FAT-fs (loop1): bogus number of reserved sectors [ 2971.377563] CPU: 0 PID: 48011 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2971.378562] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2971.380106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2971.380116] Call Trace: [ 2971.380147] dump_stack+0x107/0x167 [ 2971.380178] should_fail.cold+0x5/0xa [ 2971.385305] should_failslab+0x5/0x20 [ 2971.386188] __kmalloc_track_caller+0x79/0x370 [ 2971.387238] ? kstrdup_const+0x53/0x80 [ 2971.388133] ? kasprintf+0xbb/0xf0 [ 2971.388968] kstrdup+0x36/0x70 [ 2971.389730] kstrdup_const+0x53/0x80 [ 2971.390597] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2971.391768] p9_client_create+0xc6a/0x1230 [ 2971.392770] ? p9_client_flush+0x430/0x430 [ 2971.393760] ? trace_hardirqs_on+0x5b/0x180 [ 2971.394762] ? lockdep_init_map_type+0x2c7/0x780 [ 2971.395883] ? __raw_spin_lock_init+0x36/0x110 [ 2971.396965] v9fs_session_init+0x1dd/0x1680 [ 2971.397979] ? lock_release+0x680/0x680 [ 2971.398928] ? kmem_cache_alloc_trace+0x151/0x320 [ 2971.400056] ? v9fs_show_options+0x690/0x690 [ 2971.401108] ? trace_hardirqs_on+0x5b/0x180 [ 2971.402128] ? kasan_unpoison_shadow+0x33/0x50 [ 2971.403188] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.404374] v9fs_mount+0x79/0x8f0 [ 2971.405205] ? v9fs_write_inode+0x60/0x60 [ 2971.406185] legacy_get_tree+0x105/0x220 [ 2971.407160] vfs_get_tree+0x8e/0x300 [ 2971.408047] path_mount+0x1429/0x2120 [ 2971.408967] ? strncpy_from_user+0x9e/0x470 [ 2971.409999] ? finish_automount+0xa90/0xa90 [ 2971.411024] ? getname_flags.part.0+0x1dd/0x4f0 [ 2971.412143] ? _copy_from_user+0xfb/0x1b0 [ 2971.413147] __x64_sys_mount+0x282/0x300 [ 2971.414111] ? copy_mnt_ns+0xa00/0xa00 [ 2971.415060] do_syscall_64+0x33/0x40 [ 2971.415936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2971.417148] RIP: 0033:0x7fe4d5f5bb19 [ 2971.418042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.422384] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2971.424187] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2971.425907] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2971.427610] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2971.429193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2971.430683] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2971.432415] kmem_cache_create(9p-fcall-cache-58) failed with error -12 [ 2971.433857] CPU: 0 PID: 48011 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2971.435288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2971.437006] Call Trace: [ 2971.437579] dump_stack+0x107/0x167 [ 2971.438355] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2971.439468] p9_client_create+0xc6a/0x1230 [ 2971.440386] ? p9_client_flush+0x430/0x430 [ 2971.441282] ? trace_hardirqs_on+0x5b/0x180 [ 2971.442209] ? lockdep_init_map_type+0x2c7/0x780 [ 2971.443211] ? __raw_spin_lock_init+0x36/0x110 [ 2971.444184] v9fs_session_init+0x1dd/0x1680 [ 2971.445108] ? lock_release+0x680/0x680 [ 2971.445972] ? kmem_cache_alloc_trace+0x151/0x320 [ 2971.447000] ? v9fs_show_options+0x690/0x690 [ 2971.447956] ? trace_hardirqs_on+0x5b/0x180 [ 2971.448888] ? kasan_unpoison_shadow+0x33/0x50 [ 2971.449867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.450952] v9fs_mount+0x79/0x8f0 [ 2971.451713] ? v9fs_write_inode+0x60/0x60 [ 2971.452594] legacy_get_tree+0x105/0x220 [ 2971.453472] vfs_get_tree+0x8e/0x300 [ 2971.454265] path_mount+0x1429/0x2120 [ 2971.455085] ? strncpy_from_user+0x9e/0x470 [ 2971.456017] ? finish_automount+0xa90/0xa90 [ 2971.456938] ? getname_flags.part.0+0x1dd/0x4f0 [ 2971.457941] ? _copy_from_user+0xfb/0x1b0 [ 2971.458849] __x64_sys_mount+0x282/0x300 [ 2971.459719] ? copy_mnt_ns+0xa00/0xa00 [ 2971.460577] do_syscall_64+0x33/0x40 [ 2971.461386] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2971.462475] RIP: 0033:0x7fe4d5f5bb19 [ 2971.463277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.467208] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 04:30:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:30:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/sunrpc', 0x80680, 0x30) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) fcntl$dupfd(r3, 0x406, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) [ 2971.468842] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2971.470560] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2971.472099] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2971.473648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2971.475194] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:30:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x3, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x4, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:30:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x11, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 2971.603696] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2971.614125] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2971.619997] FAT-fs (loop1): bogus number of reserved sectors [ 2971.621578] FAT-fs (loop1): Can't find a valid FAT filesystem 04:30:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd00}) 04:30:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 51) 04:30:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:30:46 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0xf82}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1084c1c, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) write$P9_RREADLINK(r2, &(0x7f0000000680)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x880010, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}, {@cache_mmap}, {@dfltuid}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@afid={'afid', 0x3d, 0x1}}, {@msize={'msize', 0x3d, 0xb099}}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, ',\''}}], [{@dont_appraise}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) execveat(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000380)='msize', &(0x7f00000003c0)='\x16+>[\x00', &(0x7f0000000400)='dfltgid', &(0x7f0000000440)='dont_appraise'], &(0x7f0000000640)=[&(0x7f00000004c0)='9p\x00', &(0x7f0000000500)='dfltgid', &(0x7f0000000540)='afid', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='trans=fd,', &(0x7f0000000600)='!-\'{\'.(\x00'], 0x800) [ 2971.763069] FAULT_INJECTION: forcing a failure. [ 2971.763069] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.764665] CPU: 1 PID: 48213 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2971.765661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2971.766833] Call Trace: [ 2971.767195] dump_stack+0x107/0x167 [ 2971.767705] should_fail.cold+0x5/0xa [ 2971.768248] should_failslab+0x5/0x20 [ 2971.768784] __kmalloc_track_caller+0x79/0x370 [ 2971.769438] ? kstrdup_const+0x53/0x80 [ 2971.769982] ? kasprintf+0xbb/0xf0 [ 2971.770483] kstrdup+0x36/0x70 [ 2971.770935] kstrdup_const+0x53/0x80 [ 2971.771455] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2971.772170] p9_client_create+0xc6a/0x1230 [ 2971.772770] ? p9_client_flush+0x430/0x430 [ 2971.773367] ? trace_hardirqs_on+0x5b/0x180 [ 2971.773971] ? lockdep_init_map_type+0x2c7/0x780 [ 2971.774627] ? __raw_spin_lock_init+0x36/0x110 [ 2971.775213] v9fs_session_init+0x1dd/0x1680 [ 2971.775710] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2971.776322] ? trace_hardirqs_on+0x5b/0x180 [ 2971.776796] ? v9fs_show_options+0x690/0x690 [ 2971.777314] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 2971.777893] ? kasan_unpoison_shadow+0x33/0x50 [ 2971.778410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.778992] v9fs_mount+0x79/0x8f0 [ 2971.779396] ? v9fs_write_inode+0x60/0x60 [ 2971.779870] legacy_get_tree+0x105/0x220 [ 2971.780314] vfs_get_tree+0x8e/0x300 [ 2971.780735] path_mount+0x1429/0x2120 [ 2971.781149] ? strncpy_from_user+0x9e/0x470 [ 2971.781652] ? finish_automount+0xa90/0xa90 [ 2971.782122] ? getname_flags.part.0+0x1dd/0x4f0 [ 2971.782650] ? _copy_from_user+0xfb/0x1b0 [ 2971.783130] __x64_sys_mount+0x282/0x300 [ 2971.783590] ? copy_mnt_ns+0xa00/0xa00 [ 2971.784042] do_syscall_64+0x33/0x40 [ 2971.784442] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2971.785027] RIP: 0033:0x7fe4d5f5bb19 [ 2971.785432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.787391] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2971.788264] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2971.789073] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2971.789887] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2971.790695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2971.791500] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2971.793133] kmem_cache_create(9p-fcall-cache-59) failed with error -12 [ 2971.794014] CPU: 1 PID: 48213 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2971.794806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2971.795745] Call Trace: [ 2971.796028] dump_stack+0x107/0x167 [ 2971.796421] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2971.796983] p9_client_create+0xc6a/0x1230 [ 2971.797447] ? p9_client_flush+0x430/0x430 [ 2971.797898] ? trace_hardirqs_on+0x5b/0x180 [ 2971.798360] ? lockdep_init_map_type+0x2c7/0x780 [ 2971.798867] ? __raw_spin_lock_init+0x36/0x110 [ 2971.799357] v9fs_session_init+0x1dd/0x1680 [ 2971.799823] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2971.800398] ? trace_hardirqs_on+0x5b/0x180 [ 2971.800858] ? v9fs_show_options+0x690/0x690 [ 2971.801348] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 2971.801903] ? kasan_unpoison_shadow+0x33/0x50 [ 2971.802421] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2971.802995] v9fs_mount+0x79/0x8f0 [ 2971.803397] ? v9fs_write_inode+0x60/0x60 [ 2971.803867] legacy_get_tree+0x105/0x220 [ 2971.804331] vfs_get_tree+0x8e/0x300 [ 2971.804730] path_mount+0x1429/0x2120 [ 2971.805138] ? strncpy_from_user+0x9e/0x470 [ 2971.805603] ? finish_automount+0xa90/0xa90 [ 2971.806068] ? getname_flags.part.0+0x1dd/0x4f0 [ 2971.806561] ? _copy_from_user+0xfb/0x1b0 [ 2971.807005] __x64_sys_mount+0x282/0x300 [ 2971.807436] ? copy_mnt_ns+0xa00/0xa00 [ 2971.807857] do_syscall_64+0x33/0x40 [ 2971.808253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2971.808797] RIP: 0033:0x7fe4d5f5bb19 [ 2971.809194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2971.811151] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2971.811958] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2971.812715] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2971.813477] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2971.814233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2971.814991] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:30:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xfffc}) 04:30:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:30:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x5, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2971.893613] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2971.916924] FAT-fs (loop1): bogus number of reserved sectors [ 2971.917572] FAT-fs (loop1): Can't find a valid FAT filesystem 04:31:03 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x6, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:31:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) ioctl$VFAT_IOCTL_READDIR_SHORT(r4, 0x82307202, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x3) 04:31:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:31:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 52) 04:31:03 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x10000002}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() r5 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x7}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000200)=0x9, 0x4) ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:31:03 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:03 executing program 4: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000040)={@remote, 0x71}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25, 0x2}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0022f41dccec0783333d88457cdb3c2b71256d5583b8e2b119474fe4f57d2e64d58d6cda392a52a2d831c2a793df9c3be38106bf65ad920976a454279d985529cffe0ae9c45387db6bbc1891d59c78889aff03218404c2b5f49062c26255f5881a49e710e41c8f190abfdfb48ecfebe5e6c5678215560cb2fe42e6b51c016adff95b4b0486b1aa53e1"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x20000, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000002c0)={@loopback, 0x26}) 04:31:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200001, 0x8) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, {0x2, 0x4e23, @rand_addr=0x64010102}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) [ 2988.592718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=48275 comm=syz-executor.2 [ 2988.620071] FAT-fs (loop4): invalid media value (0x40) [ 2988.621428] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2988.646428] FAT-fs (loop1): invalid media value (0x00) [ 2988.647746] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2988.651253] FAULT_INJECTION: forcing a failure. [ 2988.651253] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.653647] CPU: 0 PID: 48285 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2988.655076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2988.656770] Call Trace: [ 2988.657325] dump_stack+0x107/0x167 [ 2988.658100] should_fail.cold+0x5/0xa [ 2988.658910] should_failslab+0x5/0x20 [ 2988.659704] __kmalloc_track_caller+0x79/0x370 [ 2988.660653] ? kstrdup_const+0x53/0x80 [ 2988.661472] ? kasprintf+0xbb/0xf0 [ 2988.662233] kstrdup+0x36/0x70 [ 2988.662915] kstrdup_const+0x53/0x80 [ 2988.663685] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2988.664749] p9_client_create+0xc6a/0x1230 [ 2988.665664] ? p9_client_flush+0x430/0x430 [ 2988.666556] ? trace_hardirqs_on+0x5b/0x180 [ 2988.667455] ? lockdep_init_map_type+0x2c7/0x780 [ 2988.668430] ? __raw_spin_lock_init+0x36/0x110 [ 2988.669398] v9fs_session_init+0x1dd/0x1680 [ 2988.670287] ? lock_release+0x680/0x680 [ 2988.671128] ? kmem_cache_alloc_trace+0x151/0x320 [ 2988.672131] ? v9fs_show_options+0x690/0x690 [ 2988.673082] ? trace_hardirqs_on+0x5b/0x180 [ 2988.673995] ? kasan_unpoison_shadow+0x33/0x50 [ 2988.674940] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2988.675999] v9fs_mount+0x79/0x8f0 [ 2988.676748] ? v9fs_write_inode+0x60/0x60 [ 2988.677614] legacy_get_tree+0x105/0x220 [ 2988.678477] vfs_get_tree+0x8e/0x300 [ 2988.679252] path_mount+0x1429/0x2120 [ 2988.680059] ? strncpy_from_user+0x9e/0x470 [ 2988.680958] ? finish_automount+0xa90/0xa90 [ 2988.681852] ? getname_flags.part.0+0x1dd/0x4f0 [ 2988.682807] ? _copy_from_user+0xfb/0x1b0 [ 2988.683689] __x64_sys_mount+0x282/0x300 [ 2988.684532] ? copy_mnt_ns+0xa00/0xa00 [ 2988.685367] do_syscall_64+0x33/0x40 [ 2988.686135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2988.687199] RIP: 0033:0x7fe4d5f5bb19 [ 2988.687968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2988.691774] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2988.693365] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2988.694851] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2988.696331] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2988.697809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2988.699298] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 2988.701572] kmem_cache_create(9p-fcall-cache-60) failed with error -12 [ 2988.703060] CPU: 0 PID: 48285 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 2988.704471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2988.706189] Call Trace: [ 2988.706746] dump_stack+0x107/0x167 [ 2988.707522] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2988.708639] p9_client_create+0xc6a/0x1230 [ 2988.709554] ? p9_client_flush+0x430/0x430 [ 2988.710458] ? trace_hardirqs_on+0x5b/0x180 [ 2988.711370] ? lockdep_init_map_type+0x2c7/0x780 [ 2988.712514] ? __raw_spin_lock_init+0x36/0x110 [ 2988.713574] v9fs_session_init+0x1dd/0x1680 [ 2988.714494] ? lock_release+0x680/0x680 [ 2988.715351] ? kmem_cache_alloc_trace+0x151/0x320 [ 2988.716364] ? v9fs_show_options+0x690/0x690 [ 2988.717314] ? trace_hardirqs_on+0x5b/0x180 [ 2988.718235] ? kasan_unpoison_shadow+0x33/0x50 04:31:03 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x7, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 2988.719193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2988.720454] v9fs_mount+0x79/0x8f0 [ 2988.721207] ? v9fs_write_inode+0x60/0x60 [ 2988.722094] legacy_get_tree+0x105/0x220 [ 2988.722955] vfs_get_tree+0x8e/0x300 [ 2988.723739] path_mount+0x1429/0x2120 [ 2988.724550] ? strncpy_from_user+0x9e/0x470 [ 2988.725461] ? finish_automount+0xa90/0xa90 [ 2988.726379] ? getname_flags.part.0+0x1dd/0x4f0 [ 2988.727357] ? _copy_from_user+0xfb/0x1b0 [ 2988.728250] __x64_sys_mount+0x282/0x300 [ 2988.729104] ? copy_mnt_ns+0xa00/0xa00 [ 2988.729958] do_syscall_64+0x33/0x40 [ 2988.730742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2988.731813] RIP: 0033:0x7fe4d5f5bb19 [ 2988.732585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2988.736480] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2988.738075] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 2988.739560] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2988.741043] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 2988.742535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2988.744017] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:31:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x81, 0x0, 0x5e, 0x0, 0xfffffffffffff30c, 0x18040, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x480, 0x8, 0x7fff, 0x1, 0x0, 0x3f, 0x4, 0x0, 0x1, 0x0, 0x3}, r1, 0xe, r0, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @private=0xa010102}, {0x2, 0x0, @rand_addr=0x64010101}, {0x2, 0x0, @broadcast}}) 04:31:03 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9, 0x2}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:22 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) r4 = socket(0x25, 0x800, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f0000000180)={'hsr0\x00'}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x10, 0x100, 0x70bd29, 0x25dfdbff, {}, [@generic="d83f0f292d0496b99aa28977d1f92e5edaba455a7c68fe7dc434ddf2f8"]}, 0x34}, 0x1, 0x0, 0x0, 0x20000890}, 0x800) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r5 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() r7 = open(0x0, 0x534f66d67f7d7291, 0xd) accept4$bt_l2cap(r7, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000400)=0xe, 0x80000) mkdirat(r7, &(0x7f0000000300)='./file0\x00', 0x140) ptrace(0x10, r6) 04:31:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:31:22 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f00000002c0)={r5}) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000000)) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) r6 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r6, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x3, 0x9}]}) 04:31:22 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_names\x00') syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) syz_io_uring_setup(0x5, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x9) syz_io_uring_setup(0x1295, &(0x7f0000000140)={0x0, 0xfded, 0x8, 0x1, 0x27d, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x5) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:31:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 53) 04:31:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9, 0x4}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:22 executing program 6: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x200, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x0, 0x0, 0x0, 0x0, 0x3}) 04:31:22 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x8, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 3007.627924] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 3007.638708] FAULT_INJECTION: forcing a failure. [ 3007.638708] name failslab, interval 1, probability 0, space 0, times 0 04:31:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9, 0xfd}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3007.641252] CPU: 1 PID: 48529 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3007.642903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3007.644750] Call Trace: [ 3007.645344] dump_stack+0x107/0x167 [ 3007.646162] should_fail.cold+0x5/0xa [ 3007.647029] ? __kmem_cache_create+0x10e/0x520 [ 3007.648050] should_failslab+0x5/0x20 [ 3007.648901] kmem_cache_alloc_node+0x55/0x330 [ 3007.649913] __kmem_cache_create+0x10e/0x520 [ 3007.650926] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3007.652042] p9_client_create+0xc6a/0x1230 [ 3007.652994] ? p9_client_flush+0x430/0x430 [ 3007.653934] ? trace_hardirqs_on+0x5b/0x180 [ 3007.654903] ? lockdep_init_map_type+0x2c7/0x780 [ 3007.655961] ? __raw_spin_lock_init+0x36/0x110 [ 3007.656983] v9fs_session_init+0x1dd/0x1680 [ 3007.657945] ? lock_release+0x680/0x680 [ 3007.658848] ? kmem_cache_alloc_trace+0x151/0x320 [ 3007.659917] ? v9fs_show_options+0x690/0x690 [ 3007.660907] ? trace_hardirqs_on+0x5b/0x180 [ 3007.661876] ? kasan_unpoison_shadow+0x33/0x50 [ 3007.662895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3007.664021] v9fs_mount+0x79/0x8f0 [ 3007.664813] ? v9fs_write_inode+0x60/0x60 [ 3007.665754] legacy_get_tree+0x105/0x220 [ 3007.666666] vfs_get_tree+0x8e/0x300 [ 3007.667493] path_mount+0x1429/0x2120 [ 3007.668351] ? strncpy_from_user+0x9e/0x470 [ 3007.669313] ? finish_automount+0xa90/0xa90 [ 3007.670273] ? getname_flags.part.0+0x1dd/0x4f0 [ 3007.671304] ? _copy_from_user+0xfb/0x1b0 [ 3007.672239] __x64_sys_mount+0x282/0x300 [ 3007.673142] ? copy_mnt_ns+0xa00/0xa00 [ 3007.674023] do_syscall_64+0x33/0x40 [ 3007.674858] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3007.676009] RIP: 0033:0x7fe4d5f5bb19 [ 3007.676841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3007.680913] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3007.682609] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3007.684186] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3007.685766] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3007.687358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3007.688939] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3007.690882] kmem_cache_create(9p-fcall-cache-61) failed with error -22 [ 3007.692377] CPU: 1 PID: 48529 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3007.693910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3007.695759] Call Trace: [ 3007.696343] dump_stack+0x107/0x167 [ 3007.697155] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3007.698330] p9_client_create+0xc6a/0x1230 [ 3007.699289] ? p9_client_flush+0x430/0x430 [ 3007.700233] ? trace_hardirqs_on+0x5b/0x180 [ 3007.701206] ? lockdep_init_map_type+0x2c7/0x780 [ 3007.702272] ? __raw_spin_lock_init+0x36/0x110 [ 3007.703302] v9fs_session_init+0x1dd/0x1680 [ 3007.704264] ? lock_release+0x680/0x680 [ 3007.705156] ? kmem_cache_alloc_trace+0x151/0x320 [ 3007.706235] ? v9fs_show_options+0x690/0x690 [ 3007.707243] ? trace_hardirqs_on+0x5b/0x180 [ 3007.708210] ? kasan_unpoison_shadow+0x33/0x50 [ 3007.709238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3007.710366] v9fs_mount+0x79/0x8f0 [ 3007.711178] ? v9fs_write_inode+0x60/0x60 [ 3007.712099] legacy_get_tree+0x105/0x220 [ 3007.713010] vfs_get_tree+0x8e/0x300 [ 3007.713837] path_mount+0x1429/0x2120 [ 3007.714702] ? strncpy_from_user+0x9e/0x470 [ 3007.715660] ? finish_automount+0xa90/0xa90 [ 3007.716612] ? getname_flags.part.0+0x1dd/0x4f0 [ 3007.717656] ? _copy_from_user+0xfb/0x1b0 [ 3007.718601] __x64_sys_mount+0x282/0x300 [ 3007.719506] ? copy_mnt_ns+0xa00/0xa00 [ 3007.720379] do_syscall_64+0x33/0x40 [ 3007.721204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3007.722346] RIP: 0033:0x7fe4d5f5bb19 [ 3007.723179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3007.727265] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3007.728965] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3007.730561] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3007.732167] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3007.733758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3007.735346] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3007.737777] FAT-fs (loop1): invalid media value (0x00) [ 3007.738689] FAT-fs (loop1): Can't find a valid FAT filesystem 04:31:22 executing program 6: r0 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRES16=r0, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697020060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dee001000800070086000000080009007c000000080004000900000006000f0002000078e00006000b000a00"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x5c, r0, 0x100, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcd}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb0, r0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xef}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x685bcdc0}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfffd}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xf678}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40}, 0x804) r1 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xe, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) 04:31:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 54) 04:31:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x4, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) [ 3007.922222] FAT-fs (loop1): invalid media value (0x00) [ 3007.923100] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3007.934083] FAULT_INJECTION: forcing a failure. [ 3007.934083] name failslab, interval 1, probability 0, space 0, times 0 [ 3007.936657] CPU: 1 PID: 48749 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3007.938193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3007.940035] Call Trace: [ 3007.940621] dump_stack+0x107/0x167 [ 3007.941432] should_fail.cold+0x5/0xa [ 3007.942279] ? __kmem_cache_create+0x10e/0x520 [ 3007.943300] should_failslab+0x5/0x20 [ 3007.944143] kmem_cache_alloc_node+0x55/0x330 [ 3007.945150] __kmem_cache_create+0x10e/0x520 [ 3007.946132] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3007.947254] p9_client_create+0xc6a/0x1230 [ 3007.948200] ? p9_client_flush+0x430/0x430 [ 3007.949145] ? trace_hardirqs_on+0x5b/0x180 [ 3007.950102] ? lockdep_init_map_type+0x2c7/0x780 [ 3007.951177] ? __raw_spin_lock_init+0x36/0x110 [ 3007.952193] v9fs_session_init+0x1dd/0x1680 [ 3007.953151] ? lock_release+0x680/0x680 [ 3007.954044] ? kmem_cache_alloc_trace+0x151/0x320 [ 3007.955112] ? v9fs_show_options+0x690/0x690 [ 3007.956094] ? trace_hardirqs_on+0x5b/0x180 [ 3007.957047] ? kasan_unpoison_shadow+0x33/0x50 [ 3007.958052] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3007.959182] v9fs_mount+0x79/0x8f0 [ 3007.959968] ? v9fs_write_inode+0x60/0x60 [ 3007.960888] legacy_get_tree+0x105/0x220 [ 3007.961800] vfs_get_tree+0x8e/0x300 [ 3007.962631] path_mount+0x1429/0x2120 [ 3007.963482] ? strncpy_from_user+0x9e/0x470 [ 3007.964433] ? finish_automount+0xa90/0xa90 [ 3007.965386] ? getname_flags.part.0+0x1dd/0x4f0 [ 3007.966416] ? _copy_from_user+0xfb/0x1b0 [ 3007.967349] __x64_sys_mount+0x282/0x300 [ 3007.968246] ? copy_mnt_ns+0xa00/0xa00 [ 3007.969130] do_syscall_64+0x33/0x40 [ 3007.969956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3007.971108] RIP: 0033:0x7fe4d5f5bb19 [ 3007.971928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3007.976031] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3007.977712] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3007.979320] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3007.980918] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3007.982518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3007.984125] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3007.985961] kmem_cache_create(9p-fcall-cache-62) failed with error -22 [ 3007.987483] CPU: 1 PID: 48749 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3007.989036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3007.990897] Call Trace: [ 3007.991492] dump_stack+0x107/0x167 [ 3007.992309] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3007.993470] p9_client_create+0xc6a/0x1230 [ 3007.994427] ? p9_client_flush+0x430/0x430 [ 3007.995369] ? trace_hardirqs_on+0x5b/0x180 [ 3007.996321] ? lockdep_init_map_type+0x2c7/0x780 [ 3007.997366] ? __raw_spin_lock_init+0x36/0x110 [ 3007.998389] v9fs_session_init+0x1dd/0x1680 [ 3007.999357] ? lock_release+0x680/0x680 [ 3008.000262] ? kmem_cache_alloc_trace+0x151/0x320 [ 3008.001323] ? v9fs_show_options+0x690/0x690 [ 3008.002316] ? trace_hardirqs_on+0x5b/0x180 [ 3008.003275] ? kasan_unpoison_shadow+0x33/0x50 [ 3008.004294] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3008.005418] v9fs_mount+0x79/0x8f0 [ 3008.006215] ? v9fs_write_inode+0x60/0x60 [ 3008.007139] legacy_get_tree+0x105/0x220 [ 3008.008051] vfs_get_tree+0x8e/0x300 [ 3008.008879] path_mount+0x1429/0x2120 [ 3008.009735] ? strncpy_from_user+0x9e/0x470 [ 3008.010708] ? finish_automount+0xa90/0xa90 [ 3008.011675] ? getname_flags.part.0+0x1dd/0x4f0 [ 3008.012704] ? _copy_from_user+0xfb/0x1b0 [ 3008.013641] __x64_sys_mount+0x282/0x300 [ 3008.014539] ? copy_mnt_ns+0xa00/0xa00 [ 3008.015430] do_syscall_64+0x33/0x40 [ 3008.016256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3008.017399] RIP: 0033:0x7fe4d5f5bb19 [ 3008.018220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3008.022323] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3008.024010] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3008.025606] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3008.027207] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3008.028800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3008.030391] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:31:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 55) 04:31:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f80000200040", 0x1b}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:31:36 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYBLOB="d67a71e690b1376dd4dc1558783bf7976db0ba4994543d1a0423839fe2a32087a6faa703a65cf370a2a59846f228a3bbc13a66c888ff45f0", @ANYRES64, @ANYRESOCT, @ANYRES32=r4, @ANYRES64, @ANYRES32, @ANYRESDEC], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r5 = dup(0xffffffffffffffff) mmap$usbmon(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x100000e, 0x1010, r0, 0x8f0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r5, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) 04:31:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x9, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000000701080000000000000000010000030900010073797a310000000024000780200002400000000108030140000000d30800024000000e78080001400000000563232062a263fa995fa69f6258a39c4a67f2010e237fb268d454088561e87a23cd8a9e912d9963b96c82c4d8d14edebc055691cc2f55623a17ccb8b2a23d121e7c8b6a5c5eb23ed2c9dd36c7b33d14d9af60fb3c930726fcc03cf6f7970d76dc729fb79be5308f8c3fd50296e1e8195ecc1734c1b37b76e14d8e5f4419db312dd0714e1cf5cb89366c6bab59ed58d28ff1e01a47a3a80cbb79b1a2a1514ef9fd2206454695e5ea081157e160d8a3928fd0b6c69b64b4bf52006a2c71cf0f329f5a4ce92ffae8b7b3527cbdd9bbbd067bd67597792ada7e887354f058fb27"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:31:36 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xff, 0x8, 0x7, 0xff, 0x0, 0x7, 0x14200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp, 0x10000, 0x80000000, 0x8, 0x28d29b243eae550f, 0x7c0, 0x9, 0x1, 0x0, 0x2, 0x0, 0x1f}, 0x0, 0x6, r0, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:36 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) fcntl$dupfd(r2, 0x0, r1) r3 = fork() ptrace(0x4208, r3) ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:31:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffbf0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)=ANY=[@ANYBLOB='5']) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1182b, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 04:31:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x8, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3022.235587] FAT-fs (loop1): bogus number of FAT sectors [ 3022.236929] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3022.242160] FAULT_INJECTION: forcing a failure. [ 3022.242160] name failslab, interval 1, probability 0, space 0, times 0 [ 3022.244664] CPU: 0 PID: 48763 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3022.246228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3022.246379] FAT-fs (loop4): Unrecognized mount option "5" or missing value [ 3022.248022] Call Trace: [ 3022.248051] dump_stack+0x107/0x167 [ 3022.248082] should_fail.cold+0x5/0xa [ 3022.251235] ? create_object.isra.0+0x3a/0xa20 [ 3022.252307] should_failslab+0x5/0x20 [ 3022.253171] kmem_cache_alloc+0x5b/0x310 [ 3022.254064] create_object.isra.0+0x3a/0xa20 [ 3022.255033] kmemleak_alloc_percpu+0xa0/0x100 [ 3022.256049] pcpu_alloc+0x4e2/0x1240 [ 3022.256895] __kmem_cache_create+0x35a/0x520 [ 3022.257858] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3022.258950] p9_client_create+0xc6a/0x1230 [ 3022.259897] ? p9_client_flush+0x430/0x430 [ 3022.260817] ? trace_hardirqs_on+0x5b/0x180 [ 3022.261758] ? lockdep_init_map_type+0x2c7/0x780 [ 3022.262793] ? __raw_spin_lock_init+0x36/0x110 [ 3022.263809] v9fs_session_init+0x1dd/0x1680 [ 3022.264749] ? lock_release+0x680/0x680 [ 3022.265632] ? kmem_cache_alloc_trace+0x151/0x320 [ 3022.266676] ? v9fs_show_options+0x690/0x690 [ 3022.267654] ? trace_hardirqs_on+0x5b/0x180 [ 3022.268594] ? kasan_unpoison_shadow+0x33/0x50 [ 3022.269580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3022.270705] v9fs_mount+0x79/0x8f0 [ 3022.271487] ? v9fs_write_inode+0x60/0x60 [ 3022.272386] legacy_get_tree+0x105/0x220 [ 3022.273271] vfs_get_tree+0x8e/0x300 [ 3022.274080] path_mount+0x1429/0x2120 [ 3022.274916] ? strncpy_from_user+0x9e/0x470 [ 3022.275858] ? finish_automount+0xa90/0xa90 [ 3022.276791] ? getname_flags.part.0+0x1dd/0x4f0 [ 3022.277796] ? _copy_from_user+0xfb/0x1b0 04:31:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0xf, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 3022.278713] __x64_sys_mount+0x282/0x300 [ 3022.279759] ? copy_mnt_ns+0xa00/0xa00 [ 3022.280636] do_syscall_64+0x33/0x40 [ 3022.281447] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3022.282556] RIP: 0033:0x7fe4d5f5bb19 [ 3022.283370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3022.287352] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3022.289005] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3022.290552] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3022.292107] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3022.293657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3022.295212] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3022.326797] FAT-fs (loop4): Unrecognized mount option "5" or missing value 04:31:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x4e20, 0x4, 'lblc\x00', 0x0, 0x6, 0x77}, 0x2c) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) 04:31:37 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x30000, 0x148) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0046f08bc7ddde8594bb80d6f1b5c35773fe846983890354406aeef24f4489f950b5f0404c1242e459a95c8bb18e716a3a327e20965dce99a8c95e04e602df22327f3c"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x82, &(0x7f0000000180)={'trans=unix,', {[{@access_any}, {@access_user}, {@cache_loose}, {@cache_loose}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@nodevmap}, {@fscache}], [{@fsname={'fsname', 0x3d, 'vfat\x00'}}]}}) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) keyctl$get_security(0x11, r0, 0x0, 0x0) r1 = getuid() keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x0) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = getuid() keyctl$chown(0x4, r2, r3, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x1004011, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@afid={'afid', 0x3d, 0xffffffff}}], [{@measure}, {@hash}, {@euid_eq={'euid', 0x3d, r1}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffffc}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fscache'}}]}}) 04:31:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0xa, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) [ 3022.446595] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 3022.465715] 9pnet: p9_fd_create_unix (48971): problem connecting socket: ./file0: -30 04:31:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r5 = fork() ptrace(0x10, r5) [ 3022.477147] 9pnet: p9_fd_create_unix (48971): problem connecting socket: ./file0: -30 04:31:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 56) [ 3022.487287] 9pnet: p9_fd_create_unix (48995): problem connecting socket: ./file0: -30 [ 3022.502985] 9pnet: p9_fd_create_unix (48996): problem connecting socket: ./file0: -30 [ 3022.539239] FAT-fs (loop1): invalid media value (0x00) 04:31:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0xf0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 3022.540454] FAT-fs (loop1): Can't find a valid FAT filesystem 04:31:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x23456}, 0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd_index=0x5, 0x2, 0x0, 0xe58c, 0x2, 0x1}, 0x3) 04:31:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x5, 0x560a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fork() r2 = fork() ptrace(0x10, r1) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) r4 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r5 = creat(&(0x7f0000002280)='./file0\x00', 0x140) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f00000022c0)=@gcm_256={{0x304}, "ea9cfb995466312f", "3e30d87e12992e427df65ee845daa7c8ec4ef7471b039d72567fa2eecce8dfea", "816fbcad", "7650e146e20b60c9"}, 0x38) recvmmsg$unix(r4, &(0x7f0000002140)=[{{&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)=""/38, 0x26}, {&(0x7f0000000380)=""/105, 0x69}, {&(0x7f0000000400)=""/4, 0x4}], 0x3, &(0x7f0000000480)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000500), 0x6e, &(0x7f0000000680)=[{&(0x7f0000000580)=""/201, 0xc9}], 0x1, &(0x7f00000006c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000780)=""/192, 0xc0}, {&(0x7f0000000840)=""/212, 0xd4}], 0x2}}, {{&(0x7f0000000980)=@abs, 0x6e, &(0x7f0000002040)=[{&(0x7f0000000a00)=""/161, 0xa1}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/197, 0xc5}, {&(0x7f0000001bc0)=""/229, 0xe5}, {&(0x7f0000001cc0)=""/88, 0x58}, {&(0x7f0000001e00)=""/140, 0x8c}, {&(0x7f0000001ec0)=""/66, 0x42}, {&(0x7f0000001f40)=""/228, 0xe4}, {&(0x7f0000001d40)=""/47, 0x2f}], 0x9, &(0x7f0000002100)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x4, 0x103, 0x0) ptrace$setopts(0x4206, r2, 0xc6, 0x4c) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000002240)={0x200, 0xfff, 0x4, 0x7, 0x13}) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9, 0x7, r0, &(0x7f0000000140)="3e6736e04e0ecb52406a45128f5bf69300408831348d5933fdd9031c49b76609ac393815d4ee77d5aa9327213f050910b5a9e7bc35c21ca312f90dc9973eec1a1618a46699f53b8d04258fccdf95338754bcfb83b68802b56b6605c032935e7a0919659d035edd1f5bf18a8fbbe7db20f41162f3d0bd514c6b07ceb75445e83500733472e13306ea57fef3e583bb6a3f319f946d5024326128342e8e4487df8a69b55a32b810832c71246688ca69951685c7b3acd4c4a01a182f1eb5bb7c76ddd2ecd6bae0f221135f67f20c16a7d6c75b2f592fe2dfed93e961cdd12db428ef8846a985ed75c4944bec62f810eaadc729be2d9a1cdfcec5", 0xf8, 0x100000001, 0x0, 0x2, r4}, &(0x7f0000000280)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xa6, 0xd, 0x3, 0x1e, 0x0, 0x6, 0x49004, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5a04, 0x3}, 0x4000, 0x2000000000000000, 0x200, 0x6, 0x80000000, 0x2, 0x140, 0x0, 0x94, 0x0, 0x5}, r1, 0x8, r3, 0x3) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) perf_event_open(&(0x7f0000002300)={0x4, 0x80, 0x8, 0x40, 0x0, 0x0, 0x0, 0x4640000000, 0x98220, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x55, 0xf4}, 0x0, 0x4, 0x80000000, 0x9, 0x1000, 0x91e, 0x1, 0x0, 0x7, 0x0, 0x8001}, 0x0, 0x7, r6, 0x2) 04:31:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x14, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3022.683996] FAULT_INJECTION: forcing a failure. [ 3022.683996] name failslab, interval 1, probability 0, space 0, times 0 [ 3022.685348] CPU: 1 PID: 49077 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3022.686127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3022.687073] Call Trace: [ 3022.687375] dump_stack+0x107/0x167 [ 3022.687792] should_fail.cold+0x5/0xa [ 3022.688227] ? create_object.isra.0+0x3a/0xa20 [ 3022.688746] should_failslab+0x5/0x20 [ 3022.689175] kmem_cache_alloc+0x5b/0x310 [ 3022.689636] create_object.isra.0+0x3a/0xa20 [ 3022.690137] kmemleak_alloc_percpu+0xa0/0x100 [ 3022.690647] pcpu_alloc+0x4e2/0x1240 [ 3022.691092] __kmem_cache_create+0x35a/0x520 [ 3022.691589] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3022.692150] p9_client_create+0xc6a/0x1230 [ 3022.692635] ? p9_client_flush+0x430/0x430 [ 3022.693117] ? trace_hardirqs_on+0x5b/0x180 [ 3022.693607] ? lockdep_init_map_type+0x2c7/0x780 [ 3022.694145] ? __raw_spin_lock_init+0x36/0x110 [ 3022.694665] v9fs_session_init+0x1dd/0x1680 [ 3022.695159] ? lock_release+0x680/0x680 [ 3022.695628] ? kmem_cache_alloc_trace+0x151/0x320 [ 3022.696172] ? v9fs_show_options+0x690/0x690 [ 3022.696677] ? trace_hardirqs_on+0x5b/0x180 [ 3022.697167] ? kasan_unpoison_shadow+0x33/0x50 [ 3022.697678] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3022.698249] v9fs_mount+0x79/0x8f0 [ 3022.698653] ? v9fs_write_inode+0x60/0x60 [ 3022.699138] legacy_get_tree+0x105/0x220 [ 3022.699601] vfs_get_tree+0x8e/0x300 [ 3022.700029] path_mount+0x1429/0x2120 [ 3022.700458] ? strncpy_from_user+0x9e/0x470 [ 3022.700944] ? finish_automount+0xa90/0xa90 [ 3022.701433] ? getname_flags.part.0+0x1dd/0x4f0 [ 3022.701954] ? _copy_from_user+0xfb/0x1b0 [ 3022.702434] __x64_sys_mount+0x282/0x300 [ 3022.702898] ? copy_mnt_ns+0xa00/0xa00 [ 3022.703357] do_syscall_64+0x33/0x40 [ 3022.703778] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3022.704356] RIP: 0033:0x7fe4d5f5bb19 [ 3022.704773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3022.706854] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3022.707715] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3022.708528] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3022.709347] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3022.710170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3022.710972] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:31:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 57) 04:31:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1d5ceffa00"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:31:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x10440, 0x0) r1 = accept4$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80000) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000180)=""/225, &(0x7f0000000280)=0xe1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x0, @broadcast}}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000002c0)={r0, 0x5, 0x100, 0x120f}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000440)={{0x1, 0x1, 0x18}, './file0\x00'}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x24, r7, 0xc0b, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_CQM={0x8, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r7, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x3, 0x73}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x40}}, 0x20048000) 04:31:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:31:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x300, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:31:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0x50b7) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000c956cde17f512bd789ed1100400000000000000000000000000000ffffffe600a327ca26381bf20000380000000000"], 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) sync_file_range(r4, 0xc18, 0x6357, 0x7) fcntl$dupfd(r1, 0x0, r2) r5 = fork() ptrace(0x10, r5) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200), 0x824222, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap}, {@version_L}, {@nodevmap}], [{@audit}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/hpet\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/hpet\x00'}}]}}) ptrace$getregset(0x4204, r5, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:31:53 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/battery', 0x2000, 0x181) mknodat(r5, &(0x7f0000000040)='./file0\x00', 0x1000, 0x5) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r7 = syz_open_procfs$userns(r4, &(0x7f0000000140)) sendmsg$nl_generic(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0xf4, 0x15, 0x200, 0x70bd29, 0x25dfdbff, {0xd}, [@nested={0xe0, 0x7c, 0x0, 0x1, [@typed={0x8, 0x45, 0x0, 0x0, @fd=r7}, @generic="7f3b04acadb3714d81e0a66dfa071273437fcd031e866d47ee268ac9dee6820f9d5e65fce5b57201782cf44f35041a2b51842ffc1b2e714a44117b39f0d68fc87026726f6e358320cefb79bce3bf16c61b02d475394b69dbfa99a8874b92dc739a5b7fee4b99a25706c6736a9e093a807f133f80c9aa0fc5a0580481e2ecf9c8a11272e32a877dd6f6fd2fd23f5f3f04cb462be5012071b01524d1f41ab6c681a7f83a873194071873b5d78823ffa6c4d6d932d982679ba6bb93d84f25751773b4f948ce96e9c3c4dd55e4740f18192bf02fcab6"]}]}, 0xf4}}, 0x40000) ptrace(0x10, r4) [ 3038.630181] FAULT_INJECTION: forcing a failure. [ 3038.630181] name failslab, interval 1, probability 0, space 0, times 0 [ 3038.631859] CPU: 0 PID: 49243 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3038.632783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3038.633895] Call Trace: [ 3038.634258] dump_stack+0x107/0x167 [ 3038.634756] should_fail.cold+0x5/0xa [ 3038.635289] should_failslab+0x5/0x20 [ 3038.635819] __kmalloc_track_caller+0x79/0x370 [ 3038.636437] ? kstrdup_const+0x53/0x80 [ 3038.636973] kstrdup+0x36/0x70 [ 3038.637410] kstrdup_const+0x53/0x80 [ 3038.637916] kvasprintf_const+0x10c/0x1a0 [ 3038.638483] kobject_set_name_vargs+0x56/0x150 [ 3038.639108] kobject_init_and_add+0xc9/0x160 [ 3038.639714] ? kobject_create_and_add+0xb0/0xb0 [ 3038.640352] ? wait_for_completion_io+0x270/0x270 [ 3038.640998] ? kernfs_name_hash+0xe7/0x110 [ 3038.641574] ? kernfs_find_ns+0x256/0x380 [ 3038.642145] sysfs_slab_add+0x172/0x200 [ 3038.642686] __kmem_cache_create+0x3db/0x520 [ 3038.643285] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3038.643976] p9_client_create+0xc6a/0x1230 [ 3038.644563] ? p9_client_flush+0x430/0x430 [ 3038.645140] ? trace_hardirqs_on+0x5b/0x180 [ 3038.645726] ? lockdep_init_map_type+0x2c7/0x780 [ 3038.646369] ? __raw_spin_lock_init+0x36/0x110 [ 3038.647008] v9fs_session_init+0x1dd/0x1680 [ 3038.647591] ? lock_release+0x680/0x680 [ 3038.648164] ? kmem_cache_alloc_trace+0x151/0x320 [ 3038.648819] ? v9fs_show_options+0x690/0x690 [ 3038.649431] ? trace_hardirqs_on+0x5b/0x180 [ 3038.650025] ? kasan_unpoison_shadow+0x33/0x50 [ 3038.650643] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3038.651342] v9fs_mount+0x79/0x8f0 [ 3038.651840] ? v9fs_write_inode+0x60/0x60 [ 3038.652397] legacy_get_tree+0x105/0x220 [ 3038.652945] vfs_get_tree+0x8e/0x300 [ 3038.653445] path_mount+0x1429/0x2120 [ 3038.653965] ? strncpy_from_user+0x9e/0x470 [ 3038.654543] ? finish_automount+0xa90/0xa90 [ 3038.655122] ? getname_flags.part.0+0x1dd/0x4f0 [ 3038.655753] ? _copy_from_user+0xfb/0x1b0 [ 3038.656325] __x64_sys_mount+0x282/0x300 [ 3038.656869] ? copy_mnt_ns+0xa00/0xa00 [ 3038.657407] do_syscall_64+0x33/0x40 [ 3038.657904] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3038.658590] RIP: 0033:0x7fe4d5f5bb19 [ 3038.659090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3038.661551] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3038.662573] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3038.663532] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3038.664495] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3038.665451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3038.666404] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3038.667467] kobject: can not set name properly! [ 3038.668202] kmem_cache_create(9p-fcall-cache-65) failed with error -12 [ 3038.669123] CPU: 0 PID: 49243 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3038.670049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3038.671161] Call Trace: [ 3038.671519] dump_stack+0x107/0x167 [ 3038.672022] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3038.672743] p9_client_create+0xc6a/0x1230 [ 3038.673321] ? p9_client_flush+0x430/0x430 [ 3038.673889] ? trace_hardirqs_on+0x5b/0x180 [ 3038.674467] ? lockdep_init_map_type+0x2c7/0x780 [ 3038.675112] ? __raw_spin_lock_init+0x36/0x110 [ 3038.675734] v9fs_session_init+0x1dd/0x1680 [ 3038.676313] ? lock_release+0x680/0x680 [ 3038.676854] ? kmem_cache_alloc_trace+0x151/0x320 [ 3038.677497] ? v9fs_show_options+0x690/0x690 [ 3038.678097] ? trace_hardirqs_on+0x5b/0x180 [ 3038.678673] ? kasan_unpoison_shadow+0x33/0x50 [ 3038.679281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3038.679972] v9fs_mount+0x79/0x8f0 [ 3038.680456] ? v9fs_write_inode+0x60/0x60 [ 3038.681009] legacy_get_tree+0x105/0x220 [ 3038.681553] vfs_get_tree+0x8e/0x300 [ 3038.682049] path_mount+0x1429/0x2120 [ 3038.682566] ? strncpy_from_user+0x9e/0x470 [ 3038.683159] ? finish_automount+0xa90/0xa90 [ 3038.683744] ? getname_flags.part.0+0x1dd/0x4f0 [ 3038.684365] ? _copy_from_user+0xfb/0x1b0 [ 3038.684931] __x64_sys_mount+0x282/0x300 [ 3038.685473] ? copy_mnt_ns+0xa00/0xa00 [ 3038.686013] do_syscall_64+0x33/0x40 [ 3038.686515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3038.687197] RIP: 0033:0x7fe4d5f5bb19 [ 3038.687700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3038.690159] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3038.691167] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3038.692124] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3038.693069] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3038.694004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3038.694949] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3038.714122] FAT-fs (loop4): Unrecognized mount option "\ïú" or missing value [ 3038.722885] FAT-fs (loop1): invalid media value (0x00) [ 3038.724199] FAT-fs (loop1): Can't find a valid FAT filesystem 04:31:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x2, @dev}, {0x2, 0x0, @broadcast}}) 04:31:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x37f, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 3038.764775] FAT-fs (loop4): Unrecognized mount option "\ïú" or missing value 04:31:53 executing program 6: r0 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x0, 0x3, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:31:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x4, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 58) 04:32:08 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[@ANYRES64=r1, @ANYRESOCT=r2, @ANYRES32=r1, @ANYBLOB="8dce706cdbe6fb6b0ab88264a905e05470e7a682a8a818c813f72f11c82310f240142a02242af02e4311949f7dcec59c81ff407edaad6db030518c061797196418761c885d25f932bc1a92f56216395c1b257b99d3efbb10fab72a94cb59f73ad3c4193583bb4cd2fe047d76b8cffab58edf88552fbd94c0081cff1b89fb16592c5d884cce95794946e0632dd0f4ece9dfd6fda4ab12fe340acd40671dc4af47c7c0caa62c694d2476e66063ca23e79198396b00dbcfb278333c5bdefc0170d0b1748c8a18a679", @ANYBLOB="8693d782183669bf6efc770d8a6be045e699b352b68138cc6bad182b1703f146c883f7ce3b91007c0a6f3e06b5e92a693b9d135609c994f285cd19bb7659a65dfa3d", @ANYRES32=r1, @ANYBLOB="8ab45520065f9da15fc948840b669603a785cec40b67c96cb42da48305d92634b105d2a362b5425ecad9c08c2c8e49dcaf9805674012c893b1ff34660ecd47ad40a87511a89199cdfa0ec3edce68a75b3f41e9c2226dfbaa62ce777ea81ab340c04c9a33540da2dcdbb4b5af289057b44a7ff398da346e834b851645cb76a19ac808864fd90f518aa03f62216c00a5f81d68f5bd4bd0e9433b93fefab1a2bb634eb4b4e001ea80bbe2b96e8134ef403274456dbcb3b4bb6e1e7dcb1bdf77"], 0x35) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:32:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0xba201, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1b8eef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) dup2(r3, r2) r7 = fork() ptrace(0x10, r7) ptrace$poke(0x4, r7, &(0x7f0000000100), 0xb3) syz_emit_ethernet(0x8e, &(0x7f00000013c0)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "96153f", 0x58, 0x3a, 0x0, @dev, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fc7c86", 0x0, 0x0, 0x0, @mcast1, @empty, [@dstopts={0x0, 0x2, '\x00', [@enc_lim, @enc_lim, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra]}], "b89b031568bdd764"}}}}}}}, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:32:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x200000, 0x10, 0x3}, 0x18) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='user.incfs.metadata\x00', &(0x7f00000001c0)='\\)^*[%\x00', 0x7, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) 04:32:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200", 0x12}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0xfd, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x500, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:32:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) r1 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x3fe, @dev}, {0x2, 0x0, @broadcast}}) [ 3053.514680] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 3053.516232] FAULT_INJECTION: forcing a failure. [ 3053.516232] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.518968] CPU: 1 PID: 49485 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3053.520520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.522376] Call Trace: [ 3053.522972] dump_stack+0x107/0x167 [ 3053.523792] should_fail.cold+0x5/0xa [ 3053.524687] should_failslab+0x5/0x20 [ 3053.525562] __kmalloc_track_caller+0x79/0x370 [ 3053.526618] ? kstrdup_const+0x53/0x80 [ 3053.527513] kstrdup+0x36/0x70 [ 3053.528263] kstrdup_const+0x53/0x80 [ 3053.529118] kvasprintf_const+0x10c/0x1a0 [ 3053.530069] kobject_set_name_vargs+0x56/0x150 [ 3053.531118] kobject_init_and_add+0xc9/0x160 [ 3053.532142] ? kobject_create_and_add+0xb0/0xb0 [ 3053.533201] ? wait_for_completion_io+0x270/0x270 [ 3053.534292] ? kernfs_name_hash+0xe7/0x110 [ 3053.535262] ? kernfs_find_ns+0x256/0x380 [ 3053.536217] sysfs_slab_add+0x172/0x200 [ 3053.537119] __kmem_cache_create+0x3db/0x520 [ 3053.538119] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3053.539250] p9_client_create+0xc6a/0x1230 [ 3053.540214] ? p9_client_flush+0x430/0x430 [ 3053.541164] ? trace_hardirqs_on+0x5b/0x180 [ 3053.542147] ? lockdep_init_map_type+0x2c7/0x780 [ 3053.543226] ? __raw_spin_lock_init+0x36/0x110 [ 3053.544278] v9fs_session_init+0x1dd/0x1680 [ 3053.545257] ? lock_release+0x680/0x680 [ 3053.546171] ? kmem_cache_alloc_trace+0x151/0x320 [ 3053.547264] ? v9fs_show_options+0x690/0x690 [ 3053.548286] ? trace_hardirqs_on+0x5b/0x180 [ 3053.549267] ? kasan_unpoison_shadow+0x33/0x50 [ 3053.550305] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.551459] v9fs_mount+0x79/0x8f0 [ 3053.552274] ? v9fs_write_inode+0x60/0x60 [ 3053.553214] legacy_get_tree+0x105/0x220 [ 3053.554134] vfs_get_tree+0x8e/0x300 [ 3053.554967] path_mount+0x1429/0x2120 [ 3053.555834] ? strncpy_from_user+0x9e/0x470 [ 3053.556820] ? finish_automount+0xa90/0xa90 [ 3053.557787] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.558831] ? _copy_from_user+0xfb/0x1b0 [ 3053.559779] __x64_sys_mount+0x282/0x300 [ 3053.560701] ? copy_mnt_ns+0xa00/0xa00 04:32:08 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000200000000000002dc59954d7040000000000000000000000000000004000000000000000000000269a00000000000000000038000000000000000000"], 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r4 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) unlinkat(r5, &(0x7f0000000140)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r4, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) [ 3053.561596] do_syscall_64+0x33/0x40 [ 3053.562576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3053.563725] RIP: 0033:0x7fe4d5f5bb19 [ 3053.564570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.568710] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3053.570420] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3053.572033] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3053.573626] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3053.575230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.576833] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3053.578557] kobject: can not set name properly! [ 3053.579706] kmem_cache_create(9p-fcall-cache-66) failed with error -12 [ 3053.581228] CPU: 1 PID: 49485 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3053.582772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.584625] Call Trace: [ 3053.585207] dump_stack+0x107/0x167 [ 3053.586025] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3053.587206] p9_client_create+0xc6a/0x1230 [ 3053.588172] ? p9_client_flush+0x430/0x430 [ 3053.589115] ? trace_hardirqs_on+0x5b/0x180 [ 3053.590079] ? lockdep_init_map_type+0x2c7/0x780 [ 3053.591138] ? __raw_spin_lock_init+0x36/0x110 [ 3053.592158] v9fs_session_init+0x1dd/0x1680 [ 3053.593110] ? lock_release+0x680/0x680 [ 3053.593995] ? kmem_cache_alloc_trace+0x151/0x320 [ 3053.595063] ? v9fs_show_options+0x690/0x690 [ 3053.596045] ? trace_hardirqs_on+0x5b/0x180 [ 3053.597009] ? kasan_unpoison_shadow+0x33/0x50 [ 3053.598011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.599138] v9fs_mount+0x79/0x8f0 [ 3053.599920] ? v9fs_write_inode+0x60/0x60 [ 3053.600843] legacy_get_tree+0x105/0x220 [ 3053.601738] vfs_get_tree+0x8e/0x300 [ 3053.602557] path_mount+0x1429/0x2120 [ 3053.603400] ? strncpy_from_user+0x9e/0x470 [ 3053.604359] ? finish_automount+0xa90/0xa90 [ 3053.605311] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.606335] ? _copy_from_user+0xfb/0x1b0 [ 3053.607262] __x64_sys_mount+0x282/0x300 [ 3053.608162] ? copy_mnt_ns+0xa00/0xa00 [ 3053.609033] do_syscall_64+0x33/0x40 [ 3053.609851] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3053.610977] RIP: 0033:0x7fe4d5f5bb19 [ 3053.611797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.615813] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3053.617490] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3053.619044] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3053.620619] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3053.622169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.623720] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 04:32:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 3053.654357] FAT-fs (loop1): invalid media value (0x00) [ 3053.655671] FAT-fs (loop1): Can't find a valid FAT filesystem 04:32:08 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) fork() 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x4000, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0xfd00, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 59) 04:32:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) r1 = dup2(r0, r0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/79, 0x4f}, {&(0x7f00000001c0)=""/55, 0x37}], 0x2, &(0x7f0000000380)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/79, 0x4f}], 0x1, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000500), 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000580)=""/76, 0x4c}, {&(0x7f0000000600)=""/17, 0x11}, {&(0x7f0000000640)=""/193, 0xc1}, {&(0x7f0000000740)=""/54, 0x36}, {&(0x7f0000000780)=""/220, 0xdc}, {&(0x7f0000000880)=""/4, 0x4}, {&(0x7f00000008c0)=""/154, 0x9a}, {&(0x7f0000000980)=""/53, 0x35}, {&(0x7f00000009c0)=""/115, 0x73}, {&(0x7f0000000a40)=""/228, 0xe4}], 0xa, &(0x7f0000000c00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000cc0)=""/204, 0xcc}, {&(0x7f0000000dc0)=""/4096, 0x1000}], 0x2, &(0x7f0000001e00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}}, {{&(0x7f0000001f40), 0x6e, &(0x7f0000002200)=[{&(0x7f0000001fc0)=""/199, 0xc7}, {&(0x7f00000020c0)=""/204, 0xcc}, {&(0x7f00000021c0)}], 0x3, &(0x7f0000002240)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f00000022c0)=@abs, 0x6e, &(0x7f0000002700)=[{&(0x7f0000002340)=""/185, 0xb9}, {&(0x7f0000002400)=""/119, 0x77}, {&(0x7f0000002480)=""/69, 0x45}, {&(0x7f0000002500)=""/219, 0xdb}, {&(0x7f0000002600)=""/34, 0x22}, {&(0x7f0000002640)=""/135, 0x87}], 0x6, &(0x7f0000002780)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f00000027c0), 0x6e, &(0x7f0000002840)}}, {{&(0x7f0000002880), 0x6e, &(0x7f0000003c00)=[{&(0x7f0000002900)=""/245, 0xf5}, {&(0x7f0000002a00)=""/173, 0xad}, {&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/220, 0xdc}, {&(0x7f0000003bc0)=""/44, 0x2c}], 0x5}}], 0x8, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180), 0x900000, &(0x7f0000003e80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@loose}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x8}}, {@fscache}, {@aname={'aname', 0x3d, 'vfat\x00'}}], [{@euid_gt={'euid>', r2}}]}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop6', 0xa4100, 0x106) write$P9_RREADLINK(r3, &(0x7f00000000c0)={0x16, 0x17, 0x1, {0xd, './file0/file0'}}, 0x16) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:32:08 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x3, 0x0, 0x0, 0x260001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:32:08 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x344, 0x1, 0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f800", 0x17}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) [ 3053.838452] FAULT_INJECTION: forcing a failure. [ 3053.838452] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.839854] CPU: 0 PID: 49826 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3053.840638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.841592] Call Trace: [ 3053.841900] dump_stack+0x107/0x167 [ 3053.842320] should_fail.cold+0x5/0xa [ 3053.842768] ? create_object.isra.0+0x3a/0xa20 [ 3053.843296] should_failslab+0x5/0x20 [ 3053.843739] kmem_cache_alloc+0x5b/0x310 [ 3053.844212] ? lock_release+0x680/0x680 [ 3053.844672] create_object.isra.0+0x3a/0xa20 [ 3053.845175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.845764] __kmalloc_track_caller+0x177/0x370 [ 3053.846300] ? kstrdup_const+0x53/0x80 [ 3053.846757] kstrdup+0x36/0x70 [ 3053.847130] kstrdup_const+0x53/0x80 [ 3053.847560] kvasprintf_const+0x10c/0x1a0 [ 3053.848038] kobject_set_name_vargs+0x56/0x150 [ 3053.848565] kobject_init_and_add+0xc9/0x160 [ 3053.849075] ? kobject_create_and_add+0xb0/0xb0 [ 3053.849620] ? wait_for_completion_io+0x270/0x270 [ 3053.850174] ? kernfs_name_hash+0xe7/0x110 [ 3053.850667] ? kernfs_find_ns+0x256/0x380 [ 3053.851155] sysfs_slab_add+0x172/0x200 [ 3053.851620] __kmem_cache_create+0x3db/0x520 [ 3053.852137] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3053.852721] p9_client_create+0xc6a/0x1230 [ 3053.853223] ? p9_client_flush+0x430/0x430 [ 3053.853706] ? trace_hardirqs_on+0x5b/0x180 [ 3053.854207] ? lockdep_init_map_type+0x2c7/0x780 [ 3053.854750] ? __raw_spin_lock_init+0x36/0x110 [ 3053.855283] v9fs_session_init+0x1dd/0x1680 [ 3053.855774] ? lock_release+0x680/0x680 [ 3053.856252] ? kmem_cache_alloc_trace+0x151/0x320 [ 3053.856806] ? v9fs_show_options+0x690/0x690 [ 3053.857323] ? trace_hardirqs_on+0x5b/0x180 [ 3053.857824] ? kasan_unpoison_shadow+0x33/0x50 [ 3053.858345] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.858924] v9fs_mount+0x79/0x8f0 [ 3053.859337] ? v9fs_write_inode+0x60/0x60 [ 3053.859813] legacy_get_tree+0x105/0x220 [ 3053.860297] vfs_get_tree+0x8e/0x300 [ 3053.860720] path_mount+0x1429/0x2120 [ 3053.861153] ? strncpy_from_user+0x9e/0x470 [ 3053.861639] ? finish_automount+0xa90/0xa90 [ 3053.862135] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.862668] ? _copy_from_user+0xfb/0x1b0 [ 3053.863148] __x64_sys_mount+0x282/0x300 [ 3053.863619] ? copy_mnt_ns+0xa00/0xa00 [ 3053.864074] do_syscall_64+0x33/0x40 [ 3053.864512] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3053.865101] RIP: 0033:0x7fe4d5f5bb19 [ 3053.865528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.867639] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3053.868521] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3053.869339] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3053.870158] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3053.870978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.871797] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3053.872992] FAT-fs (loop1): bogus number of FAT sectors [ 3053.874274] FAT-fs (loop1): Can't find a valid FAT filesystem 04:32:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x600, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0xfe03, @dev}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x2}}, {0x2, 0x0, @broadcast}}) [ 3053.926362] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x3}}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x4}}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x5}}, {0x2, 0x0, @broadcast}}) 04:32:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c0008012000020000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x6}}, {0x2, 0x0, @broadcast}}) [ 3054.156512] FAT-fs (loop1): invalid media value (0x00) [ 3054.157200] FAT-fs (loop1): Can't find a valid FAT filesystem 04:32:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c0008012000020000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:32:23 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x60a1c0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = fork() ptrace(0x10, r3) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:32:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000240), 0x208900, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000000120000000000000400000500000010000000270e0000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x1, 0x370d, 0x4}) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000480)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) getxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)=""/34, 0x22) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) r5 = getpgid(0xffffffffffffffff) fcntl$setownex(r4, 0xf, &(0x7f0000000080)={0x0, r5}) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r6 = fork() ptrace(0x10, r6) 04:32:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x7}}, {0x2, 0x0, @broadcast}}) 04:32:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c00080120000200004000f8000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="48ab1d34322a23c195e6c6c1291d1300f6e0ca21f17bae58af462b191a252ebeb0cf7cd02b333f5a24d8aab946fdc79c87e344612c748d910e5b66b7d8171f4721ea26f24e286199db1d048d111ae422997d25aff3b5ee08303d8bbcc93df79a95e7a3b5f3acf1b23e2102818b901cd6fce5df0d5423555349b3464d1161ed9d86de45fcc7081d1e1e"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r2 = open(0x0, 0x212100, 0xd) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000940)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) accept$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000640)=0x1c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/asound/timers\x00', 0x0, 0x0) r3 = open(0x0, 0x212100, 0xd) r4 = open(&(0x7f0000000500)='./file0\x00', 0x200000, 0x20) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000540)={@local, @rand_addr=' \x01\x00', @private2, 0x8001, 0x1f, 0x7, 0x0, 0xffffffffffff78d2, 0x1010000}) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in=@private, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x41, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="5eea8b64748b250d87a6a485580090198f3565b9f089f9f02813a9e225a0f5246ed7cac9960b150518a2a3433bb1d47a790a21744f45fcd63ed2cb19d47b398c6250b6e718bfb038bfcf6a5a837c181e74d4de2023e26133b39844841b3a7c9719f958fee65729c6a1e2c4d61a74a272e75e85df2be429f69d1df0d9275856c08c6543bb53fd31177b225290db0557d0a4b2dcdfbc324b5fb2e3bfef0b9304c90273288f8bb1fdfda71926a264e6cc9db4fe2cd6c4c55ef0371c4b67eb6b70225033d0bf40c02e3ec68e23", 0xcb, 0x4}, {&(0x7f0000000340), 0x0, 0x1}, {&(0x7f0000000380)="e780fa8dd40ecd947e3eb4a258ab755bdd2b766570de6d1218a605e61d729005f5f7c3bdbc29d794aa5fb7a9d344cc1c76b626b8950faafbc518351ce344679680f04c0581e42a2c22efe3886cb309f893006272e23e5224df1979d6e003d75670b0a3f2ace6cc35b63161a7dc6d6f7bb764075ce5def0bc35826c87f8ca8b0b3124923f062acd972bb788719ce75914ecebd5f89d0f09", 0x97, 0x40}], 0x804000, &(0x7f0000000700)=ANY=[@ANYBLOB='sysvgroups,uid<', @ANYRESDEC=r1, @ANYBLOB=',euid<', @ANYRESDEC=r5, @ANYBLOB="2c736d61636b6673666c6f6f723d282c646f6e745f6d6561737572652c7375626a5f757365723d3a262b262c7375626a5f757365723d76666174002c736dd886aeae04b7ae06c81c7861636b6673666c6f6f723d76666174002c7063723d30303030303030303030303030303030303035332c00"]) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) 04:32:23 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x700, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:32:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa2, 0x81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:32:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 60) [ 3068.686082] FAULT_INJECTION: forcing a failure. [ 3068.686082] name failslab, interval 1, probability 0, space 0, times 0 [ 3068.687714] CPU: 1 PID: 50082 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3068.688632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3068.689725] Call Trace: [ 3068.690078] dump_stack+0x107/0x167 [ 3068.690561] should_fail.cold+0x5/0xa [ 3068.691075] ? create_object.isra.0+0x3a/0xa20 [ 3068.691681] should_failslab+0x5/0x20 [ 3068.692183] kmem_cache_alloc+0x5b/0x310 [ 3068.692758] create_object.isra.0+0x3a/0xa20 [ 3068.693345] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3068.694023] __kmalloc_track_caller+0x177/0x370 [ 3068.694637] ? kstrdup_const+0x53/0x80 [ 3068.695156] kstrdup+0x36/0x70 [ 3068.695582] kstrdup_const+0x53/0x80 [ 3068.696084] __kernfs_new_node+0x9d/0x860 [ 3068.696649] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3068.697317] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3068.698020] ? SOFTIRQ_verbose+0x10/0x10 [ 3068.698560] ? lock_release+0x680/0x680 [ 3068.699083] ? find_held_lock+0x2c/0x110 [ 3068.699629] kernfs_new_node+0x18d/0x250 [ 3068.700184] kernfs_create_dir_ns+0x49/0x160 [ 3068.700778] sysfs_create_dir_ns+0x127/0x290 [ 3068.701361] ? sysfs_create_mount_point+0xb0/0xb0 [ 3068.701999] ? rwlock_bug.part.0+0x90/0x90 [ 3068.702573] ? do_raw_spin_unlock+0x4f/0x220 [ 3068.703173] kobject_add_internal+0x25e/0xa30 [ 3068.703781] kobject_init_and_add+0x101/0x160 [ 3068.704375] ? kobject_create_and_add+0xb0/0xb0 [ 3068.704996] ? wait_for_completion_io+0x270/0x270 [ 3068.705630] ? kernfs_name_hash+0xe7/0x110 [ 3068.706186] ? kernfs_find_ns+0x256/0x380 [ 3068.706742] sysfs_slab_add+0x172/0x200 [ 3068.707273] __kmem_cache_create+0x3db/0x520 [ 3068.707854] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3068.708521] p9_client_create+0xc6a/0x1230 [ 3068.709089] ? p9_client_flush+0x430/0x430 [ 3068.709644] ? trace_hardirqs_on+0x5b/0x180 [ 3068.710216] ? lockdep_init_map_type+0x2c7/0x780 [ 3068.710840] ? __raw_spin_lock_init+0x36/0x110 [ 3068.711447] v9fs_session_init+0x1dd/0x1680 [ 3068.712021] ? lock_release+0x680/0x680 [ 3068.712551] ? kmem_cache_alloc_trace+0x151/0x320 [ 3068.713189] ? v9fs_show_options+0x690/0x690 [ 3068.713773] ? trace_hardirqs_on+0x5b/0x180 [ 3068.714340] ? kasan_unpoison_shadow+0x33/0x50 [ 3068.714942] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3068.715615] v9fs_mount+0x79/0x8f0 [ 3068.716095] ? v9fs_write_inode+0x60/0x60 [ 3068.716651] legacy_get_tree+0x105/0x220 [ 3068.717194] vfs_get_tree+0x8e/0x300 [ 3068.717685] path_mount+0x1429/0x2120 [ 3068.718194] ? strncpy_from_user+0x9e/0x470 [ 3068.718776] ? finish_automount+0xa90/0xa90 [ 3068.719344] ? getname_flags.part.0+0x1dd/0x4f0 [ 3068.719957] ? _copy_from_user+0xfb/0x1b0 [ 3068.720502] __x64_sys_mount+0x282/0x300 [ 3068.721041] ? copy_mnt_ns+0xa00/0xa00 [ 3068.721561] do_syscall_64+0x33/0x40 [ 3068.722059] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3068.722730] RIP: 0033:0x7fe4d5f5bb19 [ 3068.723219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3068.725647] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3068.726653] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3068.727589] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3068.728534] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3068.729478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3068.730410] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3068.734713] FAT-fs (loop4): Unrecognized mount option "H«42*#Á•æÆÁ)" or missing value [ 3068.739181] FAT-fs (loop1): invalid media value (0x00) [ 3068.739931] FAT-fs (loop1): Can't find a valid FAT filesystem 04:32:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x1000}, 0x108c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, {0x2, 0x0, @dev}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 3068.790931] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 3068.823205] FAT-fs (loop4): Unrecognized mount option "H«42*#Á•æÆÁ)" or missing value [ 3068.856516] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:32:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736602106c0008012000020000", 0x13}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011000)) 04:32:41 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c460000000000000000000000000400000000000000000000000000000040000000060000001c0000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r3, 0xc0109414, &(0x7f00000032c0)={0x865, 0x5, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r4 = fork() ptrace(0x10, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)={'L+', 0x8}, 0x16, 0x0) ptrace$getregset(0x4204, r4, 0x202, &(0x7f0000000140)={&(0x7f0000002280)=""/4105, 0xcc4}) 04:32:41 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x9d480ecf99f12f6b}, 0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x105301, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000003c0)={&(0x7f0000000380)=[0x0, 0x0, 0x0], 0x3, 0x2}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x208880, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="7f454c46000000000000000000000000040000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000"], 0x40) fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x220001, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00), 0x0, 0x4c, 0x0) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d2e39bdde7859ba"], &(0x7f0000000240)=""/163, 0xa3) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) 04:32:41 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r3, 0x5, 0x900, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000081) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 04:32:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x9}}, {0x2, 0x0, @dev={0xac, 0x8}}, {0x2, 0x0, @broadcast}}) 04:32:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) (fail_nth: 61) 04:32:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 04:32:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x142}) getsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000005b40)='./file0\x00', 0x8000, 0x0, &(0x7f0000000200), 0xa1d028, &(0x7f0000011000)) mount$9p_unix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10021, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x290002, 0x0) r2 = dup(0xffffffffffffffff) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000001c0)='-$\'\'\x00', &(0x7f0000000580)='./file0\x00', r2) r3 = open(0x0, 0x212100, 0xd) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x80000) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@rand_addr=0x64010102, 0x4e24, 0x3, 0x4e22, 0x4, 0x2, 0x0, 0x0, 0x29}, {0x9, 0x1, 0x4, 0x0, 0x80000000, 0x7, 0xffffffff, 0x9}, {0x200, 0x1ce2, 0x5, 0x3042000000000}, 0x9, 0x6e6bbe, 0x2, 0x0, 0x2, 0x1}, {{@in6=@loopback, 0x4d2, 0x32}, 0xa, @in=@local, 0x3501, 0x3, 0x1, 0x5, 0x3, 0x1, 0x9}}, 0xe8) recvmmsg(r4, &(0x7f0000005880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/6, 0x6}, {&(0x7f0000000600)=""/255, 0xff}, {&(0x7f0000000700)=""/128, 0x80}, {&(0x7f0000000880)=""/160, 0xa0}, {&(0x7f0000000940)=""/192, 0xc0}, {&(0x7f0000000a00)=""/222, 0xde}, {&(0x7f0000000b00)=""/197, 0xc5}, {&(0x7f0000000c00)=""/156, 0x9c}], 0x8, &(0x7f0000000cc0)=""/77, 0x4d}, 0x3f}, {{&(0x7f0000000d40)=@can, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)=""/28, 0x1c}, {&(0x7f0000000e00)=""/42, 0x2a}, {&(0x7f0000000e40)=""/171, 0xab}, {&(0x7f0000000f00)=""/141, 0x8d}], 0x4}, 0x4000000}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001000)=""/178, 0xb2}, {&(0x7f00000010c0)=""/128, 0x80}, {&(0x7f0000001140)=""/2, 0x2}, {&(0x7f0000001180)=""/201, 0xc9}], 0x4}, 0x5}, {{&(0x7f00000012c0)=@nl=@proc, 0x80, &(0x7f0000002800)=[{&(0x7f0000001340)=""/234, 0xea}, {&(0x7f0000001440)=""/99, 0x63}, {&(0x7f00000014c0)=""/149, 0x95}, {&(0x7f0000001580)=""/78, 0x4e}, {&(0x7f0000001600)=""/122, 0x7a}, {&(0x7f0000001680)=""/164, 0xa4}, {&(0x7f0000001740)=""/153, 0x99}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x8}}, {{&(0x7f0000002880)=@x25={0x9, @remote}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002900)=""/72, 0x48}], 0x1}, 0x7ff}, {{0x0, 0x0, &(0x7f0000004c00)=[{&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/165, 0xa5}, {&(0x7f0000004a80)=""/124, 0x7c}, {&(0x7f0000004b00)=""/244, 0xf4}], 0x5, &(0x7f0000004c80)=""/149, 0x95}, 0x800}, {{0x0, 0x0, &(0x7f00000052c0)=[{&(0x7f0000004d40)=""/43, 0x2b}, {&(0x7f0000004d80)=""/77, 0x4d}, {&(0x7f0000004e00)=""/48, 0x30}, {&(0x7f0000004e40)=""/179, 0xb3}, {&(0x7f0000004f00)=""/90, 0x5a}, {&(0x7f0000004f80)=""/183, 0xb7}, {&(0x7f0000005040)=""/84, 0x54}, {&(0x7f00000050c0)=""/200, 0xc8}, {&(0x7f00000051c0)=""/204, 0xcc}], 0x9}, 0x9}, {{0x0, 0x0, &(0x7f0000005500)=[{&(0x7f0000005380)=""/3, 0x3}, {&(0x7f00000053c0)=""/121, 0x79}, {&(0x7f0000005440)=""/146, 0x92}], 0x3, &(0x7f0000005540)=""/88, 0x58}, 0x101}, {{&(0x7f00000055c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000005780)=[{&(0x7f0000005640)=""/127, 0x7f}, {&(0x7f00000056c0)=""/3, 0x3}, {&(0x7f0000005700)=""/100, 0x64}], 0x3, &(0x7f00000057c0)=""/142, 0x8e}, 0x8}], 0x9, 0x10000, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000120031cd0000d023e1619c1bccef000000000100410d5430090000005ef6a651"], 0x20}}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r5, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000005ac0)=0x8) [ 3086.397904] FAT-fs (loop1): invalid media value (0x00) [ 3086.399324] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3086.435262] FAULT_INJECTION: forcing a failure. [ 3086.435262] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.437996] CPU: 0 PID: 50322 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3086.439570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.441442] Call Trace: [ 3086.442046] dump_stack+0x107/0x167 [ 3086.442879] should_fail.cold+0x5/0xa [ 3086.443748] ? __kernfs_new_node+0xd4/0x860 [ 3086.444727] should_failslab+0x5/0x20 [ 3086.445592] kmem_cache_alloc+0x5b/0x310 [ 3086.446527] __kernfs_new_node+0xd4/0x860 [ 3086.447478] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3086.448576] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3086.449767] ? SOFTIRQ_verbose+0x10/0x10 [ 3086.450684] ? lock_release+0x680/0x680 [ 3086.451586] ? find_held_lock+0x2c/0x110 [ 3086.452518] kernfs_new_node+0x18d/0x250 [ 3086.453458] kernfs_create_dir_ns+0x49/0x160 [ 3086.454462] sysfs_create_dir_ns+0x127/0x290 [ 3086.455456] ? sysfs_create_mount_point+0xb0/0xb0 [ 3086.456537] ? rwlock_bug.part.0+0x90/0x90 [ 3086.457508] ? do_raw_spin_unlock+0x4f/0x220 [ 3086.458513] kobject_add_internal+0x25e/0xa30 [ 3086.459545] kobject_init_and_add+0x101/0x160 [ 3086.460557] ? kobject_create_and_add+0xb0/0xb0 [ 3086.461626] ? wait_for_completion_io+0x270/0x270 [ 3086.462713] ? kernfs_name_hash+0xe7/0x110 [ 3086.463679] ? kernfs_find_ns+0x256/0x380 [ 3086.464635] sysfs_slab_add+0x172/0x200 [ 3086.465550] __kmem_cache_create+0x3db/0x520 [ 3086.466553] kmem_cache_create_usercopy+0x1db/0x2f0 [ 3086.467691] p9_client_create+0xc6a/0x1230 [ 3086.468676] ? p9_client_flush+0x430/0x430 [ 3086.469643] ? trace_hardirqs_on+0x5b/0x180 [ 3086.470625] ? lockdep_init_map_type+0x2c7/0x780 [ 3086.471697] ? __raw_spin_lock_init+0x36/0x110 [ 3086.472745] v9fs_session_init+0x1dd/0x1680 [ 3086.473724] ? lock_release+0x680/0x680 [ 3086.474641] ? kmem_cache_alloc_trace+0x151/0x320 [ 3086.475776] ? v9fs_show_options+0x690/0x690 [ 3086.476827] ? trace_hardirqs_on+0x5b/0x180 [ 3086.477822] ? kasan_unpoison_shadow+0x33/0x50 [ 3086.478849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3086.480000] v9fs_mount+0x79/0x8f0 [ 3086.480812] ? v9fs_write_inode+0x60/0x60 [ 3086.481757] legacy_get_tree+0x105/0x220 [ 3086.482679] vfs_get_tree+0x8e/0x300 [ 3086.483526] path_mount+0x1429/0x2120 [ 3086.484397] ? strncpy_from_user+0x9e/0x470 [ 3086.485385] ? finish_automount+0xa90/0xa90 [ 3086.486358] ? getname_flags.part.0+0x1dd/0x4f0 [ 3086.487418] ? _copy_from_user+0xfb/0x1b0 [ 3086.488372] __x64_sys_mount+0x282/0x300 [ 3086.489305] ? copy_mnt_ns+0xa00/0xa00 [ 3086.490216] do_syscall_64+0x33/0x40 [ 3086.491055] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3086.492207] RIP: 0033:0x7fe4d5f5bb19 [ 3086.493047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.497160] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3086.498883] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3086.500481] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3086.502091] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3086.503696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.505297] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3086.507205] kobject_add_internal failed for 9p-fcall-cache-69 (error: -12 parent: slab) [ 3086.509156] kmem_cache_create(9p-fcall-cache-69) failed with error -12 [ 3086.510711] CPU: 0 PID: 50322 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 3086.512259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.514121] Call Trace: [ 3086.514724] dump_stack+0x107/0x167 [ 3086.515562] kmem_cache_create_usercopy.cold+0x17/0x65 [ 3086.516762] p9_client_create+0xc6a/0x1230 [ 3086.517749] ? p9_client_flush+0x430/0x430 [ 3086.518707] ? trace_hardirqs_on+0x5b/0x180 [ 3086.519677] ? lockdep_init_map_type+0x2c7/0x780 [ 3086.520746] ? __raw_spin_lock_init+0x36/0x110 [ 3086.521794] v9fs_session_init+0x1dd/0x1680 [ 3086.522774] ? lock_release+0x680/0x680 [ 3086.523884] ? kmem_cache_alloc_trace+0x151/0x320 [ 3086.524970] ? v9fs_show_options+0x690/0x690 [ 3086.525994] ? trace_hardirqs_on+0x5b/0x180 [ 3086.526967] ? kasan_unpoison_shadow+0x33/0x50 [ 3086.527998] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3086.529140] v9fs_mount+0x79/0x8f0 [ 3086.529965] ? v9fs_write_inode+0x60/0x60 [ 3086.530901] legacy_get_tree+0x105/0x220 [ 3086.531826] vfs_get_tree+0x8e/0x300 [ 3086.532665] path_mount+0x1429/0x2120 [ 3086.533546] ? strncpy_from_user+0x9e/0x470 [ 3086.534517] ? finish_automount+0xa90/0xa90 [ 3086.535493] ? getname_flags.part.0+0x1dd/0x4f0 [ 3086.536537] ? _copy_from_user+0xfb/0x1b0 [ 3086.537501] __x64_sys_mount+0x282/0x300 [ 3086.538419] ? copy_mnt_ns+0xa00/0xa00 [ 3086.539323] do_syscall_64+0x33/0x40 [ 3086.540177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 3086.541334] RIP: 0033:0x7fe4d5f5bb19 [ 3086.542173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.546275] RSP: 002b:00007fe4d34d1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3086.547988] RAX: ffffffffffffffda RBX: 00007fe4d606ef60 RCX: 00007fe4d5f5bb19 [ 3086.549592] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 3086.551184] RBP: 00007fe4d34d11d0 R08: 0000000020000000 R09: 0000000000000000 [ 3086.552777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.554376] R13: 00007ffc8c7f9f6f R14: 00007fe4d34d1300 R15: 0000000000022000 [ 3103.022171] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888008c198c0 (size 32): comm "syz-executor.5", pid 50322, jiffies 4297753477 (age 24.655s) hex dump (first 32 bytes): 39 70 2d 66 63 61 6c 6c 2d 63 61 63 68 65 2d 36 9p-fcall-cache-6 39 00 c1 08 80 88 ff ff 00 00 00 00 00 00 00 00 9............... backtrace: [<0000000052d22738>] kstrdup+0x36/0x70 [<00000000bd349218>] kstrdup_const+0x53/0x80 [<000000003915e26c>] kvasprintf_const+0x10c/0x1a0 [<0000000053a80a58>] kobject_set_name_vargs+0x56/0x150 [<000000001dc9d2e2>] kobject_init_and_add+0xc9/0x160 [<0000000017f5a250>] sysfs_slab_add+0x172/0x200 [<00000000caa83d85>] __kmem_cache_create+0x3db/0x520 [<000000005360693a>] kmem_cache_create_usercopy+0x1db/0x2f0 [<0000000036f54675>] p9_client_create+0xc6a/0x1230 [<000000005bfcbba8>] v9fs_session_init+0x1dd/0x1680 [<0000000067523128>] v9fs_mount+0x79/0x8f0 [<00000000382155f9>] legacy_get_tree+0x105/0x220 [<00000000c66945f4>] vfs_get_tree+0x8e/0x300 [<000000002b183436>] path_mount+0x1429/0x2120 [<00000000b092071a>] __x64_sys_mount+0x282/0x300 [<00000000f2ec1c19>] do_syscall_64+0x33/0x40 BUG: leak checking failed VM DIAGNOSIS: 04:33:06 Registers: info registers vcpu 0 RAX=ffffffff83e7e9a0 RBX=0000000000000000 RCX=ffffffff83e6657c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efa8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85677788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 ffffc90000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fceab32f4d8 CR3=0000000015bca000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041583fd800000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7e9a0 RBX=0000000000000001 RCX=ffffffff83e6657c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efa8 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85677788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe5900000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffdacf2b2b0 CR3=000000000f4f8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29323320657a697328203063383931 XMM03=303520646970202c22352e726f747563 XMM04=6c6c6163662d70392020363320643220 XMM05=32206336206336203136203336203636 XMM06=73657479622032332074737269662820 XMM07=2e343220656761282037373433353737 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000