Warning: Permanently added '[localhost]:36465' (ECDSA) to the list of known hosts. 2024/05/11 21:55:22 fuzzer started 2024/05/11 21:55:23 dialing manager at localhost:32819 syzkaller login: [ 27.721977] cgroup: Unknown subsys name 'net' [ 27.723278] cgroup: Unknown subsys name 'net_prio' [ 27.724858] cgroup: Unknown subsys name 'devices' [ 27.725841] cgroup: Unknown subsys name 'blkio' [ 27.768314] cgroup: Unknown subsys name 'hugetlb' [ 27.769764] cgroup: Unknown subsys name 'rlimit' 2024/05/11 21:55:36 syscalls: 2215 2024/05/11 21:55:36 code coverage: enabled 2024/05/11 21:55:36 comparison tracing: enabled 2024/05/11 21:55:36 extra coverage: enabled 2024/05/11 21:55:36 setuid sandbox: enabled 2024/05/11 21:55:36 namespace sandbox: enabled 2024/05/11 21:55:36 Android sandbox: enabled 2024/05/11 21:55:36 fault injection: enabled 2024/05/11 21:55:36 leak checking: enabled 2024/05/11 21:55:36 net packet injection: enabled 2024/05/11 21:55:36 net device setup: enabled 2024/05/11 21:55:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/05/11 21:55:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/05/11 21:55:36 USB emulation: enabled 2024/05/11 21:55:36 hci packet injection: enabled 2024/05/11 21:55:36 wifi device emulation: enabled 2024/05/11 21:55:36 802.15.4 emulation: enabled 2024/05/11 21:55:36 fetching corpus: 50, signal 39770/41561 (executing program) 2024/05/11 21:55:36 fetching corpus: 100, signal 56747/60081 (executing program) 2024/05/11 21:55:36 fetching corpus: 150, signal 68753/73555 (executing program) 2024/05/11 21:55:36 fetching corpus: 200, signal 76797/83009 (executing program) 2024/05/11 21:55:36 fetching corpus: 250, signal 82900/90499 (executing program) 2024/05/11 21:55:36 fetching corpus: 300, signal 89535/98415 (executing program) 2024/05/11 21:55:37 fetching corpus: 350, signal 95887/105984 (executing program) 2024/05/11 21:55:37 fetching corpus: 400, signal 101867/113115 (executing program) 2024/05/11 21:55:37 fetching corpus: 450, signal 107423/119793 (executing program) 2024/05/11 21:55:37 fetching corpus: 500, signal 109940/123555 (executing program) 2024/05/11 21:55:37 fetching corpus: 550, signal 114334/129013 (executing program) 2024/05/11 21:55:37 fetching corpus: 600, signal 117179/132965 (executing program) 2024/05/11 21:55:37 fetching corpus: 650, signal 120117/137006 (executing program) 2024/05/11 21:55:38 fetching corpus: 700, signal 125223/143012 (executing program) 2024/05/11 21:55:38 fetching corpus: 750, signal 127987/146809 (executing program) 2024/05/11 21:55:38 fetching corpus: 800, signal 130223/150079 (executing program) 2024/05/11 21:55:38 fetching corpus: 850, signal 134802/155458 (executing program) 2024/05/11 21:55:38 fetching corpus: 900, signal 138047/159615 (executing program) 2024/05/11 21:55:38 fetching corpus: 950, signal 141251/163658 (executing program) 2024/05/11 21:55:38 fetching corpus: 1000, signal 144933/168049 (executing program) 2024/05/11 21:55:39 fetching corpus: 1050, signal 146782/170852 (executing program) 2024/05/11 21:55:39 fetching corpus: 1100, signal 149511/174389 (executing program) 2024/05/11 21:55:39 fetching corpus: 1150, signal 151457/177258 (executing program) 2024/05/11 21:55:39 fetching corpus: 1200, signal 154406/180923 (executing program) 2024/05/11 21:55:39 fetching corpus: 1250, signal 156706/184007 (executing program) 2024/05/11 21:55:39 fetching corpus: 1300, signal 158796/186882 (executing program) 2024/05/11 21:55:39 fetching corpus: 1350, signal 160325/189203 (executing program) 2024/05/11 21:55:39 fetching corpus: 1400, signal 162194/191844 (executing program) 2024/05/11 21:55:40 fetching corpus: 1450, signal 163801/194273 (executing program) 2024/05/11 21:55:40 fetching corpus: 1500, signal 165329/196566 (executing program) 2024/05/11 21:55:40 fetching corpus: 1550, signal 167055/199015 (executing program) 2024/05/11 21:55:40 fetching corpus: 1600, signal 169008/201671 (executing program) 2024/05/11 21:55:40 fetching corpus: 1650, signal 170462/203851 (executing program) 2024/05/11 21:55:40 fetching corpus: 1700, signal 171722/205907 (executing program) 2024/05/11 21:55:40 fetching corpus: 1750, signal 173384/208212 (executing program) 2024/05/11 21:55:40 fetching corpus: 1800, signal 175243/210629 (executing program) 2024/05/11 21:55:41 fetching corpus: 1850, signal 176538/212643 (executing program) 2024/05/11 21:55:41 fetching corpus: 1900, signal 177948/214719 (executing program) 2024/05/11 21:55:41 fetching corpus: 1950, signal 179649/217033 (executing program) 2024/05/11 21:55:41 fetching corpus: 2000, signal 181661/219496 (executing program) 2024/05/11 21:55:41 fetching corpus: 2050, signal 182993/221441 (executing program) 2024/05/11 21:55:41 fetching corpus: 2100, signal 184093/223214 (executing program) 2024/05/11 21:55:41 fetching corpus: 2150, signal 185707/225369 (executing program) 2024/05/11 21:55:42 fetching corpus: 2200, signal 187238/227447 (executing program) 2024/05/11 21:55:42 fetching corpus: 2250, signal 188250/229134 (executing program) 2024/05/11 21:55:42 fetching corpus: 2300, signal 189578/231056 (executing program) 2024/05/11 21:55:42 fetching corpus: 2350, signal 191046/232977 (executing program) 2024/05/11 21:55:42 fetching corpus: 2400, signal 192363/234800 (executing program) 2024/05/11 21:55:42 fetching corpus: 2450, signal 193198/236242 (executing program) 2024/05/11 21:55:42 fetching corpus: 2500, signal 194190/237871 (executing program) 2024/05/11 21:55:42 fetching corpus: 2550, signal 195375/239600 (executing program) 2024/05/11 21:55:43 fetching corpus: 2600, signal 196584/241329 (executing program) 2024/05/11 21:55:43 fetching corpus: 2650, signal 197895/243094 (executing program) 2024/05/11 21:55:43 fetching corpus: 2700, signal 198828/244610 (executing program) 2024/05/11 21:55:43 fetching corpus: 2750, signal 200062/246299 (executing program) 2024/05/11 21:55:43 fetching corpus: 2800, signal 200926/247690 (executing program) 2024/05/11 21:55:43 fetching corpus: 2850, signal 202213/249375 (executing program) 2024/05/11 21:55:44 fetching corpus: 2900, signal 203136/250804 (executing program) 2024/05/11 21:55:44 fetching corpus: 2950, signal 204342/252418 (executing program) 2024/05/11 21:55:44 fetching corpus: 3000, signal 205294/253805 (executing program) 2024/05/11 21:55:44 fetching corpus: 3050, signal 206077/255101 (executing program) 2024/05/11 21:55:44 fetching corpus: 3100, signal 206763/256378 (executing program) 2024/05/11 21:55:44 fetching corpus: 3150, signal 207625/257733 (executing program) 2024/05/11 21:55:44 fetching corpus: 3200, signal 208820/259244 (executing program) 2024/05/11 21:55:44 fetching corpus: 3250, signal 209405/260432 (executing program) 2024/05/11 21:55:45 fetching corpus: 3300, signal 210212/261668 (executing program) 2024/05/11 21:55:45 fetching corpus: 3350, signal 211014/262925 (executing program) 2024/05/11 21:55:45 fetching corpus: 3400, signal 211902/264278 (executing program) 2024/05/11 21:55:45 fetching corpus: 3450, signal 212744/265521 (executing program) 2024/05/11 21:55:45 fetching corpus: 3500, signal 213433/266686 (executing program) 2024/05/11 21:55:45 fetching corpus: 3550, signal 214482/268054 (executing program) 2024/05/11 21:55:45 fetching corpus: 3600, signal 215104/269157 (executing program) 2024/05/11 21:55:46 fetching corpus: 3650, signal 216043/270436 (executing program) 2024/05/11 21:55:46 fetching corpus: 3700, signal 217242/271877 (executing program) 2024/05/11 21:55:46 fetching corpus: 3750, signal 217890/272973 (executing program) 2024/05/11 21:55:46 fetching corpus: 3800, signal 218766/274221 (executing program) 2024/05/11 21:55:46 fetching corpus: 3850, signal 219489/275399 (executing program) 2024/05/11 21:55:46 fetching corpus: 3900, signal 220575/276748 (executing program) 2024/05/11 21:55:46 fetching corpus: 3950, signal 221530/278005 (executing program) 2024/05/11 21:55:47 fetching corpus: 4000, signal 222368/279176 (executing program) 2024/05/11 21:55:47 fetching corpus: 4050, signal 222887/280198 (executing program) 2024/05/11 21:55:47 fetching corpus: 4100, signal 223496/281250 (executing program) 2024/05/11 21:55:47 fetching corpus: 4150, signal 224451/282455 (executing program) 2024/05/11 21:55:47 fetching corpus: 4200, signal 225101/283559 (executing program) 2024/05/11 21:55:47 fetching corpus: 4250, signal 225751/284541 (executing program) 2024/05/11 21:55:47 fetching corpus: 4300, signal 226702/285737 (executing program) 2024/05/11 21:55:48 fetching corpus: 4350, signal 227258/286667 (executing program) 2024/05/11 21:55:48 fetching corpus: 4400, signal 228043/287718 (executing program) 2024/05/11 21:55:48 fetching corpus: 4450, signal 228732/288743 (executing program) 2024/05/11 21:55:48 fetching corpus: 4500, signal 229429/289760 (executing program) 2024/05/11 21:55:48 fetching corpus: 4550, signal 230111/290772 (executing program) 2024/05/11 21:55:48 fetching corpus: 4600, signal 230876/291796 (executing program) 2024/05/11 21:55:48 fetching corpus: 4650, signal 231614/292771 (executing program) 2024/05/11 21:55:48 fetching corpus: 4700, signal 232441/293803 (executing program) 2024/05/11 21:55:49 fetching corpus: 4750, signal 232955/294675 (executing program) 2024/05/11 21:55:49 fetching corpus: 4800, signal 233657/295664 (executing program) 2024/05/11 21:55:49 fetching corpus: 4850, signal 234266/296579 (executing program) 2024/05/11 21:55:49 fetching corpus: 4900, signal 235161/297643 (executing program) 2024/05/11 21:55:49 fetching corpus: 4950, signal 235800/298535 (executing program) 2024/05/11 21:55:49 fetching corpus: 5000, signal 236422/299448 (executing program) 2024/05/11 21:55:49 fetching corpus: 5050, signal 237168/300403 (executing program) 2024/05/11 21:55:50 fetching corpus: 5100, signal 237962/301304 (executing program) 2024/05/11 21:55:50 fetching corpus: 5150, signal 238679/302188 (executing program) 2024/05/11 21:55:50 fetching corpus: 5200, signal 239350/303072 (executing program) 2024/05/11 21:55:50 fetching corpus: 5250, signal 239825/303858 (executing program) 2024/05/11 21:55:50 fetching corpus: 5300, signal 240541/304785 (executing program) 2024/05/11 21:55:50 fetching corpus: 5350, signal 241172/305662 (executing program) 2024/05/11 21:55:50 fetching corpus: 5400, signal 241849/306517 (executing program) 2024/05/11 21:55:51 fetching corpus: 5450, signal 242215/307268 (executing program) 2024/05/11 21:55:51 fetching corpus: 5500, signal 242682/308067 (executing program) 2024/05/11 21:55:51 fetching corpus: 5550, signal 243158/308831 (executing program) 2024/05/11 21:55:51 fetching corpus: 5600, signal 244445/309886 (executing program) 2024/05/11 21:55:51 fetching corpus: 5650, signal 245325/310783 (executing program) 2024/05/11 21:55:51 fetching corpus: 5700, signal 245950/311618 (executing program) 2024/05/11 21:55:51 fetching corpus: 5750, signal 246789/312533 (executing program) 2024/05/11 21:55:52 fetching corpus: 5800, signal 247221/313242 (executing program) 2024/05/11 21:55:52 fetching corpus: 5850, signal 247782/313982 (executing program) 2024/05/11 21:55:52 fetching corpus: 5900, signal 248283/314760 (executing program) 2024/05/11 21:55:52 fetching corpus: 5950, signal 248716/315465 (executing program) 2024/05/11 21:55:52 fetching corpus: 6000, signal 249339/316205 (executing program) 2024/05/11 21:55:52 fetching corpus: 6050, signal 249836/316874 (executing program) 2024/05/11 21:55:52 fetching corpus: 6100, signal 250292/317599 (executing program) 2024/05/11 21:55:52 fetching corpus: 6150, signal 250834/318323 (executing program) 2024/05/11 21:55:53 fetching corpus: 6200, signal 251451/319073 (executing program) 2024/05/11 21:55:53 fetching corpus: 6250, signal 251979/319762 (executing program) 2024/05/11 21:55:53 fetching corpus: 6300, signal 252653/320457 (executing program) 2024/05/11 21:55:53 fetching corpus: 6350, signal 253108/321102 (executing program) 2024/05/11 21:55:53 fetching corpus: 6400, signal 253510/321744 (executing program) 2024/05/11 21:55:53 fetching corpus: 6450, signal 254044/322387 (executing program) 2024/05/11 21:55:53 fetching corpus: 6500, signal 254585/323034 (executing program) 2024/05/11 21:55:54 fetching corpus: 6550, signal 255152/323724 (executing program) 2024/05/11 21:55:54 fetching corpus: 6600, signal 255737/324380 (executing program) 2024/05/11 21:55:54 fetching corpus: 6650, signal 256684/325134 (executing program) 2024/05/11 21:55:54 fetching corpus: 6700, signal 257198/325778 (executing program) 2024/05/11 21:55:54 fetching corpus: 6750, signal 257717/326376 (executing program) 2024/05/11 21:55:54 fetching corpus: 6800, signal 258326/327014 (executing program) 2024/05/11 21:55:54 fetching corpus: 6850, signal 258747/327610 (executing program) 2024/05/11 21:55:55 fetching corpus: 6900, signal 259541/328254 (executing program) 2024/05/11 21:55:55 fetching corpus: 6950, signal 260011/328844 (executing program) 2024/05/11 21:55:55 fetching corpus: 7000, signal 260485/329458 (executing program) 2024/05/11 21:55:55 fetching corpus: 7050, signal 260863/330020 (executing program) 2024/05/11 21:55:55 fetching corpus: 7100, signal 261297/330622 (executing program) 2024/05/11 21:55:55 fetching corpus: 7150, signal 261917/331243 (executing program) 2024/05/11 21:55:55 fetching corpus: 7200, signal 262552/331834 (executing program) 2024/05/11 21:55:55 fetching corpus: 7250, signal 263051/332450 (executing program) 2024/05/11 21:55:56 fetching corpus: 7300, signal 263503/333000 (executing program) 2024/05/11 21:55:56 fetching corpus: 7350, signal 264275/333589 (executing program) 2024/05/11 21:55:56 fetching corpus: 7400, signal 264938/334178 (executing program) 2024/05/11 21:55:56 fetching corpus: 7450, signal 265393/334702 (executing program) 2024/05/11 21:55:56 fetching corpus: 7500, signal 265821/335220 (executing program) 2024/05/11 21:55:56 fetching corpus: 7550, signal 266152/335746 (executing program) 2024/05/11 21:55:57 fetching corpus: 7600, signal 266559/336285 (executing program) 2024/05/11 21:55:57 fetching corpus: 7650, signal 267084/336813 (executing program) 2024/05/11 21:55:57 fetching corpus: 7700, signal 267737/337345 (executing program) 2024/05/11 21:55:57 fetching corpus: 7750, signal 268201/337839 (executing program) 2024/05/11 21:55:57 fetching corpus: 7800, signal 268618/338341 (executing program) 2024/05/11 21:55:57 fetching corpus: 7850, signal 268897/338807 (executing program) 2024/05/11 21:55:57 fetching corpus: 7900, signal 269427/339321 (executing program) 2024/05/11 21:55:58 fetching corpus: 7950, signal 269887/339808 (executing program) 2024/05/11 21:55:58 fetching corpus: 8000, signal 270305/340313 (executing program) 2024/05/11 21:55:58 fetching corpus: 8050, signal 270642/340782 (executing program) 2024/05/11 21:55:58 fetching corpus: 8100, signal 271008/341244 (executing program) 2024/05/11 21:55:58 fetching corpus: 8150, signal 271418/341696 (executing program) 2024/05/11 21:55:58 fetching corpus: 8200, signal 271764/342140 (executing program) 2024/05/11 21:55:58 fetching corpus: 8250, signal 272182/342589 (executing program) 2024/05/11 21:55:58 fetching corpus: 8300, signal 272577/343010 (executing program) 2024/05/11 21:55:59 fetching corpus: 8350, signal 272880/343431 (executing program) 2024/05/11 21:55:59 fetching corpus: 8400, signal 273317/343890 (executing program) 2024/05/11 21:55:59 fetching corpus: 8450, signal 273675/344323 (executing program) 2024/05/11 21:55:59 fetching corpus: 8500, signal 274078/344723 (executing program) 2024/05/11 21:55:59 fetching corpus: 8550, signal 274382/345151 (executing program) 2024/05/11 21:55:59 fetching corpus: 8600, signal 274857/345569 (executing program) 2024/05/11 21:55:59 fetching corpus: 8650, signal 275131/346001 (executing program) 2024/05/11 21:56:00 fetching corpus: 8700, signal 275561/346001 (executing program) 2024/05/11 21:56:00 fetching corpus: 8750, signal 276126/346001 (executing program) 2024/05/11 21:56:00 fetching corpus: 8800, signal 276586/346001 (executing program) 2024/05/11 21:56:00 fetching corpus: 8850, signal 277133/346011 (executing program) 2024/05/11 21:56:00 fetching corpus: 8900, signal 277421/346011 (executing program) 2024/05/11 21:56:00 fetching corpus: 8950, signal 277768/346011 (executing program) 2024/05/11 21:56:00 fetching corpus: 9000, signal 278045/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9050, signal 278416/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9100, signal 278832/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9150, signal 279179/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9200, signal 279584/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9250, signal 279927/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9300, signal 280299/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9350, signal 280691/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9400, signal 281022/346011 (executing program) 2024/05/11 21:56:01 fetching corpus: 9450, signal 281238/346011 (executing program) 2024/05/11 21:56:02 fetching corpus: 9500, signal 281582/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9550, signal 281982/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9600, signal 282487/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9650, signal 282904/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9700, signal 283265/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9750, signal 283710/346012 (executing program) 2024/05/11 21:56:02 fetching corpus: 9800, signal 284119/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 9850, signal 284387/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 9900, signal 284880/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 9950, signal 285311/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 10000, signal 285644/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 10050, signal 286034/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 10100, signal 286425/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 10150, signal 286740/346012 (executing program) 2024/05/11 21:56:03 fetching corpus: 10200, signal 287113/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10250, signal 287448/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10300, signal 287746/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10350, signal 288261/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10400, signal 288665/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10450, signal 289041/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10500, signal 289359/346012 (executing program) 2024/05/11 21:56:04 fetching corpus: 10550, signal 289693/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10600, signal 290033/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10650, signal 290474/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10700, signal 290862/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10750, signal 291223/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10800, signal 291650/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10850, signal 292160/346012 (executing program) 2024/05/11 21:56:05 fetching corpus: 10900, signal 292548/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 10950, signal 292887/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 11000, signal 293193/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 11050, signal 293591/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 11100, signal 293919/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 11150, signal 294192/346012 (executing program) 2024/05/11 21:56:06 fetching corpus: 11200, signal 294603/346012 (executing program) 2024/05/11 21:56:07 fetching corpus: 11250, signal 294938/346012 (executing program) 2024/05/11 21:56:07 fetching corpus: 11300, signal 295218/346012 (executing program) 2024/05/11 21:56:07 fetching corpus: 11350, signal 295459/346012 (executing program) 2024/05/11 21:56:07 fetching corpus: 11400, signal 295790/346012 (executing program) 2024/05/11 21:56:07 fetching corpus: 11450, signal 296215/346013 (executing program) 2024/05/11 21:56:07 fetching corpus: 11500, signal 296468/346013 (executing program) 2024/05/11 21:56:07 fetching corpus: 11550, signal 296880/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11600, signal 297144/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11650, signal 297577/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11700, signal 297864/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11750, signal 298199/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11800, signal 298519/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11850, signal 298821/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11900, signal 299074/346013 (executing program) 2024/05/11 21:56:08 fetching corpus: 11950, signal 299367/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12000, signal 299712/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12050, signal 299931/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12100, signal 300263/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12150, signal 300550/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12200, signal 300889/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12250, signal 301215/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12300, signal 301484/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12350, signal 301747/346013 (executing program) 2024/05/11 21:56:09 fetching corpus: 12400, signal 301979/346013 (executing program) 2024/05/11 21:56:10 fetching corpus: 12450, signal 302273/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12500, signal 302584/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12550, signal 302899/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12600, signal 303235/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12650, signal 303537/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12700, signal 303888/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12750, signal 304121/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12800, signal 304406/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12850, signal 304705/346015 (executing program) 2024/05/11 21:56:10 fetching corpus: 12900, signal 304941/346015 (executing program) 2024/05/11 21:56:11 fetching corpus: 12950, signal 305239/346015 (executing program) 2024/05/11 21:56:11 fetching corpus: 13000, signal 305646/346016 (executing program) 2024/05/11 21:56:11 fetching corpus: 13050, signal 305881/346016 (executing program) 2024/05/11 21:56:11 fetching corpus: 13100, signal 306191/346016 (executing program) 2024/05/11 21:56:11 fetching corpus: 13150, signal 306411/346019 (executing program) 2024/05/11 21:56:11 fetching corpus: 13200, signal 306606/346019 (executing program) 2024/05/11 21:56:11 fetching corpus: 13250, signal 307270/346019 (executing program) 2024/05/11 21:56:11 fetching corpus: 13300, signal 307605/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13350, signal 307945/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13400, signal 308188/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13450, signal 308433/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13500, signal 308701/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13550, signal 309038/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13600, signal 309427/346019 (executing program) 2024/05/11 21:56:12 fetching corpus: 13650, signal 309609/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13700, signal 309877/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13750, signal 310178/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13800, signal 310443/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13850, signal 310682/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13900, signal 310989/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 13950, signal 311180/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 14000, signal 311429/346019 (executing program) 2024/05/11 21:56:13 fetching corpus: 14050, signal 311664/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14100, signal 311849/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14150, signal 312091/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14200, signal 312313/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14250, signal 312570/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14300, signal 312773/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14350, signal 313103/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14400, signal 313318/346019 (executing program) 2024/05/11 21:56:14 fetching corpus: 14450, signal 313487/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14500, signal 313713/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14550, signal 314084/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14600, signal 314279/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14650, signal 314513/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14700, signal 314746/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14750, signal 314993/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14800, signal 315261/346019 (executing program) 2024/05/11 21:56:15 fetching corpus: 14850, signal 315436/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 14900, signal 315742/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 14950, signal 315994/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 15000, signal 316428/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 15050, signal 316618/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 15100, signal 316787/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 15150, signal 317138/346019 (executing program) 2024/05/11 21:56:16 fetching corpus: 15200, signal 317367/346019 (executing program) 2024/05/11 21:56:17 fetching corpus: 15250, signal 317536/346019 (executing program) 2024/05/11 21:56:17 fetching corpus: 15300, signal 317763/346019 (executing program) 2024/05/11 21:56:17 fetching corpus: 15350, signal 317939/346019 (executing program) 2024/05/11 21:56:17 fetching corpus: 15400, signal 318169/346019 (executing program) 2024/05/11 21:56:17 fetching corpus: 15450, signal 318445/346021 (executing program) 2024/05/11 21:56:17 fetching corpus: 15500, signal 318633/346021 (executing program) 2024/05/11 21:56:17 fetching corpus: 15550, signal 318920/346021 (executing program) 2024/05/11 21:56:17 fetching corpus: 15600, signal 319150/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15650, signal 319431/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15700, signal 319695/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15750, signal 319881/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15800, signal 320139/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15850, signal 320394/346021 (executing program) 2024/05/11 21:56:18 fetching corpus: 15900, signal 320638/346025 (executing program) 2024/05/11 21:56:18 fetching corpus: 15950, signal 320858/346025 (executing program) 2024/05/11 21:56:18 fetching corpus: 16000, signal 321093/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16050, signal 321376/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16100, signal 321692/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16150, signal 321959/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16200, signal 322178/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16250, signal 322435/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16300, signal 322645/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16350, signal 322884/346025 (executing program) 2024/05/11 21:56:19 fetching corpus: 16400, signal 323121/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16450, signal 323365/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16500, signal 323566/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16550, signal 323766/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16600, signal 324032/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16650, signal 324235/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16700, signal 324431/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16750, signal 324640/346025 (executing program) 2024/05/11 21:56:20 fetching corpus: 16800, signal 324888/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 16850, signal 325063/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 16900, signal 325308/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 16950, signal 325593/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 17000, signal 325878/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 17050, signal 326067/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 17100, signal 326262/346025 (executing program) 2024/05/11 21:56:21 fetching corpus: 17150, signal 326468/346029 (executing program) 2024/05/11 21:56:21 fetching corpus: 17200, signal 326826/346029 (executing program) 2024/05/11 21:56:22 fetching corpus: 17250, signal 327078/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17300, signal 327297/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17350, signal 327544/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17400, signal 327781/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17450, signal 328006/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17500, signal 328177/346030 (executing program) 2024/05/11 21:56:22 fetching corpus: 17550, signal 328373/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17600, signal 328596/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17650, signal 328948/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17700, signal 329149/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17750, signal 329402/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17800, signal 329719/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17850, signal 329897/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17900, signal 330196/346030 (executing program) 2024/05/11 21:56:23 fetching corpus: 17950, signal 330436/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18000, signal 330623/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18050, signal 330816/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18100, signal 331104/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18150, signal 331256/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18200, signal 331462/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18250, signal 331672/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18300, signal 331952/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18302, signal 331956/346030 (executing program) 2024/05/11 21:56:24 fetching corpus: 18302, signal 331956/346030 (executing program) 2024/05/11 21:56:26 starting 8 fuzzer processes 21:56:26 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) r2 = dup3(r0, r1, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf, 0x1, {0x0, r3}}, 0x2) r4 = fsmount(r2, 0x0, 0x81) copy_file_range(r0, &(0x7f0000000080)=0x1ff, r4, &(0x7f00000000c0)=0x1ff, 0x10001, 0x0) r5 = syz_io_uring_setup(0x6494, &(0x7f0000000100)={0x0, 0xa3fd, 0x1, 0x3, 0x2ff, 0x0, r4}, &(0x7f0000003000/0x2000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000008, 0x100010, r2, 0x10000000) syz_io_uring_submit(r6, r8, &(0x7f0000000200)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x6) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000002, 0x10, r9, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004, 0x10, r4, 0x0) syz_io_uring_submit(r10, r7, &(0x7f00000002c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r3}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5, {0xff}}, './file0\x00'}) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() sendmsg$netlink(r11, &(0x7f0000000600)={&(0x7f0000000340)=@proc={0x10, 0x0, 0x25dfdbfe, 0x8000000}, 0xc, &(0x7f00000004c0)=[{&(0x7f0000000380)={0x118, 0x17, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@nested={0xfe, 0x16, 0x0, 0x1, [@generic="f1afc2287be33a797ec3847c84a53f33d54d995d14375e8d7132ae6adc2f3be27997c52414a630cb6c8b938514f3e5282b343001c1367569754f42d31c4b1fd92ddcab30dbf015837147e6fa797ac4abc2e7aa5a66236befc4e34be295da758c022f707b05b60bd187f1809ac11582d693d44b6383d32821d45afa11f7faac42d37ecd469e798a5b2cf7c51a71019babd2d970f541d591d0210ff5cae734dce85715e0ae55cd92ca0658aa1c591a69c6d74c33cd2b38ac19219093e6cdb0e75e2a3ea78e8177936a5c7dc977ed6750e3482502b33fd950bdd22b74eb6b44135c192aeafd598a1e80eda97554876ad89dde34", @typed={0x8, 0x34, 0x0, 0x0, @u32}]}, @generic="eef9c3ae9a"]}, 0x118}], 0x1, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r12, r13}}}], 0x20, 0x40}, 0x800) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, r9) 21:56:26 executing program 1: r0 = syz_io_uring_setup(0x5d9b, &(0x7f0000000000)={0x0, 0x85c1, 0x4, 0x2, 0x212}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r2, &(0x7f0000000180)=0x80, &(0x7f00000001c0)=@xdp, 0x0, 0x800, 0x1, {0x0, r3}}, 0xc1) r4 = signalfd4(r0, &(0x7f0000000280)={[0x6]}, 0x8, 0x800) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x810, r4, 0x0) r5 = signalfd(r0, &(0x7f00000002c0)={[0x1]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x50, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x1e}}, './file0\x00'}) io_uring_enter(r6, 0x78da, 0xfe75, 0x1, &(0x7f0000000340)={[0x7fffffff]}, 0x8) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000380)=""/119, 0x77, 0x51) lseek(r0, 0x400, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1010, r5, 0x8000000) syz_io_uring_submit(r7, r1, &(0x7f0000000400)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x4000, @fd=r2, 0x3, 0x5, 0xfffffff9, 0x6}, 0x7) io_uring_enter(r0, 0x42c4, 0xcdc9, 0x0, &(0x7f0000000440)={[0x3]}, 0x8) syz_mount_image$tmpfs(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000700)=[{&(0x7f0000000500)="6a4bd9451fb975cf891aaed455b4567aa0d1e9a2efc6b116f0d4", 0x1a, 0x8001}, {&(0x7f0000000540)="6c7e94620a5b353759974946d8eb1a2aa210f9bf", 0x14, 0x4}, {&(0x7f0000000580)="bc42a729859767027a9836c39ec19cdfb6eb3c41ac2101513911f7545dccc30c4c7fc479f07c", 0x26, 0x7ff}, {&(0x7f00000005c0)="1cec8add5e38e071dd286bd1af34449dd42ac60fb51aa4a7b3f0362719b43445a82cc6264deb8df543deadb221922264ff4966", 0x33, 0x828c}, {&(0x7f0000000600)="379af636011a3a0fef84b09c50457acf9a1e8b5f1c9e4b4681eefd112aa59373d896657cfc09ce443563b84bf0d2e6f69a2fb657afce1df3ed6e8b248ddca8bb8cd0694384458e3064de76f8178f0218d23f78d1a20597002b6b5eadcaeaac3f98de206055fc552967", 0x69, 0xffffffffffffafad}, {&(0x7f0000000680)="589ddfa4c42d21b080e328ed5dab4d600106da401fe2e6b5fdce5e687cfecc61e28931649fcc3cf3304954a16e5c474cb52e3ed59d967f1428956b86851b7ea15509a4ae311cc7b1cafde1c991dbc9c6", 0x50, 0x6}], 0xaa2010, &(0x7f00000007c0)={[{@huge_within_size}, {@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@huge_never}, {@mode={'mode', 0x3d, 0x9}}, {@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@uid={'uid', 0x3d, 0xee00}}, {@mode={'mode', 0x3d, 0xfffffffffffffffd}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b]}}], [{@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_lt={'euid<', 0xee01}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r1, &(0x7f0000000e00)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r5, 0x0, &(0x7f0000000dc0)={&(0x7f0000000900)=@phonet, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/221, 0xdd}, {&(0x7f0000000a80)=""/81, 0x51}, {&(0x7f0000000b00)=""/64, 0x40}, {&(0x7f0000000b40)=""/162, 0xa2}, {&(0x7f0000000c00)=""/244, 0xf4}, {&(0x7f0000000d00)=""/60, 0x3c}], 0x6}, 0x0, 0x41, 0x1, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000ec0)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r6, 0x80, &(0x7f0000000e40)=@ieee802154={0x24, @none={0x0, 0x3}}}, 0x63) 21:56:26 executing program 2: syz_usb_ep_read(0xffffffffffffffff, 0x80, 0x13, &(0x7f0000000000)=""/19) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000280)={0x2c, &(0x7f0000000040)={0x0, 0xe, 0x41, {0x41, 0x3, "6564f7b34df47914342c717048d9de308a13fb2eba27d2026c8fc067f2e1384097e093ce435580ed39d051dc6e4c6c70f29b93983600827da65f21eaee79c6"}}, &(0x7f00000000c0)={0x0, 0x3, 0x8f, @string={0x8f, 0x3, "b1a4f37ab5383bf89cb9b9128607f499b752dceee74adc7ddfe08ae13772c48420882e7190276be9db05fa520bde3dec0f9d7a080aef6dad2271dd2d1f93da8b234c29e72a36f718e8c50ee0953d3ca1ef559fec62d3fa73e3f0a18c32f88be3502e2f3694b9d28cac1e8a282e89ce10cd2a2a7f2ed42301072fb519ec15156e975d3bbe4441d1f13245565c22"}}, &(0x7f0000000180)={0x0, 0xf, 0x6f, {0x5, 0xf, 0x6f, 0x3, [@ssp_cap={0x24, 0x10, 0xa, 0xf7, 0x6, 0x6, 0xff00, 0x7f, [0x30, 0xff3f30, 0xc000, 0xff, 0xe1d2249d2ba9258f, 0xf]}, @generic={0x3b, 0x10, 0x2, "435b504eed192268b40db31c08ee53fee4bb019c2116996836e2e388885523f4980fca793e08231c4ed56940efa0983734da41da40e478cb"}, @wireless={0xb, 0x10, 0x1, 0x4, 0x82, 0x8, 0x4, 0x8b52, 0x7f}]}}, &(0x7f0000000200)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x4, 0x81, 0xa0, "a8097332", "f5a74b58"}}, &(0x7f0000000240)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x1, 0x0, 0xe4, 0x7f, 0x9, 0xffff}}}, &(0x7f0000000700)={0x84, &(0x7f00000002c0)={0x40, 0x15, 0x44, "1a7eb2c1142db9476a718beb27314fcf988aacc226118ef56b5b8b558224dbddd04e41d3b928f395c5895ce81bbee8f8de36aa67f1e1432d66a907d0a920c254ff895709"}, &(0x7f0000000340)={0x0, 0xa, 0x1, 0x58}, &(0x7f0000000380)={0x0, 0x8, 0x1, 0xf9}, &(0x7f00000003c0)={0x20, 0x0, 0x4, {0x0, 0x4}}, &(0x7f0000000400)={0x20, 0x0, 0x8, {0xe0, 0x20, [0xf087]}}, &(0x7f0000000440)={0x40, 0x7, 0x2, 0x2}, &(0x7f0000000480)={0x40, 0x9, 0x1, 0x9}, &(0x7f00000004c0)={0x40, 0xb, 0x2, 'Lk'}, &(0x7f0000000500)={0x40, 0xf, 0x2, 0x3}, &(0x7f0000000540)={0x40, 0x13, 0x6, @broadcast}, &(0x7f0000000580)={0x40, 0x17, 0x6, @local}, &(0x7f00000005c0)={0x40, 0x19, 0x2, "0cfa"}, &(0x7f0000000600)={0x40, 0x1a, 0x2, 0x200}, &(0x7f0000000640)={0x40, 0x1c, 0x1, 0x4}, &(0x7f0000000680)={0x40, 0x1e, 0x1, 0x1a}, &(0x7f00000006c0)={0x40, 0x21, 0x1, 0x7f}}) syz_usb_ep_write(0xffffffffffffffff, 0x8, 0xf8, &(0x7f00000007c0)="cd98f7c9f95cd25ee69b9c6c8d93ba2b8e8c1d133434b62ef232763bfe2f3bdcbc8bc9a01efd7244b372d05c2fcfe4eec8b8b02cef4f935881427c462481d5d57c9fcab0aef3323443b0b775246ca78fe6ae37854ec14c437099fb5afbf55b7a4ec65ed0c32e41440e5770a0c41a81179c148f12c4eb6d4af2e89b016c5991145e4faad1fb001478f1de694f3e08e93bf06f4cfaab4b262c3ca76a951350b2348db3af6ce9b418a659047777c85aa4b63a74ce918ac8327a0777c67f182bb0231ce6b144bfd031d8b313a833276c2d5c7bdb7012649db099ef906c3e790735979852900a0d7719aea8261055d9d4c101ccc3c4c675272647") syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000a80)={0x24, &(0x7f00000008c0)={0x40, 0x8, 0xd1, {0xd1, 0x22, "be040d7d6f95811e8a780391335d560af843e273bbc154e2e4953a89463aac5243aaa8911f8a3c2b44b7189f07cc9bbf53ed54a574b43a036200f644617071608682691b46a382f8965febba2ba72289a3858ef99036826273dc6eab1af85ca9dc5481373ad12ab5958190fb1d3889fa0f91d0ecf6e00e8c1b8afc6b2d81a2e9cd0a148aba138eb79237da1f85c89eb803b9a23161286493909dc89292c6631f4abe3a75d67e78aa8301e459f99ba43874047b4787ba7e5df8036460e23d01238f5ac74ea22602fd9782bae45254e9"}}, &(0x7f00000009c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44a}}, &(0x7f0000000a00)={0x0, 0x22, 0x11, {[@main=@item_012={0x1, 0x0, 0x4, 'k'}, @main=@item_4={0x3, 0x0, 0xc, "e55ab091"}, @main=@item_4={0x3, 0x0, 0x9, "57a6c6d9"}, @main=@item_4={0x3, 0x0, 0x9, "0ec9da41"}]}}, &(0x7f0000000a40)={0x0, 0x21, 0x9, {0x9, 0x21, 0x6, 0x9}}}, &(0x7f0000000c40)={0x2c, &(0x7f0000000ac0)={0x40, 0xf, 0x19, "b68163ee211a92046435efe2fb2978241c8bd4f63ecab7b060"}, &(0x7f0000000b00)={0x0, 0xa, 0x1, 0x11}, &(0x7f0000000b40)={0x0, 0x8, 0x1, 0x7}, &(0x7f0000000b80)={0x20, 0x1, 0x6b, "bf614d172fa2a12ec5ecb155a553a9aa49333865681d215537436f680852ec2aec1d78c3c842fddb4673660e5d06428fae5777656cd4c539ad45c3fa42ee4f44f2702e9eb2f1277f2274a7042999228e8722de6e111d0a3905bfbcb9db72851e141cbbd489948e0b7328c8"}, &(0x7f0000000c00)={0x20, 0x3, 0x1, 0x1f}}) r0 = syz_usb_connect$hid(0x1, 0x3f, &(0x7f0000000c80)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb654, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x81, 0x90, 0x8, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x2, 0x7, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0xe20}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x0, 0x9, 0x42}}, [{{0x9, 0x5, 0x2, 0x3, 0x200, 0x4, 0x7f, 0x3f}}]}}}]}}]}}, &(0x7f0000000e80)={0xa, &(0x7f0000000cc0)={0xa, 0x6, 0x300, 0x1, 0x2, 0x0, 0x40, 0xe}, 0xfb, &(0x7f0000000d00)={0x5, 0xf, 0xfb, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x3, 0x0, 0x1, 0x8}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4a, 0xff, 0x1, 0x80, 0x8}, @generic={0xcb, 0x10, 0x1, "4c4ccce76f259c209569bfacd85accb1c99671d2c21341de54cd93f5f37271c39fbe24d0bad06a6ce50280cf51cdf288b4bf6f0ec9fe540c665c3b32da954564c6883a1611f921a7235032ea1a749034cd339b20b0f4f5422512703b6b011003a5f5a720a57c1b371cb16f8c762542698384812940fdaf208e8926b8110339c7e788e155cea304a0542a4b45da1f44411b2073930185c8180e4966c30ad8e3dace951a3c5b3e39c9bc83d8261f63a8d8dfa4a9e61d329169bbc47a9f9ab47e1a2be5dd499bc2d5e9"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x58, 0x1, 0x8, 0xdaae, 0xa0}, @wireless={0xb, 0x10, 0x1, 0x4, 0x50, 0x2, 0x3, 0x4, 0xea}]}, 0x1, [{0x5f, &(0x7f0000000e00)=@string={0x5f, 0x3, "c14dacf3983f7b8af03b858f0e86cefa39dd842b84d3dea0f468ae5aa3e526032b5476e6267b00adbc9ad5249463061fd757f65ed5a69174f2a24f1c91d83c95b04d583f5327a7e16d8a93fbfcf5a8dff7a9470a48e8c5d306e65e0571"}}]}) syz_usb_control_io$hid(r0, &(0x7f00000010c0)={0x24, &(0x7f0000000ec0)={0x40, 0x23, 0xb5, {0xb5, 0x27, "4fe609952080c1787f9777fcc9f21986078aebcfeecc93f7f458db482059f12329d0420f509f8a41315d97a88e0734b9954bd7943b10662fdb4b3c779a5ccc3480def667d24df4e2a3b1458ee5b5325eee1cfa69bd7100d69ac507a4608cbd32f3a6faa305eaefc9284c84e9644655661ab8e81342c241dd8a1ce05b910fc35e12cebe3b0cba0f42df57a4dfa052d94e3b511fea7110dc38ddf2cb2fc5e2cb9f3fe44cd0a689f7849358d278532b6283ae9ef5"}}, &(0x7f0000000f80)={0x0, 0x3, 0x8e, @string={0x8e, 0x3, "9c824611696c687330f1462c9d91aa19099fb3fa5e07e895c28d5477fbba810729aabf0daa613ddc60ee84aa684f0672465f554e220e39c0f44bd62cea5ad7a9b209c3225763035c36cec100c72408989950a0fc0965cb27ce5fe9af8ac7a167f49ace94ae387f90ab4af46f5370f6d3f5a47969d24712032663972a9832f559e535feecd2d94d0fd9da8cf3"}}, &(0x7f0000001040)={0x0, 0x22, 0x14, {[@main=@item_012={0x1, 0x0, 0xb, "d7"}, @main=@item_4={0x3, 0x0, 0x0, "4f21dc7a"}, @main=@item_012={0x1, 0x0, 0x9, "0e"}, @local=@item_4={0x3, 0x2, 0x1, "2b58e672"}, @main=@item_012={0x1, 0x0, 0xa, '\r'}, @main=@item_012={0x0, 0x0, 0xa}, @main=@item_012={0x2, 0x0, 0xa, "cea2"}]}}, &(0x7f0000001080)={0x0, 0x21, 0x9, {0x9, 0x21, 0x7, 0x5, 0x1, {0x22, 0x60a}}}}, &(0x7f0000001380)={0x2c, &(0x7f0000001100)={0x40, 0x1a, 0xb1, "a3654e621ca3fc4404bd3f4fc0504b51ab278c3b6c0bd95a0f8501e74578f4ed0abc938376abbe52313929b039486774a069254afde5e7cceae7bc7fe445d331f7193df6438abd9364da72d9573fd0bed02d0971def23828f099d4e1d81e1a676e40e214efabb5e7b8a79c7e5fd720e0ba1c42b00239cc7b8da1f3d466fcb7011bdd694c70b8a517758cc5b6eb31eadd74e43d2e05149b8b9c0c6e15da9d55ffc68b9958da7ccd6fbd15f8d945be6608e6"}, &(0x7f00000011c0)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000001200)={0x0, 0x8, 0x1, 0x6}, &(0x7f0000001240)={0x20, 0x1, 0xdf, "e4734f1b5aff5528288112c6142464e822a6c4155217674a91c38110e0f3032cb53eb5b02b634e81f1feaf2a6d3336183c017fb1e0d9883ffb7f9c6807c7a8f06417baa6ff9666916d0647c7f6712e1f284eb2a8710917fcedd08111022dd66e8b831e4b3069eb28cec10da254bbd344af9b33d64ff9f9a450239ac1168044666b98eb2cc98527b037b86309dbca678ac9929121a50e6c315a0ce6a86a036c40173e73dd4765691937c6727283382406213a401cd84178750c1e9739e0df4a8b7a29ec123f152c69124b5b246c6ffd60702c8b5ba9799a634bb8af11c3da9d"}, &(0x7f0000001340)={0x20, 0x3, 0x1, 0x9}}) syz_usb_control_io$hid(r0, &(0x7f0000001580)={0x24, &(0x7f00000013c0)={0x0, 0xd, 0x2b, {0x2b, 0x23, "a1e6255ba3b52d877d73bcf02ed11bb9529c7452f0f04e46962e5d25b8bf521a44bc6d0a9ae60f799d"}}, &(0x7f0000001400)={0x0, 0x3, 0xf9, @string={0xf9, 0x3, "847831b448a7a78f00ffb6d0036fb23ab5fa9db3bd5513933d133d8d319a1f33d48e02bf25d1d320268195d2577cd853938f2afa81fc2c55356c107b70c44642ee4a453ae3a79d89e0e24d19d2648305ab3b5e36bbb146deab49ae6f73fa0f83472a8bcf40ddb8c086d94f9fb4f889f215be0b0faf6eccd82bae341dea132a71a9cd36f4bcae94cd52ab7fb7a274ef1a1f0beb667142e09aa5b0ecda2a72b29fbd58e0a05580b3b1c527d2f90b001426912fa0f89e66179e666f16193ddd74d52410eee181abcbf0a9e687ca31616c2e3ee555534aa42f327a784f748e5c436b25235bc2c7e077e5662fc049ee499121a682b60a9d8f30"}}, &(0x7f0000001500)={0x0, 0x22, 0x12, {[@main=@item_012={0x0, 0x0, 0xc}, @global=@item_4={0x3, 0x1, 0x3, "39edfdfd"}, @global=@item_012={0x1, 0x1, 0xb, "e8"}, @local=@item_012={0x1, 0x2, 0xa, "b8"}, @global=@item_012={0x2, 0x1, 0x7, "710e"}, @local=@item_4={0x3, 0x2, 0x9, "476f42dc"}]}}, &(0x7f0000001540)={0x0, 0x21, 0x9, {0x9, 0x21, 0x7, 0x0, 0x1, {0x22, 0x350}}}}, &(0x7f0000001880)={0x2c, &(0x7f00000015c0)={0x20, 0x16, 0xce, "d4ee485d5d2988f8b3f68f1faf3153773141d07b2dd8e60645659039dcb57d3dce961a8ad41f3e34e600fbf3bbcf64ca2a3a17eb9ddbe8a3ca43b028c260a63ab6f17bcd7c00e5d3cfc3d6397e6e61e5bbeb4b9cf1f05721bc37cc899a0b6b5f282fa92f871424866f3780bccd7bf14ec2c20a63872ded344b9932a0b0698d7851c66973965091ec046862025e043a0c525ba1d2786fd675585bdd7ccbee2508feff5ce6986977d7a91e6a2d870126cd801af66ca71dff0b475b0ae725434c750375bce4a6821f200e66492eb4e2"}, &(0x7f00000016c0)={0x0, 0xa, 0x1, 0x8f}, &(0x7f0000001700)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000001740)={0x20, 0x1, 0xe9, "fd8c048d067039bae03ff775aa161059fa502e4cb7ad20192592da82f5b272e0e59f5edcf5601121198d0b7c528966e681672b5c9aea5b2317e7cb1d226f57244b51685111ff2f63de98f91f64d7367a6a24cb869b4f90037a29ef4538f5b20b68b31afa39b7ae4d26d0eeeb86f81b5781949cc47ceb74e0e3520b00c54daf3e9d7c7225ec91a44fabae4c8b95a9bad92b005b5763a5fe37b0e0e04ef2c1379fe28f15b5e23fcf622366b93e8b17dad058eb6c1a5f707b049ea326bae2ff59bac00320c8a4727ad68a7eed0d1dc38c8c1f9c66cbfcb2a6544b7f427a1b6982d19871c4dcf4724e6078"}, &(0x7f0000001840)={0x20, 0x3, 0x1, 0x7f}}) r1 = syz_usb_connect$uac1(0x4, 0x99, &(0x7f00000018c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x87, 0x3, 0x1, 0xa, 0x20, 0x6, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x7, 0x9b}, [@mixer_unit={0x6, 0x24, 0x4, 0x5, 0x3, "98"}, @extension_unit={0x9, 0x24, 0x8, 0x2, 0x6, 0x7, "0ad4"}, @selector_unit={0x5, 0x24, 0x5, 0x1, 0x3}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xd, 0x24, 0x2, 0x1, 0x1, 0x2, 0xfd, 0x0, "09eb", "a786c4"}, @as_header={0x7, 0x24, 0x1, 0x7, 0x6, 0x1002}]}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0x3, 0x7f, 0x8, {0x7, 0x25, 0x1, 0x1, 0x1f, 0x7fff}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x7, 0xf8, 0x3f, {0x7, 0x25, 0x1, 0x0, 0x3f, 0x5}}}}}}}]}}, &(0x7f0000001c00)={0xa, &(0x7f0000001980)={0xa, 0x6, 0x300, 0x1f, 0x4, 0x10, 0x8}, 0x1a5, &(0x7f00000019c0)={0x5, 0xf, 0x1a5, 0x5, [@generic={0x84, 0x10, 0x2, "a7300e3e3f0e61dafde27921bea47de5f169f6d00b2ebc789aaf38f0f355e913b4a564f0e39404978ffa4acedd675ef1367980df20c81b676107ee00aea86ad40c31f1c88af6c466dd58de3306e4a0e2511961c721e70b1b0c388faf23d94dfbfee75771258de44927fb10a290952b893d1032e8be089f2e357683ae5b4c00768d"}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x2, 0x6, 0x2}, @ssp_cap={0x10, 0x10, 0xa, 0x6, 0x1, 0x4, 0xf000, 0x6, [0x3f00]}, @ssp_cap={0x24, 0x10, 0xa, 0x6, 0x6, 0x6, 0x780, 0x9, [0x3f, 0xff3f30, 0x0, 0xc00f, 0x3fc0, 0xff0007]}, @generic={0xe1, 0x10, 0x2, "49a2ad0bd174ce65a4356f821ac75403570c65e75f84f52f5c6d9f6006646540e9027961acedb3fd30b6582f9306d25596cfc1aa3fb392980ee9dd18a77c17a3f492ecafc6dd3daf81021eff38172790ec5112ebb254fed9fd15607dc692cc38089eff9f8941bcb1f258552cdaa9cf9d1858873ab7b8fd9a0f8ea8bab7b902ef89b8305e3a48007acd8522b0195cd095414797d16ec49294ca0838845d8f86944f5ce9846e74e99e8e2f88d2b3c45c1f850c444d3b49911b95b0aaa3cfe126509f4df8b83e6cf2f4731507e3381663651a88eb5c4ce9e432197d47b45eff"}]}, 0x1, [{0x4b, &(0x7f0000001b80)=@string={0x4b, 0x3, "264a35206d5c6bc510eb8da3476d890551e1d9c6a6afd042508fec02015df62545867d75f82288ef58c7585910accfb126319fa5f1e16d57294bd59242666d40e542fe16ed01ea8451"}}]}) syz_usb_ep_write(r0, 0xc6, 0xf1, &(0x7f0000001c40)="6ac3392ad458393afd61757647ce4e21fdf6c4bcad5310cecc3d5e2a6cf30b6908f01ae21679c90b3232e0e2b543cfe0f4945af0aa1aacc2d06cd5cba6502ac10141c2a53cd062b3c8a02aa4ba31f7c8ebeaae92575e93b1cbafd51a85993d6b0a0c6268c79f77c4d4b985d79b08e752a57a8a04c7289d78e07d5ea3a3425b86eabab8bae0d47363e6659137a3822651733f822bf056037d514dd71147da4588cc7b86491ccab535e0504d474f7460f8d3f73a30abff59f04ae90a0ebe9e5f5ab6b1cc506488cff899e54706999cc2948f2742bd092b09e3f10b645238e996f517f3644ac0a2098c100df79888271069ed") r2 = syz_usb_connect$printer(0x6, 0x2d, &(0x7f0000001d40)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x80, 0x20, 0xff, [{{0x9, 0x4, 0x0, 0xe, 0x2, 0x7, 0x1, 0x2, 0x80, "", {{{0x9, 0x5, 0x1, 0x2, 0x20, 0x0, 0x9, 0x20}}}}}]}}]}}, &(0x7f0000001e80)={0xa, &(0x7f0000001d80)={0xa, 0x6, 0x200, 0x1, 0x5, 0x2, 0x20, 0x2}, 0x19, &(0x7f0000001dc0)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x1, "5a29d2d5b4cf7eec2b2302133ff5988c"}]}, 0x2, [{0x4, &(0x7f0000001e00)=@lang_id={0x4, 0x3, 0x380a}}, {0x4, &(0x7f0000001e40)=@lang_id={0x4, 0x3, 0x445}}]}) syz_usb_ep_write(r2, 0x80, 0x4f, &(0x7f0000001ec0)="161d0dc21d1b8a8f47c9ab5985cbad04e78d235423b41a74428fd81992e07163bb7a3cbd109d9fd261132f95f2a9697ee9e42e743b754897fbd865216b3671fffa5b317b50a60d8ceebf2a8b3e4ce6") syz_usb_ep_read(r1, 0x2, 0x6d, &(0x7f0000001f40)=""/109) r3 = syz_usb_connect(0x3, 0x12c, &(0x7f0000001fc0)={{0x12, 0x1, 0x110, 0x25, 0xa6, 0xa2, 0x20, 0x403, 0xfc82, 0x696, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x11a, 0x1, 0x2, 0xc1, 0x0, 0x40, [{{0x9, 0x4, 0x51, 0x2, 0x1, 0x86, 0x95, 0x18, 0x0, [@generic={0xf1, 0x11, "04942c036a6ef654c54eb12e03b188c299df73c1c050c2e5dd89b78156c14dd1d60b83ab052f9d2bed52eb080ebf771fe72527b85416d974ee1c8626a87eb4852924418f47e59dc3a450123ac6fe9d7c04fa3fed6ce6a84f10574b5511289bae6bea232713f0904e101ddc69b4cd395892fecb41227f7689bd934f64014e82f48db3ffa96117271b4b519254c0ee7bbdd43cf84d7632f69ee41103b9c7a5663974d0bbf128665a659178c5e949af7668467bf9cc75e17b971a5c426c3f0c71dab3addefa55859573d2e5feb19a86152c310d8a989a57a7134c62ac05a50930347074395052b4e1f7218185e5bfa640"}], [{{0x9, 0x5, 0xe, 0xc, 0x400, 0x1, 0xc9, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x3, 0x3ff}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0xfe, 0x2}]}}]}}]}}]}}, &(0x7f00000024c0)={0xa, &(0x7f0000002100)={0xa, 0x6, 0x201, 0x1, 0x80, 0x40, 0x20, 0x1}, 0x15, &(0x7f0000002140)={0x5, 0xf, 0x15, 0x1, [@ssp_cap={0x10, 0x10, 0xa, 0x1, 0x1, 0x100, 0x0, 0x8, [0xff0000]}]}, 0x7, [{0x4, &(0x7f0000002180)=@lang_id={0x4, 0x3, 0x180c}}, {0x4, &(0x7f00000021c0)=@lang_id={0x4, 0x3, 0x4001}}, {0x4, &(0x7f0000002200)=@lang_id={0x4, 0x3, 0x813}}, {0x4, &(0x7f0000002240)=@lang_id={0x4, 0x3, 0xfcff}}, {0xfc, &(0x7f0000002280)=@string={0xfc, 0x3, "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"}}, {0xc9, &(0x7f0000002380)=@string={0xc9, 0x3, "451b7ff073bac412a7457baed303f8d9834381c694294b6a4b43b7d80ced7f6f29026e9a318b42753b3695bfb39650c2bc2b710ea55b998d1ff08760f68444c4f49b209be77b0671ed3296e23f37cbf64c55b7d98b659b7470aa58e08685da2d81cf05a2c70cc14a58f293543fdce852905103035a475dda6db89f29e811ba744598b8a0870c6ea6c1cd6afae15e3a09b5f0b951111592e74a48b90756759b37d69c452b863fdb699211e98b5559c99a12f1d11d912e03a36be73d376c196c8c42925ff4f5abfc"}}, {0x4, &(0x7f0000002480)=@lang_id={0x4, 0x3, 0xc04}}]}) syz_usb_control_io(r3, &(0x7f0000002740)={0x2c, &(0x7f0000002540)={0x40, 0x7, 0x8f, {0x8f, 0x2, "65b45ad931660f63199bcfd60bb99e600b682e5478cd8089542b4cffd3140974b7ded0c04b8dfb69e2983053fb268b28e256f2cc522c5ce65dc8033cd233506df0a5189019f32f59a47a653c46e09e7751db76f1ab51974d968c7e9a5cf8338c1ac66c355e45769070e4485712b770251030aa47dcc17d1e51acae99b232c8a9b72cbdd8b8894645f50821a356"}}, &(0x7f0000002600)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x457}}, &(0x7f0000002640)={0x0, 0xf, 0x47, {0x5, 0xf, 0x47, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0xc, 0x7, 0x6, 0x400}, @ext_cap={0x7, 0x10, 0x2, 0x2e020a850fa82516, 0xe, 0x3, 0xfff}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x6, 0xa, 0x81}, @ptm_cap={0x3}, @ssp_cap={0x20, 0x10, 0xa, 0x4, 0x5, 0x400, 0xf0f, 0xfff8, [0xc0, 0xff, 0xf0, 0x1fe00e1, 0xff00]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xb, 0x5, 0xb, 0x8}]}}, &(0x7f00000026c0)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3f, 0x60, 0x3, 0x5e, "5d6db52a", "ae846ce1"}}, &(0x7f0000002700)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0xb3, 0x60, 0x1d, 0x2, 0x7, 0x4, 0x5}}}, &(0x7f0000002bc0)={0x84, &(0x7f0000002780)={0x20, 0x3, 0x74, "1296da39d6a69a3012d473ad3fdf22c08117dd192c5d614ae7c17b31e1af38b2aa46986e1ac2df635f0f5fad6652666c55c603c362da16e1d2b7fed206f2bc16fb8a41ae8a6b771a864a85afa7a8f490dfc0da5ff7fd14e602016b25a8b2a811acb84d763b644f3bb91632e2dc36c13b50238edc"}, &(0x7f0000002800)={0x0, 0xa, 0x1}, &(0x7f0000002840)={0x0, 0x8, 0x1, 0xfb}, &(0x7f0000002880)={0x20, 0x0, 0x4, {0x1, 0x1}}, &(0x7f00000028c0)={0x20, 0x0, 0x8, {0x280, 0x10, [0x0]}}, &(0x7f0000002900)={0x40, 0x7, 0x2, 0x6}, &(0x7f0000002940)={0x40, 0x9, 0x1, 0x6}, &(0x7f0000002980)={0x40, 0xb, 0x2, "1ebf"}, &(0x7f00000029c0)={0x40, 0xf, 0x2, 0x4}, &(0x7f0000002a00)={0x40, 0x13, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, &(0x7f0000002a40)={0x40, 0x17, 0x6, @random="84e570ca048e"}, &(0x7f0000002a80)={0x40, 0x19, 0x2, "04e1"}, &(0x7f0000002ac0)={0x40, 0x1a, 0x2, 0x1}, &(0x7f0000002b00)={0x40, 0x1c, 0x1, 0x80}, &(0x7f0000002b40)={0x40, 0x1e, 0x1, 0xbb}, &(0x7f0000002b80)={0x40, 0x21, 0x1}}) syz_usb_control_io$uac1(r3, &(0x7f0000002d80)={0x14, &(0x7f0000002c80)={0x20, 0xa, 0x7f, {0x7f, 0x1, "dcc56532c581ca429c929d5fd99a046fc85a2b01cf7a140e0af3951ae45e7744fd4117205a5220b07dc431f5d75affff35f4b961151966b2e71562075d921c0e9c1005fb15c693326e4c330d9663223deb6d1fcf9fea9d5738591fa5c638de51c31d55f0a3d47682ed3250f3162d663a866cd0f5b101ed242a40982805"}}, &(0x7f0000002d40)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x439}}}, &(0x7f0000003000)={0x44, &(0x7f0000002dc0)={0x40, 0x15, 0x5d, "6d26edc388b7831f7ace87fa31d3a6b1a0816b24d644b44e50ad252c78d8b6202bb94aeac8730a71d98e7174be3ae4389a813b21b10b5faaab17250aa17f1f339294afeb1c3f9a943d9a5149ca10bedce991e142e87fe76020c737f3a2"}, &(0x7f0000002e40)={0x0, 0xa, 0x1, 0x81}, &(0x7f0000002e80)={0x0, 0x8, 0x1, 0x6}, &(0x7f0000002ec0)={0x20, 0x81, 0x2, '\r\f'}, &(0x7f0000002f00)={0x20, 0x82, 0x2, "9c6c"}, &(0x7f0000002f40)={0x20, 0x83, 0x1, "e1"}, &(0x7f0000002f80)={0x20, 0x84, 0x1, "ca"}, &(0x7f0000002fc0)={0x20, 0x85, 0x3, "170383"}}) r4 = syz_usb_connect(0x5, 0xb27, &(0x7f0000003080)={{0x12, 0x1, 0x250, 0x5, 0x89, 0x37, 0xff, 0x22b8, 0x2c84, 0x4b0b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb15, 0x2, 0x80, 0x6, 0x128, 0x2, [{{0x9, 0x4, 0x6, 0x9, 0xf, 0x69, 0xf6, 0x47, 0x0, [@uac_as={[@as_header={0x7, 0x24, 0x1, 0x81, 0x8}, @format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0x4, 0x3, 0x63, "b68b61e5223f"}, @format_type_ii_discrete={0xe, 0x24, 0x2, 0x2, 0x3ff, 0x7ff, 0x9, 'kF\t+l'}, @as_header={0x7, 0x24, 0x1, 0x6, 0x80, 0x1002}, @format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x1f, 0xff, 0x9f, "36ead9ea"}]}], [{{0x9, 0x5, 0x3, 0x0, 0x3ff, 0x9, 0x6, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x3, 0x5}, @generic={0xdf, 0x22, "ba16530d6eef79af5a67b289c2d8d3ccb5488663aac58e75bb32dada03940c84a3274e03c72d72a56f51b5cd3aec0772aed4a3416571b73d0b5231d09da0086f45e5b346ece7c2f796a669511577763fc504707dde34271c660c6968e3d717a1c3240687310cefd13f92ad8a2d2065d9e4bc53a8efaab1b8f3c7691f50d40809265ba08ea39b9601c5205a23313d9b12029cdc12c91c3e48fa8546842d467e24eb78ca62cfc868099d80fd579dc36356b328fb0b8e2e0b02083ae2c95fb78abfc6a1f817a5e3790978a6d0144b878fcf5c834af8cb647a25bbcd5eef3b"}]}}, {{0x9, 0x5, 0xc, 0x1, 0x400, 0xd0, 0xfe, 0x2, [@generic={0xd4, 0xa, "ab2c279d1fc779228aaa38126fda410c5759b8ecb9cc4141fb36970eb1ede3079ecb7799d566def1000e368ca3d6b9e2b3b34ab140048e4f1e84b618308abd3423a85936256c72f8079042a0defa8bcec60b84058ed723b65d6a90844cfdb9c1067aa19e554fd04b9dc964a46be17b69f5480f73ed0cc8b74b11bf3f56bfe0e162f0024f4e3c0b2327d6f40e38148657c22e93ed18ba65256e3a7c7b6ab7d85505fcb04f915ace0f5df1443df9ae280c1003755c574e131a4dae4df3a88d9d91af3d2e3e51432b3f8d6a9cce3ff9f273fc29"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x200, 0xfa, 0x1}}, {{0x9, 0x5, 0x5, 0x2, 0x10, 0x0, 0x8, 0x8a}}, {{0x9, 0x5, 0x5, 0x0, 0x20, 0x35, 0x8, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x9, 0x928}, @generic={0xea, 0x4, "c29f9d9f0dab0d9f645c02cbc5857c13d25f9ad0f0b94049fcb63208fabd40badf6c4061e58e313745cdd260648695ef5cd12f2ad4dfaa4d08ccbae4439667ee7ec4a3d903a453836d13fa004652192e0da27f0da8c32f4539f4eb5a723e85252994820c7a9de579427fdb35b68a2c19175bfbc3b1e775920761ff36591800d5b5ef04d8413ab38731affc368c3c60f62105bb637c149673c32adf87950f932aaa88c8e9af4b4c39980f276bfd1dc2754522ac6695cfdee9e4868df7368bf239cc15e4a3e55e6cb92ee5644d99deda34518226c91df9f0dee77ac14bd636c3d0ea244a32312207a3"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x8, 0x7, 0x0, 0x4f, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x20, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x3f, 0xe9}]}}, {{0x9, 0x5, 0x4, 0x1, 0x40, 0x20, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xac}, @generic={0xb5, 0xf, "dc692ba22773c3c1b7bc2452f9f2def090dd987d3fb0445e11de8a5208a5acd7b0374ac4a2814364edee57e9c7c7a450e87d70f9cd12079ff0bcc487131ce292ae9a073a004e911a29fff193ab6061bc82f6fcd60d198694ae65578796bf1ee06d3448ff1a2b3eb0a258e358b87aed50a3b2329e687ade71220af3a542c67e1b5f70f825b843d3aa59a0b42f584379c8b80e82ef70fc4a2c17492fe1a7109895f4949f3e642a95517f73352e36deba6e7bb1a1"}]}}, {{0x9, 0x5, 0x80, 0x0, 0x20, 0x2a, 0x9, 0x20, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xc9, 0x9}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xfa, 0x1}]}}, {{0x9, 0x5, 0x0, 0x10, 0x10, 0x0, 0x8, 0x5, [@generic={0xec, 0xa, "d8f1d630b2ab4d52c46bbaa2ba98429a97322376d0e9cb16c570688b3d6309467f859e089d13e46e0263a2a3391a1b7de2c808b2070fb63e95f36a3aa41add105df20f325ccd2f1e42f72a7aeefa59e9fd680244dc29c5b3079951a42f92518915bca1cff514ad9c8bd7b8dad18f264d0c1295fbea5f8559b84e3eff20e88729dd1551ed5d23c17e70f534431fbf8e8b5ae1caca620f4f4ee083b0963dd12d4e6c1cecd07e2cb61cd2aa322356dfe4b60c7487e7efe060123e366636790f1d0cd43cee3dd8a04ffcbf94e3e7d6d487820a0c3a8960bb361788aca6a123a73bd87f959dcdec8fac4da575"}, @generic={0x7e, 0x30, "9fcc2100e64c4cc0bde33c43b9326c566516e1abbe288c599243bae2895ed70716c5dc02ffc7673c80f3a78abd76195154a1395a9dcccefeda4db8a729487f1cc1cf3368824b9a49c41def531804594bf3aad97bd377f65117bc3397f9cea03b8b8d720d128d3021827d8294a6319a34b3c6e65e6d29a0f5f03b6bf7"}]}}, {{0x9, 0x5, 0x7, 0xc, 0x200, 0x80, 0x81, 0x0, [@generic={0xec, 0x21, "76aa562dd64dbbd9dedd6ff88f2acae58d4efff03967094eb7bf7ef21e4f8a38f90b273edd9dd8651d5eff157c6cada033b30b6bdfea958fbd89e5c4e2beddaed5eb7b1409c3c48fe66d1d769eac78ee8a518797fce2d5d80162a954313651f44fdfc39e7f14e216ab390b3a45b293cf223972e5a4b3bc799bb94264817afe3b84638a4aedf7976978ab40216ebbb7c85bb1ed126d6dd476a91113b393c9b5d9db52922f6bc5766a2cdfc1e81c3f92f0bc0522dd9b70cfe64439d1d1794b863a7fb43a12b1b18e919b9dd2c0776b3e39bf5fd6f9eac33c16c42e3e63bdaa83b0b175329a08802e9e753d"}]}}, {{0x9, 0x5, 0x7, 0x10, 0x3ff, 0x1, 0x5, 0x4, [@generic={0x41, 0x22, "58513cb633c8dbd8fbd306f4aa41559842dd979ca041d43a93ee449ee69596fef7b86f678b6a6b12ab77570c258c6b59aadf0b7e16e666fb15cf1b016f545c"}]}}, {{0x9, 0x5, 0xc, 0x4, 0x8, 0x2, 0x7, 0x3, [@generic={0xd0, 0x22, "d1a26ac1fa62457fc22da1742f3578a84bdb2dcc96a78d7e52bf539e8b81231e2ed5ce6cf1fbb54c5bf81b72fe73399ab90f917cb18191a85060b6458529f808ed25b25171d4c83388e86092d70851e29b7fac129f76a52736902c32f9a84093a4f46b711bfa75d9d63d48403886c71379de6ac7d33b4890b75fe3de4e7e4331755639d5c7bebdd3e9e0ce3331ce0f67754eda28720ec49f75ae329eb3296ed6aaa9257ce65631e3c249787b07b7c50dd0d6d4d05d6462108bc2b96561d3e14a897d498ed342b367672e8c4bba33"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x34, 0x2}]}}, {{0x9, 0x5, 0xb, 0x1, 0x40, 0x74, 0x0, 0x70, [@generic={0x37, 0x21, "c2ec6fcdd4273aa15893e16aea557b6b6f3c306d288a06952ce2f364b4d90f7153f9d4e6a6c3850a357c8ee793de5bd5c3dfa25505"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x8, 0x3}]}}, {{0x9, 0x5, 0x6, 0x0, 0x3ff, 0x0, 0x4d, 0x20}}, {{0x9, 0x5, 0x5, 0x0, 0x40, 0x3f, 0xc3, 0x7}}]}}, {{0x9, 0x4, 0xe9, 0x1f, 0xc, 0xea, 0xee, 0xb0, 0x9, [], [{{0x9, 0x5, 0xa, 0x8, 0x40, 0x9, 0x80, 0x8, [@generic={0x7d, 0xf, "dc0ec0d8e454c86f90b0c82dc66b6b4f5b26098157fb137e68131d70914e407b33f4279814d984fbbb5a8b3d65652a30fff7dd2bd60c4709ed81183bbfd6db5a6a20441fd0a1487b1093f28b0d2239447bf26193944b379f6081d0bc77813f5831dd7ce678de79c6778226a00eb2bb085c247ff59152c89b36ede3"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x3, 0x9}]}}, {{0x9, 0x5, 0xc, 0x8, 0x400, 0x3, 0x40, 0x20}}, {{0x9, 0x5, 0xd, 0x4, 0x20, 0xcd, 0x7, 0x4, [@generic={0x38, 0xd, "3c323a7dbc2fc2740ea8938a36472a8458d395076b16cf172fe25a9381e015f4aa55ba8f91ece59842bbbea3f12b8e3bd4c0d4472c80"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0xfd, 0x1000}]}}, {{0x9, 0x5, 0x1, 0xc, 0x3ff, 0x5, 0xb1, 0x80, [@generic={0xf6, 0x30, "27e49560cbbf7660899097c0c4cca3270467a5245368fd6bd8eed9ead7599d3a9dadd578b770b62ec7c22b29db63f683bf0aeadda4fd1938e3a089da0f90f738bd09a43261495f03a3a9729d72269a38e1ff43a9d11b68c342220eb1303793e840085cb7225b9d851a3cad7a0a5bc89c5e551d5d5dc9e68514680e82605125a14bc257c48a22613ce12ca5aa616a2d6fe19215d708b1a1046a1008c7ae498ba14b7af8dbf28080cc9e22cc24b4712e0d4b9bc9c5654dc10c1d74d9c7b1d674267aeb3c34e158d97279e24fada8c32486eeb95e1ea297cdbcce026a426d236271cf765a9d62897c179ed6c2f9469dccb738035040"}]}}, {{0x9, 0x5, 0x7, 0x3, 0x200, 0x4, 0xff, 0x7f}}, {{0x9, 0x5, 0x80, 0x14, 0x8, 0x9, 0x7f, 0x20}}, {{0x9, 0x5, 0x5, 0x4, 0x7c7, 0x20, 0x3f, 0x7}}, {{0x9, 0x5, 0x80, 0xd, 0x10, 0x3, 0x6, 0x40}}, {{0x9, 0x5, 0x3, 0x3, 0x200, 0x9, 0x6, 0x81}}, {{0x9, 0x5, 0x80, 0x8, 0x20, 0x73, 0x80, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x80, 0x7}, @generic={0xd9, 0x23, "67e5abd37c6caed5e535b3a5986edc3b97d5af760b882ab2c75dc513e2088ea7ed5b398dba1cec46a68acbeda9823574bdef54373d915e69726b5d2fe3d9dea77706235753111103a77f4096eec049f0f62daafd1b9e87f500b8ba0266651d06fe1dcb42d398de38a351ef577c5901de387173efc70c959f183d8d5adb78f87b0234b32e01e56e974fa399e02d059c13df6dd7975d0e8b00d565fac51aa7c1e94dda4820181e18d44bb58caff2bb63f247ab63a218848cdd9aad78002c925bd08492850cbe69d48f3c3dbc1746b1fe6b1f7d4fc5658d82"}]}}, {{0x9, 0x5, 0xa, 0xc, 0x10, 0x3f, 0x7f, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x857}]}}, {{0x9, 0x5, 0x2, 0x10, 0x40, 0x6, 0x1, 0x7}}]}}]}}]}}, &(0x7f0000003f00)={0xa, &(0x7f0000003bc0)={0xa, 0x6, 0x110, 0xf7, 0x40, 0x40, 0x10, 0x5}, 0x10d, &(0x7f0000003c00)={0x5, 0xf, 0x10d, 0x5, [@generic={0x54, 0x10, 0x1, "079a929024e7cc6e41106f64b7566e1205ed15b18587079c1ee820b1e2559f6eabac8de7fe3eba542b1ee402f04ee12ec39acb929f6d983e059264048f11f1e3906ffa422bfce97e6ebc3d107eead03881"}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ssp_cap={0x14, 0x10, 0xa, 0xc0, 0x2, 0x200, 0xf, 0x3, [0x1fec000, 0x28]}, @generic={0x9a, 0x10, 0xb, "97746844c01f2995ab53685bef4fe668453fd76a9762b8cb2c59b26d0348f6e68d3e8b98ff98c04d538804fdddf42356a9204074012fcbbd82eaad5af126df846c63af976979c6a48b7e1b9e0a3226b0621f2f6accad3990405290c5455881addf514a9e1751138ffccc21d95b570f52f446a01d956fd2a9d6ac3c0af75a6a9ce93805fc8c79f7723981d5acce3a1ead2f2cc6dc55fbbc"}]}, 0x4, [{0x16, &(0x7f0000003d40)=@string={0x16, 0x3, "42e3b6ebe4d3d9430f9cb6130b1954f8cff9ef2e"}}, {0xca, &(0x7f0000003d80)=@string={0xca, 0x3, "2084bf3b11f569dc1d20f5c62e5374c04c7f70df22222cdef2e59ba043906186fc75501e35f9c6ae74136f853cd089f11c432610b403c0035af2643a88342bf592e8d441c7cf81b5487237962065e3780b879c975efd8a306f373dde2566afe09c795b10e1eb8a64970c730439717ec6a13241ee383fb82e384036d4e6708cab1141463c18a2b04cc70644f5eade14dfe8dd2c2a4e1d245b413e4d9b22afce02a6129e2108a4c1b9de0d3a7cdf17334479f1988fd093d246cd873617ba40e51d5d116157430bc80c"}}, {0x4, &(0x7f0000003e80)=@lang_id={0x4, 0x3, 0x44d}}, {0x10, &(0x7f0000003ec0)=@string={0x10, 0x3, "8a016c3f23c61c97e5d217dd8531"}}]}) syz_usb_control_io$hid(r4, &(0x7f0000004140)={0x24, &(0x7f0000003f80)={0x40, 0xa, 0x75, {0x75, 0x23, "8992bf1bd70f52f8fc533891997daebb0021cbd97fd6960d172bc9909b258f2f6bc9f9f4a897724b13ab3043c3a27b430baab5c1997631eb2d0548207378e005bf197724c298f2822cc24d4f74c154c59bd0dfabc0dae8b010a2d7e33dc507ed340a8baf145033289290df7dafbae9c4502cec"}}, &(0x7f0000004000)={0x0, 0x3, 0xa6, @string={0xa6, 0x3, "312cccf54d995d9fc9d6bafaa30e02a182a3dcb378cd98c82ddbefe41ee37f0d060d945712dd3a8488e1333cab8331944e08de56166ec1d25424424f9f80d9b2b5dfe3cef7975166067cf8f3a722244c11e6767aeb0fa54a4afdd4dbc92d5bc5c2afbad9a66bb19a66552000eb62ea2682b9632195234c0e34e5f3931fa73280477d3c91a429bd793cc9c054c37b5ac49d278b8a7ac70557544ed7179d84eea3429a6a8a"}}, &(0x7f00000040c0)={0x0, 0x22, 0xc, {[@local=@item_4={0x3, 0x2, 0x4, "dcfd18b7"}, @global=@item_4={0x3, 0x1, 0x9, "43dd2f67"}, @main=@item_012={0x1, 0x0, 0xa, 'U'}]}}, &(0x7f0000004100)={0x0, 0x21, 0x9, {0x9, 0x21, 0x3, 0x3f, 0x1, {0x22, 0x6dc}}}}, &(0x7f0000004380)={0x2c, &(0x7f0000004180)={0x0, 0xc, 0xee, "fa56e604a0c92e2bc8e77258ca3fbd8583b8c28e53f2c3e97cd4c29c696fb67e88dd522dcdcfbcf3a97d309bf33e1047ba963a3989e9fbb27b4b5863e8841dbbc8b5b3ec56619e0b593152af72bfd7bdb7d81c8fc36b70f26247f2065c8ab496288682643d1b1e5193828ab603130a632fac323c65eae7b1edb208066dc7f2a6e01160ce4309724f765d510a4ed45df4cda2f64c3e37b6c8de81e08a7a32d0b5d7a4b55acf036b5f9427e7211ee524ba055e838088e7b78ad1bfe8a28863ef130f3fa0fe270386cc873dd8b6e41a7bdc667d68edbddb355706b33a5444e785b6621c8f4a9008e1f3f172f3d1e1c9"}, &(0x7f0000004280)={0x0, 0xa, 0x1, 0xff}, &(0x7f00000042c0)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000004300)={0x20, 0x1, 0xf, "924e858394f0f00cf91e1bfe408058"}, &(0x7f0000004340)={0x20, 0x3, 0x1, 0x40}}) syz_usb_control_io(r1, &(0x7f0000004600)={0x2c, &(0x7f00000043c0)={0x20, 0x4, 0xe0, {0xe0, 0x2, "38aa4a2ba1a18f24818f795ddc5ccd27c1585c6d1e764ef0e8e686d6077738b8464e5894309b114b635b851e9e865ca24cefe4a511dd5cc910bb3801eca96b8c5518cb6235dd0ab4e77f6e726ed4e693176a3d418a4e43246c3acee645b1f0f987f5e9efb6e4b2cb45a49b9fa1aacfae10aaad86c544d6881cce5a79d4329d561dc7bd1b2f46dfa8b6aa92fcc2ea4c40ea7cb5185c26f49851f026e0e88dea4e1595c9a3c1944a4f95006d306cd58c4cfb23e4baf991e798ae93cf738f18bf424a548aa719c5580d38483f4a0b6e65b8ffb21b95183cc95416c2affeccb2"}}, &(0x7f00000044c0)={0x0, 0x3, 0x56, @string={0x56, 0x3, "e0cbb0ca80d05c66cd4d7d607fead168de3065fe1e428beeec8b1339e6ce5bbee344bf3233b3fd5f9f06f0d885388eb051888dcb6484607f420c810bd61a8a1646cb2337d333e811f93ed5ac7db39c345d34fac9"}}, &(0x7f0000004540)={0x0, 0xf, 0x20, {0x5, 0xf, 0x20, 0x2, [@ssp_cap={0x10, 0x10, 0xa, 0xfd, 0x1, 0xffff, 0xff00, 0x20e, [0xc0]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0x9, 0x1, 0x4, 0x17}]}}, &(0x7f0000004580)={0x20, 0x29, 0xf, {0xf, 0x29, 0x40, 0x18, 0x3f, 0x65, "3449ffd6", "97aff27e"}}, &(0x7f00000045c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x6, 0x10, 0x5, 0x1, 0x0, 0xfff, 0x1}}}, &(0x7f0000004a80)={0x84, &(0x7f0000004640)={0x40, 0x1, 0x52, "8630a12d60590c5408cf3796080d351db267f83ce6683a569c0c9b5525f5c642307398ef49eaea08744ca1252426f13180d04b4806631d47f16227b13a060b498991bec9f73a1c65cc4fb728c340e12f153d"}, &(0x7f00000046c0)={0x0, 0xa, 0x1, 0x9}, &(0x7f0000004700)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000004740)={0x20, 0x0, 0x4, {0x0, 0x3}}, &(0x7f0000004780)={0x20, 0x0, 0x8, {0x80, 0x4, [0x78]}}, &(0x7f00000047c0)={0x40, 0x7, 0x2, 0x6}, &(0x7f0000004800)={0x40, 0x9, 0x1, 0x4}, &(0x7f0000004840)={0x40, 0xb, 0x2, "8314"}, &(0x7f0000004880)={0x40, 0xf, 0x2, 0x2}, &(0x7f00000048c0)={0x40, 0x13, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, &(0x7f0000004900)={0x40, 0x17, 0x6, @local}, &(0x7f0000004940)={0x40, 0x19, 0x2, "c584"}, &(0x7f0000004980)={0x40, 0x1a, 0x2, 0x81}, &(0x7f00000049c0)={0x40, 0x1c, 0x1, 0x66}, &(0x7f0000004a00)={0x40, 0x1e, 0x1}, &(0x7f0000004a40)={0x40, 0x21, 0x1, 0x5}}) syz_usb_connect$printer(0x5, 0x2d, &(0x7f0000004b40)={{0x12, 0x1, 0x298, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x7, 0x40, 0x0, [{{0x9, 0x4, 0x0, 0x6, 0x2, 0x7, 0x1, 0x3, 0xfd, "", {{{0x9, 0x5, 0x1, 0x2, 0x20, 0xbe, 0xff}}}}}]}}]}}, &(0x7f0000004f80)={0xa, &(0x7f0000004b80)={0xa, 0x6, 0x201, 0xf0, 0x2, 0x0, 0x20, 0x1}, 0x6f, &(0x7f0000004bc0)={0x5, 0xf, 0x6f, 0x6, [@wireless={0xb, 0x10, 0x1, 0x8, 0x20, 0xb5, 0x80, 0x401}, @wireless={0xb, 0x10, 0x1, 0x2, 0x20, 0x4, 0x1, 0x2}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "71135028d32fbd88ddbaec40aa03f9d1"}, @ss_container_id={0x14, 0x10, 0x4, 0x40, "625cb05fb5114f0215b6bbbf23a3ad8b"}, @ssp_cap={0x18, 0x10, 0xa, 0x3, 0x3, 0x25aa, 0xf00, 0x80, [0x1010140, 0xff0000, 0xc0]}, @ss_container_id={0x14, 0x10, 0x4, 0xf8, "b820493e7a02445f02acdeb8c1e39af0"}]}, 0x9, [{0x7b, &(0x7f0000004c40)=@string={0x7b, 0x3, "e225c0ce9379fb1b6431331c7b5d4f58174364cfd04db80822ff84fd3a9ec5daed340647a832bc1736780ede131f3a8a089cd0433242a023b74d2dd895bb47bf95a6b1a3683995d4606079bb778da4a3e6adf95a06325d0796f6cd1db05981fc08a156f859458ea249c2175fb48858a25fcb3b01294d03bc37"}}, {0x4, &(0x7f0000004cc0)=@lang_id={0x4, 0x3, 0x436}}, {0x76, &(0x7f0000004d00)=@string={0x76, 0x3, "8fd48d9e7c127607fe17e759a9bfffe6d7d9c4324db425dc1cdb682f3dc605c260cdc4ddf8aeb6f13372ea1c4523a99d61d78410bb11be9332c00c31bf8cc2e48714075db429e56e6859c87b105671589ebccc1d140bef1dc92fec3ec293ae0ae2b006f9c582dc38aecc399c43324d804eee86a7"}}, {0x4, &(0x7f0000004d80)=@lang_id={0x4, 0x3, 0x42a}}, {0x4, &(0x7f0000004dc0)=@lang_id={0x4, 0x3, 0x860}}, {0x69, &(0x7f0000004e00)=@string={0x69, 0x3, "313d294551de0e0cd16aec95b75a6feb1e96b1ee24a6dbe32f4aa1a6da86e45fe8e7e632979111901eb2a3bb1fc47e2ad0bd532bc8b31afb8753936d2f108975d61bc54ed45d3afe499a116e8b6d7d5806aa62b0e1e2ff939c903d2e98362bd4f1d03b81215621"}}, {0x76, &(0x7f0000004e80)=@string={0x76, 0x3, "537b125d01008b48b960534642a3714d443619530726d2dae52bcbabc685839ac72951c212943d687189fc62badb463a6b2319da463e8d2c9814be3c30bc2e0812b45f431d5d34ff4b3ff88e4f12d93b52bf6b34a7a8da81538d7c8844c273130018da9748a01655f1d83a8f617f45885b45a9d8"}}, {0x4, &(0x7f0000004f00)=@lang_id={0x4, 0x3, 0x2001}}, {0x4, &(0x7f0000004f40)=@lang_id={0x4, 0x3, 0x42c}}]}) syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000005040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x56a, 0x4004, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0xf9, 0x50, 0x2, [{{0x9, 0x4, 0x0, 0x3, 0x2, 0x3, 0x1, 0x1, 0x3, {0x9, 0x21, 0x8, 0x6, 0x1, {0x22, 0xd8a}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x82, 0x81, 0x4}}, [{{0x9, 0x5, 0x2, 0x3, 0x204, 0x3f, 0xf9, 0x40}}]}}}]}}]}}, &(0x7f0000005140)={0xa, &(0x7f0000005080)={0xa, 0x6, 0x310, 0x5, 0x7f, 0x2a, 0xff, 0x7}, 0x26, &(0x7f00000050c0)={0x5, 0xf, 0x26, 0x5, [@ptm_cap={0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x3, 0x3, 0x3, 0x9}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x2, 0x7f}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x2}]}, 0x1, [{0x13, &(0x7f0000005100)=@string={0x13, 0x3, "2eab12c80fe2bebf0e08532341565a256c"}}]}) 21:56:26 executing program 6: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x400, 0x4) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x50, 0xffffffffffffffff, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x2000, @fd_index=0x3, 0x1ff, 0x1, 0x8, 0x0, 0x1, {0x0, r1}}, 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000080)=@ax25={{0x3, @bcast}, [@null, @rose, @netrom, @bcast, @bcast, @null, @null, @null]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/135, 0x87}, {&(0x7f00000001c0)=""/239, 0xef}, {&(0x7f00000002c0)=""/25, 0x19}, {&(0x7f0000000300)=""/236, 0xec}, {&(0x7f0000000400)=""/232, 0xe8}], 0x5, &(0x7f0000000580)=""/160, 0xa0}, 0x6}, {{&(0x7f0000000640)=@tipc=@id, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/248, 0xf8}, {&(0x7f00000007c0)=""/4, 0x4}, {&(0x7f0000000800)=""/32, 0x20}, {&(0x7f0000000840)}], 0x4, &(0x7f00000008c0)=""/171, 0xab}, 0x6}, {{&(0x7f0000000980)=@rc={0x1f, @none}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a00)=""/102, 0x66}, {&(0x7f0000000a80)=""/66, 0x42}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000b80)=""/236, 0xec}], 0x4, &(0x7f0000000cc0)=""/180, 0xb4}}, {{&(0x7f0000000d80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000e00)=""/90, 0x5a}, {&(0x7f0000000e80)=""/60, 0x3c}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/106, 0x6a}, {&(0x7f0000001000)=""/106, 0x6a}, {&(0x7f0000001080)=""/159, 0x9f}], 0x6, &(0x7f00000011c0)=""/138, 0x8a}, 0x80}], 0x4, 0x10043, &(0x7f0000001380)={0x77359400}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000013c0)=@abs, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/122, 0x7a}], 0x1}, 0x40000040) mmap$IORING_OFF_SQ_RING(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x1000000, 0x20010, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001540), 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000001580)={0x0, 0x0, 0x3b6589be}) fstat(r2, &(0x7f0000001980)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001a00)={0x0, 0x0}) fcntl$lock(r2, 0x25, &(0x7f0000001a80)={0x0, 0x2, 0x5, 0x8, r3}) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000001ac0)={0x62, 0xc, 0x1, 0xff, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast1}]}, 0x68) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001b40)={0x0, r2, 0x7, 0x4, 0x7d, 0x800}) syz_io_uring_setup(0x4ad4, &(0x7f0000001b80)={0x0, 0xecee, 0x2, 0x2, 0x344}, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000001c00)=0x0, &(0x7f0000001c40)) syz_io_uring_submit(r4, 0x0, &(0x7f0000002c80)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x6, 0x0, &(0x7f0000001c80)="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", 0x7, 0x0, 0x1}, 0xf419d99b) connect$packet(0xffffffffffffffff, &(0x7f0000002cc0)={0x11, 0x17, 0x0, 0x1, 0x7b, 0x6, @local}, 0x14) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$AUTOFS_IOC_READY(r5, 0x9360, 0x9) 21:56:26 executing program 5: r0 = syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1d0, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0xfd}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x1}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc6, 0xbe, "91400443c0fce7015523c4992459083a375570aebfae5869d49fdb525546a96407507451e7a1dccf0ea32e8abd427c7db48b2838364d1a707764e6398e15303145abe30c1b0296f267b45693dbd3bcae6e011c8386092199d8fe86e4bc61bbe222bc81db73f26448311efd78e39ef077f9a3bffe19755d8f2897617316e129dd2c1a0792affec6ff927a10e9a834d70801ccb00ab7b98109dc0f239e3cd6cd1899111f94e5064115e5a79dc0339eeac3e8908790649e74bea5ce45175023f103bc3f"}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x1000}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x6}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xba, 0xac, "ae55935359bec0cb2edf8d5b3e7aaa9a841bf49a55e3b434e999cf52211e65912211932d19164c703d5e1b8367833a55fd9fea150ea3db1d1c2097e82e9e5c0018cbc9c7f5782f3b1f0e4c63c45ea5a4845e540c0af2678e472c910928752cbb82a2612e45fb59e6f1a0d228c58db8a181e4558e1f4dfe8f96a6ce1da5d5a30cfcb063785285c425fb25737dd5dfa2da919d565a934a71377b961a5b90701289645232e5ebede78695af195fc06917fff0ad55c19163"}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x48000}, 0x81) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x2f, 0x5, 0x2, 0x8, 0x10, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xb3b0978b68539f2, 0x10, 0x2, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x29, 0x60, 0xdf, 0x70, 0x2c, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80a1, 0x20, 0xd4a6, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f00000004c0)={'erspan0\x00', 0x0, 0x700, 0x700, 0x0, 0x40, {{0x16, 0x4, 0x0, 0x1e, 0x58, 0x68, 0x0, 0x1, 0x29, 0x0, @rand_addr=0x64010101, @loopback, {[@timestamp={0x44, 0x10, 0x9c, 0x0, 0x0, [0x80, 0x0, 0x7]}, @rr={0x7, 0x17, 0x2f, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @multicast1, @multicast1, @rand_addr=0x64010102]}, @rr={0x7, 0x7, 0xbd, [@multicast1]}, @timestamp_prespec={0x44, 0x14, 0x3c, 0x3, 0x3, [{@loopback, 0xffffffd2}, {@remote, 0xfffffffe}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000580)={0x1b8, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r5 = syz_io_uring_setup(0x27e7, &(0x7f00000007c0)={0x0, 0xe097, 0x2, 0x3, 0x24d}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000840), &(0x7f0000000880)=0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x2, 0x0, 0xffffffffffffffff, &(0x7f00000008c0)={0xc0000014}, r1, 0x3, 0x0, 0x1}, 0x800) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000940)={0x0, 0x1, 0x6, @broadcast}, 0x10) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x30, r0, 0x0) syz_io_uring_submit(r7, r6, &(0x7f00000009c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000980)}, 0x9) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00), 0x80, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x30, r8, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9, 0x8}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(r9, &(0x7f0000000d40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000d00)={&(0x7f0000000b00)={0x1c4, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x65b, 0x5e}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_IE={0x11d, 0x2a, [@mic={0x8c, 0x10, {0xf37, "3dabca358a59", @short="688d71605c31af7f"}}, @random_vendor={0xdd, 0xae, "710da966898d72e02046e17fbb0629c418a26911d15cbc5bf963fa99bfbbdd8b5587fc63a577f4ba4d1d817e3a15360e37a1d4d3081ce410af21bb0db71398e6e6a1aabd61b0a400f0aa4c64b2ca05e0b9fac0948996a11431520e5b47e70132c5f54126c61e9a4049c2190f4e7db0d9c0f2cae3c3e5dce5327d4f709b5ae46b357179364c7aac13e2d680d60b91766136e4341baabfc011d5f1f3d5d1e0fe20feaeb760caba40e83acf22e47aaa"}, @gcr_ga={0xbd, 0x6, @broadcast}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, 0xffffffffffffffff, 0x81, 0x8}}, @link_id={0x65, 0x12, {@initial, @device_b}}, @preq={0x82, 0x30, @not_ext={{0x1, 0x0, 0x1}, 0x1, 0x6, 0x4, @device_a, 0x1, "", 0xffffffff, 0x20, 0x2, [{{0x0, 0x0, 0x1}, @device_a, 0x1eb6}, {{}, @broadcast, 0x200}]}}]}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_IE={0x1e, 0x2a, [@mic={0x8c, 0x18, {0xf35, "4ac81ef3194f", @long="0f7fc6a680990306e9462e1d95b79ca2"}}]}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x12}, 0x8000) r11 = dup(r5) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x40010, r11, 0x8000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000d80)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) 21:56:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa97e545aa2634e67}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9}, 0x4008000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4805}, 0x80c0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000003c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), r5) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r8, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r6, 0x8, 0x70bd25, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc004) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), r5) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000005c0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(r7, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x14814012}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x5c, r9, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x19}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_PAGE={0x5, 0x7, 0xf}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_PAGE={0x5, 0x7, 0x17}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24004000}, 0x1) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r11, 0x8933, &(0x7f0000000700)={'wpan4\x00'}) sendmsg$IEEE802154_LLSEC_GETPARAMS(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x48, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 91.310903] audit: type=1400 audit(1715464586.742:7): avc: denied { execmem } for pid=273 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 21:56:26 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2a000, 0xf9) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x8001, 0x0) r3 = dup(r1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x153100, 0x8) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x143042, 0x62) r5 = syz_open_dev$ptys(0xc, 0x3, 0x0) ppoll(&(0x7f0000000100)=[{r5, 0x8001}, {r2, 0x200}], 0x2, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={[0xfea]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, {0x5}}, './file0\x00'}) ioctl$EVIOCGABS20(r6, 0x80184560, &(0x7f0000000200)=""/159) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r7) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f00000002c0)={0x0, 0x81, 0x3, 0xfff, 0xff}) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0x1e, 0x100, 0x70bd2c, 0x25dfdbff, {0x3}, [@nested={0x20, 0x30, 0x0, 0x1, [@typed={0x14, 0x5, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x8, 0x4e, 0x0, 0x0, @uid=0xee00}]}, @nested={0x4, 0x67}, @typed={0x4, 0x53}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40005}, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x200000, 0x14) syz_io_uring_setup(0x195c, &(0x7f0000000440)={0x0, 0xf1c1, 0x10, 0x2, 0x1d3}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) r8 = openat2(r2, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x604040, 0x1fc, 0xd}, 0x18) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r4) sendmsg$NL80211_CMD_NEW_MPATH(r8, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, r9, 0x200, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x0, 0x4c}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x74, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcada}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x40080d0}, 0x4000) 21:56:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='ip6gretap0\x00') sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x1, 0x4, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_CMD={0x5, 0x1, 0x4}, @NFULA_CFG_MODE={0xa, 0x2, {0x8, 0x2}}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x100}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x80}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xffffffff}, @NFULA_CFG_FLAGS={0x6}]}, 0x60}}, 0x8004) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, @generic={0xb, "104b522a0623e63e3f7520e2bbaa"}, @vsock={0x28, 0x0, 0x2710, @my=0x1}, @can={0x1d, 0x0}, 0x3757, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}) r2 = geteuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)=@newpolicy={0x268, 0x13, 0x0, 0x70bd2d, 0x25dfdbfd, {{@in6=@dev={0xfe, 0x80, '\x00', 0x16}, @in6=@mcast2, 0x4e21, 0x0, 0x4e23, 0x1, 0xa, 0x80, 0x80, 0x3b, r1, r2}, {0x1, 0x5, 0x8001, 0x5, 0xfffffffffffffff7, 0x200, 0x4}, {0x6, 0x8a, 0x1000, 0x8000}, 0x4, 0x6e6bb4, 0x0, 0x1, 0x1}, [@algo_auth_trunc={0x138, 0x14, {{'blake2b-256-generic\x00'}, 0x760, 0x60, "7c33e0cb63cbeae37e807e0a89c1c6827e53dbc1f974f0a629dfbde50ba43c0eeea2c2ecbe5b46aa80d721fd6bce86ea77d9c5a6bacc86e14a2201419418e03d5badda62abd8a18ac590981dfb5b20b7c081f682922022ee669d2b8bcff20d690962a91e6905245b996a1a9ff4f1bbcec932dd695fdafc892f6871ef5e87ad0618a72512297db85a0bdb19576020ec84252e9db34833b1855dcbec5d103c0b757e6d5ad52148d785f68a48de11b57d174d6ec74164138f729b08537dece6585e21586dd598e421fcbd055d703e18b4f02113f3bd6fa66c002b7d9677b32b099da80974e67ee23166c1e43d12"}}, @replay_thresh={0x8, 0xb, 0xacc}, @lifetime_val={0x24, 0x9, {0x2, 0xffffffffffff0000, 0xffffffff, 0x4}}, @XFRMA_IF_ID={0x8}, @tmpl={0x44, 0x5, [{{@in6=@private2, 0x4d6, 0x3c}, 0xa, @in6=@empty, 0x3500, 0x0, 0x1, 0x5, 0x2, 0xffff0001, 0x3ff}]}]}, 0x268}, 0x1, 0x0, 0x0, 0xc0}, 0x48000) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000580)=0x8001, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000006b40)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000006b00)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x68, 0x18, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1000}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x1c, 0x18, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELSETELEM={0x3594, 0xe, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x3380, 0x3, 0x0, 0x1, [{0x6f4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x208, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xfb, 0x1, "33ff5664aabcee90a4d62c40418f9e5ee1c2fd517d76e646a85c9aab62d6d85a5cea5a33bf4009f8a861d4803759ab4896d687c584e9d138c800dd16990ee4cc1ad60e62a3db3d8bab1cc8a30a0e07af1322049722bac0e355db535786119d79240478cdef4a3f72aee4834352127d6633145a64f09862a258ac4d53498f5fc692fb7e31d6f8f9d5e1badbc7c8c230a0ef73f6909d83e5cc6a0461e52b1777f4f17c9b0695f10a2c1cf9e6809494fcf002fb0de63fb282eaf286c5b981d9e186e9c5dbbcd2fd916b7bef4c056d4d02a90ab5d7bcec1a184b18f20cd48767accab937bf462438bc7c1e16b28fc9fa9b46f286d794a860c1"}, @NFTA_DATA_VALUE={0x33, 0x1, "cc57adf4d6684bb2d67e2098190898016f7ec7f767590d99751cad5eab5861ad890b41dc06bf27c476b8084e38836a"}, @NFTA_DATA_VALUE={0x9e, 0x1, "13811a449641f753f4a94cf0d1069b60a73a6d85259badb4f2bdad94e6c26bbf00d3cea25ef1c985c12db699fdbc435b3cd05fff5df92367d30f91ec7ccd058e91db6d8818a4bdffb36b003c21a6e7e0f11f22ffe3aa25636942e0b589484fd070bbbb1a71641926f9fd716799472f0828567b5f8fe99acc002aa49386fe5671fe1d04a28d5f3ec443a57f0de0b8ed4494387349260d3b88caf6"}]}, @NFTA_SET_ELEM_DATA={0x40, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3c, 0x1, "df46173a78be5b116d01f149e6ba3aa1eb463c39e73a36afac21da05c63236ba7a938a915d80adac6ddc44c7469fb79e84f8ff063081039f"}]}, @NFTA_SET_ELEM_DATA={0x1b0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6c, 0x1, "9c27b15ce744a07a1a069f8f39f05dd2ddba5301dc2c20691a5e14232f55700149815c3c55660fac50146ea783b8ffd747aa7f5b3e63422b8525c879313906ac667435628c1ac1c223aa8fbd3302c7f5c502bd55f8de7f41adba4646460655be1336e66a47d8b860"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x25, 0x1, "a2910abdb9880a638989ba0f446bc678770e2a6c6d0a74b405f1fa78360720b7db"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_DATA={0x2f8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb2, 0x1, "2057738cc896d4e53f687130fe4e943fd82888dc9d9b5572cbe1dc95b2b97814fb3bccdc97b2211824a913fb2e8fe65f9dc027973787ee631f3101b5f5eb6fa24210809e08365a07a603004a6f35664d99fcb574b70f123994abac7581e9d13cf72e08d3d9a35bf4bf66cb84b48012e223cbbcc90f501fb7934fe77a49562840941f516ad3352b0a094efd46fa89a0d9f1d1c6f785b0821127dae53d469ca09ab71f8a33d3368af3fd239e501f2e"}, @NFTA_DATA_VALUE={0x96, 0x1, "5f8b9f8342ef3da4ff57be2665e42c66862107e3435ff141c2a3218e1c51e19bd1acec7069a7e275514b33d8fe8111c028645f8cb42ce1af14b4d447220ae47916ca3cbbd3735e448f81ba32ef36f7c4cbf8cafd9b216f4c599dc8648cdbaa7569f5b73eff9d7d955f53bf96885984c53204aa02c2e05084196ab8505ca5ba281afaf44d9d4a728d2c679593c611f6892351"}, @NFTA_DATA_VALUE={0xc2, 0x1, "e8f8b3656844cdd596e7b59cb560494690758b2560cfe21fbb8fc872fbe6c724f643f063bce2f3b3589120ca99356fbfbd602b155c261c814bb36f7ceaa6e6e12066d70b0a982aca817f9f5eab545f3a8adf4e8dfc780c080430b3515015422a5282e063a34dd687a7e703d29c81f4743c9ee866f5e83a696147ad32afa2c82fb419f2e006671e1a628802fe642ac99147cf93c8b0805093c772d6a951045f1fd828bfade224738f5ed6cd49b7bb250251a5be9201ab1547039f844c003e"}, @NFTA_DATA_VALUE={0x2a, 0x1, "a0f9ababcabcf24234a2422628ab80320cf1feaa40ff5998ee3f354f35adc0e3269bd67c487a"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x6f, 0x1, "ccf4052691479525b4634de9ac80ba10029354d87c7add6f57eb9e89be8a6679a94574ad319e4ea3c0c8d583bd53083a168fadeb5cdccc9009191b8a373300dc874661ab9ecf70f02ce88ab2edc318176947fdfd8bc31323bed791ab20af2b02dbc3396706a9f44e810b31"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}]}, {0x139c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0x1064, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_KEY={0x318, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xdc, 0x1, "ec2849f61397c5effd1158dbab53a78af7a553dfbf918955c9e9435d6830ef478417e440d5d53e83294c5b8ef08376f39a1405719a4fba8357755f631fdaed9f07e3f1d69602f746b09522490bcc7bc8be5f94e11fcbda46b087a7b653db6d7f9c4321934c69408eebd2c27ee00b3a021a95713e0867e91688510999bbb39572cb18dfab9b231d09163cc8ba272d2371da4900dc7c5de8103626693fc15e97fda8e55a247c04775fec6af3d61380080d8760ea88234d151067bbc5c6ff48ae5b3e4d36f58187072fdf2e10de3e2270a23766577f27c1a9c0"}, @NFTA_DATA_VALUE={0xe6, 0x1, "eb77bf3bcdd418a11f42901295edc9aa26a72d7d16c7865b2f42cd6ad450273f399dc96e620170d70ddfaac1e5247bb54191fbee8cb474444fd196798de529f79d3eab313c36602cd2aae94e6100f07a94c42c128392df7fa1caaf7818def0f89dd429eb343f1937a62a3352737caca31567f37ce440c59848ba39227b141179552ffee4d5ee52be38cc89901cc3eaa38e30824ad974ac0f627fc9730c44a531bdc6b8ae5be3efb10c0824d35b34681734811e93a4d6c86981ee60f11939aafb593e9397e89c9d4538347755b9b3f443f85fab9c0327523314c8f941d75a31498a0e"}, @NFTA_DATA_VALUE={0x12, 0x1, "4619b50a120e73e7c23c93c7a922"}, @NFTA_DATA_VALUE={0xe3, 0x1, "7575ee8ba49f15af763e3cef26b7a9c1107b1a88056a138f7e0c6a50cf4a97cf0d676ac6bbb72358d671a725496a36e60ae47b52e13137b1e88d0e9ac26bc95cd43eaec988ae42b3bb7ae923806fb3f96b3abd915b529a96da348cfa00c7312e042e7646ab1cca462c4b2bb4bb718ff4efbc98880260cad155cdc4cfbcf22dab8d7d591e7c01903c73f7d88a8745cc91fd2768b9044dd451c3957fdb1401b6cded85f3daea1248668bae4aeb938bcb2502fdc81b2558dabe1ff633a935647e84367b0f55b73b640f693bd9bfb03184833a250526c3179e27780768788ce8bc"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x1b0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x170, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xeb, 0x1, "72d343170ee0f9bfbd35b126fbad0a2d29ae1f7f6da6691416c9a19ada3a13611e6bbf159933e33b93e3863d215ab01da8091b8e686bf3d6ab3c91d9c71bcdd89deed999e00db2a65bf788dc634517fbd226ccce2cd3c5a5d2ae66b412cf09329ab078f01df1e73c275c1ebf5977261e06f7af7f118723c25286fe5017cddeff889e1725cbf96a2eecb54204e403f2f565f04e440ffe392dd9d468b6f200e21f25bcaab849502fd3227ae95300984c9e5b55c1fb7316cac6a0441579d9e2f5b01d9244df7b41dd60f3128b72a80066e923320553ff80a7d7c5f849a1c7f40ce5f68a7821fa493a"}, @NFTA_DATA_VALUE={0x2e, 0x1, "cb4497fb508f16d1b12938d45977b297c6f615d311304a5295062e25aaaafe8ce5d76b7181fdbd345fe7"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0x14, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x18, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x13, 0x1, "172a9434b87a5892465a46141dc31a"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x106c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x50, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "95a6daa2fae3665ed6d09b30daab6a2a8bc8f37fdeb074a5c9810e7c0dc472f5b3510c2976ced84303619c32ef888a3523fa5ff9947ebb4fd16b5b12eeb78ed81aa1c4bd1597bda45558d768b3fd7ba32699ef244666be444b43b8162599745a17d62ed342aa6005cb294c7dbcb35a6dd6cc931dfa261bacf2399b84a696fb7f7394d3bf29a0491f7726bed1628a5e0785b7f462aa5d070916f967d76b20126a11720da1eb291cf175ea18fd83cb2420cff82909d752fd9cb29b3e7a5f8c5e8fd26eef42d43171dbb1ddc195e7fbb14d1cc05954f47e48211ee113843e496a04bc8017723aa87c0b9d6fa1c594e7f45f8395b6507f14e34ca1f4b114176ad8137c50167927a1f2774607fd52283c9be2cbe82cd9f312b0445e5e6eb255a6a5d558777d3683c2b4679b2e715dc01dc2ab228c2575df68cebb62291e47ea38d9ba084575484d951708ee2cc01d0e62cd599ebbe6da36ee79b25573ea1c482f3e580319ab7a96ee67252e6f76bd6924191c32dccf7775099f6cebc2b4c49fb6fc941c9ddc8e9e24f16044ed892a9a774825b748ed4b71c0663f344a37ef1cb51f6436ab629f603643df74887b6494a07ff972174af85d24343de365505ae4ac5ccf1a5de2bd8be7a2263bb859bfeaec64ce6235b97c8b22cee614d3f0dd3ff4708792c2b62db6dcadcfb5b23525b6ae9c20dcad4645e121f03d767a72ff434ba2d6bfead32f130866601f5d3ea440c301b31e39e825905135272fc0608f998283af008e02e4054757f4690903d70fa7bccaf541d5c26d776351e294f42c7e5afa86b40b58278922d828bcff4f6b2e1679027464adbcc39ebc180d91d5eb30cd6b63ff795ee0bd9d4d5082f0a3c5c8b359c921f6988a2b0b9330a73cec8381dc1acd6d3e0546464d4da3ce87f4a34d29eb1f8f7b96710d5a73c3cb9f0078e2294f62c67b0603e22e65bc970cb3ebec975845fd25cfa8051f7b8f232c9fa0fe09fa97d0a1ea8ca3bd2a00672fe30c0d3f1a329cae7bdce3a693945fd63cff55e66bd86235f4e21cd441460dd3a553689efbf53e8625608bbee5c3c81c8aa145c818ae93ea4e326ffe1365278f78f5cb686b71cee9f4ab8210a519fc5dd89e309f52d4210d7cbc57022de604f055478a4ad0a06f5ae2f7634d6976d67c8e42217aac794a0cb30f6bea8300c08459881372b97d1b6a5bd83c6d6f7a1d6e1466d5072af6538addd45db51503200be4fd27cbb0364b2c5351f26ee1abaff1a2f86b6d88b2419f2c1c4cdf722f5e189aaca044883c5a93b4e5af1408afccedcedfdc26e4f46505c4e406246362ef8bbd0edaaf82ee1dac553cf25ce1ba2f8229fb1a2bf05b5fa9a065976d44a9fe99ea09c518252c739f195f96422a15c21bf482c20ad436d0783c1a01d406d882e901d7769e0b23204f8066a38313769145c2c108870232a1a0258597ce9d594c44811f41c5c18bc5dde2ac56a33bf7ca78e95da2273786cfb1a67f932436e1d1551dc28a956db509db8907df26e942baf5ce953bfad16262268799d3101d1e280ba244f0bd9b8926905195315b27fa7b33839cd4b6497968ef9a6fe1a2cd8ed75b12542ad7bb482f3bb06e2692dc44c3819b7d80aa7bb0c44e1058984a624bb5b2c8b2a028377df316619a93b03155c3534519079bca3c48b2ba3d07873dc4af1c59fdf55528585812c28782c33d71f3c577eedc451382687b8d13d93fac64aad248f1ae73f51152f833cc712a9debe6eb1d6ce5dfe6936b79e55face3e6f99db6be41acae2a63b267ea4a757597d2778362e300c600d29e27536394083fab824430af5861cdff5770492ba4125dc086ebe47f283b5c912db06a866980a3a227ae84f79cbc59d3344b8e892626b996b80e5572a8f56dcfeafebda6db216cf6155f48363337f010e987861257b8d4e53ab3ace70c096c2e7375c2c09344c14e89f3294f043f2818625c9b1c7f87bbcaecaff943f47cabdc56abf807715379e13519c826c8504aeb0ba74673a601c038c743f4ea2d4ca18289a726cc8416b0f1d91cdc598cc118e6a7a48bf6aa77015a33c3832f04204b7be235e61f3d97c65d7cd7c39eba8c7b5faebbcd8081bbeb5b554dcbb45f362636b07e147fabe45afc048098beb16d1c40261f5e9573b593b2e66c959a6790a28f69764bf16ed8d7875e35913c9383b41e7ff46345bf76c26f2eab3f4ada49bd2ca9f8d6e099e8bb5c5a71f4aa984e68d031461001c9949665bd1b30470170f32a4c71658f5d2dfe3b80b9e6cb10b3188e1f6b646129ef97fd3bd72050be366991b10f0d1ee1f5122029bbd2eeadce95310b56211963ce3b8bc67350cb763cc6f7c908dc2e40b6688d20097184d86131b4b8e0b2d72d5a9633d603af042099b3ad1192401984c31fe9446987e5a8c8d6c812da3d5728ab112c255db9b00fd53a81d641136d987806d8b64518ad06bf687ab692a30cb219dc8ade17554449353d40aebf1465cae406a10e1e006cdc96b41a4d1219a830dd391d5049999f597baa64f3e15d661cb17942ce40698bef90e8faa12bfecdb4ac49ca4dd5236e82a7051d9a0c083d856bda6d42769deebecf5a0f25dcc4470b37d4a14777ded9897ee2d34917a5bde4af8d331c7c5ddcf62bd4a59137bbda05f5ff76bee29de6921185b7b572cef869699b1a416b8679b28b36c102fa3bb1313fb5990b0e3bfb29095fc2e175dd8b99077163394b6aed87d010fa4257910255fa4d219c757c1a7945311cb276868ef89a51ab921e3ae33c11aa9c3598a598d258a95a9cf15194ef14f64a3dd59bd09be9fa9a204eacbef037ed9cdd715d93f45443f288b0890c2ab19cbf26af9a14602bfb12a4a73d1d94942148e7f432ba678b1dcee403082db97e183ec173df9dbfe1ce133a2ca32560726251087ed708dd1e0bac06526f6eab3b0bcb30874b3b657b09c6a21173ddfafe06b4d9678d89f971c630ba0e2afc25e4060b8e395c702b6534d822df358f47a6bf08f3a7ac19727862749fb216c56c98bb3d1cdc2829b3dc7d5dab501f3169463004ac19b88d6e2cd9c9c681b661c26fb8dfb9d8dbd49aed9b100affb9d44a92d99108f277a61f306c2e7f6a936c5d7afa5d6ba7e7ef305336cddb82418dce92d4508717d7b07d8f978d83b36ff819a6a35bac42b6868de478d3156fdffe62854502a05eeefe9fd775c10e711a23fab62fb6a5ba9f9e495de263fcfa34616d5b6655a0d886c86ff65fd11653ac5eb7484132da270db67e877461376ce8b1f68f462b19ffca0749d00df471f3dcb2fb9af338921ceb7081e4f7c2f21eff752e14b6c25dd494fd554206e8ddf755bd13373eb473edcd586dff12d54eba7a0693d9fe531ea7e18c4d65838422bc7f8f0bf10ab2e9500ec8caebbb31b4093e065554935c681baaddd6fca7ca32cfbea1d86f64ca11b4563ef949991b3f636f74311d7eddbb7e1fe60b6e8fe387e9d943522c6623a8aeaf5b56ad6389aadc46899832208b942682ece52fcaf4af7868d39f534989c3560f401a19aad8f90a2c22845068a555e7f4e8c5437e84e2506a0908c24827787ee98805103aaf0d795ea1f30ab0710e36bcf498977e7ed87914ada79e7819cb27667f62c0a1f2f05037e87061e577cb80c0e00f27e111528901d8c5ecd98300b4cf66f1446a2d421eb1cce9e837d1a9f0afe0c5c4d77f727c2b2927cbd4dc71f8e9f4295054aa8f1b15ea51347f25a9a6a834e38acef7d857e83385ac17c0c7fd44a06d1c78bdb0c5e2df016d431330c158ece7d698c1832477ea426120c4e4b4560f59dfc24adca6acb9a0df243d329f3e50afc0795429695f945938280c1718ee4a4c3f47b1c3bd7821e9123559cb54c721d4b922033bc1a2b322536f3d68bc5035c9628d7645cfaad21acf58f6a27be37e6cf3e2705aaf6bee913c2f227e30bb8fd5615388849b25b49be2545119ef2509b8723fba19a0e6bc1cee671c19f526ec48ce6459001907e2407cefff30a2d7e40ffa4d24a56049508f14bc91ba82074dc488faf6813188645e0aef7ae2eeb36f3d6605799f5c41ac83199fdc8b498ff93ea727d379a6de99858e2074b5f8c158ea89226afe3c79cc3293665a4db75d26bb58ec0563c108dec3cbd730bf91058e717b10eab18d78dd79f5a6d62f1c32d9d0de988bdf8299a6fef8247e9878b1ac5160c8a0423163bff1de94972bfff7ab50c295c80ea470f36d578c47b4f8a43cafcfc36a6e424c8312f4c41ea9d91d910d8fead70d7ac7f808b5b0d858129a2632712dbf45047082427e9a6aaaf9baddc7060e22d3c9249d0b1019eba09d17c7fe6445db725ede77e10106fcffc84b7bb61cfcea9760297eee3c79fc439ce20b1c13c314d269eda6368a05b25540e3f2fdb9d3462fd182cda0f7ba1278ae6acd90420cdd47ec3b9126a63267f8cb76b980781513f2fdfe34b7348aae13483e2790bc25004d8e548538fda7eb9b1c7723198b7b13ba3525ea2d170a32db0d976c4d9c6a3e8f6599cecb9d4fd7e58ff7f6d2dca95308635a62c6b1c750c6defdf79da75d0a070aacc171d3d59576816cdbfda60a57bb571bb5f371043d3ed334da361eb96d20f7d8f59f85175345f9991258288d743050214ef15607f4e002c60467a6506efb8564095a2879958caf22f306f5bb0966f2bd116166bccd09e849699d415a388c335d7dd5341d30038ee8630645160898ea7fc88a165ad151c6ea1f35d92038ac39134bd25e7ae2b894d2ab6da98909e37c3c07768f80a72e39bf50e5e0292df69bc01409d0193843343e3f2ee4cb91786ca1d6737bf74c571dd52f2bbf322eb3d8ba1a221f50a4a4393586f6f416251a5471940127fdd88d7301861d67b020740386b4feeaa8c4b4e25b5bf44893eb7017c9f7d9ba1731c698fe355cd85548af490fdd7b668d529955d73b9ec57bd7b1e5a3314f91478a8e37da56652010099435234d485acb52f49bf9ef3322241d2e29d59bc176b6d7e54a870a8e69123e02a82e9b43972c371112db97e2003130f1952b63027ea6120d3e5b7453ce95fd3acab2aeeff6fee7cc0194992b320969dcfc26cbd4617cd129a7ca9833cab0844ae56e92bc4e3504ab6e57f7ae20b02db273321b018337d2f452bb041c9b69cf0d54ff7e8511fa2ba1e8168756f402fcf61a38cc2423bbbad65afb3ca473bf3def57e482d87977f614a2998c4b27aac98edd57a8579c1b934086445299ba09e98f07fba81e07da52197165ff3ff0addff2f6d127acb9fc21731eafec9e0125dbd7aba8f09e0b2110fd3d517eae72eb4846ae7ec6110514a09bd87d67f8c4c6c966056bdb2ef77ce3a7055bf3e2e033cb3fb91f5165538ca7608b07478c9d61b382c8f7a038114e9c66dc415ae637bc1aa15c0af54c0ae7f2160e09793e400a393b9d569c36d7141c947a1a581a5e265155567fa61ff4333dbb00dbcbb7e49f2960b4f2c551ecb4c1cac3ba23c0c03fe0d56c335fe8c44315067173bf9dfe8eabb2167d8c437b18c4811746c1f9d8a5d0c1cb6661e542de0414ea52b4c8b12c8e3054980d014154be49bebe0182ba7b58286e1f6e98324bc8bcfec1ce656b5f5603a2292a07d17fd3281232b2fb23c3ed66cb0f72379faf088cd8c14adf681ea47ab20adaf8c6f13f55b15eded06a929e4878821c6b9557792ed36c7d3ee0a19f2000c8a1e662aab8dad15e745c0eeae11dd79a6d032bcf0a57a88b795a9201a7cfc66d1e3b0d184189bbe7fc902089d2cb4bc0d05a5043153465129e333c806c64b13a855bda5d81"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x3b4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x160, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xbe, 0x1, "8679a4c800eb4628d8b4f00feedb01ce533650b43c08c4990c52cd488cd3fe4188040776f714fb5428e10856bfcf2f8040dd79800ae98d2603dd8b99908fd6e09a747a5557e429aa05a8847de6d21a098b56206c6e7d137e661456f2cc323fc63d9600dcbccd37f63714f670ef159912ca35bd2bad3fa37326e3174e4e65f2d0426549948332ca50f0a35f173fe26514beb37e2ffeb380c79a50ee035290a881f52cfb5a96e28b6c1bc75fb8a5e8aa307d78a9203e01f6ea3f1f"}, @NFTA_DATA_VALUE={0x7d, 0x1, "e9197fb874dd7ee87bbca8cb6a0872f39ea0ee1ad7382e8b6039a886fdb5fb607e733b5edb7c60415286e4c0101e84c61ae2784c8a707bf959c656416c06837dc18abbfd9daa6209a7b062b360adf5a773a6ca091b8d93a6b3e0fc7dac508f84964ad788c58aa42a764dacb48049eea09e92f95481df071163"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_USERDATA={0x100, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_KEY_END={0xe4, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xc1, 0x1, "4b300f68c4ebb14d9b193ae7edfd9b540b1f710293629efd0129a2c8ccea34ec06031607359ffdd3d02816fe1d13000c3b87bfc13efae375fced89c32ffd84d0d7dedd4b1ea2fd942567f1f15861c4d8e35c614d85dabd1709e48fd14fef9531fc0114c020840ec396c38e8d0ee92374d6af2054466a999d6ba025d87999619112d42bc1690999114970d45b268a7f9f11567377a90b4ce23b1d6f03c25fa41f6875edb16a1949d0d1bbd4136c9ca85531755afe94c5b854f3655cfb9d"}]}, @NFTA_SET_ELEM_USERDATA={0x46, 0x6, 0x1, 0x0, "9896a0ce0bb5f6ae394af25f7449fcfe74c7d035ca24a2c5aad7ba1655ee47a1862d46b105eada5291c4690cf324fd5cc508e40d6fe4fea8193766da95199db3a6e9"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x30c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x7e, 0x6, 0x1, 0x0, "b9995d6b081b98a35220ecf1568c2439bbffeb7f280aeb43b048a834e5b81cfcfb23c4f65e347b09fb1d533c6212f716f5fe2bb513c7965dda91584401418e2ff5bc039b094051a6907816f3babc69a624e713b9c35f3e8abe64701f02b01a06481db2db3007c261a549cc0b2b176c269b8038f269015e0c68e8"}, @NFTA_SET_ELEM_KEY_END={0x280, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x6}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xac, 0x1, "29a4c75eb16397ebaebd198db3ba29d3d7ee00a27352083f9e892782a1a8c41447074a779c36b0695fb18a76c6d276fb3277359a02b621b6d3d501b842b4ba700183f8d8bd84bdb4e9c32ca4c54667bd472e55ad641716bb48e2925208d64b81dbad4de8fdc1e98b605ce6cde5ce5e36d95b2e7f540d5f128819461043ae62753b1088932160dae0af78512c017d4bd82dad4f21b291c2575a019d32e21a737bad02fabdd270dbc4"}, @NFTA_DATA_VALUE={0x40, 0x1, "a8d1657c5b8a6fdb44430028d81d908691a3cd9de20af5b7453e7dcc17d1f25065c9ace019236c3c731359c554df44b40f1089b131c3319a6791dc1f"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xfc, 0x1, "36fdb77c8877f757768f24bc22886f5ae357b51560bc9d38c0d29aca7622b4a5f0d3c26fb540f1a68ba42490644f6a76cfc4f7aa69a94b75584d0781bb29b093616feae82d681ee96c03535fb74175294358f3b09d13a01659db22bf45516841f33cc9cc064f11c208156eaa12b97104df99daa6469484452070e54ae8ba02657f3f90e618ddda658d9c6c2a20c3631d36d6353b5f6d038f1ef78e70c6440df1752f258551064b3577866bfe093a5f5d53278ca4e4e030afda20eab570f49193ae2ecde1be0eae21a85361f876af6206a685d42d2503446d9a6a56817b4b9f7f41f562bcc69591b5736980e07728fcc2a1a8c5be26e76a10"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}]}]}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x20}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1f8, 0x3, 0x0, 0x1, [{0x1f4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x68, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_KEY={0x88, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_USERDATA={0x73, 0x6, 0x1, 0x0, "8ebf75916c8c123fe17e1e1e8142128990052d35aeeefe45cc252dce38929b297c8058b1ab3bd2eb6a010299a3c70fcfb62bf3dece36a81743d1b4e375d9791e14b2b5c89dc48e7c4fc9872bc071793bfe982135b873e050817a2e1c6d9b4d4e80017cc496dd1de94e5a03aed39ccc"}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0x78, 0x6, 0x1, 0x0, "e85e8aef3e3ebdf4f33ee5aa0a26e9c3e43e481614aed4b64c309e8b1d04696ae82c980e19bdbfcab72313c7afa0256b38651d169f1094ab716f3ddff72ff737f92660097ba7d096643b8934b785e385684ec5fd25119383e9d0eb6c4064367cb695836b1efc57bddeb61cf9cf7b0c5f73544abc"}]}]}]}, @NFT_MSG_DELSETELEM={0x2e18, 0xe, 0xa, 0x401, 0x0, 0x0, {0x5}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2ddc, 0x3, 0x0, 0x1, [{0x298, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY_END={0x288, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xbb, 0x1, "947551db48de6b6ddc73e033f9f218d3caf93e28b7706a99871485755e054d6f59aa95de6fcca59ded7493bd4cf2c07732a2a75f344a855b9f1b42ec7682de9dc96a0bd40fdfb90978204a95a0c276b866de12cc649d64a18efd566206238564aed16ff0200d8d5d97b002aad3e0f7842b21b66428ced6a2543bbf1d47186ee3c9640f132f1d33fd161caddff3236df45dc5509923c13e2e6251b98e6b0e798aa4733edab5719a8f1e68d739d16cbc8f8dd6136477ca43"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x6, 0x1, "ed87"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x61, 0x1, "a1b4e6b4855295c8bc48d90ab8f7fddb2c04c06e1ae08b6b1ca6af91f31ab46b152816d3805e83fccf062764005e0fd7c5cd6f46202f7785a8e64c4146b825fc58e992ba13cb391831690038406d1d4db190953e7e12ab331bb943d809"}, @NFTA_DATA_VALUE={0xa2, 0x1, "ccb3258d39792a8b0b54fcb79488d2bf65697bd54d4ca0ca888a92f29cff548495a765cb9edf20d30bae16f91d7f46ceffdeba18fd9b77104f3ab5fc67733f71b302f92b81246568b9cc7da2d2b2d6e3039e828ea6e76b750a4c762c0fb915285899b7c6551ffac7024700184ba02c6e1581f0985d1046be874b52d3fcf3d75f2d0ef69e1710c4cb38ea2f51250d74b28ea007ed9ba1b85a6057d6aec063"}]}]}, {0x68, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x47, 0x6, 0x1, 0x0, "a13ad6cd4a4c1d3de60b1a9790b87625d371bb5ffdb386edab84a9445d20fb8da1c8f08a861c21f0b82e92ae76f40a9e4b836a8219620798611a2c081b97c7a157403f"}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0xc4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xac, 0x6, 0x1, 0x0, "694b9899b193689633a6a05ceda7f703b0c9995f2ce62e5c1c9c9d038a2f2faef250f03fab2d16ca5f3af16cd218dd4d359bd28e68184d2101ab802c8c9e9ec0ff1bd9535c9b0baaeba74fbf2e0f65ba4ce2404e484f165be99f778327013cb8bb6bff043587262079aa1fb2d6bc7a0924f73fcc2ce38e0557145b337e878195f8a6dc9b59abab517b90c9fe4a979b32f4e8d7bdeb84657567e2ab3075a966d1c758f53b492cd068"}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}]}, {0x2a14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x264, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x99, 0x1, "30f57812fcf1160e6ec1829c20d514a366d0ce4bf6a88958350679c7cfd3724fde50f20f5184293f17efd6af683ca36098ae2b915e5cf9dfa7609db80418053397910da43dd6bd6463bfce5fa5bac517c84c0a70d60bf124dd6a5010cb957b5c0584d46dd241e54f6ae07f46dc4fc6e05d8bc61915fe52076dee7888dacad457f21a7431f5c89356ce770b17555e00abe6feb27259"}, @NFTA_DATA_VALUE={0x82, 0x1, "2e4b8df17e07a8fe344de9fb3e7a9ec07b63f7cbc86199caa0f55394cdfdd6047beb9f0b3e2acbb688a16fcc908bf1a737d5b44490b0db8de457236cb3bdad84e2fe999a07f76837d3bbb53dc5fa77bbf57c24bbcd660533ee656ef1d5c7407217234e3994e97cb58656aa60e172400c3c39e4c54cda8e16749f9dba0799"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x34, 0x1, "ee9f57f9e7b9b1a9c4688477046f61fde0c666118e1ddc449a9225d8b852ef7ea24b1ab6734a50371c68128082207778"}, @NFTA_DATA_VALUE={0xa7, 0x1, "2269738757840aadfe728d7f0dcf1d349ab96f426b067d83d10b7e74d3ae7c06c543151d66a7e0e55af2a8228c8dec02990d16b5587af738a4f4fdc1aa02d805cff548d64a29843e5c5bf2abcbeae94c7d9dff56281a1643a265338384cd98ced57d7ab546a7f6b751a8191563210a83b584fed2e8a04ddab55c35da8956b7283e03cfbd2e4d77832d9535cdfbdf40f4bf3f1ab32ddd23eb6b258b8d95bffa6f37923f"}]}, @NFTA_SET_ELEM_DATA={0x1218, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x2a, 0x1, "ca5255f45ef25a9c1e226abad0d4a1d5b6e8ba45e6b4fddbec8ba2f317127ecdc1cc564ba9f2"}, @NFTA_DATA_VALUE={0xf2, 0x1, "1d5c1efb1bb470b0a3ba8e7d5e6c9edb4ecbc47642640d0157dcebdb24f1939114d24093c96f3b66458a2a941ca3f68c1b7f3e505fdb4cabc2a98dd04bd98070c16bcfffde6fb8c3f8863142b6e5c0746c1722ff3fdb62be22bc7e035fe5fd602640b499322ad956727a7527d99cf26a0bc60db472ae10c01a26409a3a50d3d8b7f8309f57bb8d63ec6a36a760f2936845900f4be6aecd2785e8a4bf30d08126ff0b30d852004b49dbcc49f3b7a339b6071cd93bc911666a6151f2ad7bc2101f143c76f9138ddeba7e9552ed5886e236eeed265f5ff0c3cc603d30c93c2618d1905c117aaf6cc22284e9e401d3f3"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xbe, 0x1, "28ea65f80d3e8fe4f1b33705ef6837d2a2fd54a61112117f94d254636a34083819f328fb2bc20198afbe22f0952ef80cac20006f82d1d23bb7c3f8499b9c0c27b746854b846298988e1db98eb97f1be72f5267bdcb363adc22f03ed4d9904ad5d6aabf066dc69e6a8f26c2e1c7d9b13041d723cbd5546474bcd5193d27610aaa9c026d56b7e2503b7cd1fae2326bd4771ef82f5ff9af0dda99bd304e2b92b53bc7c5da5f0298760d4811277a8866183b4dea8cf77ab93d405625"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_USERDATA={0x40, 0x6, 0x1, 0x0, "3b43e376cbc2c5a492dc09ea810c1a13a5f26d7d830c23556e84d59c5341128b20f718ad8d2b6786c55ec61a83e427418fc715ea37099836540f8c43"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1010, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x7, 0x1, "2042ec"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x3f0, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x3c, 0x1, "881c3f963b7b7eaa12e6748b138d18eb00074103444fe6e81322e641452cc16fcc07690f90649e0a979256ad3dc97259b665996946429b3a"}, @NFTA_DATA_VALUE={0xf8, 0x1, "22e87829840cfa707044ea032d8123c3149cb5302906b5cf740169303d904d9d4a176b28c5ab3c2a3e9af1aac766e27c4ea9980c8ca906f8da9ecda02fd902bb8790ab111ed7dd3976ce35e7fe6ff5dbf3cc878ea411ff962a6d6ec77b6425fbf85f998f75da7e2a9025f471d8454709b640a79635937a24d317180098c904ed3e072125b53ffd48f17e14dd9eca1d6d09347add7f5e7c0fa7e78ff8b1d689bf46b4c7085a637d647bc625b1ca5449a829ab880783227d80d1f2591588b0ed4545e2aa4fcd79ee1e30c3208304ddb8241e59499bf3d7027b2377dd35a025e6334327cee96f4ebed8c128b6f601230fa4d3c20695"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x54, 0x1, "0839b35d87c9ebf44d41c624385da9ecc4308d0c9c7adaed9553f4203591e9d60ab328cdb29d6f41d8136141c4853459a7b74364817817d84a51c72c2b651a10fe1967e5f45659e32100910db6901e04"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4d, 0x1, "f525f6576e97e2d5a064aca5b26bccc420c797d60ad5e54aa92c9ed9ca4fa3b4def2bba3e1738cf1a41cdb4775e355001fa0ae831cc6073fe0dfbcd89d3121b947161492834084bdc6"}, @NFTA_DATA_VALUE={0xef, 0x1, "b8887bb8afc8b8b234c0b0ebc10ed5484029eae104d0d5b127a07a58d0820be1e2dcd624661ba338eb21f7baf6a5915cc01d5ae354a7aec10b5af8760dcdbd123273a6a7f1d9d459e0e38f9137497edf1ef795f35e5cd22ac343f53b43716e577ef6303f87ff9937bc70d248f2639b1df09b1698c6e40dd1b20970388729db06791e2e4702510797a02dce4b4e8f6704300cc281a8cc3cbc4c5081c8cbdfa65160508ee5679b2873b9ddec20fc5031e768df4bd8f5cd7f0613b51dca124f32ad19167cb39a696e2e0c430f2c2709d867c424b9570cb088ff766f9e9e761f12585af58589f0365c986009bd"}, @NFTA_DATA_VALUE={0x97, 0x1, "0741c663c31a0ef9bdf4bc5aa3bb9e2aedc1f494f1ff4f2ca4557282183e52326c50831312461d2efbe562b615587e72ecb2f165274d55821af990e1816f5126c58626f2e00ac269af417bbed35db57a1967f5d62ba92ae582372e1733b3f1555a4190164098ad1b089986925b5823b3e0fd2bd70c632fb8df9d94b454f8f1d6924acb337183ae6443b87af2384880efb6b027"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY_END={0x134, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xa3, 0x1, "f2c9715ade3768316002f7dcd1d4f92dc9059350e418632bd3d5ef9050fb25eee40372f904278de9f790c65a99bf2d05b90c5d65a856d3d9b43ffa9ff54106c5d66f70c7740a43b8e849a2486b1a19eff416fc912ef97917b066f05f5379e2a91e6b7ad012f158cff3cc6dccf45b9568a3994d9dc202fbadbe8bcf33376e17c035dbceadb7b1e7d6aa6fcf5cfdae208394089e4a9a04cebacc7b17afb9b07f"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}]}]}]}, @NFT_MSG_NEWTABLE={0x40, 0x0, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x64d4}, 0x1, 0x0, 0x0, 0x80}, 0x8004) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000006cc0)={&(0x7f0000006b80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000006c80)={&(0x7f0000006bc0)={0x94, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000009240)=[{{&(0x7f0000006d00)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000006e80)=[{&(0x7f0000006d80)="a05a4eff630f0d464539f7a48a9d613bda90611f98097500cd585698e44b68cb47025094cf31e2722e9bd5f8a3620c31c9e1202a142bc4bcc7db2939d9df01130bd80ae1176b", 0x46}, {&(0x7f0000006e00)="0c0307f4cb13c52e06a8af96557902747c5a5c10f8ad45d25b9903a2cb28f51eec0908444908c455e9f6082d5fbebdd86bfef386da2170e8d6e8eebe4f566d5b41f8c476246e4bdcf3e20efb2fb37b62135cb029fa437b2d566200dd88fde19b0ac9dec5f58124155f1663793b", 0x6d}], 0x2, &(0x7f0000006ec0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}], 0x60}}, {{&(0x7f0000006f40)=@qipcrtr={0x2a, 0x4, 0x4000}, 0x80, &(0x7f0000007100)=[{&(0x7f0000006fc0)="e689942b5a9486cbc4bba60b8c2733b635ae84e1165154b935726173ac8d7c5f359135bff4cf8fbda02e03c0a8985c066139f9678df6b0e6fb59fb869584c44b39fcf6ba4cc185324e10be484f8463450c2523284600ba5ed6f6443bb1e2a8a1b0e91a52d778c03c5eca879608b1568bfef017db4e334f790faab29b13a59464dfad3c0aa1e58b5fb37463f9a1018b5d0a6e6ce17146cbf6f17187909ef2c5f828eedd40a118d364bd902ace6af6", 0xae}, {&(0x7f0000007080)="58ba489e68552ad446f61a1e4b9a9cedcbf8f76830187472f39c0f3dfb266ac6e39271f2d0b59e045c4a752f6c33b1ec2c742a5b42d36151e9c6389698f32513ea32efbde91be3295be2755377d898080ddb91160d1a7ed24cac81cb9875c2d50fd2976c005d49", 0x67}], 0x2, &(0x7f0000007140)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}], 0x48}}, {{0x0, 0x0, &(0x7f00000072c0)=[{&(0x7f00000071c0)="1f6d8d8461953478b13fdc63b152eac176da190cd3221b81685332a6cbbb0de0172a1823c117ce4e082af343cda52002870c3cb599346e76126c1ca362d232db68709f01fc489f4e52b0dafe5327e894798870b4344ffc4f8024c6ff45457fa1b3e3b64b59ae626d488dae9e3d9dc4e47467ccea14ea9cd0bca618530308045de0ae8ef76a09cf7d020a7e49702535a5d5622edc3ac22ee47aa1449c624e716ba494cecf0394bd82cd8103ca865d99e7efa2a80da1947df4c11ca7f55ad4e9181b3f604570a05a0681ca0d01a881452a455cdbeed206e49f54cb7a17080a44926f2ddb8376a6c446c6cc24d5ec5a954e9b6813", 0xf3}], 0x1, &(0x7f0000007300)=[@timestamping={{0x14, 0x1, 0x25, 0x82}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x92f1}}], 0xd8}}, {{&(0x7f0000007400)=@l2tp6={0xa, 0x0, 0xb2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1000, 0x2}, 0x80, &(0x7f0000008940)=[{&(0x7f0000007480)="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", 0x1000}, {&(0x7f0000008480)="a7aa885194062b2876a792c4269aaab213a68906e433a3aaa776d04b5fc39d695bb3c093a088e69a703803429d1bf4204272dab64935afbb247f7207e39e33546a6d5bcf8fed5e66b662b6cf4ddec306bcfaf3e04f7cf68101df7dda4ca233b2c426b285f013b78a83bc3de19949959fcbe600cd5effce5c543229a85e1a16bfb7ae5a7250f70a96d649ddc467e8f47d951913f2c625939ec432afc5d0ee6f4240b6726414ad690f7419d37eb4b5c9df5dc729ab846d7ead8f1b8c6c6df915f203e7f744dc1df8bf124ce0ef28f4db4e", 0xd0}, {&(0x7f0000008580)="5b6a0c669e6087bbd7d5a29f42a5a60c64fd81298a15df1ae3955e262dbacb7ad4a89717d5d95faec8ffef5eaee04e3b54cec1b61f09d3645e7030199c66f4cbabce1ea76fd85364e2953355be4addd30144a4bd83944b7182f108df36544b89a5cb6aca373b77880b68f522c38b21dbb61e30a4dec4f7efc190968461c274f3742e28be", 0x84}, {&(0x7f0000008640)="7408ff6c3eb89202630f928c4e465c38b50c3997fec7861508c4f281", 0x1c}, {&(0x7f0000008680)="f949fe81603b3491228e093ec371ff88fc3d7f793240b50acec716414dc827f326a9dba8a52eca87e3a3a087f213724e0cc0a827ea3b8ca27e0c04f0ba97d64ef016829ee49b6c04344080d9a9d33a63134d5f9514ea7eb6", 0x58}, {&(0x7f0000008700)="28b366bf51cca7f5f1297d8aa18e1a1b84467be2b64c44f63543a41df2e4a16b6e3d4fe703aca307a2b399bb22f43d24a6efd2e780dab1a5fbf1a886529581439c0a3e7555e7a67f956f830746430c9862662dee57623c362ab05d35398be2ac5d0e8b4149da8d1afd3d0b6064bd53a7668da4274924f56f14f2200f1839cef219e3be462e91fd128159672c0c4ac5877b5951340a29e09ba2aa1e525e1b0848423636f5bc2c8415cfd701597b47a8a94dd81b29335b3ce71a76807da76cd8d83fee7f967ffa03201dac87aa23669d56049fb37f89aaf6f6b96babebc57bc3f21d7e741452cbe60d4b", 0xe9}, {&(0x7f0000008800)="b35403fc17a7451a938cd2b0cc3384675305019e80a806286d8cbcab7aabd4a22d11e21ee033493c092e900edee5a713a3b480e04017e54015651214e5a486e5d36449b619d74cc401d62a57bd6b93f6824c9fc192259c62030d461f9f11e4ac6d49d95e6094c951c136d7cf7470bdedf5ca9f76a4c8058d75123911d9c9f303db46f0e02e8798a12064bd2278246ac62cdf91fb3f7e637e87f7ecf45e72a0005e538d9db4d003c81a92ef6d439af6ce21d7f694a522c929876f0b76cef8696930311c4dec00b9cb412eaf751daf0d56a404ec7414180f56a0bb67a5dc3c390c9e8222f708e3cc438d6ebb94b7a20d491f17dacc7fc2024a9bfeb2f663f823", 0xff}, {&(0x7f0000008900)="8a567e6bc4d04d07d71fa449222314bb18f57ecfa29d14dc8a541107681589e10f4062f2a88e24aa", 0x28}], 0x8, &(0x7f00000089c0)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x30}}, {{&(0x7f0000008a00)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}, 0x80, &(0x7f0000008dc0)=[{&(0x7f0000008a80)="59c83b58d8972ac2cc796b655f0075506cdb348a8f9b1c", 0x17}, {&(0x7f0000008ac0)="11c6", 0x2}, {&(0x7f0000008b00)="682cc8f8f2fa5e7b0fe623bd20abbbdaba096e557ee6e5e87db15e1d7e", 0x1d}, {&(0x7f0000008b40)="c36c60d612df8dba6a0338eb1266e458389de7e607f9f296df962aa7f24559afc11284ddc6a13d122d6f59fbd310208bc4a535272c2da3f513de7a5b774103a5cf48adb329107113f7ac5302b8", 0x4d}, {&(0x7f0000008bc0)="962a7c98fc4b51456d753cdbc62afad58b813ced1fcf1a94e49e5526d0f70c737c9a55a0824b8259f670cd8cb56181fdd11ca7f6a6a29d6abd6465ce99f8d5f951c3a4ca92850f8261b94e2fe288278828ca2ae1656484440f4b2cc31f28e3e859a9c4a460f775a9ba3a72854769dcff33e259949c20e47d66dd", 0x7a}, {&(0x7f0000008c40)="cb412687c725fcbfbf2b9c2c614c21718ecc8d31fce686082cbcacfe5a14355b035d49ad770aaea0059e13fcf0273ba261c021eccfee13dc63ba4a3133ca3669427073771a29cc690862d95a2c955d877469f19f583cf8cbb3663c703ef7be70440790879187f49bb49707b1a4142200618633c5d67eff1a3009e9e5f30c01f418616763f2c1d11eef3d50a5f2ecd26537c650678a89ef38fcaaa5d30a290ddf8e458dc4f9c4d7e4edf0f18a784478f0fa7f7b7ef3", 0xb5}, {&(0x7f0000008d00)="eb7bb476445dcd4680a3", 0xa}, {&(0x7f0000008d40)="3a5704fc46a25732787ddeef999160f7a0e1039e2492a559c231fb26169644bc82ccefaf839b1edbcaefc56ac4e29a4f0cbcc89ee59e3411b9dd4917b6e3d75387a2b7bf35a095", 0x47}], 0x8, &(0x7f0000008e40)=[@timestamping={{0x14, 0x1, 0x25, 0x1396}}], 0x18}}, {{0x0, 0x0, &(0x7f0000008f80)=[{&(0x7f0000008e80)="3fc9ffb3769966dba1e8e69db0d421c6bd9098660f53e62c175ecefce56803c27bc5d6ae962f26ce0e4404c79bb26ba37ae504f788cc405682a4003324a5d497fbbc88eaba5d7a8cc68866d0a26f724fbe138b6170bc4f8a79eff92fa7eed56234cdbc3b403c342bfde60018869a44118a70916625d3c4c8d3b1aba9a853ddddff384a8fffed4e7190e82b928a3cfdb11b53383e06a048d68b7921001e61e374188810864321b41a957bade08e92f09fd50f492672f759fa636875103d4faa3431bd376a", 0xc4}], 0x1, &(0x7f0000008fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x1f}}], 0x18}}, {{&(0x7f0000009000)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x1f, 0x5, "7f4a2d44542af304fb2af448594b31e256a66bb37458aac7fa9ca6c7f188db41c34841066c2aadfb00e5e6e67480bfb9178b8d0fd378b720da890ae4a1d6e2", 0x3c}, 0x80, &(0x7f0000009200)=[{&(0x7f0000009080)="5845262a7f50f23c1641d09d5f86f2f5088988151bb7440195f34512cefd84a8aac170d40fe8c7fe2a7e8e0d2b97161004958edd28102a470760a04a49b9657b7bcde004dd40fd9031dc1384", 0x4c}, {&(0x7f0000009100)="3b6574a23b2e582a473c444e6802c833bc22605ac8c597273d713f1129b1c2750574790f434b1aa0b335c58496c6829ff194ee71b08a64b82a1952a6c6b5303b7c9a688387d1ba45cbc899d7fbb79b31ef1317a084bf9bdb588e8f8dfbcee17fecf295664e5c34e53efa7983ff6e206cd0e4efe27ac1d03ad74e2a8bf781257d7908e4e1ebac298237a909d707fd03892b97ccde87cc98c39037f08a084988c6f0ab51ab561b0fc6d4542bf471adc8d9b8d3219b85ad35002b722a64c8178ad382d1ab2545dc5b2920a1ec8ade49cc4a31bf073cffae8292e5e97b91f5e6f0c3413943288028f514", 0xe8}], 0x2}}], 0x7, 0x4000) r3 = getuid() recvmmsg$unix(0xffffffffffffffff, &(0x7f0000009b00)=[{{&(0x7f0000009440), 0x6e, &(0x7f0000009a00)=[{&(0x7f00000094c0)=""/252, 0xfc}, {&(0x7f00000095c0)=""/147, 0x93}, {&(0x7f0000009680)=""/181, 0xb5}, {&(0x7f0000009740)=""/131, 0x83}, {&(0x7f0000009800)=""/44, 0x2c}, {&(0x7f0000009840)=""/244, 0xf4}, {&(0x7f0000009940)=""/56, 0x38}, {&(0x7f0000009980)=""/77, 0x4d}], 0x8, &(0x7f0000009a80)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0x1, 0x40000100, &(0x7f0000009b40)) keyctl$chown(0x4, 0x0, r3, r4) r5 = request_key(&(0x7f0000009b80)='id_resolver\x00', &(0x7f0000009bc0)={'syz', 0x3}, &(0x7f0000009c00)='ip6_vti0\x00', 0x0) r6 = add_key$keyring(&(0x7f0000009c40), &(0x7f0000009c80)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r6, 0xfffffffffffffffc, 0x1) r7 = add_key$keyring(&(0x7f0000009d40), &(0x7f0000009d80)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000009cc0), &(0x7f0000009d00)={'syz', 0x1}, 0x0, 0x0, r7) add_key$keyring(&(0x7f0000009dc0), &(0x7f0000009e00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000009e40)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd, 0x2, 0x0, 0x800, 0x2, 0x1}, 0x9) [ 94.591991] Bluetooth: hci3: command 0x0409 tx timeout [ 94.592003] Bluetooth: hci1: command 0x0409 tx timeout [ 94.594086] Bluetooth: hci0: command 0x0409 tx timeout [ 94.596692] Bluetooth: hci2: command 0x0409 tx timeout [ 94.655431] Bluetooth: hci5: command 0x0409 tx timeout [ 94.656406] Bluetooth: hci7: command 0x0409 tx timeout [ 94.719519] Bluetooth: hci4: command 0x0409 tx timeout [ 94.721797] Bluetooth: hci6: command 0x0409 tx timeout [ 96.639423] Bluetooth: hci2: command 0x041b tx timeout [ 96.639929] Bluetooth: hci0: command 0x041b tx timeout [ 96.642542] Bluetooth: hci1: command 0x041b tx timeout [ 96.643012] Bluetooth: hci3: command 0x041b tx timeout [ 96.703418] Bluetooth: hci7: command 0x041b tx timeout [ 96.703924] Bluetooth: hci5: command 0x041b tx timeout [ 96.767411] Bluetooth: hci6: command 0x041b tx timeout [ 96.767941] Bluetooth: hci4: command 0x041b tx timeout [ 98.687451] Bluetooth: hci3: command 0x040f tx timeout [ 98.688349] Bluetooth: hci1: command 0x040f tx timeout [ 98.691463] Bluetooth: hci0: command 0x040f tx timeout [ 98.693271] Bluetooth: hci2: command 0x040f tx timeout [ 98.751514] Bluetooth: hci5: command 0x040f tx timeout [ 98.752352] Bluetooth: hci7: command 0x040f tx timeout [ 98.815434] Bluetooth: hci4: command 0x040f tx timeout [ 98.817343] Bluetooth: hci6: command 0x040f tx timeout [ 100.735431] Bluetooth: hci2: command 0x0419 tx timeout [ 100.735908] Bluetooth: hci0: command 0x0419 tx timeout [ 100.736328] Bluetooth: hci1: command 0x0419 tx timeout [ 100.736795] Bluetooth: hci3: command 0x0419 tx timeout [ 100.799400] Bluetooth: hci7: command 0x0419 tx timeout [ 100.800263] Bluetooth: hci5: command 0x0419 tx timeout [ 100.863422] Bluetooth: hci6: command 0x0419 tx timeout [ 100.863856] Bluetooth: hci4: command 0x0419 tx timeout [ 108.271785] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.272459] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.273830] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.423683] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.424308] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.426320] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.450016] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.450607] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.451699] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 108.499189] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.499831] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.500655] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.509710] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.510285] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.511388] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 108.594615] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.595219] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.596273] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.617590] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.618232] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.619693] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 108.650564] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.651180] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.652806] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.664197] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.664819] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.665891] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 108.734113] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.734789] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.739809] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 21:56:44 executing program 1: r0 = syz_io_uring_setup(0x5d9b, &(0x7f0000000000)={0x0, 0x85c1, 0x4, 0x2, 0x212}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r2, &(0x7f0000000180)=0x80, &(0x7f00000001c0)=@xdp, 0x0, 0x800, 0x1, {0x0, r3}}, 0xc1) r4 = signalfd4(r0, &(0x7f0000000280)={[0x6]}, 0x8, 0x800) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x810, r4, 0x0) r5 = signalfd(r0, &(0x7f00000002c0)={[0x1]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x50, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x1e}}, './file0\x00'}) io_uring_enter(r6, 0x78da, 0xfe75, 0x1, &(0x7f0000000340)={[0x7fffffff]}, 0x8) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000380)=""/119, 0x77, 0x51) lseek(r0, 0x400, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1010, r5, 0x8000000) syz_io_uring_submit(r7, r1, &(0x7f0000000400)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x4000, @fd=r2, 0x3, 0x5, 0xfffffff9, 0x6}, 0x7) io_uring_enter(r0, 0x42c4, 0xcdc9, 0x0, &(0x7f0000000440)={[0x3]}, 0x8) syz_mount_image$tmpfs(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000700)=[{&(0x7f0000000500)="6a4bd9451fb975cf891aaed455b4567aa0d1e9a2efc6b116f0d4", 0x1a, 0x8001}, {&(0x7f0000000540)="6c7e94620a5b353759974946d8eb1a2aa210f9bf", 0x14, 0x4}, {&(0x7f0000000580)="bc42a729859767027a9836c39ec19cdfb6eb3c41ac2101513911f7545dccc30c4c7fc479f07c", 0x26, 0x7ff}, {&(0x7f00000005c0)="1cec8add5e38e071dd286bd1af34449dd42ac60fb51aa4a7b3f0362719b43445a82cc6264deb8df543deadb221922264ff4966", 0x33, 0x828c}, {&(0x7f0000000600)="379af636011a3a0fef84b09c50457acf9a1e8b5f1c9e4b4681eefd112aa59373d896657cfc09ce443563b84bf0d2e6f69a2fb657afce1df3ed6e8b248ddca8bb8cd0694384458e3064de76f8178f0218d23f78d1a20597002b6b5eadcaeaac3f98de206055fc552967", 0x69, 0xffffffffffffafad}, {&(0x7f0000000680)="589ddfa4c42d21b080e328ed5dab4d600106da401fe2e6b5fdce5e687cfecc61e28931649fcc3cf3304954a16e5c474cb52e3ed59d967f1428956b86851b7ea15509a4ae311cc7b1cafde1c991dbc9c6", 0x50, 0x6}], 0xaa2010, &(0x7f00000007c0)={[{@huge_within_size}, {@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@huge_never}, {@mode={'mode', 0x3d, 0x9}}, {@mpol={'mpol', 0x3d, {'interleave', '', @void}}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@uid={'uid', 0x3d, 0xee00}}, {@mode={'mode', 0x3d, 0xfffffffffffffffd}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b]}}], [{@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_lt={'euid<', 0xee01}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r1, &(0x7f0000000e00)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r5, 0x0, &(0x7f0000000dc0)={&(0x7f0000000900)=@phonet, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/221, 0xdd}, {&(0x7f0000000a80)=""/81, 0x51}, {&(0x7f0000000b00)=""/64, 0x40}, {&(0x7f0000000b40)=""/162, 0xa2}, {&(0x7f0000000c00)=""/244, 0xf4}, {&(0x7f0000000d00)=""/60, 0x3c}], 0x6}, 0x0, 0x41, 0x1, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000ec0)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r6, 0x80, &(0x7f0000000e40)=@ieee802154={0x24, @none={0x0, 0x3}}}, 0x63) [ 108.768985] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.769682] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.771460] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 21:56:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) stat(&(0x7f0000000000)='mnt/encrypted_dir\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, r1}}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1810098, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x8000000000000000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 108.810292] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 108.811841] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 21:56:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000d00)={{}, "8e78457e12e60fb7b96db2ace421dafc7bc8b7b0b9b4b1f0a791ca7a8702010724a1aaae5460b96b03ae329accc82e24a93fbde630811bfba80e09f77ef2f422591d1d902f99b20039a37ad631913e3fa560da109350d66243897621666a08a0508ad8b1b8b59f6aa23f8e327070fce8a179b443be0b697f025fabd1150fbb8de763106cabf0a3e3b293f649229ff73260841fa159816d3a5271b0d815d3fb32fb6338f49b2e6c03a9fea942eedc453a3d15364c8114225735156f3f0d957994e0e80dde64ca3128d3caccf59882218de914f41b6ce8ee8ec56d08406f8ff12c788c9952ee32788c1488d1625d9438d6af5524789909441074998e912e89fbfa7533cb1d5b973b481d31d73de612fcf11b9c3a57ccbc372b3fe72e850121054c8f1d27d2018e8d99fc205fbe488a2996622d389ebdd51f15cc6c9b8bf6ed97af8edf081afd34273220e5b09452bd2c7f04a21f6acd6a898d38191244c982450dda5a2525e3610c823aedcd71ea61ee3d17f33ce3d2205d07e0f32ee5f93808f6fdfe41bc0a17364ec3812dd854a091e09bcf7fbfdd5934e33526009ef6bbac151568e7265cf11a4426b6da8083342fd153a4690d323afeba832c06f3c5780e144d9f54147ecb49dd81294a60dcba34df483a39223bcdc55c21b69ad4fb4dfce72484161fb31e0f55c3ed49180c9534ac3ec67a99f40b457d9d612f32b91a0146fb5cc032b5d660444deb13ecbf9cbd0ffc00dee440a31cc70f68288b932932501e8798e5a1306085358630ebf8a5a47788f62ace51b0e85b1f26d028be1326bd08aefa787711b9ec2abf5e2ada8af5df0c78ed022641f4bb664ebe4d7f12bbbaf74a213151dd2243fbeac6f666a37fc1d6910aded99452b31404685473eb6813dfc1a290448c8c61b5128dfbad285db235bbe5713d2513df5ccc78abca48c3ebfdb85faf5990596d86b0fc312f34fb5176f0787b7733535dce9dd841ea8bd47f5c2c5522c3d2a5a0f9115e7763c161b08d02e2131fe84b4b3d2dfb5f7098471c4258a6e412deb177f01800bc73f37f5d6b43256fa0215961c673c65fec07c82f1077ba15c7600eef7b47a31e0eff543e5c31a94246d72e955abd2a218239309df809df42af72ccef92dc5ec10db4b71b6512a305cd8fbf25f23ec6a07bead21c0322481801ca3dfde4f1882dbcf6ead6122c279482bc222e86b9518cb4d6846a12d796489a618912ed3e8ca45f7c03d65631a1edee8808612b2a6fc7186bf00edefe640c6d662d4ed474c2b0df9d81cb4017605f6564a158cd519e84e845d7eb913dd5e2a6655834c40d60cb68f7c7c78d1d222d1ae21d918698f4c5b47542d5ac9c155bdc83b58e4b9b0ec2a2d9c9ec729810284320d9859328f757b06bb85fafcebeed2b56360fcd6a054fff0178e2ecc218843e47c2e69ef0b6f6781f0995c5526a8161ba657f18a1f449931bd91bd47a85ec50c51a911b823a69961c13a2ddb146280e90b4afbea41e07dbb61878d8312c1a1074ceeda62cb05a0e0a9bdba07b325723dce583133c56d236af9711e37ebb3d244747da5e14234248bd3de533d35edc6be20070199aa5112871e6806bf0bcd6ecb628997b16ca1fce91cd215eef16431e4e0d3ee85b15686dbce2790409ccb5bd55c24d74a49c81c4065a897a3b90d7711f50cc182c7c780edd24e3637f40fb249b20bf83825ae0dd24b2be12ae4f740a3c25197c4c8f5b6933371866b77aeeef2f36ca92b3ef82ad0beca9ae152854b5cf818f982123a57f0d1eed1a9440fb133e3592db4615d097c2ec769b4b72711497b549979a22e62a73717f853dcde1b5b518331df0e2ded5679a35472a9c48bff56514a37afa9d2bf8cda1a5c0c4661059dcf1dcba038e9f22d25bd17f153ff9c1ecbe05a6e9244d8e68071fc6ebd2787c3dacf6da9b43dafedea7889d94839d3236c322023232429dfc9917dc16a5b399785a2e44bb284a590fde8a4a336c48b8a5ba76dad7d8d486ad323402f4e4d2dd74007caefc90523fd9e69b4d22cd7ffa52a63ffdd25977aedc6cb6a1cf1293944dd78569b8304e934837bbfac8db5daead0dfe0f27b95ce0fb09f0b49c3dfc139e5043ec14a8c659411616cbc3e7551d7e0a3e5564cf1f2fd72dc00e748eb857274fe036a60cea57f8b02bef77e6616c73fa9f3c117ec75f8a7a93be798c5332293ce28b5fd65b6c481e1b9a99aa656a4364ce2bb285b89f540dce5852df69997af93c9ad1aa09e3577c6f63aeefbc4668aa5be20903901705be1dea035486bba88aafbb9c614457242d5a8a484d8dddfc564dea242f5eb41ab3210e8ae449b7c352465c6bc94f563fda4a5e052436674937ff4c4b96de63d1e810b76443e117a64ce72734e6e270614eae665918c0b861883dd281333fe951bc64578a4615c7d5b0ba63401a17b494103f157d3af4940467712b7ae1a23513b32778d0b49185472924c82ff64b290159f807f7ba8c0a5186ac58548264a9d24620e380803d176bf3afdbd628d579b9516850e5e5ad09233f7b5caeb5e90e3b5c2f6ceb9c81812cf77df91ceea2791e9d29e33284c8794ba68871e7c9099385afd5968988da9b35d617bead6090a4480222f7ac08aeeb28121b5f3f51b727d17111b05fc12ef2d944f071b2a0c67d8ea10a8f5b18eb3b043f25d1a1c6d4b5d7a96b276bfd02a51119462fc9fa96f9ea62ddbe5649d9afcc67cc40f997c11cf7e49a0ec4157e135925f103dbeab9b1bea36726f65e04ced6abf2d04b82754b7781149a38d194fe645762d9165c311e91d95af8da27784b8bf7b2ed9583b7134daced56bb31d46dee32ab2c53c43ab1149efd5be4196d3740be03fba0037cf95c355cecebca98000bcd35a8e8a6c23e8f6e9342b1007a8fbeaaf181354dd6b2e66ff338637879fae0a8a9348dfd483246f656f847484a2f8f2a06a4b379ce9d820e51c5202f9766c98e929d1aad224baa9c7a987edea658a6742b7c8dcd8f67d209109785645fd63a0948c16b29a8b0d8fc618996c02ea2ed798101ef7a0050f82260841caf4b1577e6cb85a7fd331dd3f24404d2d1684609df45f8b48199eb07b8ba2f9dbfe254a808019eea037a1899674849fe815ce6bdb507fa066c02bf70db8d6b7a7d19ac5985678e328fd99978d10b5ce7c5af9154b142860875104bd1b3e7e4dd23df3c9ed2531eb6e4d9f7ee970af27af1991da4ee7ff6c231270c9a2455629ec631138328e537e28373dd470a9bb504ab82f98949a0b7db289013fbf4c51d88c6c85040790d319c4c026bc226847173580d7e6251d323152f325be56e6f27add8ce9258b3f2359affa2d0f77a154880ad3ae9ed75e7e61f7f56f591ca7ffb19bbf6124b564f02a4624748b93b5af67c336e8216b665f7765538e30c07684c2517425a996a739ef091f31eed21059308e42996bb0058b24eb191b8cda989cd8dac6c9d1c219df2594526e2ed2ab066384cab0b66c36841efa22b4b89aa17a80a2d74352bad27ba9bcce991607a6be88466b81eeb7e5709550745b043e4f97659ea6bc0ab9be10c809f6ffaadae713e2eb6d2aba36a124db57700d1dc88a6ce07f805f34396f15ae17ce3e6af014b4bc0a29407bf75f831ba57ceea5e5ca4d48799aae651eb22b6130d4621ec55eda04501125347f366a2b454604f17af7c40a247c5fbb10d7e26e850e146f9e3c953411a0f0f505baf933916f9fe055367001319ae45b6221ecf8de1bde664240c30fb944bb4bc3cd884507b142db7ac73bd6ff62e4e2bbfeaf3f4be887fda6300b0956f47d184a00e2617bf2f762c3fe726c2a04bf2254e9e725f71fc3b54484207ac34051311489d2bc0e8adf9ecfec136cb9723e514af84d36b98520348eb34ae6839cf61afacaf16349b1de1b3c0ff8798cf7b3004b603fe06892519a387e9cb48c13075a0f094958e1a8a76b268de0ffe100a7bb4a509fd51308f993925d1a54f64dfc2a84a91f7c6e43b53c23c6cc5c8da4fed8d26042bc193f047bb6ab88c9a372bff9794722b2c235918d4d439cac4253db0259b121c878e4b4ee721a1f6323b646aea30044058105d7b6b4f46671a722e923736939117acf44109a1086cac9512378e57d9faf81df5b8da294295f7c3e48b2dca6e74d152e6d7543c1ee7157c7590a0ffe30023271a6eed498bad8863019f8577d5a926ba8f26f1428768d3fc8938670c34bef1b6678d06d4445bc3a246516a604b428d0730663446f53e693a1a399c79a6fb29a47c5f0bb03759c6aa9368cb224a9fa828ba0a03b953076cc16637315d6952b09842f2c22c557778b45f4d963ee3eddbb5fd78a162cf165ba91b713e1ce7f9a07c7b194451cddcd2c3990a70cf052cc4b0759bce2d25f02b81f83a6be43059320744342cb5e1127606f8d69a78a0f3ca9b1d06c64512678196d0e11b38e8c793876028d78eefa9ef372ea700db8be5bc3bf60c7db69a0709ae7aee0830674de9e696539dae769006577b6423b10eec073f3ee10ec7ca879609172b7e936d23c831a1fd86d17dc02edb78269d1e26cc51046d1451b69dccc8987352fb350a0ebf1fb9957958439a818142405b86dcc2a0af9ccbb213053ff00e57038d42e59bbda235e813a8046435978846f9876d9bbab12357c20b61cdc90d7c1708d948615fd79ee64aeadf16a8b8b48b85d0d0c8c3acd4973b043402ab7ec870963469a3d588aee97763999aad7f8f2f21c3f05291f27fc40479003615a22449b61fe639c8e192295ccdb5bec0a7b2fdf16fe336e35720e7bb168029d4a77b98c62e0e2f0e5512d06fa45410788b12858624363af823219a4da9333f0dcef9d7f291d352caf78fb849ea7b62e1589b07150c5b29e1da2e52bd563b11c7325613f895dd3a10605713b647928eacd4b93dc690aff4b2147f891e27c8affc93456257a25f7eddae80d863981db73ff72baa888fc621bbb460c23682c5f03094b8d1973580d4e0956877f5f4a8fc03d49985cdfcb6b6eea3798925318f1ae1aa272845dd8890c2d41f10a04eb8ea30cbac028ede826f1beefd8f29d153b21331f11c97ba8ec27f2a3ada6b7f60f7a5f2cf32d1e177f7aa06eee2306ca102d5c8b82ba9c8bf19f70e528b753cd2c6e0a80bf06b01bf8e6282ec95e2b0d5228026dee35b5ac193cf254ae314118df9de33f412d6a91ce9e40bceb3333ebbb0b994fd51a16d1dd7b6733c66eb1b850603a7d96aa7f8be97033f935de66edaa7e4da9307eb45668e30250e5a079e68b117bf08f18c9989a8d52d671e59c8af13247db5d476af58437c123d57170ed1b7e62b3b463ee3871cbad3bbfd8efd9f2766bae533daf0dcb0085207fd71ad12cb47abf8db83a62287141f77763fbf7c3f051b0018183b1f7fe890a1005aa2f2bef559d1c5476ba9d9952fe871c73e1b8182a31ea83799ed428ed48377e86c6cd43355714ca2747c2e711cf5edee70bf5006fcf55d75b77d349ae0ee028a35d1d7995d0eb2b3166379cb1a651596d6099cd35dc013cab4621e6500693680c1c77dda34b163b42b238440a3bd85e849133977a6a38b47404df17192f54517ccd9692f48c31e1491c0afc9363741dfeb519ba828f08f898d3287799569f02a9c2d9b4f96d78576ce7c49e5500dc97088c73d599358cf209ac897fde8fdd6c2add9279f37023bf9ade950669eac8b004b4ede86df032ed812365214498c04e70a60818001c1fb3f3619be8a36a4c553acbed9fd9ebff07160e032e86b322dbed14d2913bf59c7a9c8"}) r2 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@fat=@nocase}]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xff, 0xb7, 0x5, 0x100000000, 0x3, 0x3, 0x2, 0x37a, 0x40, 0x202, 0x2, 0x7f, 0x38, 0x2, 0xfff8, 0x5, 0x2}, [{0x70000000, 0x5, 0x0, 0x3, 0xffffffffffffff06, 0x2, 0x6b, 0x8001}], "60a50d3837b5dc296ccab7daed1647390ed619809d4fef24acc012addac71088a97e79e6aea89d2d98f46d835ba04ce1aa0f5412af83480463215eccc9b7f39e0de983b967636cd63ced3b44db6c78b1993aaa4269d9cdb2e7cc3a932cdc374f13aab51ab46598658ee41818af79e031b584259b58e74fa658190ab3c7db92ecdb1282d74c190ece161e87945ad66b3baf5bf509076c70c455339b22b8fd0601d24dbb8c1951fc20836e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa22) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r4, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002729e8b033b718a2", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 108.831854] audit: type=1400 audit(1715464604.263:8): avc: denied { open } for pid=3901 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 108.833568] audit: type=1400 audit(1715464604.263:9): avc: denied { kernel } for pid=3901 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 108.840641] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.841248] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.842268] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 108.849321] audit: type=1400 audit(1715464604.280:10): avc: denied { write } for pid=3908 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 108.850021] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 108.855976] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 21:56:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffffffff918b}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001940)=[{0x0}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/134, 0x86}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x7) 21:56:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/custom0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x20}}, './file0\x00'}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\xf7/'}, {0x20, '\\'}, {0x20, 'asymmetric\x00'}, {0x20, './binderfs2/custom0\x00'}, {0x20, 'asymmetric\x00'}, {0x20, '*'}, {0x20, 'asymmetric\x00'}, {0x20, '.(!]])&}%'}], 0xa, "a0333e41c131fe9c98a362a936978458c0b29de0c04ba8db91330842a0ced389cc956745821a3564c7af75f11965139225a340f5182740e9d989066fce1400c37954390099ee32b1a739539a44f09ce44e1c2aa425d03d6836eef3c4cdb01f16d309425fb28782369480906df79de0db0a0c020b2613de607f3f946d41a51f46675177efce43940e294f657bbc81f22afd81b647199509f023f6e1ed352407faa9b3c8fbbec13e273efa38c508746ae1d9d4ac"}, 0x108) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r4, 0x6801, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x11e000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) pidfd_getfd(r4, r3, 0x0) add_key(&(0x7f00000000c0)='pkcs7_test\x00', 0x0, &(0x7f0000000000)='0', 0x1, 0xfffffffffffffffb) [ 108.911308] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.912008] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.913332] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:56:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000005e, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000640), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc0105303, &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4007, @fd_index=0x3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, 0x0, 0x101040, 0x0) 21:56:44 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/custom0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x20}}, './file0\x00'}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\xf7/'}, {0x20, '\\'}, {0x20, 'asymmetric\x00'}, {0x20, './binderfs2/custom0\x00'}, {0x20, 'asymmetric\x00'}, {0x20, '*'}, {0x20, 'asymmetric\x00'}, {0x20, '.(!]])&}%'}], 0xa, "a0333e41c131fe9c98a362a936978458c0b29de0c04ba8db91330842a0ced389cc956745821a3564c7af75f11965139225a340f5182740e9d989066fce1400c37954390099ee32b1a739539a44f09ce44e1c2aa425d03d6836eef3c4cdb01f16d309425fb28782369480906df79de0db0a0c020b2613de607f3f946d41a51f46675177efce43940e294f657bbc81f22afd81b647199509f023f6e1ed352407faa9b3c8fbbec13e273efa38c508746ae1d9d4ac"}, 0x108) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r4, 0x6801, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x11e000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) pidfd_getfd(r4, r3, 0x0) add_key(&(0x7f00000000c0)='pkcs7_test\x00', 0x0, &(0x7f0000000000)='0', 0x1, 0xfffffffffffffffb) [ 108.976601] FAT-fs (loop1): bogus number of reserved sectors [ 108.977235] FAT-fs (loop1): Can't find a valid FAT filesystem [ 108.995788] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.995809] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.996513] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:56:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10000005e, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000640), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc0105303, &(0x7f00000000c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4007, @fd_index=0x3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x4, 0x0, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, 0x0, 0x101040, 0x0) [ 109.045383] FAT-fs (loop1): Unrecognized mount option "fd/4" or missing value [ 109.090136] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 109.091168] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.092349] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 109.118994] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 109.119592] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.120645] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 109.320623] udc-core: couldn't find an available UDC or it's busy [ 109.321198] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 109.325855] udc-core: couldn't find an available UDC or it's busy [ 109.326407] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 109.329647] udc-core: couldn't find an available UDC or it's busy [ 109.330152] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 109.333486] udc-core: couldn't find an available UDC or it's busy [ 109.333989] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 122.136388] hrtimer: interrupt took 24556 ns 21:56:57 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000d00)={{}, "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"}) r2 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@fat=@nocase}]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xff, 0xb7, 0x5, 0x100000000, 0x3, 0x3, 0x2, 0x37a, 0x40, 0x202, 0x2, 0x7f, 0x38, 0x2, 0xfff8, 0x5, 0x2}, [{0x70000000, 0x5, 0x0, 0x3, 0xffffffffffffff06, 0x2, 0x6b, 0x8001}], "60a50d3837b5dc296ccab7daed1647390ed619809d4fef24acc012addac71088a97e79e6aea89d2d98f46d835ba04ce1aa0f5412af83480463215eccc9b7f39e0de983b967636cd63ced3b44db6c78b1993aaa4269d9cdb2e7cc3a932cdc374f13aab51ab46598658ee41818af79e031b584259b58e74fa658190ab3c7db92ecdb1282d74c190ece161e87945ad66b3baf5bf509076c70c455339b22b8fd0601d24dbb8c1951fc20836e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa22) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r4, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="000000002729e8b033b718a2", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 21:56:57 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') pread64(r2, &(0x7f0000000040)=""/30, 0x1e, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) fsetxattr$security_selinux(r1, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:null_device_t:s0\x00', 0x23, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r5 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)=ANY=[@ANYBLOB='euid\b', @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,dont_hash,fsmagic=0x0000000000000008,seclabel,fsmagic=0x0000000000010001,\x00']) ioctl$FICLONE(r4, 0x40049409, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r7 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) r8 = fsmount(r0, 0x1, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd, 0xb9, {0x0, r3}, 0x9, 0x6, 0x0, {0x0, 0x0, r8}}, 0xfce) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000180)={{r6}, 0x7fffffff, 0x3f, 0x100}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 21:56:57 executing program 4: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(r0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x400, &(0x7f00000004c0)) fallocate(r0, 0x60, 0x8, 0x6) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x10000, 0xd8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x6, 0x4, 0x7, 0x4c, 0x0, 0xff, 0x406, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, @perf_config_ext={0x13, 0x401}, 0x0, 0x7, 0x7ff, 0xb, 0x2, 0x8, 0x81, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r3, 0x9) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, r4, &(0x7f0000000300), &(0x7f0000000180)='./file1\x00', 0x400, 0x800, 0x0, {0x0, r5}}, 0xc3) fcntl$dupfd(r3, 0x0, r3) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c00000012000000000400020008000c0000000000"], 0x1c}}, 0x0) 21:56:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001b00)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000001600)=[@hopopts_2292={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x48}}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) sendmsg$inet6(r1, &(0x7f0000000700)={&(0x7f0000000000)={0xa, 0x4e24, 0x4, @remote, 0x800}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000040)="18b0f02fe6239abbad9a43f228b1a7438c4fd632909accbd", 0x18}, {&(0x7f0000000140)="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", 0xfc}, {&(0x7f0000000240)="6a1418c0d046e8c35fe520ec212274b53816053293662ec88e8c2a8481c4812e8ca520746093fad5ff27e349bddadbaf0675640a87238c6b30f7bbad7330774882f95970dc81134ea768fea2cd8fe5a61f4c3270b575e5477c1be894341232901357ca558b647381ffdca231527ed94ab8f4b8e72884d02e7302cba4f92295b6073cbccc0738c109a8c03444d55ac90a1573456520491ac16c45f7463902fc4f27ad44d69723b9afe3611f034483ff35b5c5ec040bcef4fa65bd1a127dfee4db550fe9b46822c5e19f7bd1b33a2f5b560474989581b5af47245159dcca772102e334535fe30814bb6caf80f0ff", 0xed}, {&(0x7f0000000340)="2e358fc439f4a250b6082f9d03dd0c9c271454a17cbd008d8edce5158416c8dae58947c676e7f77101fb61bc7b2d16e60cdd3356bb08fa532a1a6a26ced95a62d6a190f4b855e978102cb2602ce83a2a38a2beb0239fd47c9b171b566920cabb3aabab00b369d1e9803803ca6077b7e132addac81fb66b85b3a9ae86ae8f08118542957a219f08cf929169dbda9fcf498443a6f78a5814f9b410507b4bd4", 0x9e}, {&(0x7f0000000080)="21ec34efe3512e5e5f3f3057c8a72bbc9f4aeb4936618935cfb26417edae40af29440457db02a9b5995a87b4ac2399a12ee2f5336c31d46bdb95393565395f959965c5c59726158c325a8b0862002253d6d3e41a317fce558329e438865176aede12a7374eebf950318f2ce28fcd15082867adc29f95", 0x76}, {&(0x7f0000000400)}, {&(0x7f0000000440)="5334f7be48d67dbaf1d0ae1a047ad3f9d474a5c542320a0c705bf75750f7d5bc0ff5032cb3abe80d168acac30089a6545232d40ba198fd60d858835667d34ed841758bd9d17770ee", 0x48}], 0x7, &(0x7f0000000540)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x8c, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty]}}}, @dstopts_2292={{0x158, 0x29, 0x4, {0x0, 0x27, '\x00', [@generic={0x5, 0xf5, "0d1c7507f776da26b6b54ed6bfe84d2e1a16c445f170bdc3abc21c1f65cf92c9b60331f9975d010dc03c6fc678ef1000602e7edea51e63e6774a7dc298797fcf69ca5c028657cbac068ef6dc8d5a150a7a039aa5d737808e5ccb1b419c52666cfd87a0ced5c17730e5d26d1596983bf32d35f2ec144dca63e634d67823f2b5a9caf0fdce5a6f34d3afe1c482dbf42c737cb799fa58e9f59ddd2c2f8906a7fc3f9f7fd2702aecb8b402552b78195ed7b3c0bbb87f49b02cc14dde11d83780128ff022d1f67944f088e7a3f060099a65d2f203290f8c8604d72be5dd9da02d72f42eefd4c18560530fbce2f7f3be1719e2633d0d2e2c"}, @generic={0x3, 0x38, "cd2b8e9c7628a1a9147c04fc09a4929537479b6f4bf7948634a9d7070ff1df87797e9971ceee935f5c0dc627e4767d56ca10d0453387ecb1"}, @pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}]}}}], 0x190}, 0x40001) 21:56:57 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r3 = accept4(r1, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000000)="ca92784ccf9310d43759114413462d6f3b8146bbf6562dd92ea04af9") ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000340)) 21:56:57 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1cbb43, 0x0) ioctl$CDROMVOLCTRL(r2, 0x1261, 0x0) bind$802154_dgram(r2, &(0x7f00000000c0)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0002}}}, 0x14) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short={0x2, 0x3}}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x6, 0x8000}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r0) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000040)="ddd8312b5695af1944881f92247c4ecd", 0x10) dup2(r4, r6) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x40, 0x20, 0xc7, 0x1, 0x0, 0x9, 0x40320, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x35a6, 0x10001}, 0x1009, 0x3ff, 0x5, 0x8, 0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0x2, r3, 0x1) 21:56:57 executing program 2: clock_gettime(0x1, &(0x7f00000003c0)={0x0}) setitimer(0x0, &(0x7f0000000400)={{r0}}, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="40a08c90dd6067e2fd0000001f0001000004d20a0061002d245ec72ab9e0ba0000000000000000030000000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=@updsa={0x184, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@local, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x32}, @in6=@private0, {}, {0x7ffffffe}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @extra_flags={0x8, 0x18, 0xfd}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@remote, 0xa, 0x8, 0x80}}, @lastused={0xc}]}, 0x184}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) pread64(r2, &(0x7f0000000180)=""/26, 0x1a, 0x9) creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={[0x1]}, 0x8, 0x80000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=@getae={0xec, 0x1f, 0x8, 0x70bd28, 0x25dfdbfd, {{@in=@remote, 0x4d6, 0xa, 0x3c}, @in=@empty, 0x2, 0x3504}, [@algo_crypt={0x63, 0x2, {{'cts(cfb(anubis))\x00'}, 0xd8, "24235958dd7eaa4824d8ac2c1c89ebc74262a11f76f6c770dcc836"}}, @tfcpad={0x8, 0x16, 0x8001}, @user_kmaddress={0x2c, 0x13, {@in=@private=0xa010101, @in=@remote, 0x0, 0xa}}, @etimer_thresh={0x8}, @mark={0xc, 0x15, {0x9, 0x9}}]}, 0xec}, 0x1, 0x0, 0x0, 0x24004811}, 0x8000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000280)={{r3, r4/1000+60000}, {0x0, 0xea60}}, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$unix(0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'netpci0\x00'}) open(&(0x7f0000000080)='./file0\x00', 0x1000, 0x2) inotify_rm_watch(0xffffffffffffffff, 0x0) 21:56:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="1c00000000000000010000000200000026ce9d07820c7400e80370c98f1e86d6e01c002d763ca78444e136d79869d81fac07ef8b621a0736ea823d2c3b734d10e11b3531b3a17b0052278f12abecc05253530f05dd17f0acff5818df9fb5081eb775bfca057f82827df7cc5a0bf5ed18fb8e6d04f1bd6ba10ad3ef9859cc", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0001000020000000002a298337bd3e1ef223f16ac901ba527feb63c50952400700000000000000f0a579e413de204100"/61, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x10000) r4 = syz_open_procfs(r3, &(0x7f0000001700)='net/ipv6_route\x00') ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100}) readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) sendmsg$nl_netfilter(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xc0, 0x11, 0x6, 0x101, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x8}, [@generic="fcb452e3cda8bfa0647e4e42347ed35272ed9d3db5f72562c13a25f8a8e8d3e45ab1e7dd6843684d4a3cea779aeef36ac0a424ccd8289b35c8e502d65665c543453cde1fd47fbd21eb32dd220b6ad4dc2e9b4e6a1eb18a7bf96b2889732aae265a073d8018eabf41724cf17510e6cb774eaa2a60c161a24a8a8b02d39f98a0a22621b25ece3f9e3c5d4d4175c581c5ecce350c8866b6686b15288a9be33994", @typed={0xc, 0x28, 0x0, 0x0, @u64=0x7}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x10c, 0x7d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) writev(r5, &(0x7f00000002c0)=[{&(0x7f0000000100)="b343ba3a06e764cf30690050b624600b67bf48f93561a8721370fa9483263799b82feeb7b9f91d8bf80a51dea7748be553383617514ea63773094fa486e267d9c5c8a17e7142b7d007a397f01895a048d54802a100aa68ad7f62dcd85232d7aae8a70d6c774898952995b4e89802353ec105109a8b5cfd60", 0x78}, {&(0x7f0000000180)="9acbc44e19afa142be168d56e18277f62b2bae73c43b77c1470d301e1de02c506607a430f283545f38443bd173a7e7fee5fdd2bb26e385fd735b0e728e0b0cd6af9feeb13d4344118cd962b165c6532b35b2fbd9e89e7bbe77c58d841afd262c9a2458ed5f9116379e47a80b9c921034b935c1cc0d66974e618e34ef88436230d0d6d812ce75d54feb3c57226cfabf573bd0112918378a1c743eb15656ffb0c9aab4dd64e07f305c553196f03425d4cde672c8cf16ff55b1f88436a63f0b8d69c5670c0cd2", 0xc5}], 0x2) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001640), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r6, 0x5000943f, &(0x7f0000001e00)={{r0}, 0x0, 0x1c, @unused=[0x2, 0x7f, 0x7fff, 0x3], @devid}) dup2(r0, r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3f}) [ 122.287590] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 63 (only 16 groups) 21:56:57 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x3, 0x0, 0x81, 0xee, 0x0, 0x8, 0x8c010, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x9, 0x8}, 0x8008, 0x1b858, 0x6, 0x3, 0xe1, 0x32, 0x6, 0x0, 0x200, 0x0, 0xd9}, 0x0, 0x6, r0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020000000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x160}}, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000280)=[r4], 0x1) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x22902, 0x0) copy_file_range(r6, 0x0, r6, &(0x7f00000000c0)=0x6, 0x6, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) 21:56:58 executing program 4: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(r0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x400, &(0x7f00000004c0)) fallocate(r0, 0x60, 0x8, 0x6) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x10000, 0xd8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x6, 0x4, 0x7, 0x4c, 0x0, 0xff, 0x406, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, @perf_config_ext={0x13, 0x401}, 0x0, 0x7, 0x7ff, 0xb, 0x2, 0x8, 0x81, 0x0, 0x5, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r3, 0x9) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, r4, &(0x7f0000000300), &(0x7f0000000180)='./file1\x00', 0x400, 0x800, 0x0, {0x0, r5}}, 0xc3) fcntl$dupfd(r3, 0x0, r3) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c00000012000000000400020008000c0000000000"], 0x1c}}, 0x0) [ 122.621332] perf: interrupt took too long (4064 > 4037), lowering kernel.perf_event_max_sample_rate to 49000 [ 122.622843] perf: interrupt took too long (4064 > 4037), lowering kernel.perf_event_max_sample_rate to 49000 [ 122.622890] FAT-fs (loop1): Unrecognized mount option "fd/4" or missing value [ 122.624605] perf: interrupt took too long (5088 > 5080), lowering kernel.perf_event_max_sample_rate to 39000 [ 122.626810] perf: interrupt took too long (6398 > 6360), lowering kernel.perf_event_max_sample_rate to 31000 21:56:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="1c00000000000000010000000200000026ce9d07820c7400e80370c98f1e86d6e01c002d763ca78444e136d79869d81fac07ef8b621a0736ea823d2c3b734d10e11b3531b3a17b0052278f12abecc05253530f05dd17f0acff5818df9fb5081eb775bfca057f82827df7cc5a0bf5ed18fb8e6d04f1bd6ba10ad3ef9859cc", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0001000020000000002a298337bd3e1ef223f16ac901ba527feb63c50952400700000000000000f0a579e413de204100"/61, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x10000) r4 = syz_open_procfs(r3, &(0x7f0000001700)='net/ipv6_route\x00') ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100}) readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) sendmsg$nl_netfilter(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xc0, 0x11, 0x6, 0x101, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x8}, [@generic="fcb452e3cda8bfa0647e4e42347ed35272ed9d3db5f72562c13a25f8a8e8d3e45ab1e7dd6843684d4a3cea779aeef36ac0a424ccd8289b35c8e502d65665c543453cde1fd47fbd21eb32dd220b6ad4dc2e9b4e6a1eb18a7bf96b2889732aae265a073d8018eabf41724cf17510e6cb774eaa2a60c161a24a8a8b02d39f98a0a22621b25ece3f9e3c5d4d4175c581c5ecce350c8866b6686b15288a9be33994", @typed={0xc, 0x28, 0x0, 0x0, @u64=0x7}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x10c, 0x7d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) writev(r5, &(0x7f00000002c0)=[{&(0x7f0000000100)="b343ba3a06e764cf30690050b624600b67bf48f93561a8721370fa9483263799b82feeb7b9f91d8bf80a51dea7748be553383617514ea63773094fa486e267d9c5c8a17e7142b7d007a397f01895a048d54802a100aa68ad7f62dcd85232d7aae8a70d6c774898952995b4e89802353ec105109a8b5cfd60", 0x78}, {&(0x7f0000000180)="9acbc44e19afa142be168d56e18277f62b2bae73c43b77c1470d301e1de02c506607a430f283545f38443bd173a7e7fee5fdd2bb26e385fd735b0e728e0b0cd6af9feeb13d4344118cd962b165c6532b35b2fbd9e89e7bbe77c58d841afd262c9a2458ed5f9116379e47a80b9c921034b935c1cc0d66974e618e34ef88436230d0d6d812ce75d54feb3c57226cfabf573bd0112918378a1c743eb15656ffb0c9aab4dd64e07f305c553196f03425d4cde672c8cf16ff55b1f88436a63f0b8d69c5670c0cd2", 0xc5}], 0x2) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001640), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r6, 0x5000943f, &(0x7f0000001e00)={{r0}, 0x0, 0x1c, @unused=[0x2, 0x7f, 0x7fff, 0x3], @devid}) dup2(r0, r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3f}) [ 122.733627] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 63 (only 16 groups) [ 122.766655] perf: interrupt took too long (8001 > 7997), lowering kernel.perf_event_max_sample_rate to 24000 [ 122.777171] perf: interrupt took too long (10022 > 10001), lowering kernel.perf_event_max_sample_rate to 19000 [ 122.906866] syz-executor.4 (4068) used greatest stack depth: 23672 bytes left 21:57:12 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1cbb43, 0x0) ioctl$CDROMVOLCTRL(r2, 0x1261, 0x0) bind$802154_dgram(r2, &(0x7f00000000c0)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0002}}}, 0x14) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @short={0x2, 0x3}}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x6, 0x8000}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r0) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f0000000040)="ddd8312b5695af1944881f92247c4ecd", 0x10) dup2(r4, r6) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x40, 0x20, 0xc7, 0x1, 0x0, 0x9, 0x40320, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x35a6, 0x10001}, 0x1009, 0x3ff, 0x5, 0x8, 0x5, 0x3, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0x2, r3, 0x1) 21:57:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r3 = accept4(r1, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000000)="ca92784ccf9310d43759114413462d6f3b8146bbf6562dd92ea04af9") ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000340)) 21:57:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r3 = accept4(r1, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000000)="ca92784ccf9310d43759114413462d6f3b8146bbf6562dd92ea04af9") ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000340)) 21:57:12 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') pread64(r2, &(0x7f0000000040)=""/30, 0x1e, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) fsetxattr$security_selinux(r1, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:null_device_t:s0\x00', 0x23, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r5 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)=ANY=[@ANYBLOB='euid\b', @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,dont_hash,fsmagic=0x0000000000000008,seclabel,fsmagic=0x0000000000010001,\x00']) ioctl$FICLONE(r4, 0x40049409, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r7 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) r8 = fsmount(r0, 0x1, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd, 0xb9, {0x0, r3}, 0x9, 0x6, 0x0, {0x0, 0x0, r8}}, 0xfce) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000180)={{r6}, 0x7fffffff, 0x3f, 0x100}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 21:57:12 executing program 2: clock_gettime(0x1, &(0x7f00000003c0)={0x0}) setitimer(0x0, &(0x7f0000000400)={{r0}}, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="40a08c90dd6067e2fd0000001f0001000004d20a0061002d245ec72ab9e0ba0000000000000000030000000000"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=@updsa={0x184, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@local, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x32}, @in6=@private0, {}, {0x7ffffffe}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @extra_flags={0x8, 0x18, 0xfd}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@remote, 0xa, 0x8, 0x80}}, @lastused={0xc}]}, 0x184}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) pread64(r2, &(0x7f0000000180)=""/26, 0x1a, 0x9) creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f0000000300)={[0x1]}, 0x8, 0x80000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=@getae={0xec, 0x1f, 0x8, 0x70bd28, 0x25dfdbfd, {{@in=@remote, 0x4d6, 0xa, 0x3c}, @in=@empty, 0x2, 0x3504}, [@algo_crypt={0x63, 0x2, {{'cts(cfb(anubis))\x00'}, 0xd8, "24235958dd7eaa4824d8ac2c1c89ebc74262a11f76f6c770dcc836"}}, @tfcpad={0x8, 0x16, 0x8001}, @user_kmaddress={0x2c, 0x13, {@in=@private=0xa010101, @in=@remote, 0x0, 0xa}}, @etimer_thresh={0x8}, @mark={0xc, 0x15, {0x9, 0x9}}]}, 0xec}, 0x1, 0x0, 0x0, 0x24004811}, 0x8000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000280)={{r3, r4/1000+60000}, {0x0, 0xea60}}, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$unix(0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'netpci0\x00'}) open(&(0x7f0000000080)='./file0\x00', 0x1000, 0x2) inotify_rm_watch(0xffffffffffffffff, 0x0) 21:57:12 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') pread64(r2, &(0x7f0000000040)=""/30, 0x1e, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) fsetxattr$security_selinux(r1, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:null_device_t:s0\x00', 0x23, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r5 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)=ANY=[@ANYBLOB='euid\b', @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,dont_hash,fsmagic=0x0000000000000008,seclabel,fsmagic=0x0000000000010001,\x00']) ioctl$FICLONE(r4, 0x40049409, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r7 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) r8 = fsmount(r0, 0x1, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd, 0xb9, {0x0, r3}, 0x9, 0x6, 0x0, {0x0, 0x0, r8}}, 0xfce) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000180)={{r6}, 0x7fffffff, 0x3f, 0x100}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 21:57:12 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r3 = accept4(r1, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000000)="ca92784ccf9310d43759114413462d6f3b8146bbf6562dd92ea04af9") ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000340)) 21:57:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="1c00000000000000010000000200000026ce9d07820c7400e80370c98f1e86d6e01c002d763ca78444e136d79869d81fac07ef8b621a0736ea823d2c3b734d10e11b3531b3a17b0052278f12abecc05253530f05dd17f0acff5818df9fb5081eb775bfca057f82827df7cc5a0bf5ed18fb8e6d04f1bd6ba10ad3ef9859cc", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0001000020000000002a298337bd3e1ef223f16ac901ba527feb63c50952400700000000000000f0a579e413de204100"/61, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x10000) r4 = syz_open_procfs(r3, &(0x7f0000001700)='net/ipv6_route\x00') ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100}) readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) sendmsg$nl_netfilter(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xc0, 0x11, 0x6, 0x101, 0x70bd27, 0x25dfdbfe, {0x1, 0x0, 0x8}, [@generic="fcb452e3cda8bfa0647e4e42347ed35272ed9d3db5f72562c13a25f8a8e8d3e45ab1e7dd6843684d4a3cea779aeef36ac0a424ccd8289b35c8e502d65665c543453cde1fd47fbd21eb32dd220b6ad4dc2e9b4e6a1eb18a7bf96b2889732aae265a073d8018eabf41724cf17510e6cb774eaa2a60c161a24a8a8b02d39f98a0a22621b25ece3f9e3c5d4d4175c581c5ecce350c8866b6686b15288a9be33994", @typed={0xc, 0x28, 0x0, 0x0, @u64=0x7}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}, 0x10c, 0x7d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) writev(r5, &(0x7f00000002c0)=[{&(0x7f0000000100)="b343ba3a06e764cf30690050b624600b67bf48f93561a8721370fa9483263799b82feeb7b9f91d8bf80a51dea7748be553383617514ea63773094fa486e267d9c5c8a17e7142b7d007a397f01895a048d54802a100aa68ad7f62dcd85232d7aae8a70d6c774898952995b4e89802353ec105109a8b5cfd60", 0x78}, {&(0x7f0000000180)="9acbc44e19afa142be168d56e18277f62b2bae73c43b77c1470d301e1de02c506607a430f283545f38443bd173a7e7fee5fdd2bb26e385fd735b0e728e0b0cd6af9feeb13d4344118cd962b165c6532b35b2fbd9e89e7bbe77c58d841afd262c9a2458ed5f9116379e47a80b9c921034b935c1cc0d66974e618e34ef88436230d0d6d812ce75d54feb3c57226cfabf573bd0112918378a1c743eb15656ffb0c9aab4dd64e07f305c553196f03425d4cde672c8cf16ff55b1f88436a63f0b8d69c5670c0cd2", 0xc5}], 0x2) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001640), 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r6, 0x5000943f, &(0x7f0000001e00)={{r0}, 0x0, 0x1c, @unused=[0x2, 0x7f, 0x7fff, 0x3], @devid}) dup2(r0, r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3f}) [ 137.194337] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 63 (only 16 groups) 21:57:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(r2, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r3 = accept4(r1, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000000)="ca92784ccf9310d43759114413462d6f3b8146bbf6562dd92ea04af9") ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000340)) [ 151.094236] cgroup2: Unknown parameter 'ÿÿÿÿÿÿÿÿ' 21:57:26 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') pread64(r2, &(0x7f0000000040)=""/30, 0x1e, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) fsetxattr$security_selinux(r1, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:null_device_t:s0\x00', 0x23, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r5 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)=ANY=[@ANYBLOB='euid\b', @ANYRESDEC, @ANYBLOB=',defcontext=sysadm_u,dont_hash,fsmagic=0x0000000000000008,seclabel,fsmagic=0x0000000000010001,\x00']) ioctl$FICLONE(r4, 0x40049409, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r7 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) r8 = fsmount(r0, 0x1, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd, 0xb9, {0x0, r3}, 0x9, 0x6, 0x0, {0x0, 0x0, r8}}, 0xfce) ioctl$FICLONE(r6, 0x40049409, r7) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000180)={{r6}, 0x7fffffff, 0x3f, 0x100}) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 21:57:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0xb, 0x80000001) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x8, 0x4, 0x8}, 0x1f}}, 0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x81, 0x0, 0x6, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x9}, 0x80, 0x7, 0x2, 0x0, 0x374ec00000000, 0x8001, 0xa38b, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) stat(0x0, &(0x7f00000001c0)) ioctl$sock_bt_hci(r2, 0x400448e0, 0x0) pipe(&(0x7f0000000180)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x81) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x4) mknodat$loop(r3, &(0x7f0000000300)='./file0\x00', 0x1000, 0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0xa0243, 0x0) write(r3, &(0x7f0000000240)="9175624689a566f2f93e24c93e932d14d45a6bc23612cfecbb681c352deb2330b5b09e20315b24e04075690294ad697b197182bd96de37996915efa65ddc2e28e19203696a2a83696e1bc79595e2094fa131844627e2a35910b25b85bf365271166f2a3b0618e2b91f6266186e71d72aedb4115ed147e3e6c395f3ebfe1672f92da181c8380b53b0823bd488c479a0ec1d8aaf283fbe5b57c044ccb9", 0x9c) 21:57:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r1, 0x88, 0x64, 0x0, &(0x7f0000000040)) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, &(0x7f00000000c0)=0x5, 0x4) r4 = dup2(r2, r0) close(0xffffffffffffffff) fsetxattr$security_capability(r0, 0x0, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001000014f9f5a63dad6c8dd000000000005000000000000000c0000800800560066d381fa01fd170e08d374daafcb50491e42eea2af7a7e29054841b82c47d9756cbe38f8f8607526b1b8ceae31e8746de6d4abb7bd1cc1ac7eb2b23244b3185b90491c940a662b4ba000beadc12e7a32df37624bfb0cefc2a45a4313974aa90c5c146f303421dbfe82a5704da52f793c84aca3cc9c30157e5e93bc9c88a4a91684a0c4a30598a6855252855f49aa2697a93992a7a67373c2b2445b1308ad40a6c44ae39891ac64bc5ed5990690"], 0x28}}, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) fcntl$dupfd(r2, 0x406, r4) fchmod(r5, 0x54) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x40, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x988}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x7b}, @NL80211_MESHCONF_MAX_RETRIES={0x5}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0x8}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x400102, 0x0) 21:57:26 executing program 7: preadv2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) recvmmsg$unix(r0, &(0x7f0000003fc0)=[{{&(0x7f00000001c0), 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000000500)=""/238, 0xee}, {&(0x7f0000000600)=""/231, 0xe7}, {&(0x7f0000000700)=""/252, 0xfc}, {&(0x7f0000000800)=""/191, 0xbf}, {&(0x7f00000008c0)=""/184, 0xb8}, {&(0x7f0000000980)=""/252, 0xfc}, {&(0x7f0000000a80)=""/132, 0x84}], 0x9}}, {{&(0x7f0000000c00)=@abs, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000c80)=""/250, 0xfa}, {&(0x7f0000000d80)=""/132, 0x84}, {&(0x7f0000000e40)=""/70, 0x46}, {&(0x7f0000000440)=""/16, 0x10}], 0x4, &(0x7f0000000f00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000000f40), 0x6e, &(0x7f00000023c0)=[{&(0x7f0000000fc0)=""/57, 0x39}, {&(0x7f0000001000)=""/84, 0x54}, {&(0x7f00000020c0)=""/103, 0x67}, {&(0x7f0000002140)=""/146, 0x92}, {&(0x7f0000002200)=""/247, 0xf7}, {&(0x7f0000002300)=""/138, 0x8a}, {&(0x7f0000001080)=""/18, 0x12}], 0x7, &(0x7f0000002440)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xe0}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000002540)=""/23, 0x17}, {&(0x7f0000002580)=""/174, 0xae}, {&(0x7f0000002640)=""/17, 0x11}, {&(0x7f0000002680)=""/250, 0xfa}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/231, 0xe7}, {&(0x7f0000003880)=""/197, 0xc5}, {&(0x7f0000003980)=""/126, 0x7e}], 0x8, &(0x7f0000003a80)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f0000003b80)=@abs, 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000003c00)=""/186, 0xba}, {&(0x7f0000003cc0)=""/209, 0xd1}, {&(0x7f0000003dc0)=""/212, 0xd4}], 0x3, &(0x7f0000003f00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}}], 0x5, 0x180, &(0x7f0000004100)={0x0, 0x3938700}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000004280)={&(0x7f0000004140)={0x10, 0x0, 0x0, 0x62024}, 0xc, &(0x7f0000004240)={&(0x7f00000041c0)={0x7c, r3, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x3, 0x67}}}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "584ee407e1dba355facaa10530d06299"}, @NL80211_ATTR_PMKID={0x14, 0x55, "b2ef59cf5e7a2395072c3ed0e00278c5"}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x7e6f9480}, @NL80211_ATTR_PMKID={0x14, 0x55, "23391787b592b9c4fff032137e3833c3"}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c0}, 0x4008050) listen(0xffffffffffffffff, 0x3) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000000901040000000000000000030000070900010073797a30000000000800034000000000080003400000000808000540000000081800020006000340000400000c000280050001002f00000008000340000000060c0004800800017921c0c6400000000808000540"], 0x6c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 151.106461] cgroup2: Unknown parameter 'ÿÿÿÿÿÿÿÿ' sendmsg$nl_generic(r1, &(0x7f0000005700)={&(0x7f00000042c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000056c0)={&(0x7f0000004300)={0x1398, 0x8, 0x400, 0x70bd28, 0x25dfdbfb, {0x11}, [@generic="9f077de9123c089736e0b437b97c92359a158838fabe26de44f24d655706cde4115fbca941e31b893022e3cd433147e0f92665b9770918774832f7ff40b90be674426bd1bbcfbb0446b062188107b354a8214ad6a91cc385386ab554dca53120407b9930906400e2a5057c780ac9ea574f3f40aa13417e296bf23f8d57a7f287d815a9e35a070d4be69d1b4ce4f7ec64134d8d1109ef66ecb5aca069711723", @nested={0x5b, 0x67, 0x0, 0x1, [@generic="eee53c15ab64af3675e2f1e80617e50f34fd43d72725d16a5c0c89f198ba9f9633677ae13ce702f41125de1fd3a965935fded0ac9bb9b640b4edca1b1ac3875c681234e07b7705526aa8091fe387171da3db36d2a874f4"]}, @nested={0x1286, 0x92, 0x0, 0x1, [@typed={0x1004, 0x6, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0x1}, @generic="e23869ce65f6ff9310022bda10fb21d17b97a8dc2fc3df690c079515a11d01537f3366bf0f3c0136348efd440d2b2419113d06d44660f8be784bdacaf33b6aee72b05e484e4b9d8ae82206f26a2ecd368f9832a9116426b38fd5111a3edd7a5587e453e63fe44b3745ff3066455fa76540b8795654d7f350b577a5651b8e6b92dea21d0345a4102f9c43dc5f7a0dec363cf43b0945f59776264bd25ef425d802568934c7ae271889c9de418a8774af07a5dfb6db25483d97d03a39fd4137e86f2ed0298405db337471851fa4", @generic="b02cd564e828e31e34cf8cbee07000bf078644497f904e87b5761ebb9ded65b7c272147761c09f793a7abbde49ea6ae09d939213df784b326cf762e71646665b0d2af6525a4550dcb679aaa60841767046e80986a97d2446eb8687f8a3360a1c4b910677eb32e39e2ae6ce0e2e9fa11e1937dc8010604d0f48aa331c3b2d4e6f5f0d794ff88e5818040c889feda0cfdac24f804637c76e5cf006304770c02149cb66d653fddbbf1310c83f7cf1e6b9df975205d92ea3721c08eddf5ae6400d0aa06b2992bd026592d69d51c60019dc0000c76545a8a118bef86099eaf442", @generic="8cabdbc1f5ffea1e8a044e3a74b3371bf8da364936d6cab82a1e921ca0ff685be7b8186191b6c8e4eab33d4ae2f7fc683939081ddc43d1c2fd53de6d2dcb76d491347e0807d3e7ca62ab9b6869b2ac1a49530bd436fc755671a580513186c97bd071d653af7c9ad6a246daf0625c44806e2e2cc72adb52132e50446d83ee8dcd2cf64c9fdc332b147e38b49a6ebd721e555963af4c1b377657196e3099471c22", @typed={0x8, 0x14, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x22}}, @typed={0x8, 0x55, 0x0, 0x0, @pid=r2}, @typed={0x14, 0x66, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x8, 0x27, 0x0, 0x0, @str='-^\x95\x00'}]}]}, 0x1398}, 0x1, 0x0, 0x0, 0x10}, 0x880) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x28, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}]}, 0x28}}, 0x0) 21:57:26 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x800080, &(0x7f0000000000)=ANY=[@ANYRES64=r0]) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) 21:57:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000001c0)=@expire={0x104, 0x18, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@local}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in6=@private0}}, [@mark={0xc}]}, 0x104}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x40, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x988}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x7b}, @NL80211_MESHCONF_MAX_RETRIES={0x5}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r3, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1d}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8004) 21:57:26 executing program 6: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, 0x0, 0x0) getgroups(0x3, &(0x7f0000000040)=[r2, r2, r2]) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r3, r4) r5 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000300)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) keyctl$setperm(0x5, r5, 0x8000000) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 21:57:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x80, 0x80) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x70, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x1}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8080}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)={0x2c, r1, 0x201, 0x0, 0x0, {{0x6}, {@void, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x2c}}, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x40, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x988}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x7b}, @NL80211_MESHCONF_MAX_RETRIES={0x5}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x34, r7, 0x100, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x38}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x800) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6, {r5}}, './file0\x00'}) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r6) r11 = dup(r9) ioctl$sock_inet_SIOCGIFADDR(r11, 0x8915, &(0x7f00000003c0)={'veth0_to_hsr\x00'}) sendmsg$TIPC_NL_BEARER_GET(r9, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x90, r10, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x7c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xdf00}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}]}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x393}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x110, r10, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5e5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xb64}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4881}, 0x810) 21:57:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)=ANY=[@ANYBLOB="240000000104010200000000000000000000000008000440000000000500011223000000"], 0x24}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c", 0x15}, 0x48, 0xfffffffffffffffe) r1 = getegid() r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffb, 0x0) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r3) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='syz', r4) getgroups(0x5, &(0x7f0000000040)=[r1, r1, 0xee00, r1, r1]) setgid(r1) [ 151.207750] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 21:57:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000000300)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) syz_emit_ethernet(0x1e, &(0x7f00000000c0)={@local, @empty, @void, {@can={0xc, {{0x2}, 0x3, 0x2, 0x0, 0x0, "ac40e9bee0cc42c9"}}}}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:57:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002700)='/proc/stat\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0xb, 0x80000001) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x8, 0x4, 0x8}, 0x1f}}, 0x18) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0x81, 0x0, 0x6, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x9}, 0x80, 0x7, 0x2, 0x0, 0x374ec00000000, 0x8001, 0xa38b, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) stat(0x0, &(0x7f00000001c0)) ioctl$sock_bt_hci(r2, 0x400448e0, 0x0) pipe(&(0x7f0000000180)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x81) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x4) mknodat$loop(r3, &(0x7f0000000300)='./file0\x00', 0x1000, 0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0xa0243, 0x0) write(r3, &(0x7f0000000240)="9175624689a566f2f93e24c93e932d14d45a6bc23612cfecbb681c352deb2330b5b09e20315b24e04075690294ad697b197182bd96de37996915efa65ddc2e28e19203696a2a83696e1bc79595e2094fa131844627e2a35910b25b85bf365271166f2a3b0618e2b91f6266186e71d72aedb4115ed147e3e6c395f3ebfe1672f92da181c8380b53b0823bd488c479a0ec1d8aaf283fbe5b57c044ccb9", 0x9c) 21:57:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)=ANY=[@ANYBLOB="240000000104010200000000000000000000000008000440000000000500011223000000"], 0x24}}, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c", 0x15}, 0x48, 0xfffffffffffffffe) r1 = getegid() r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r3, 0xfffffffffffffffb, 0x0) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r3) request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='syz', r4) getgroups(0x5, &(0x7f0000000040)=[r1, r1, 0xee00, r1, r1]) setgid(r1) 21:57:26 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[]) unlinkat(r0, &(0x7f0000000140)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x88001) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') unlinkat(r2, &(0x7f0000000100)='./file1\x00', 0x0) dup3(r0, r1, 0x0) [ 151.413976] sysfs: cannot create duplicate filename '/class/ieee80211/€˜§°ÇÛ ”uòQÇC !' [ 151.415312] CPU: 0 PID: 4180 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 151.416305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 151.417501] Call Trace: [ 151.417894] dump_stack+0x107/0x167 [ 151.418440] sysfs_warn_dup.cold+0x1c/0x29 [ 151.419059] sysfs_do_create_link_sd+0x122/0x140 [ 151.419756] sysfs_create_link+0x5f/0xc0 [ 151.420353] device_add+0x703/0x1c50 [ 151.420904] ? devlink_add_symlinks+0x970/0x970 [ 151.421591] ? ieee80211_set_bitrate_flags+0x202/0x620 [ 151.422356] wiphy_register+0x1da6/0x2850 [ 151.422973] ? wiphy_unregister+0xb90/0xb90 [ 151.423624] ? ieee80211_init_rate_ctrl_alg+0x121/0x500 [ 151.424403] ieee80211_register_hw+0x23c5/0x38b0 [ 151.425109] ? ieee80211_ifa6_changed+0x4d0/0x4d0 [ 151.425804] ? net_generic+0xdb/0x2b0 [ 151.426369] ? lockdep_init_map_type+0x2c7/0x780 [ 151.427062] ? memset+0x20/0x50 [ 151.427554] ? __hrtimer_init+0x12c/0x270 [ 151.428167] mac80211_hwsim_new_radio+0x1ce0/0x4250 [ 151.428919] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 151.429594] ? hwsim_new_radio_nl+0x967/0x1080 [ 151.430262] ? memcpy+0x39/0x60 [ 151.430752] hwsim_new_radio_nl+0x991/0x1080 [ 151.431404] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 151.432347] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 151.433288] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 151.434223] genl_family_rcv_msg_doit+0x22d/0x330 [ 151.434918] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 151.435871] ? cap_capable+0x1cd/0x230 [ 151.436453] ? ns_capable+0xe2/0x110 [ 151.436998] genl_rcv_msg+0x33c/0x5a0 [ 151.437553] ? genl_get_cmd+0x480/0x480 [ 151.438126] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 151.438872] ? lock_release+0x680/0x680 [ 151.439449] ? netlink_deliver_tap+0xf4/0xcc0 [ 151.440097] netlink_rcv_skb+0x14b/0x430 [ 151.440682] ? genl_get_cmd+0x480/0x480 [ 151.441261] ? netlink_ack+0xab0/0xab0 [ 151.441837] ? netlink_deliver_tap+0x1c4/0xcc0 [ 151.442496] ? is_vmalloc_addr+0x7b/0xb0 [ 151.443091] genl_rcv+0x24/0x40 [ 151.443578] netlink_unicast+0x549/0x7f0 [ 151.444171] ? netlink_attachskb+0x870/0x870 [ 151.444819] netlink_sendmsg+0x90f/0xdf0 [ 151.445414] ? netlink_unicast+0x7f0/0x7f0 [ 151.446040] ? netlink_unicast+0x7f0/0x7f0 [ 151.446655] __sock_sendmsg+0x154/0x190 [ 151.447231] ____sys_sendmsg+0x70d/0x870 [ 151.447830] ? sock_write_iter+0x3d0/0x3d0 [ 151.448436] ? do_recvmmsg+0x6d0/0x6d0 [ 151.448999] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 151.449774] ___sys_sendmsg+0xf3/0x170 [ 151.450344] ? sendmsg_copy_msghdr+0x160/0x160 [ 151.451004] ? lock_downgrade+0x6d0/0x6d0 [ 151.451609] ? finish_task_switch+0x126/0x5d0 [ 151.452255] ? lock_downgrade+0x6d0/0x6d0 [ 151.452871] ? __fget_files+0x296/0x4c0 [ 151.453459] ? __fget_light+0xea/0x290 [ 151.454030] __sys_sendmsg+0xe5/0x1b0 [ 151.454582] ? __sys_sendmsg_sock+0x40/0x40 [ 151.455211] ? io_schedule_timeout+0x140/0x140 [ 151.455893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 151.456644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 151.457379] ? trace_hardirqs_on+0x5b/0x180 [ 151.457999] do_syscall_64+0x33/0x40 [ 151.458542] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 151.459281] RIP: 0033:0x7f2243400b19 [ 151.459831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.462418] RSP: 002b:00007f2240955188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 151.463515] RAX: ffffffffffffffda RBX: 00007f2243514020 RCX: 00007f2243400b19 [ 151.464528] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000005 [ 151.465543] RBP: 00007f224345af6d R08: 0000000000000000 R09: 0000000000000000 [ 151.466557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 151.467577] R13: 00007fff58d91a7f R14: 00007f2240955300 R15: 0000000000022000 21:57:26 executing program 1: r0 = timerfd_create(0x2, 0x80800) fsetxattr$security_capability(r0, &(0x7f00000000c0), &(0x7f0000000140)=@v3={0x3000000, [{0x2, 0xfff}, {0xfffffffd, 0xfffffffe}], 0xffffffffffffffff}, 0x18, 0x1) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000d4f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000001000028020000028400001b", 0x65, 0x400}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}, {&(0x7f0000010400)="ff3f000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff01", 0x1003, 0x2000}, {&(0x7f0000012500)="ed41000000100000d4f4655fd4f4655fd4f4655f000000000000040008000000000000000500000006", 0x29, 0x4100}, {0x0, 0x0, 0x44a80}, {&(0x7f0000012f00)="020000000c0001022e00000002002e00000b", 0x12, 0x6000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="d2841244e10ea5f791fea6"]) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r3) write$binfmt_elf64(r3, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x9, 0x3, 0x1, 0x1, 0x0, 0x6, 0xc5e4, 0x3e8, 0x40, 0x3b3, 0x7ff, 0x81, 0x38, 0x1, 0x5, 0x3ff, 0x4}, [{0x6474e551, 0x9, 0x7f, 0x9, 0x2, 0x2, 0x0, 0xb7b}, {0x6474e551, 0xdc5, 0x22142a28, 0x1, 0x6, 0x1000, 0x7fff, 0xfffffffffffffffc}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x19b0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) 21:57:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x21e000, 0x88) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000190fa30d674ec3d1f700dcd108b7456bd70100000004000000e9281a59654b8bba29ff88d1b69430cd2008d99de8ed0675b08fde30a847819fb9ef520bd9a0850c580038020c129b3e448259e315d99a3cd727f56a7a3adec42d237c0ec3b61f8234836d5e304dc238a7f26a4cd4b24443a0dda8c8849dd3c71631b846ce", @ANYRES32=r2, @ANYBLOB="00a24541f6b8846c3321d93aaf6cec39c4275fd30f193f8eef79ab6427a55de837fc43e64182a5cc774df3e2710f3e0da9394595a84b42c12d6bb9b158c9e7cbd155562f7217c3c88abde0f8f4f9518cee837f6e6579bb4d1b6a718f41b7fa3ee3c90d5c15da2bea6d764854f5d0b71f89abac015879e9adf577820ba35956e0d38dffbb4b62c4b8"]) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x2c800, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000040)='$()^]%!\\$\xd0:\x00', &(0x7f00000000c0)='./file0\x00', r4) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x1, 0x0, 0x0, 0x61f0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xffe3) [ 151.530441] EXT4-fs (loop1): Unrecognized mount option "Ò„Dá¥÷‘þ¦" or missing value 21:57:26 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400f0ffb3ceb6f8130000efb7f009870bb73500000000000000372997c3ef9b830ee50eb70ae0410dcf29e008daaece1c8d4b0ea9e9d8b53d916946a3bfad3c618f0241d5"], 0x14}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="03000000000000000a00000000000000ff010945394500000000f50000000001000000ed0000000000000000000000000000000000000002000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ff000000000000000000000000000840000000000000000000000000b921c93e0000000a00000000000000303385dd79010000000000200000000000000001000000000000000000000000000000000000764ffb3d84824900000000000000000000157718cbf76ce2b6152a6b74f665"], 0x110) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000000000000010857e2f85fbc7a3000005000000000000000000", @ANYRES32=r1, @ANYBLOB="000000008e00"/28, @ANYRES32, @ANYBLOB="000000000200"/28, @ANYRES32=r3, @ANYBLOB="000000000f0200"/28, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000ff0100"/28]) socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) close_range(r2, r5, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000400)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x58040280) unshare(0x10040200) [ 151.564828] process 'syz-executor.3' launched '/dev/fd/-1' with NULL argv: empty string added [ 151.623093] EXT4-fs (loop1): Unrecognized mount option "Ò„Dá¥÷‘þ¦" or missing value 21:57:27 executing program 2: recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r2 = syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f00000000c0)) r4 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r3, 0x40049409, r4) lseek(r4, 0x55, 0x1) readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) openat(r2, &(0x7f0000000000)='./file0\x00', 0x5830781a290f48f, 0x48) r5 = memfd_create(&(0x7f0000000140)='seclabel', 0x9123a36abdce9ce3) r6 = accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, &(0x7f00000001c0)=0x1c, 0xc0800) ioctl$FICLONE(r5, 0x40049409, r6) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) io_uring_enter(r7, 0x17fa, 0x1e37, 0x1, &(0x7f0000000080)={[0x2]}, 0x8) 21:57:42 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x21e000, 0x88) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000190fa30d674ec3d1f700dcd108b7456bd70100000004000000e9281a59654b8bba29ff88d1b69430cd2008d99de8ed0675b08fde30a847819fb9ef520bd9a0850c580038020c129b3e448259e315d99a3cd727f56a7a3adec42d237c0ec3b61f8234836d5e304dc238a7f26a4cd4b24443a0dda8c8849dd3c71631b846ce", @ANYRES32=r2, @ANYBLOB="00a24541f6b8846c3321d93aaf6cec39c4275fd30f193f8eef79ab6427a55de837fc43e64182a5cc774df3e2710f3e0da9394595a84b42c12d6bb9b158c9e7cbd155562f7217c3c88abde0f8f4f9518cee837f6e6579bb4d1b6a718f41b7fa3ee3c90d5c15da2bea6d764854f5d0b71f89abac015879e9adf577820ba35956e0d38dffbb4b62c4b8"]) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x2c800, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000040)='$()^]%!\\$\xd0:\x00', &(0x7f00000000c0)='./file0\x00', r4) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x1, 0x0, 0x0, 0x61f0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xffe3) 21:57:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x21e000, 0x88) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000190fa30d674ec3d1f700dcd108b7456bd70100000004000000e9281a59654b8bba29ff88d1b69430cd2008d99de8ed0675b08fde30a847819fb9ef520bd9a0850c580038020c129b3e448259e315d99a3cd727f56a7a3adec42d237c0ec3b61f8234836d5e304dc238a7f26a4cd4b24443a0dda8c8849dd3c71631b846ce", @ANYRES32=r2, @ANYBLOB="00a24541f6b8846c3321d93aaf6cec39c4275fd30f193f8eef79ab6427a55de837fc43e64182a5cc774df3e2710f3e0da9394595a84b42c12d6bb9b158c9e7cbd155562f7217c3c88abde0f8f4f9518cee837f6e6579bb4d1b6a718f41b7fa3ee3c90d5c15da2bea6d764854f5d0b71f89abac015879e9adf577820ba35956e0d38dffbb4b62c4b8"]) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x2c800, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000040)='$()^]%!\\$\xd0:\x00', &(0x7f00000000c0)='./file0\x00', r4) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x1, 0x0, 0x0, 0x61f0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xffe3) 21:57:42 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup3(r3, r2, 0x0) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000001880)={0x130, 0xa, 0x6, 0x3, 0x0, 0x0, {0x5}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_ADT={0x94, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010100}}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x401}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x5c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x40}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x2}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x3f}}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48e0}, 0x80) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2410d0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@uname={'uname', 0x3d, '.'}}, {@access_user}, {@debug={'debug', 0x3d, 0xfff}}, {@noextend}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) fcntl$getown(0xffffffffffffffff, 0x9) fsmount(r4, 0x0, 0x70) r5 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r5, 0x5000943f, &(0x7f0000000100)={{r5}, 0x0, 0x0, @unused=[0xffffffff80000000, 0xfffffffffffffffa, 0x101, 0xfffffffffffffffc], @devid=r6}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000740)={{}, 0x0, 0x0, @unused=[0x3ff, 0x7, 0xccd5, 0x400], @devid=r6}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000580)={{r0}, 0x0, 0x8, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1, 0x10001, {0x18, 0xff, 0xa5d9, 0xcc, 0x2}}}, @devid=r6}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 21:57:42 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f0000000140)={0x2, 0xf34800}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x32, 0x0, @dev, @private=0xa010100, {[@lsrr={0x83, 0x5}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x7, 0x5}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) syz_emit_ethernet(0x7d, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0000000000008848000f0f00e0050000000000000000000000000c0001000000616bb547002f89e2fc0000ea000000000000000000000001ff010000000000000000000000000001a3046e728a3994b41d1d124d1af5d5b184f7803b4446af3f28f74c2422703e7c388a64"], 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r3, 0x80489439, &(0x7f0000000180)) 21:57:42 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x0, 0x4}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}, {0x0}, {0x0}], 0x33}, 0x0, 0x4008000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x4) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r5, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r5, 0x0, &(0x7f0000000280), 0x0, 0x8080, 0x1}, 0x0) syz_io_uring_submit(r1, r7, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x4f) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8982, &(0x7f0000000080)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 21:57:42 executing program 7: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f00000002c0)={0x1, 0x2, 0x101, 0x8}) ptrace$getsig(0x4202, 0x0, 0x6, &(0x7f0000000340)) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x4, 0x0) r2 = dup2(r0, r1) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f00000003c0)={{r2}, 0x0, 0xa, @unused=[0x398, 0x6, 0x400, 0x2], @subvolid=0x1}) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280), &(0x7f0000000240)=@md5={0x1, "6d6edc9db981cf5732af13cdee47fc76"}, 0x11, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x10000) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001600)={&(0x7f0000001440)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYRESOCT], 0x1e8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 21:57:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x62) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6531202f6465762f6e756c6c00202f6465762f6e756c6c00202f6465762f6e756cafba9a2e"], 0x8b) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x135182, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) getdents(r3, &(0x7f0000000180)=""/185, 0xb9) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/77, 0x4d}, {0x0}], 0x2, 0x2, 0x1) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x3) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="a7a959d500800007020000000000000000003d0056530000a8030000000000004000000000000000000000000000000001000000ff07080001002000dd050000ae22ff4ac6d2d010ff033b9841b395d4da51af26003b83c706e1248f496a29ee5a5bc2737c51bcb40d92eaafd11f4fc6820454631db04b23aebe2d3ae43f9b5440db6cebd0873475d9aaa96e428529dcaa32e0465a5bb8ff88e614f2b913dde50222ca99700f1691d5ebe7dd717bf6858fdfcc5ac4ff12f5544f291164c401"], 0xbb) r4 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000080)={{r3}, 0x81, 0x6, 0x100}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0xcf27) 21:57:42 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup2(r0, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x21e000, 0x88) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$netlink(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000190fa30d674ec3d1f700dcd108b7456bd70100000004000000e9281a59654b8bba29ff88d1b69430cd2008d99de8ed0675b08fde30a847819fb9ef520bd9a0850c580038020c129b3e448259e315d99a3cd727f56a7a3adec42d237c0ec3b61f8234836d5e304dc238a7f26a4cd4b24443a0dda8c8849dd3c71631b846ce", @ANYRES32=r2, @ANYBLOB="00a24541f6b8846c3321d93aaf6cec39c4275fd30f193f8eef79ab6427a55de837fc43e64182a5cc774df3e2710f3e0da9394595a84b42c12d6bb9b158c9e7cbd155562f7217c3c88abde0f8f4f9518cee837f6e6579bb4d1b6a718f41b7fa3ee3c90d5c15da2bea6d764854f5d0b71f89abac015879e9adf577820ba35956e0d38dffbb4b62c4b8"]) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x2c800, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000040)='$()^]%!\\$\xd0:\x00', &(0x7f00000000c0)='./file0\x00', r4) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x1, 0x0, 0x0, 0x61f0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0xffe3) [ 167.386092] audit: type=1400 audit(1715464662.817:11): avc: denied { watch_reads } for pid=4226 comm="syz-executor.2" path="/syzkaller-testdir680175485/syzkaller.eQVYc7/7" dev="sda" ino=15982 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 [ 167.453959] ====================================================== [ 167.453959] WARNING: the mand mount option is being deprecated and [ 167.453959] will be removed in v5.15! [ 167.453959] ====================================================== 21:57:42 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x84, 0x6, 0xbf, 0xfc, 0xbf, 0x3, 0x6, 0x3c67, 0x1b7, 0x40, 0x4b, 0x6, 0x2, 0x38, 0x1, 0x40, 0x1ff, 0x40}, [{0x2, 0xcf4, 0x0, 0x7, 0x1, 0x1000, 0x8c, 0x100000000}, {0x1, 0x10001, 0x0, 0x401, 0x400, 0x1, 0x6, 0x81}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x14b0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r2 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r3, 0x107, 0x14, 0x0, &(0x7f0000000100)) fcntl$addseals(r1, 0x409, 0xb) r4 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="1d23de7449ee513d0fbbb59dcf0b1bbac60fe6674c12730f11d2e4a1e5f805fa4b51984ac5bc8ca2939f684ddf22e6602e5bd13a291e12eb168fd3a24106088d1c278eafb335beb6e01629099e679c512f7219aa2f120c110a54e373ea9d3aaeb23dde64ff57a34a6b52aa10e55013c177ccf8a58eb34a2f8f5a64e95da56e9e9bb1de581df6f59867fe2d2005abe10959b04704", 0x94, 0x101}], 0x14041, &(0x7f0000000380)={[{@nojoliet}, {@dmode={'dmode', 0x3d, 0x2}}, {@map_normal}, {@unhide}, {@block}], [{@smackfsfloor={'smackfsfloor', 0x3d, '^&:^/({%\\#-!'}}]}) dup2(r3, r4) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000b7e6922000000120000000c0005e601442859541239e19f06d9a1818190000000010000c3"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) read$hiddev(r1, &(0x7f0000000280)=""/175, 0xaf) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000400)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 21:57:42 executing program 6: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pread64(0xffffffffffffffff, &(0x7f0000000400)=""/186, 0xba, 0x4) stat(&(0x7f0000001cc0)='.\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x18) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000001e00)={{r1}, 0x0, 0x8, @inherit={0x68, &(0x7f0000000000)={0x0, 0x4, 0x1, 0x8, {0x20, 0x1, 0x606, 0x6, 0x1ff}, [0x1, 0x8, 0x9, 0x0]}}, @name="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"}) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80002000}) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}], 0x1, 0x5545, 0x0) 21:57:43 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup3(r3, r2, 0x0) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000001880)={0x130, 0xa, 0x6, 0x3, 0x0, 0x0, {0x5}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_ADT={0x94, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @local}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010100}}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x401}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x5c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x40}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x2}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x3f}}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48e0}, 0x80) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2410d0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@uname={'uname', 0x3d, '.'}}, {@access_user}, {@debug={'debug', 0x3d, 0xfff}}, {@noextend}], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) fcntl$getown(0xffffffffffffffff, 0x9) fsmount(r4, 0x0, 0x70) r5 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r5, 0x5000943f, &(0x7f0000000100)={{r5}, 0x0, 0x0, @unused=[0xffffffff80000000, 0xfffffffffffffffa, 0x101, 0xfffffffffffffffc], @devid=r6}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000740)={{}, 0x0, 0x0, @unused=[0x3ff, 0x7, 0xccd5, 0x400], @devid=r6}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000580)={{r0}, 0x0, 0x8, @inherit={0x48, &(0x7f0000000500)={0x0, 0x0, 0x1, 0x10001, {0x18, 0xff, 0xa5d9, 0xcc, 0x2}}}, @devid=r6}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 21:57:43 executing program 0: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0xf, 0x6, 0x301, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040041}, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) 21:57:43 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x0, 0x4}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}, {0x0}, {0x0}], 0x33}, 0x0, 0x4008000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x4) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r5, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r5, 0x0, &(0x7f0000000280), 0x0, 0x8080, 0x1}, 0x0) syz_io_uring_submit(r1, r7, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x4f) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8982, &(0x7f0000000080)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 21:57:43 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x0, 0x4}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a", 0x2}, {0x0}, {0x0}], 0x33}, 0x0, 0x4008000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x4) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r5, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x2, 0x0, r5, 0x0, &(0x7f0000000280), 0x0, 0x8080, 0x1}, 0x0) syz_io_uring_submit(r1, r7, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x4f) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8982, &(0x7f0000000080)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 21:57:43 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1cbb43, 0x0) ioctl$CDROMVOLCTRL(r1, 0x1261, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000280)={@local, @mcast2, @mcast1, 0x2, 0x0, 0x0, 0x0, 0x8, 0x6080150, r3}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x29, 0x40, 0x4, 0x40, 0x29, @dev={0xfe, 0x80, '\x00', 0x30}, @loopback, 0x8000, 0x40, 0xffffffff, 0x7}}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r0, r6, 0x80000) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000280)={@local, @mcast2, @mcast1, 0x2, 0x0, 0x0, 0x0, 0x8, 0x6080150, r8}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x80, 0xfffffffa, 0x44, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7800, 0x8, 0x1, 0x800}}) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x2, 0x4e24, @private=0xa010100}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="86dfd0bc08050967c33d3b33961c4e46a96cafeee5a1a82954d07d9dec0ea671539b30a631ed994a4e391edab12e7472727e82444733b480e9839aba6312001c7292fa09b6e5eb4b23a2eec86733035e5c187ece87964164e9ee54d5ac43ae5194b8a087de26fc5017c2afe49155433b906a8da136b241ec002b476a06a0b7050aae8f77638ccf70204bf90000", 0x8d}, {&(0x7f0000000180)="348a003807c583dbbd12c96c4bb8e7983d67ead3a7687008ccfe8dbfc9506368e59a077daa0681195c8c3827f288b37c8b2c9994cbcaecbb08478064", 0x3c}], 0x2, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @private=0xa010101, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @dev={0xac, 0x14, 0x14, 0x42}, @private=0x1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20b7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x235f3cf1}}], 0xe0}, 0x4008000) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="cc0000001b0001000000000000000000fe80000000000000f2ff1900000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xcc}}, 0x0) 21:57:43 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) [ 167.722412] audit: type=1326 audit(1715464663.153:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.725911] audit: type=1326 audit(1715464663.156:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.734564] audit: type=1326 audit(1715464663.156:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.753252] audit: type=1326 audit(1715464663.166:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.762689] audit: type=1326 audit(1715464663.175:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.774668] audit: type=1326 audit(1715464663.175:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.786809] audit: type=1326 audit(1715464663.175:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 21:57:43 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x84, 0x6, 0xbf, 0xfc, 0xbf, 0x3, 0x6, 0x3c67, 0x1b7, 0x40, 0x4b, 0x6, 0x2, 0x38, 0x1, 0x40, 0x1ff, 0x40}, [{0x2, 0xcf4, 0x0, 0x7, 0x1, 0x1000, 0x8c, 0x100000000}, {0x1, 0x10001, 0x0, 0x401, 0x400, 0x1, 0x6, 0x81}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x14b0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r2 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r3, 0x107, 0x14, 0x0, &(0x7f0000000100)) fcntl$addseals(r1, 0x409, 0xb) r4 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="1d23de7449ee513d0fbbb59dcf0b1bbac60fe6674c12730f11d2e4a1e5f805fa4b51984ac5bc8ca2939f684ddf22e6602e5bd13a291e12eb168fd3a24106088d1c278eafb335beb6e01629099e679c512f7219aa2f120c110a54e373ea9d3aaeb23dde64ff57a34a6b52aa10e55013c177ccf8a58eb34a2f8f5a64e95da56e9e9bb1de581df6f59867fe2d2005abe10959b04704", 0x94, 0x101}], 0x14041, &(0x7f0000000380)={[{@nojoliet}, {@dmode={'dmode', 0x3d, 0x2}}, {@map_normal}, {@unhide}, {@block}], [{@smackfsfloor={'smackfsfloor', 0x3d, '^&:^/({%\\#-!'}}]}) dup2(r3, r4) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000b7e6922000000120000000c0005e601442859541239e19f06d9a1818190000000010000c3"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) read$hiddev(r1, &(0x7f0000000280)=""/175, 0xaf) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000400)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 167.798683] audit: type=1326 audit(1715464663.176:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.804833] audit: type=1326 audit(1715464663.176:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4258 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 167.865061] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 21:57:57 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) 21:57:57 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) 21:57:57 executing program 0: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0xf, 0x6, 0x301, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040041}, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) 21:57:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, r5) 21:57:57 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r2 = syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg$inet(r0, &(0x7f0000000a80), 0x0, 0x0) 21:57:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r2, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x14000, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000140)={0x0, 0x1c81}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) 21:57:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='mpol=inter\beave=relative:0\r,\x00']) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) sync_file_range(r1, 0x8, 0x5, 0x2) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000a, 0x13, r0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_complete(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 21:57:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x4101, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80224000}, 0xc, &(0x7f0000000200)={&(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x40000000}, 0x4000) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, ["", "", "", "", ""]}, 0x14}}, 0x0) bind$netlink(r0, &(0x7f000000aac0)={0x10, 0x0, 0x0, 0x8}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r3 = syz_open_procfs(r2, &(0x7f0000001700)='net/ipv6_route\x00') readv(r3, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r1) sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000001580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001540)={&(0x7f0000001440)={0xf8, r4, 0x400, 0x70bd27, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) write(r5, &(0x7f0000000300)="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", 0x1000) [ 181.687548] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 181.698249] tmpfs: Bad value for 'mpol' 21:57:57 executing program 6: r0 = syz_io_uring_setup(0x52dc, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000740), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f00000000c0), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/mdstat\x00', 0x0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 181.709297] audit: type=1326 audit(1715464677.140:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4304 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 181.714191] audit: type=1326 audit(1715464677.145:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4304 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 181.724571] audit: type=1326 audit(1715464677.155:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4304 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 181.729818] audit: type=1326 audit(1715464677.155:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4304 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1c653eab19 code=0x7ffc0000 [ 181.810713] tmpfs: Unknown parameter '/dev/nvram' [ 181.835747] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 21:57:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xffffffffffffff1b, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500), 0x1000) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r4, 0x0, 0x5, &(0x7f00000003c0)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000100)={0x5618, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x0, @broadcast}}}, 0x108) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000080)) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) openat(r1, &(0x7f0000000380)='./file1\x00', 0x20800, 0x1ab) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) 21:57:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, r5) 21:57:57 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@mpol={'mpol', 0x3d, {'local', '=static', @void}}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_targets\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000180)={0x7, 0x0, &(0x7f0000000140)=[r1]}, 0x1) ioctl$FIONREAD(r0, 0x6801, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r3}}, './file0/file0\x00'}) 21:57:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000600)={0x3060180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap(&(0x7f0000ff7000/0x8000)=nil, 0x8000, 0x1000002, 0x110, r0, 0xe1926000) 21:57:57 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) [ 181.982605] tmpfs: Bad value for 'mpol' [ 182.001768] tmpfs: Bad value for 'mpol' [ 182.076773] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 182.369050] syz-executor.0 (4346) used greatest stack depth: 23608 bytes left 21:58:11 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x28000, 0xc) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/usbhid', 0x541340, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000280)={@desc={0x1, 0x0, @desc1}}) r4 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r4) lseek(r2, 0x0, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x81, 0x2, 0x1f, 0x9, 0x0, 0xfa, 0x4b0e0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000300)}, 0x11005, 0x400, 0x3, 0x3, 0x465, 0x20, 0x1ff, 0x0, 0x4, 0x0, 0x9}, r5, 0x6, r2, 0x8) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000180)={0x8, 0x1, 0x0, 0x7ff, 0x2, 0x3}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd, "f2f143e1cdd44c3116febc024137cf608cfef0e8b305e2ae3608c3e698a7b760713d8384e87dfff32f99a8961e129450b571048c38c74c5a9adcfb7e8f3eda76", "255155a203164ed1a8e984ae77f0abfe7ac10a067d48b82663fe2a61a3ccf4d30b265830fed5966b84f82e5e326bc2dcdacded1a660100d3a5c61d06a6bcb0fe", "b71b356b299781b4a6ab01dc4b6ab7b44834f268d3c0591a4283ea4eb99eeece", [0x200, 0xffffffffffffff01]}) chdir(&(0x7f00000001c0)='./file0\x00') 21:58:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, r5) 21:58:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xffffffffffffff1b, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500), 0x1000) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r4, 0x0, 0x5, &(0x7f00000003c0)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000100)={0x5618, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x0, @broadcast}}}, 0x108) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000080)) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) openat(r1, &(0x7f0000000380)='./file1\x00', 0x20800, 0x1ab) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) 21:58:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r2, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x14000, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000140)={0x0, 0x1c81}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) 21:58:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) statx(r0, &(0x7f0000000480)='./file0/file0\x00', 0x6000, 0x40, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x20, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@msize={'msize', 0x3d, 0x1ff}}, {@uname={'uname', 0x3d, ',-]'}}, {@access_uid={'access', 0x3d, r1}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@fscache}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@obj_type={'obj_type', 0x3d, '/dev/usb/hiddev#\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}}) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) io_setup(0x100, &(0x7f0000000000)=0x0) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) io_submit(r3, 0x2, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) r5 = syz_open_dev$hiddev(&(0x7f00000000c0), 0x7, 0x80002) ioctl$INCFS_IOC_FILL_BLOCKS(r5, 0x80106720, &(0x7f00000003c0)={0x4, &(0x7f0000000140)=[{0x0, 0x1000, &(0x7f0000001440)="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", 0x1, 0x1}, {0x1, 0x3a, &(0x7f0000000100)="81f8699b1402005e17defd2d143417f9fe54a711ad5fc3cde9e317f5483294bcf43d4b2a8f01d4734c2fd3efc5d000f4fbc3f6a1c5edb6ccf176", 0x1, 0x1}, {0x5, 0x87, &(0x7f0000000240)="0d2b8df806cbb25073128b9a4c1957af1e139938887e7302243e2098928b9a7384d9d7d86aee19cfc37706dd3fb4c86b7bd871de4958bd1f95ed63751519be887095cd465a9cbda448294db1bc54f605416821e4d9cf7e1aa351230715d806e71453b263c4fa780e286997c69317ba209019ad6444e74d381301c8be3506dd1b3eec978e71d27a", 0x1, 0x1}, {0xffff, 0xba, &(0x7f0000000300)="f70948a6df8a013d04ad0cf0c3e71137d7275e3626b37275c64118797b150a5cfe857bd2c5dc67c0a8462c48e9c6c93ce4cf2bad729b20d508e64d40939f74b5ed46ad787f452524266d2e05bc2ddaee3d21b729aeeaeb104067f3c72b8a9e1c9a5230e0c9d867a358e20084612cd9f9cd897bcc1e20936767c2f120dd7d619c736df6789e5288dc4069cf78a9304bbbb663794cbd86a3610c9deea1f61295f17648290820835ad4d189682f49c20a17aa737613879484668a23", 0x0, 0x1}]}) 21:58:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d408d0", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) chdir(&(0x7f0000000140)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000180)='./file1\x00', 0x2ea) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc3b3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r0, r1) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r5 = syz_open_procfs(r4, &(0x7f0000001700)='net/ipv6_route\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) copy_file_range(r5, &(0x7f0000000280)=0x1, r3, 0x0, 0x8, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close(r2) r6 = accept4(r2, &(0x7f0000001740)=@x25={0x9, @remote}, &(0x7f00000017c0)=0x80, 0x800) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x86f28d2151a1f54f}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x20068081) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp6\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) 21:58:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x10000000) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000300)=ANY=[@ANYBLOB="409156b5ea6d18e3b27e753db9825124b9a2b5bc0000000000040000000000", @ANYRES32=r0, @ANYBLOB="0852000004d373c47cc761460f66691c2db13ed9548f96d26d081f21d35ea8c08c51aefb1869ba36ff678a67715a2cf3addda75b71d22c6a91f119ec7b8d79f7c323271461d33b5a4153df9d0de090e98406c259b92461c9b053021ec2e690954d"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x143, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x7, 0x1, 0x35, 0x200}) r4 = open(&(0x7f00000002c0)='./file0\x00', 0x448343, 0x90) mq_getsetattr(r4, &(0x7f00000000c0)={0x1, 0x400, 0x6530, 0x5}, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r3, 0x4010942a, &(0x7f0000000100)={0x0, 0x2}) 21:58:11 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) [ 196.007108] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 196.014856] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 196.039561] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 21:58:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x10000000) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000300)=ANY=[@ANYBLOB="409156b5ea6d18e3b27e753db9825124b9a2b5bc0000000000040000000000", @ANYRES32=r0, @ANYBLOB="0852000004d373c47cc761460f66691c2db13ed9548f96d26d081f21d35ea8c08c51aefb1869ba36ff678a67715a2cf3addda75b71d22c6a91f119ec7b8d79f7c323271461d33b5a4153df9d0de090e98406c259b92461c9b053021ec2e690954d"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x143, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x7, 0x1, 0x35, 0x200}) r4 = open(&(0x7f00000002c0)='./file0\x00', 0x448343, 0x90) mq_getsetattr(r4, &(0x7f00000000c0)={0x1, 0x400, 0x6530, 0x5}, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r3, 0x4010942a, &(0x7f0000000100)={0x0, 0x2}) [ 196.061735] EXT4-fs error (device loop5): ext4_mb_generate_buddy:805: group 0, block bitmap and bg descriptor inconsistent: 212 vs 2260 free clusters 21:58:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xffffffffffffff1b, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500), 0x1000) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r4, 0x0, 0x5, &(0x7f00000003c0)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000100)={0x5618, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x0, @broadcast}}}, 0x108) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000080)) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) openat(r1, &(0x7f0000000380)='./file1\x00', 0x20800, 0x1ab) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r5, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) 21:58:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r2, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x14000, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000140)={0x0, 0x1c81}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) 21:58:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, r5) [ 196.218265] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:58:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0xc}, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffb}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r1, 0x21, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10200, &(0x7f0000000b00)={0x77359400}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3e3cb8ee0c7e11ee}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0xc004) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d000000000000000068653d6c6f6f736c2c613aecb9d913cebd2aa15069b3f4b73d2b2c2c736d61636b66736465663d706970656673002c704021b9966f309af9643e000000000000a9a8142492812b665fc827946b0000f0fceb805d45fa1322c8425193c6b8ec9703a6210d1635b92c729668e9b3b752defb8a2e822cbfb965bbecb488c5ca5fb8ac9f5b2068dfabf4dbd3d9834207fe58a16a3c976e71adf6712f0dadd2788f", @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d654d70501203bc5565ce8f4cafa423b2ead6ba714bc28fdb8259de7b2d04135c7976bbf3ff1732fe22c93a75d6046ed66ad2d9e306991600b5cb0e10de1b559b430a2db95148f44f1d331d800a5fe4bb20f79a06ddc1120b0586c8acbe3bfdeb2e9b3b06b8d9dbae77081a0e01feb410594851956dd516f61f5c56bd4b6ade41453e19ed1db53a4d29edb9d2bf94c8990d954811"]) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x5, 0x0, 0x7f, 0x3, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f00000004c0), 0xe}, 0x8, 0x6, 0x1f, 0x0, 0x3, 0x8, 0xfff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x2) mount$9p_unix(0x0, &(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x240000, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000b40)='./file0/../file0\x00', 0x42) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000005c0)={0x7, 'vlan1\x00', {0x5}, 0x81}) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x8) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000400), 0x14, 0x0) 21:58:11 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) getdents64(r0, 0x0, 0x0) 21:58:11 executing program 4: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x64, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101d}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0xc84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8529, 0x7, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0xd, 0x3, 0xfe, 0x0, 0xff, 0x80a2c, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0xf}, 0x10, 0xfffffffffffffffd, 0x7, 0x6, 0x7fffffff, 0xa8000000, 0x2, 0x0, 0x92, 0x0, 0x9}, 0x0, 0xd, r0, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000380), 0x8) sendmmsg$inet6(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xff41}], 0x1}}], 0x1, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x7ffe, 0x0, 0x0, 0x0) [ 196.370896] EXT4-fs (sda): re-mounted. Opts: (null) 21:58:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) 21:58:11 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x28000, 0xc) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/usbhid', 0x541340, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000280)={@desc={0x1, 0x0, @desc1}}) r4 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r4) lseek(r2, 0x0, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x81, 0x2, 0x1f, 0x9, 0x0, 0xfa, 0x4b0e0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000300)}, 0x11005, 0x400, 0x3, 0x3, 0x465, 0x20, 0x1ff, 0x0, 0x4, 0x0, 0x9}, r5, 0x6, r2, 0x8) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000180)={0x8, 0x1, 0x0, 0x7ff, 0x2, 0x3}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd, "f2f143e1cdd44c3116febc024137cf608cfef0e8b305e2ae3608c3e698a7b760713d8384e87dfff32f99a8961e129450b571048c38c74c5a9adcfb7e8f3eda76", "255155a203164ed1a8e984ae77f0abfe7ac10a067d48b82663fe2a61a3ccf4d30b265830fed5966b84f82e5e326bc2dcdacded1a660100d3a5c61d06a6bcb0fe", "b71b356b299781b4a6ab01dc4b6ab7b44834f268d3c0591a4283ea4eb99eeece", [0x200, 0xffffffffffffff01]}) chdir(&(0x7f00000001c0)='./file0\x00') [ 196.440999] EXT4-fs (sda): re-mounted. Opts: (null) [ 196.514113] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 196.515485] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:58:25 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x28000, 0xc) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/usbhid', 0x541340, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000280)={@desc={0x1, 0x0, @desc1}}) r4 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r4) lseek(r2, 0x0, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x81, 0x2, 0x1f, 0x9, 0x0, 0xfa, 0x4b0e0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000300)}, 0x11005, 0x400, 0x3, 0x3, 0x465, 0x20, 0x1ff, 0x0, 0x4, 0x0, 0x9}, r5, 0x6, r2, 0x8) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000180)={0x8, 0x1, 0x0, 0x7ff, 0x2, 0x3}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd, "f2f143e1cdd44c3116febc024137cf608cfef0e8b305e2ae3608c3e698a7b760713d8384e87dfff32f99a8961e129450b571048c38c74c5a9adcfb7e8f3eda76", "255155a203164ed1a8e984ae77f0abfe7ac10a067d48b82663fe2a61a3ccf4d30b265830fed5966b84f82e5e326bc2dcdacded1a660100d3a5c61d06a6bcb0fe", "b71b356b299781b4a6ab01dc4b6ab7b44834f268d3c0591a4283ea4eb99eeece", [0x200, 0xffffffffffffff01]}) chdir(&(0x7f00000001c0)='./file0\x00') 21:58:25 executing program 0: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x64, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101d}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0xc84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8529, 0x7, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0xd, 0x3, 0xfe, 0x0, 0xff, 0x80a2c, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0xf}, 0x10, 0xfffffffffffffffd, 0x7, 0x6, 0x7fffffff, 0xa8000000, 0x2, 0x0, 0x92, 0x0, 0x9}, 0x0, 0xd, r0, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000380), 0x8) sendmmsg$inet6(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xff41}], 0x1}}], 0x1, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x7ffe, 0x0, 0x0, 0x0) 21:58:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0xc}, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffb}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r1, 0x21, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10200, &(0x7f0000000b00)={0x77359400}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3e3cb8ee0c7e11ee}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0xc004) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d000000000000000068653d6c6f6f736c2c613aecb9d913cebd2aa15069b3f4b73d2b2c2c736d61636b66736465663d706970656673002c704021b9966f309af9643e000000000000a9a8142492812b665fc827946b0000f0fceb805d45fa1322c8425193c6b8ec9703a6210d1635b92c729668e9b3b752defb8a2e822cbfb965bbecb488c5ca5fb8ac9f5b2068dfabf4dbd3d9834207fe58a16a3c976e71adf6712f0dadd2788f", @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d654d70501203bc5565ce8f4cafa423b2ead6ba714bc28fdb8259de7b2d04135c7976bbf3ff1732fe22c93a75d6046ed66ad2d9e306991600b5cb0e10de1b559b430a2db95148f44f1d331d800a5fe4bb20f79a06ddc1120b0586c8acbe3bfdeb2e9b3b06b8d9dbae77081a0e01feb410594851956dd516f61f5c56bd4b6ade41453e19ed1db53a4d29edb9d2bf94c8990d954811"]) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x5, 0x0, 0x7f, 0x3, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f00000004c0), 0xe}, 0x8, 0x6, 0x1f, 0x0, 0x3, 0x8, 0xfff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x2) mount$9p_unix(0x0, &(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x240000, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000b40)='./file0/../file0\x00', 0x42) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000005c0)={0x7, 'vlan1\x00', {0x5}, 0x81}) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x8) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000400), 0x14, 0x0) 21:58:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r2, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x14000, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r4, 0x4010942a, &(0x7f0000000140)={0x0, 0x1c81}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) 21:58:25 executing program 4: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x64, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101d}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0xc84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8529, 0x7, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0xd, 0x3, 0xfe, 0x0, 0xff, 0x80a2c, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0xf}, 0x10, 0xfffffffffffffffd, 0x7, 0x6, 0x7fffffff, 0xa8000000, 0x2, 0x0, 0x92, 0x0, 0x9}, 0x0, 0xd, r0, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000380), 0x8) sendmmsg$inet6(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xff41}], 0x1}}], 0x1, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x7ffe, 0x0, 0x0, 0x0) 21:58:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) 21:58:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:58:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) [ 210.582077] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 210.585514] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 21:58:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 210.642883] EXT4-fs (sda): re-mounted. Opts: (null) 21:58:26 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x28000, 0xc) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/usbhid', 0x541340, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000280)={@desc={0x1, 0x0, @desc1}}) r4 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r4) lseek(r2, 0x0, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x81, 0x2, 0x1f, 0x9, 0x0, 0xfa, 0x4b0e0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000300)}, 0x11005, 0x400, 0x3, 0x3, 0x465, 0x20, 0x1ff, 0x0, 0x4, 0x0, 0x9}, r5, 0x6, r2, 0x8) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000180)={0x8, 0x1, 0x0, 0x7ff, 0x2, 0x3}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd, "f2f143e1cdd44c3116febc024137cf608cfef0e8b305e2ae3608c3e698a7b760713d8384e87dfff32f99a8961e129450b571048c38c74c5a9adcfb7e8f3eda76", "255155a203164ed1a8e984ae77f0abfe7ac10a067d48b82663fe2a61a3ccf4d30b265830fed5966b84f82e5e326bc2dcdacded1a660100d3a5c61d06a6bcb0fe", "b71b356b299781b4a6ab01dc4b6ab7b44834f268d3c0591a4283ea4eb99eeece", [0x200, 0xffffffffffffff01]}) chdir(&(0x7f00000001c0)='./file0\x00') 21:58:26 executing program 3: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="d9739dd28962", 0x6) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) pwritev2(r1, &(0x7f0000000040)=[{&(0x7f0000000340)='u', 0x1}], 0x1, 0x100009, 0x3, 0x2) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x108000}) r2 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x13, r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000002000210c00000000000000000200000008000000", @ANYRES32=0xee01, @ANYBLOB="0a0000440000750a8000001000217442c8bda83acfdc79e57b9f0ded04d87ae38777a9cd39f4abf03d1a10a91b642d20b3cc0e2768f342cbc446e5f3f9b336269f9f68ef1bbed406027ea88e72c87eb4380f00277aecb7f6f3bc9f85cdcf342db7fbc3fa2c77bcbfc3e3b38f2f00"/121], 0x24}}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000100)=0x1, 0x9e6) r5 = creat(&(0x7f0000000080)='./file1\x00', 0x72) pwrite64(r5, &(0x7f00000000c0)="04", 0x1, 0x3ff03) syz_open_procfs(r4, &(0x7f00000001c0)='gid_map\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x300000000, 0x0) 21:58:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) 21:58:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 21:58:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001500)={&(0x7f00000002c0)={0x1234, 0x2d, 0x4, 0x70bd26, 0x25dfdbfb, {0xd}, [@nested={0x2f, 0x44, 0x0, 0x1, [@typed={0x14, 0x2b, 0x0, 0x0, @ipv6=@loopback}, @generic="4b87b207b14e26462cf74939e376e22c78dd564cceff81"]}, @nested={0x1024, 0x8c, 0x0, 0x1, [@generic="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", @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x2}]}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@private0}, @generic="3f26303659f77682c99489b34162736af99d674015bff5ba127a7e5cbae9272a25437ee48b8e9e25c61ddee7918242c6251be5a26a262446518c7c2b43e238f80c87f0b355322b0aed8583d67d653affb7176cd44853ef7d3f46505b2b946b4fa081aaf41290ac741ec577527f9565da0990790c16c40e8a6a781a7320b4201346f3114f8881832ac5af00d5653ab5753d964906670c77ad1e3d7877b491896da93a12806d4d59036df4725b865ab84fcb4e8ec909d694835f26474545dd7f92b1c8b45c670746a80f3532e1cc678b690db01a0009e710de8792ef3ae8f644438ff337b1f3685953f1", @generic="7d9ba34fa926b39a132d3216fa37347b2999ff0cb2cd963497166a84259ac4927e44fdfc11", @typed={0x8, 0x7e, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x20, 0x0, 0x0, @u32=0x6}, @nested={0x8a, 0x6b, 0x0, 0x1, [@generic="3c25c14575a3a401eeeb9ef65b0e5288651609dad1bc82af977f662745dd2a0b5e664b8996e6661c7010ce17dbe2989c3d9d5d0083afa3d3173b2f2990d4f04c0527d26306e73c75b8f2bbf41c072b7068f6dc82dca4c088036b156ff0b2e7b9b7963a588e517550761de013b271cfe356862d5cc3ba62d32feae7daa9eb0751a11a9eb37b33"]}, @typed={0xc, 0x91, 0x0, 0x0, @u64=0x9}]}, 0x1234}, 0x1, 0x0, 0x0, 0x8000080}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file1\x00') pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/devAsg'], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x8, &(0x7f0000000200)='^},\x00') [ 210.769322] audit: type=1400 audit(1715464706.199:25): avc: denied { read } for pid=4476 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 210.785571] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 210.805099] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:58:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001500)={&(0x7f00000002c0)={0x1234, 0x2d, 0x4, 0x70bd26, 0x25dfdbfb, {0xd}, [@nested={0x2f, 0x44, 0x0, 0x1, [@typed={0x14, 0x2b, 0x0, 0x0, @ipv6=@loopback}, @generic="4b87b207b14e26462cf74939e376e22c78dd564cceff81"]}, @nested={0x1024, 0x8c, 0x0, 0x1, [@generic="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", @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x2}]}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@private0}, @generic="3f26303659f77682c99489b34162736af99d674015bff5ba127a7e5cbae9272a25437ee48b8e9e25c61ddee7918242c6251be5a26a262446518c7c2b43e238f80c87f0b355322b0aed8583d67d653affb7176cd44853ef7d3f46505b2b946b4fa081aaf41290ac741ec577527f9565da0990790c16c40e8a6a781a7320b4201346f3114f8881832ac5af00d5653ab5753d964906670c77ad1e3d7877b491896da93a12806d4d59036df4725b865ab84fcb4e8ec909d694835f26474545dd7f92b1c8b45c670746a80f3532e1cc678b690db01a0009e710de8792ef3ae8f644438ff337b1f3685953f1", @generic="7d9ba34fa926b39a132d3216fa37347b2999ff0cb2cd963497166a84259ac4927e44fdfc11", @typed={0x8, 0x7e, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x20, 0x0, 0x0, @u32=0x6}, @nested={0x8a, 0x6b, 0x0, 0x1, [@generic="3c25c14575a3a401eeeb9ef65b0e5288651609dad1bc82af977f662745dd2a0b5e664b8996e6661c7010ce17dbe2989c3d9d5d0083afa3d3173b2f2990d4f04c0527d26306e73c75b8f2bbf41c072b7068f6dc82dca4c088036b156ff0b2e7b9b7963a588e517550761de013b271cfe356862d5cc3ba62d32feae7daa9eb0751a11a9eb37b33"]}, @typed={0xc, 0x91, 0x0, 0x0, @u64=0x9}]}, 0x1234}, 0x1, 0x0, 0x0, 0x8000080}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file1\x00') pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/devAsg'], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x8, &(0x7f0000000200)='^},\x00') 21:58:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) 21:58:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001500)={&(0x7f00000002c0)={0x1234, 0x2d, 0x4, 0x70bd26, 0x25dfdbfb, {0xd}, [@nested={0x2f, 0x44, 0x0, 0x1, [@typed={0x14, 0x2b, 0x0, 0x0, @ipv6=@loopback}, @generic="4b87b207b14e26462cf74939e376e22c78dd564cceff81"]}, @nested={0x1024, 0x8c, 0x0, 0x1, [@generic="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", @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x2}]}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@private0}, @generic="3f26303659f77682c99489b34162736af99d674015bff5ba127a7e5cbae9272a25437ee48b8e9e25c61ddee7918242c6251be5a26a262446518c7c2b43e238f80c87f0b355322b0aed8583d67d653affb7176cd44853ef7d3f46505b2b946b4fa081aaf41290ac741ec577527f9565da0990790c16c40e8a6a781a7320b4201346f3114f8881832ac5af00d5653ab5753d964906670c77ad1e3d7877b491896da93a12806d4d59036df4725b865ab84fcb4e8ec909d694835f26474545dd7f92b1c8b45c670746a80f3532e1cc678b690db01a0009e710de8792ef3ae8f644438ff337b1f3685953f1", @generic="7d9ba34fa926b39a132d3216fa37347b2999ff0cb2cd963497166a84259ac4927e44fdfc11", @typed={0x8, 0x7e, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x20, 0x0, 0x0, @u32=0x6}, @nested={0x8a, 0x6b, 0x0, 0x1, [@generic="3c25c14575a3a401eeeb9ef65b0e5288651609dad1bc82af977f662745dd2a0b5e664b8996e6661c7010ce17dbe2989c3d9d5d0083afa3d3173b2f2990d4f04c0527d26306e73c75b8f2bbf41c072b7068f6dc82dca4c088036b156ff0b2e7b9b7963a588e517550761de013b271cfe356862d5cc3ba62d32feae7daa9eb0751a11a9eb37b33"]}, @typed={0xc, 0x91, 0x0, 0x0, @u64=0x9}]}, 0x1234}, 0x1, 0x0, 0x0, 0x8000080}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file1\x00') pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/devAsg'], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x8, &(0x7f0000000200)='^},\x00') 21:58:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 210.966476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 216.383434] Bluetooth: hci2: command 0x0406 tx timeout [ 216.384545] Bluetooth: hci0: command 0x0406 tx timeout [ 216.385559] Bluetooth: hci3: command 0x0406 tx timeout [ 216.386559] Bluetooth: hci1: command 0x0406 tx timeout [ 216.387559] Bluetooth: hci4: command 0x0406 tx timeout [ 216.388562] Bluetooth: hci7: command 0x0406 tx timeout 21:58:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) 21:58:38 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x6c040, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x1000, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x204800, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r3, 0x5000940e, &(0x7f00000001c0)={{r1}, "d45fceaa11b1ff109d3d0596cf00f7be7c0cff11097103520dd226acbca5b8901f2ebac3b1d5d38c2c072c22b6f23f7349f8fc677f6467c3eac1e1250be151546b84cdd28fe15198e26dc405a2432cb178cbc69f231aa3c5ef4e3ab15c5459462937e0fc0160e2d71c1800540a4287765a33b876e9ff52a8df08df47449bfd8037dff53fad190af3298a0e200aa816d94ff5310ed5a45deb24019faff9ee67dfaf162eaf23bb24f21b79f1969e3270413a527e6167ee32b360c65230de78797460629a45327702266d0a633c2161e69071cdabd8255f350ff0f1c18cc7397996df497cc2fb72e070fa13069ef242b30a0ccd3b1184c739f56524ea15c9656d4339cfc36cefc5ac2081a3a20510ab60c59d064386c1a44d1e635d19bf67edadcef1a0e2e476b7324135e59521618745af6b6e4a14ae265752bc4ece3b7a8fbc518eb51f327bc307947cf661a9d6f6029f75ec1077e154b3909551d35f2387aef281bf4d78ada4c10c808f95b0f54f8dd199e017585af14b4e8479cbea7f42923bcd356930b0ffc91f194733aeae570dee50771fd898987128d632e2d8fb81b806be48d11d7586c936bc0f290b0f6c0913d66a3755d7ca8d816399dfa1d8f5092b80e72c85b5979cbab6b1063256513f8eadf3c49eb0b4e9ccdad787e58ea57e3f94679d718e890754e9b31a75b43b4096731e0d5479a615ec49547f4aa2319466d69705db571d215e8e7dcdfcfac3e9cb5960e7c260a75cb52c5308130eb15a5fb8a8be48c49c5bb512457debddd46f55a8ca275ea3af71cfc0758b6cd25fef53c8c752bffc366b401f871eff7e1f79521803493de82e4f2a146efcac39d5b4d7fe43972129e06550ce9ae8a35f1b452afe80d156e9b0f6cfdea63b5156aee0ac0053a3c92e2e7d7855b09c81ddbeb5dc33ca9de99517c2b4e1fb6d3f90ffab78721d4aafb9e93153959b38851b273330d184e8f538184cb885f6c0856069b3334bb66739b5baa2aa9a64edeae4606b645f385d1684073f7cc395f84acd54d1776da23371b8bba71256e8f7928da47fcd34c6757315eb752c56886313631b1aefada2ce300f9e9931663aea1d7d1272cfb954f96dca8ad08124e1aeab747338492ef3a5193a62cdc9bf8f8f2a75f441cb2c6380e4a7faab4ba7d3d24524576b4f9e258c23d1831f6be3c6147daf866afc2004d9d787352bd0640a9ce864ec62b221db6f3902944ed0cdb6740c58999b51dd42ca58c576ffc8ade75a4f910ce936cbe164480e1cf22cb574c89dd89b5e4b1b4b6852ef85803ac623eb16109a10449253fd18ac9dac3eaa43a54335939e216582952b036c79c6a469fa5b0dca1ab4ef1ffd9699f924cc471aa7b6d5ed3b4d14630fc22a01082623654f6d2c779b399ac8690e154d2759c4f744a6a1da4221ef8d7acb0a29e47e4539c1f31345aa3e1606e3ebfadf22323c809473806d2ff05ae4f7a6fb9c1ffccb46dbc313863ef2b6e5daae04674486322a1404fdb402e53df29256cd242fa8a147741dd0f333d532c9d40f6eaf4f94ffc248868064eddf6eab7a06cae77069bf6211b7af43ec409326e030f4a894ba4e320697ac4db8bb12099ed0e05f4a7b24d6ca82bdb2f953f99c8a8ff5212c110e2bd3372400629201f34007f87fecb2a240e19bfcc8ee26136e0b64885ac69fc1e5236a358aec2847dc90e546fbc8c0ada7efde18ea6a9c64fca4be0c68bd48618c0d5a7752f41934c175e74790c90373836bfd64b5993ca0b72c3df0a8795dd7c0e62c2ce153cf0437b1ff26d80109543136d4a64d53b53f393d33b43b7d7a1a7dbedd1a47757bc2fffb1c034698a729fc06f4dd33a07ba7c11dad609e46b961b830c0237feb9d2b14fc5eb643e4081c2b75e159ce2b708871644a117536869198da02c14fc1689ca83deafae3dca51d62d5aba19b549a813cdc89a46318d6a3aa808eca2113a5958d93aabac529b99cfcde7b0ae497e6afb823d932ae280a0bb3013f77ff7e25b77a803289a06cd4e4e070f88e8f5000b88e16118a18eacf79b6be902166c40f2aec45929ab42b2aaa5ecd8856983c0e04b715937a95cc967621b34878b43b48df2e556a350b316b30bbdc9e666089c0fb9809830339bc7e783c204499c200b588090a1cc370e24081c3d6f6c63c26e622014f5e9dd217ac4cfa746c67446eb838d46440a02e0222e315d9cba735fb659abf9594162812dfc1d0b3dbe21880b4deb68347ae68c56a1eb0255c37bfb88566952212abde9da8ff60d217bc9bf01afe023c6e74f6f37cbf538bee476c8dd86e809337c91d151825b2d65618d18bae7e78e3d826c45fe31c7f6d93150814c98b6f3b9712ff4b5be4b001db2f0dcad5d9410ef1fd6256c95180d1d133abd4b1ef8c89eee1d8356b962d66f15d7b6ebeac3294e0f8fb81aa328b6d6ed40da758350b1c393a2f6f795cb1f579d60f544f17a387f5f2c511f06c40a371fb710835e469bd4a8b621c409703f3009ec9f38ab33ba00103efec5ebf59d71d0c87e91423936d93768910a325a52e0c80b3646ec2b2e796596593c4533cd88d56d2e1d3b5dc9370a95e7663aff16f501e9c4e2f2610a7dc25df2b86632cce18907c55216c0bf374f028c69c2b04dd523e8b8fbdbc189549eaade7f1d9363578640f5130533b36f1a9f1700df97e30a635bce750d7699c977d61c43e152ba7b389b94c33709c2643766d7dc19c4d3f911200a640de88cdf2dbf607688659915aaa5a7d52463d8c206633e8e8622c829221f51371592c7684d2be7d53ce6bd9088cb116effb89bb394311d12454b21a3890e7b33ce5c8b5d7fe63e80b753a2c005e6ef503073a7cbaa41bcf1ca46e801a707997bfb0659c46ebf736012008fc8190efc9ac19c94d2b1aedbf65157de9f883d097140068250848a2b3bb02f22d84a5bdc16825d846622c26fb0ae507845041921ac0010a46c97cdbcaa71f8b8fd6b1a75c4ac82f94aa15e15da3c2847167db9031dd2a7627b7e4d268485f02fba48e6471b1be0c76321b015933ec4ea29dbcd3c88905b87cd71fab135422d249d8db302182106dfeb2bf9041860fc90689cc0a6e2be9f4e4d5ac3bd89c71c2a97651cb850cd5019a79d0789e06c958704ef69a757b5583ab001759b0a73bee1ac9feafcd81f1ed6340a1e8d6a306a4c1f2d918609468de62e2fea3f4eea3c2463040a4b13fac2060c7d64abfccbb77165b0e2843cf45162b791cfae5219c7540b3c6452a864b3a547d1f2163cc2f86f959fdfead76deaeaa46269b98f2f183ecbe062b29cc1f1da26037b71b106cf86c0394f90cd90badcd39273d17684b897880c24ac8ff2abf55d12b981b61aa128c2e9fa5320f856831979901401cfd99a17defc4a55470980a9e40f5768ded8d0e7c57f2d23464a5a3d097afc6ad70c4dbf96f9da67d6598282536960fc245922368742a604893b74a2392eb17a5b3dde19705222cdb37dd68d4fd72d803a04f14e801e08842256b4a8427b76a783dffd0d55d47cbc9b78b7455f18767a9256c954f86e600a5eb8d85e1a26527eccfad584bab264bd0318e22d84f7b64913be3545830e7e48fc77a133cbedeb346264dd1c0b68c7a8a0cd13792ad04e3484d1e0861a8d9b684b3c2be273c9d753238088f860b13eea9009ae8ee57f8c0eca40cbb7ca5ba670e95d5f4a1c41fc3914b98f9ca7189fd141488677154f659bbd6cba4e9f959097964c60640c9629a3c69a7941c1d69514cd9d3944b855967569ae692254e86d9a5bd96a05240f4b078801a12b439195bf80caa07d0f793b9acb4f4151d8c895da888ac62a401013d2f4ed569d410d174287728615f05f08fd9292444bc2837ff57515f944ca666ba38059cf3a24d7292474f9c9d668681eb57c6e09c8da925d0d0813363930105dc8a7c6f447180a8691013e9404571e4ec36b5d63725561a5235c51563ce142717d653e559a624b6f4ba9062f4e3b55ce57c9e969bc85b2b08cf0db8d14eec5dac1e3767e70711755ba77217025f0f13407bd7fafa699f6ba85787627ce6924ce663afeb3cfc2056f9142ff69dcbeb83eb7e0861f407f3b559422b4001846c3a18f631177e6a2e24e054b3b94425622d2ec9c26300911bcadf2ffa8419bae61d4b59da87a498507752f9c260f7d7095c051c71ec1ea6ae46f367a5dae32e0e0efc04352c75d76755888767dd7e8d3d1d62e841da03087942e1fa91a9bffb61460d8c73cba13381cd8c70ef5cfdd4421df4a8c614184b9520a7f6ecf26c35154c2e5b1ba2d90b2a4fa33668a9599a2a10c7221d9fd7b89ce0f0fdc85d0cd33088899f13976d3d4783f58a122de96141ec2bb82567cd5b86adf91925dae71b9a20d4227b6f6cf90f26f4bf5b810dc3d65307d18accb76eee111b4635f7f8a5c536ff10292f46a68fea3cd9e5aa3acb61f7dd224604446de305e5c18e42335baa9fca11ccda21ab936e3f651462d2ae894f8265143a782744e4a8941671e080c2d75f67d152ea0ca50a74e0c9e27370b2a60af06596034a52b886e8ceb701bbf7cced50b56ab78f30ab5b08ef0d4c382568cad3d0da156e3171ceed4e6d1e47f0d859cc8fd6f72072ca8ebbcd25f44555c99da87305f0efb95a72490790ae3dc8f29674c2d8c95165f018b3a1f4c263c9cff8e25031c0669488f72ce3cb4e5a9b674016f78674e789110968252abd11c3c062b3c35753957446da47e9a77a90c8fb243154190a1acd18f448b5c3406d9c86779b0218fc151fe0f676f2bf150ec8b2de8440ce3d381658222e2f763d6a89b16cb5e761549cc0e22001ee49784ff379ce3008a0aa6824d7c076248225e8b88f1c68a868a27dd79b3d4c1de6b1be0c356eb9cdfc428a9c9f8c1aab19d1f09303523661ccbb89784d61fb4246c805bc990ab9dba29223a14ccdb5de6c83ed3fe24bf6b2a971ab4589ee8648f091b9723e5efbea4f45449212c581a6929280741fa11c30906813eb51fa893fe7e0db63a022772f189d41670c5335aafe67b79ace0f0761e17f77985857be8e8523d172c5d42e0fc50928bb1c105e0961588c77fe5082f0fa8eee2a6b0b9b11e5251e58d14cd57e658bd56301b7caa3e67bbcaebca3ea456c649f3a750fe13b22f856bacae1933ddc232765c2175f204c593f1f90d4fb241887da180755ea8b3c496df313507f4c559e9c20b56c332ed8abb93b1e32f398d6fb30161df1e6500b9ec0098cb298d81561b2a3cb5b99cd2ba987121306f986846a309bb8e6c212a4be962692137c66a7724a74b42747a57d112afd9abc51be1f0f7629860d5bf811c72d8c09f418d0d454051984ef03e91b9f1a09f5a37236637689293ba6dcf287125557d386736e1a9c0d1d5f32c36bb35793826d90880d3262f0faedf422edabb95e84871ec4711971b022f36047cbdabd49393c98a40924343a9989095ecc28a84964d1cadf58e81a00b8b926d9c0062a7be7f579c0db6f554430d54bbe5a512444ae443166c30ebec9905328b0d6fd86c225b2ac32c4fd43b7b05ceefa2a6ea7f4a75fa6cb81980011eb22707a14484e0d2e55c614d7a0eb13e2fafd55daa96973b5604f870ca3f0c9490a66a7a991783a478028b5b0d52b819299424d58e339723af19747c8c3bc8188bee615384f0e48489348fbddbb44322d94b615901ecc05a4cbcac4f16887344eeafd31de1dfa80bda8729d8073512ca157d00de99adaab4f77ae706e78ed1329b55651f5c477a558aa0ae73f29a3145b7f5b740934b8142c8c276c"}) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000180)=0xffffffffffffffff) 21:58:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x888, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x2210, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000280)) 21:58:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:58:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001500)={&(0x7f00000002c0)={0x1234, 0x2d, 0x4, 0x70bd26, 0x25dfdbfb, {0xd}, [@nested={0x2f, 0x44, 0x0, 0x1, [@typed={0x14, 0x2b, 0x0, 0x0, @ipv6=@loopback}, @generic="4b87b207b14e26462cf74939e376e22c78dd564cceff81"]}, @nested={0x1024, 0x8c, 0x0, 0x1, [@generic="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", @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x2}]}, @typed={0x14, 0x23, 0x0, 0x0, @ipv6=@private0}, @generic="3f26303659f77682c99489b34162736af99d674015bff5ba127a7e5cbae9272a25437ee48b8e9e25c61ddee7918242c6251be5a26a262446518c7c2b43e238f80c87f0b355322b0aed8583d67d653affb7176cd44853ef7d3f46505b2b946b4fa081aaf41290ac741ec577527f9565da0990790c16c40e8a6a781a7320b4201346f3114f8881832ac5af00d5653ab5753d964906670c77ad1e3d7877b491896da93a12806d4d59036df4725b865ab84fcb4e8ec909d694835f26474545dd7f92b1c8b45c670746a80f3532e1cc678b690db01a0009e710de8792ef3ae8f644438ff337b1f3685953f1", @generic="7d9ba34fa926b39a132d3216fa37347b2999ff0cb2cd963497166a84259ac4927e44fdfc11", @typed={0x8, 0x7e, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x20, 0x0, 0x0, @u32=0x6}, @nested={0x8a, 0x6b, 0x0, 0x1, [@generic="3c25c14575a3a401eeeb9ef65b0e5288651609dad1bc82af977f662745dd2a0b5e664b8996e6661c7010ce17dbe2989c3d9d5d0083afa3d3173b2f2990d4f04c0527d26306e73c75b8f2bbf41c072b7068f6dc82dca4c088036b156ff0b2e7b9b7963a588e517550761de013b271cfe356862d5cc3ba62d32feae7daa9eb0751a11a9eb37b33"]}, @typed={0xc, 0x91, 0x0, 0x0, @u64=0x9}]}, 0x1234}, 0x1, 0x0, 0x0, 0x8000080}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file1\x00') pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/devAsg'], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x8, &(0x7f0000000200)='^},\x00') 21:58:38 executing program 3: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001100)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3, 0x4}]}}}], 0x18}}], 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000300)=ANY=[@ANYBLOB="5dcfa8b042101a85bb03b449c8627c96843cb52fde07abc741fe2f1b0e5d344bb330d1697b377a34a7adbcc84f6cb1f2e4e40c4ee887399478f4fa8fbfaa1ecf0ab85fb7310fe276291208cd75fb2a697480b3058995563bc21ee854026b276894f435e8649b97fcd80268957a21a6ac59599dfc65aa64b3c4acca62cc24e494", @ANYRES32=r0, @ANYBLOB="00040000000000002e2f66696c653000"]) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000280)={@local, @mcast2, @mcast1, 0x2, 0x0, 0x0, 0x0, 0x8, 0x6080150, r3}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000180)={'erspan0\x00', r3, 0x7800, 0x700, 0x2, 0x3, {{0x18, 0x4, 0x2, 0x6, 0x60, 0x64, 0x0, 0x0, 0x4, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x88, 0xf, "0439ffc3ebe3d5495fc978b6e8"}, @end, @ra={0x94, 0x4}, @lsrr={0x83, 0xf, 0x5d, [@remote, @loopback, @broadcast]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x13, 0x56, [@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x17}, @multicast1]}, @ssrr={0x89, 0xf, 0x46, [@loopback, @multicast2, @multicast2]}]}}}}}) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 21:58:38 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x518d0dd6}, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c460009000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000700000000000000bd957fd92f411ce18f895838cbaa4d10431d6f1ff91416ba3d46d46f9806d0d4794ceeeea2a5db653d90fb7d492f9319d402b6e737a65be0d6103a89d9fb0225245ad48f3efc11c748601e2c14070aedcf8790cb988fd9a9dc42560687a7ca8bdb9a4308453cbc1b30fbefed1014e06c663745c9642cd44c9b610f570a3f9f879c67c210929c75380a32e7910a5057b77e7bd0079d943a44fa0493ff131383c73cac8ae601866e27e490ecdc05fa94e4e033e84ef40df030f991b72629e4b699180c2d59c227c254c29573c7ebe968993b2a808c7a7de46d4a"], 0x511) 21:58:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) 21:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:58:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000002c0), &(0x7f0000000480)={'U-', 0xbef9}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"/336]) r4 = perf_event_open$cgroup(&(0x7f00000014c0)={0x1, 0x80, 0x64, 0x20, 0x1f, 0xff, 0x0, 0x2, 0x800, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5a4, 0x1, @perf_bp={&(0x7f0000000080), 0x3}, 0x200, 0x613e, 0x4b6, 0x9, 0x3, 0xffffffff, 0x1f, 0x0, 0xffffffff, 0x0, 0x7}, r2, 0xf, r2, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000001540), &(0x7f0000001580)={'U+', 0x8001}, 0x16, 0x1) getdents(r3, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x837013, 0x0) unshare(0x48020200) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0/../file0\x00'}) ioctl$FIONREAD(r5, 0x541b, &(0x7f00000017c0)) [ 223.540919] audit: type=1400 audit(1715464718.972:26): avc: denied { setattr } for pid=4543 comm="syz-executor.2" name="mounts" dev="proc" ino=15557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 21:58:38 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000740), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x200, 0x3) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="8ee2309c47995455ec7dced68eb160c46014b839663252e10fdc61f5e2e2fd88054934d706470c49e1ecb5911b279caf9597c38f7138e265a9c0895eb5c08249a2c2fffbb7cf7c5a067a39e016d7a7be11e2a0359da88dd80144d1175f50989065d52c715c0fec711859e0ef0d7a51407b3c7d181c7a613c92ee0fb23ccfcc9ad88560cba56f1d1efc1e673619d9a31f9815bd4010524cce05589faff0ede4bcae4f0a79b2c7bf7721c3abcb4c37089fe8606a8293f7106711070be0505b1fa4c390dd60589e10d91df26fd0e49770", 0xcf, 0x2001, 0x0, {0x0, r7}}, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x10, 0x0, {0x0, r7}}, 0x84) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4000, @fd_index=0x9, 0x7, 0x7, 0x100, 0x3, 0x0, {0x2, r7}}, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './cgroup.cpu/cpuset.cpus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000002e2f6367726f75702e6370eb6bc09f4ef0a9ffc25b4d752f63"]) pipe2(0x0, 0x4800) io_uring_enter(r0, 0x58ab, 0x0, 0x3, 0x0, 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0xb8080, 0x0) syz_io_uring_setup(0x5ccd, &(0x7f0000000180)={0x0, 0xf6dc, 0x4, 0x1, 0x232, 0x0, r8}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) 21:58:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x28a0440, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_uid={'access', 0x3d, r2}}, {@aname={'aname', 0x3d, '$*,{%'}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0xa}}, {@obj_user={'obj_user', 0x3d, '\'\\'}}, {@euid_gt={'euid>', r4}}]}}) 21:58:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) 21:58:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:58:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:58:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 21:58:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 228.160381] Bluetooth: hci5: command 0x0409 tx timeout [ 228.352364] Bluetooth: hci6: command 0x0409 tx timeout [ 230.207431] Bluetooth: hci5: command 0x041b tx timeout [ 230.399363] Bluetooth: hci6: command 0x041b tx timeout [ 231.049292] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.050429] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.051870] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 231.064028] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.064803] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.065935] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 231.259974] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.260753] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.272907] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 231.293715] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.294521] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.307954] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 232.255467] Bluetooth: hci5: command 0x040f tx timeout [ 234.303408] Bluetooth: hci5: command 0x0419 tx timeout 21:59:01 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000380)=""/164, 0xa4}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x3, 0x7f, 0x7) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x6, 0x8001, 0x1, 0x32b9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff001, 0x0, @perf_config_ext, 0x800}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xfffe, 0x40b, 0x7, 0x7f}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 21:59:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 21:59:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 21:59:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) 21:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:01 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000740), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x200, 0x3) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)="8ee2309c47995455ec7dced68eb160c46014b839663252e10fdc61f5e2e2fd88054934d706470c49e1ecb5911b279caf9597c38f7138e265a9c0895eb5c08249a2c2fffbb7cf7c5a067a39e016d7a7be11e2a0359da88dd80144d1175f50989065d52c715c0fec711859e0ef0d7a51407b3c7d181c7a613c92ee0fb23ccfcc9ad88560cba56f1d1efc1e673619d9a31f9815bd4010524cce05589faff0ede4bcae4f0a79b2c7bf7721c3abcb4c37089fe8606a8293f7106711070be0505b1fa4c390dd60589e10d91df26fd0e49770", 0xcf, 0x2001, 0x0, {0x0, r7}}, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x10, 0x0, {0x0, r7}}, 0x84) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4000, @fd_index=0x9, 0x7, 0x7, 0x100, 0x3, 0x0, {0x2, r7}}, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './cgroup.cpu/cpuset.cpus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000002e2f6367726f75702e6370eb6bc09f4ef0a9ffc25b4d752f63"]) pipe2(0x0, 0x4800) io_uring_enter(r0, 0x58ab, 0x0, 0x3, 0x0, 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0xb8080, 0x0) syz_io_uring_setup(0x5ccd, &(0x7f0000000180)={0x0, 0xf6dc, 0x4, 0x1, 0x232, 0x0, r8}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000240)) 21:59:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x888, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x2210, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000280)) [ 246.078294] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 21:59:01 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000002c0), &(0x7f0000000480)={'U-', 0xbef9}, 0x16, 0x1) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000001640)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"/336]) r4 = perf_event_open$cgroup(&(0x7f00000014c0)={0x1, 0x80, 0x64, 0x20, 0x1f, 0xff, 0x0, 0x2, 0x800, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5a4, 0x1, @perf_bp={&(0x7f0000000080), 0x3}, 0x200, 0x613e, 0x4b6, 0x9, 0x3, 0xffffffff, 0x1f, 0x0, 0xffffffff, 0x0, 0x7}, r2, 0xf, r2, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000001540), &(0x7f0000001580)={'U+', 0x8001}, 0x16, 0x1) getdents(r3, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x837013, 0x0) unshare(0x48020200) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0/../file0\x00'}) ioctl$FIONREAD(r5, 0x541b, &(0x7f00000017c0)) 21:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) [ 246.205140] EXT4-fs (loop1): bad geometry: block count 128 exceeds size of device (8 blocks) 21:59:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 21:59:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x3b, 0x0, &(0x7f0000000080)=0x1f) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) accept4(r0, 0x0, 0x0, 0x80000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x290004, &(0x7f0000000800)=ANY=[]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fork() 21:59:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 21:59:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 21:59:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 250.879397] Bluetooth: hci6: command 0x0409 tx timeout [ 252.927430] Bluetooth: hci6: command 0x041b tx timeout [ 254.975390] Bluetooth: hci6: command 0x040f tx timeout [ 255.780902] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.782859] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.785630] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 255.824881] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.826081] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.827962] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 257.023436] Bluetooth: hci6: command 0x0419 tx timeout 21:59:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 21:59:25 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') r2 = dup(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7, 0x42808, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x23, 0x0, @perf_config_ext={0x1, 0x7}, 0x6808, 0x1, 0xd0ed, 0x4, 0x5, 0x9, 0x0, 0x0, 0x3, 0x0, 0x8001}, r1, 0x1, r2, 0xb) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) fsync(0xffffffffffffffff) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x1a, 0x0, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x0, 0x11, 0xc, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000140)={0x2c, 0xa, 0x8, 0x1d, 0x0, 0xbbd, 0x5, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x80, 0x5, 0x4, 0x3, 0x2, 0x3e, 0x4, 0x366, 0x40, 0x3ab, 0x415, 0x1, 0x38, 0x2, 0x4, 0xdbe1, 0x52d}, [{0x6474e551, 0x0, 0x1, 0x4000000000, 0x7, 0x80000000, 0x1, 0x1}, {0x4, 0x1, 0x7, 0x7, 0x9, 0xffffffff, 0x79fe8d1c, 0x3}], "3802bf9f856db7064f87eba6f1198f4d094b502807895fa6a9648a4e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xacc) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xffe3) 21:59:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x40086602, 0xfffffffffffffffd) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0xfffffffd, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x4c, 0x0, 0xc0b, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CQM={0x30, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x24, 0x1, [0x8, 0x0, 0x3, 0xfffffff9, 0x8, 0x200, 0x8, 0xffffbe48]}, @NL80211_ATTR_CQM_TXE_PKTS={0x8}]}]}, 0x4c}}, 0x0) lseek(r3, 0x0, 0x3) syz_open_dev$hiddev(&(0x7f00000001c0), 0x8, 0x40501) getsockopt$netlink(r2, 0x10e, 0xb, 0x0, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x100000001) 21:59:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) 21:59:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:59:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:25 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x5e7270a966ef3db7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x20, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001380)) openat(r1, &(0x7f0000000300)='./file0\x00', 0x446c84, 0x4a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) openat(0xffffffffffffffff, 0x0, 0x404100, 0x0) write$P9_RREADLINK(r0, &(0x7f0000001680)=ANY=[@ANYRES64, @ANYRES32, @ANYRES64, @ANYRES16=r2, @ANYRESOCT, @ANYRESHEX=r0], 0x10) openat(0xffffffffffffffff, 0x0, 0x0, 0x120) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/65) sendfile(r0, r1, 0x0, 0x20d315) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0/file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000340)=@v1={0x0, @adiantum, 0x1, @desc2}) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000140)) 21:59:25 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) [ 270.384791] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 21:59:25 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 270.400550] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 270.402101] EXT4-fs (loop1): get root inode failed [ 270.402673] EXT4-fs (loop1): mount failed 21:59:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 21:59:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:59:25 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:25 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') r2 = dup(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7, 0x42808, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x23, 0x0, @perf_config_ext={0x1, 0x7}, 0x6808, 0x1, 0xd0ed, 0x4, 0x5, 0x9, 0x0, 0x0, 0x3, 0x0, 0x8001}, r1, 0x1, r2, 0xb) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) fsync(0xffffffffffffffff) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x1a, 0x0, 0xa, 0x2, 0x81, 0x2, 0x80}) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x9, 0x0, 0x11, 0xc, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000140)={0x2c, 0xa, 0x8, 0x1d, 0x0, 0xbbd, 0x5, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x80, 0x5, 0x4, 0x3, 0x2, 0x3e, 0x4, 0x366, 0x40, 0x3ab, 0x415, 0x1, 0x38, 0x2, 0x4, 0xdbe1, 0x52d}, [{0x6474e551, 0x0, 0x1, 0x4000000000, 0x7, 0x80000000, 0x1, 0x1}, {0x4, 0x1, 0x7, 0x7, 0x9, 0xffffffff, 0x79fe8d1c, 0x3}], "3802bf9f856db7064f87eba6f1198f4d094b502807895fa6a9648a4e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xacc) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xffe3) [ 270.594800] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 270.595933] EXT4-fs (loop1): get root inode failed [ 270.596365] EXT4-fs (loop1): mount failed 21:59:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:59:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x6000) 21:59:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x40086602, 0xfffffffffffffffd) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0xfffffffd, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x4c, 0x0, 0xc0b, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CQM={0x30, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x24, 0x1, [0x8, 0x0, 0x3, 0xfffffff9, 0x8, 0x200, 0x8, 0xffffbe48]}, @NL80211_ATTR_CQM_TXE_PKTS={0x8}]}]}, 0x4c}}, 0x0) lseek(r3, 0x0, 0x3) syz_open_dev$hiddev(&(0x7f00000001c0), 0x8, 0x40501) getsockopt$netlink(r2, 0x10e, 0xb, 0x0, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x100000001) 21:59:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x18080, 0x0, 0x0, 0x0, 0x8000672ab4c7, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r0, 0x40049409, r1) write$binfmt_elf64(r1, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xff, 0x7, 0x0, 0x3, 0x3e, 0x8, 0x2c8, 0x40, 0x131, 0x4, 0x2, 0x38, 0x2, 0x101, 0x2, 0x4}, [{0x6, 0x101, 0x7ff, 0x2, 0x8, 0x9, 0x1}], "2e3c5fcba939f7edc487ab75748bf1df7bbee4268ef892fbc5036241c2164ce8024ab8aecd939e", ['\x00']}, 0x19f) 21:59:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:39 executing program 3: prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x170) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="e50185630a826070b74cdcbc71cfc984be36d1ed0172f5194f5d225c547bd0a4da056d65b1814f4a9a54b856c3f93b54b088487f2c5a2cc51cbcd7c3207a748c6fed80e057f570f105d49197133140f8ef62a99890a782cf084d466eb9f95d280a5b2e7489c11c1e436af0d226bc9aac292671a20edd92e45cb363fb0d393bca5382e9be52be202046607efb925c615a5b6a5ca6496bbff565c1a56739d8d27cfc393420cff8f6221773789cb5842d85acfe521765853dc600f1ef4ba10b65229483e1f29d1548ba88ae520bf5d1562c4afe", 0xd2) 21:59:39 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616eb93dff694e0a912f207db466642c726d646e6f1d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x145003, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x108}], 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r5, 0x4040942c, &(0x7f0000000200)={0x0, 0x3ff, [0x9217, 0x3, 0x1, 0x0, 0x4, 0x200]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) syz_io_uring_setup(0x205b, &(0x7f0000000100)={0x0, 0xd3f6, 0x1, 0x0, 0x2cd}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000080), &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3a}}) pidfd_getfd(r1, r4, 0x0) [ 284.072425] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 284.083017] EXT4-fs (loop1): get root inode failed [ 284.083879] EXT4-fs (loop1): mount failed 21:59:56 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616eb93dff694e0a912f207db466642c726d646e6f1d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x145003, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x108}], 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r5, 0x4040942c, &(0x7f0000000200)={0x0, 0x3ff, [0x9217, 0x3, 0x1, 0x0, 0x4, 0x200]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) syz_io_uring_setup(0x205b, &(0x7f0000000100)={0x0, 0xd3f6, 0x1, 0x0, 0x2cd}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000080), &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3a}}) pidfd_getfd(r1, r4, 0x0) 21:59:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x80, 0x0, 0x9, 0x0, 0x5e, 0x80060, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000004, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x6, 0x0, 0x6, 0x4, 0x3dfb}, 0x0, 0x2, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000680)=0xe8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)={0x8}) read(r2, 0x0, 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYRES64=r2], 0x46) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x6) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x100, r4, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_RULES={0xe4, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xc00}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xcc}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xaf86}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x800}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xa8f5004}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x80000001}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x10000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x8}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xe0000000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x4}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x3f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x8}]}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x5}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x2404c804) openat(0xffffffffffffffff, &(0x7f0000001240)='/proc/self/exe\x00', 0x200, 0x0) 21:59:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 21:59:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:56 executing program 2: socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x5453, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_procfs(0x0, &(0x7f0000000440)='children\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team_slave_0\x00'}) fchdir(0xffffffffffffffff) prlimit64(0x0, 0x3, 0x0, &(0x7f0000000080)) 21:59:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) [ 301.010738] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 301.012073] EXT4-fs (loop1): get root inode failed [ 301.012622] EXT4-fs (loop1): mount failed 21:59:56 executing program 4: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000008c0)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8d05520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4", 0xfffffffc}, 0x48, 0xfffffffffffffffb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r2 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r4 = syz_open_procfs(r3, &(0x7f0000001700)='net/ipv6_route\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x3, 0x3ff}}, './file0\x00'}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 21:59:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 21:59:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) [ 301.187925] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 301.190054] EXT4-fs (loop1): get root inode failed [ 301.190920] EXT4-fs (loop1): mount failed 21:59:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="bed7179c5a050f6c"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vfat\x00', 0x0, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9", 0x4e, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001300)=ANY=[@ANYBLOB="646d6f64653d3078303002003030303030303030303030352c6e6f636f6d70726573732c646f6e745f6d6561737572652c736d61636b66736465663d2f6465762f737230002c61707072616973655f747970653d696d617369672c736d61636b66736861743d2c646f6e745f686173842c635c6e746578743d00000000000000002c00a2c904fe98fc22c25aa015c78d2bd35621872c849d2afb58f83e98ca90d7f66039bd38310d6ac4083c5cec02662633b5e41eb6f581b77d7a54a223"]) rename(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)='./file0\x00') r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r2, 0x40049409, r3) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0x7, 0x200000) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40, 0x100) openat(r5, &(0x7f0000001400)='./file0\x00', 0x246502, 0x98) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001200)={'caif0\x00'}) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) 21:59:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 21:59:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) 21:59:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 301.378183] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 301.382041] EXT4-fs (loop1): get root inode failed [ 301.382476] EXT4-fs (loop1): mount failed 22:00:09 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616eb93dff694e0a912f207db466642c726d646e6f1d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x145003, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x108}], 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r5, 0x4040942c, &(0x7f0000000200)={0x0, 0x3ff, [0x9217, 0x3, 0x1, 0x0, 0x4, 0x200]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) syz_io_uring_setup(0x205b, &(0x7f0000000100)={0x0, 0xd3f6, 0x1, 0x0, 0x2cd}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000080), &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3a}}) pidfd_getfd(r1, r4, 0x0) 22:00:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 4: add_key$fscrypt_v1(0x0, 0x0, &(0x7f00000008c0)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8d05520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4", 0xfffffffc}, 0x48, 0xfffffffffffffffb) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x4, r1, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) r2 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r4 = syz_open_procfs(r3, &(0x7f0000001700)='net/ipv6_route\x00') readv(r4, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x3, 0x3ff}}, './file0\x00'}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 22:00:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 22:00:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="bed7179c5a050f6c"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vfat\x00', 0x0, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9", 0x4e, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001300)=ANY=[@ANYBLOB="646d6f64653d3078303002003030303030303030303030352c6e6f636f6d70726573732c646f6e745f6d6561737572652c736d61636b66736465663d2f6465762f737230002c61707072616973655f747970653d696d617369672c736d61636b66736861743d2c646f6e745f686173842c635c6e746578743d00000000000000002c00a2c904fe98fc22c25aa015c78d2bd35621872c849d2afb58f83e98ca90d7f66039bd38310d6ac4083c5cec02662633b5e41eb6f581b77d7a54a223"]) rename(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)='./file0\x00') r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r2, 0x40049409, r3) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0x7, 0x200000) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40, 0x100) openat(r5, &(0x7f0000001400)='./file0\x00', 0x246502, 0x98) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001200)={'caif0\x00'}) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) [ 314.408734] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 314.420337] EXT4-fs (loop1): get root inode failed [ 314.420779] EXT4-fs (loop1): mount failed 22:00:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616eb93dff694e0a912f207db466642c726d646e6f1d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x145003, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ppoll(&(0x7f0000000000)=[{r2, 0x108}], 0x1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r5, 0x4040942c, &(0x7f0000000200)={0x0, 0x3ff, [0x9217, 0x3, 0x1, 0x0, 0x4, 0x200]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) syz_io_uring_setup(0x205b, &(0x7f0000000100)={0x0, 0xd3f6, 0x1, 0x0, 0x2cd}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000080), &(0x7f0000000180)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3a}}) pidfd_getfd(r1, r4, 0x0) 22:00:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 22:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 314.677713] EXT4-fs error (device loop3): ext4_fill_super:4962: inode #2: comm syz-executor.3: iget: special inode unallocated [ 314.684940] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 314.686855] EXT4-fs (loop3): get root inode failed [ 314.687854] EXT4-fs (loop3): mount failed [ 314.697656] EXT4-fs (loop1): get root inode failed [ 314.698910] EXT4-fs (loop1): mount failed 22:00:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x800, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/101) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(r0, 0xe, &(0x7f000001ae00)=""/4112) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001e00)=""/102400) 22:00:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 22:00:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="bed7179c5a050f6c"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vfat\x00', 0x0, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9", 0x4e, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001300)=ANY=[@ANYBLOB="646d6f64653d3078303002003030303030303030303030352c6e6f636f6d70726573732c646f6e745f6d6561737572652c736d61636b66736465663d2f6465762f737230002c61707072616973655f747970653d696d617369672c736d61636b66736861743d2c646f6e745f686173842c635c6e746578743d00000000000000002c00a2c904fe98fc22c25aa015c78d2bd35621872c849d2afb58f83e98ca90d7f66039bd38310d6ac4083c5cec02662633b5e41eb6f581b77d7a54a223"]) rename(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)='./file0\x00') r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONE(r2, 0x40049409, r3) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0x7, 0x200000) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40, 0x100) openat(r5, &(0x7f0000001400)='./file0\x00', 0x246502, 0x98) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001200)={'caif0\x00'}) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) 22:00:25 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x13bb, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x3d}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x5, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000000), 0x6) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000007, 0x100010, r0, 0x10000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000001c0)='./file0\x00', 0x10, 0x6000, 0x1}, 0x2) dup2(r5, r3) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0xc, 0x20010, r0, 0x8000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000140)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index=0x5, 0x4, 0x0, 0x7fffffff, 0x6}, 0x100) 22:00:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 329.888495] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 329.909761] EXT4-fs (loop1): get root inode failed [ 329.910642] EXT4-fs (loop1): mount failed 22:00:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:00:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 330.308502] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 330.313681] EXT4-fs (loop1): get root inode failed [ 330.315124] EXT4-fs (loop1): mount failed 22:00:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x800, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/101) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(r0, 0xe, &(0x7f000001ae00)=""/4112) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001e00)=""/102400) 22:00:39 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x800, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/101) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(r0, 0xe, &(0x7f000001ae00)=""/4112) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001e00)=""/102400) 22:00:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:00:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x800, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/101) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(r0, 0xe, &(0x7f000001ae00)=""/4112) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001e00)=""/102400) 22:00:39 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 344.220151] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 344.238063] EXT4-fs (loop1): get root inode failed [ 344.239214] EXT4-fs (loop1): mount failed 22:00:39 executing program 4: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x800, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/224) shmctl$IPC_RMID(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r1 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/101) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(r0, 0xe, &(0x7f000001ae00)=""/4112) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000001e00)=""/102400) 22:00:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:00:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:39 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000240)="6623ed122eaa0e703cefb50aff352f3e9c2e6bf0c95d5cc2cb586383b504feb79ac12f1e2734ed78", 0x28, 0x10, 0x1}, 0x0) close(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="f6b1050072656a307a320c99331d335d62b87db11df483cf12160b1d988b42bed9f135cdbd6b241e1411199ce01ef918323590069174412e660d535be36a8a7516ebf6ab8157421609ac392cebc75f1597273c86f15136", @ANYRES16=r4, @ANYBLOB="000000080006000200"/22], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x80004, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x1000, 0x2, 0xffff8001, 0x2, 0x0, 0x400000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x11, &(0x7f00000010c0)={@empty}, 0x14) finit_module(r6, &(0x7f0000000040)='\'-.:\x00', 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000020000000f57cd6f590b2255409ed5e0721afff71374805ab661b6328271e9b64015462110ce2e9a527887919cb1857de49112d675302715f6d29fa7937a7ae9c743027a47eb3670015247c3231841ea2541a65dd8e0294c362273650702c0ab97203b0947bc7ce60a95", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x10000) r8 = syz_open_procfs(r7, &(0x7f0000001700)='net/ipv6_route\x00') syz_io_uring_submit(r5, r3, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x2, 0x0, r8, 0x0, r0, 0x2, 0x0, 0x1}, 0x8001) r9 = getpid() pidfd_open(r9, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x20200, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0xa8, 0x4, 0x6, 0x0, 0x1, 0x80, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x10001, 0x7}, 0x4010, 0x5, 0x7b9, 0x1, 0xad8, 0x1, 0x80, 0x0, 0xfffffffa, 0x0, 0x6}, r9, 0xb, r10, 0x6) [ 351.551352] Bluetooth: hci5: command 0x0406 tx timeout 22:00:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:00:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast1, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001b40)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}}], 0x2, 0x0) 22:00:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:00:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 360.233001] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 360.259945] EXT4-fs (loop1): get root inode failed [ 360.260957] EXT4-fs (loop1): mount failed [ 372.031332] Bluetooth: hci6: command 0x0406 tx timeout 22:01:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080), 0x0, 0x0, 0x3) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x2, 0x2, 0x6985) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)={0x28, 0x18, 0xc21, 0xfffffffc, 0x0, {0x2}, [@typed={0x8, 0x5fe, 0x0, 0x0, @u32}, @nested={0xc, 0x9, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @binary="da"}]}]}, 0x28}}, 0x0) r4 = openat2(r3, &(0x7f0000000280)='./file1\x00', &(0x7f0000000340)={0x52ac0, 0x107, 0x14}, 0x18) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000380)=0x7851669e) getdents64(r0, &(0x7f0000000140)=""/255, 0xff) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x14}}, 0x4090) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fadvise64(r6, 0x0, 0x0, 0x1) readv(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/21, 0x200001d5}], 0x1) timerfd_settime(r6, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) open_tree(r0, &(0x7f0000000100)='./file1\x00', 0x0) unshare(0x48020200) 22:01:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 374.646479] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 374.651303] EXT4-fs (loop1): get root inode failed [ 374.652132] EXT4-fs (loop1): mount failed 22:01:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 374.983593] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 374.986141] EXT4-fs (loop1): get root inode failed [ 374.987046] EXT4-fs (loop1): mount failed 22:01:26 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000540)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e22, @dev}, {0x2, 0x0, @loopback}, {0x2, 0x4e23, @private=0xa010100}, 0x155, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r2 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x6}, 0x0, 0x0, 0xfffffffd, 0x2, 0xffff, 0x2000002, 0xffff, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) r3 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r3, &(0x7f0000000180)=@ocfs2_parent={0x18, 0x2, {{0x8, 0x1}}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="00001b0000ce7c00cd97d723f5bd14b2e26fa82a4f7f8945ae13f8c51ab684c8e62ebeef10817a8a57bfa1f641e5af396f4e2ca45aff190445d871fb52abcb68036e9988c1755e35e7a09934208d28305ed2fcca68b61e9c1c98fd525244f8e4b4a0e7fe6bb4", @ANYRESOCT=r3, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004800) r4 = creat(&(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0xfffffffffffffffe, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 22:01:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 391.422737] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 391.425679] EXT4-fs (loop1): get root inode failed [ 391.426501] EXT4-fs (loop1): mount failed 22:01:26 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 391.719827] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 391.729716] EXT4-fs (loop1): get root inode failed [ 391.730567] EXT4-fs (loop1): mount failed 22:01:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:43 executing program 3: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000200), &(0x7f0000000240), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) move_pages(r0, 0xa, &(0x7f0000000040)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f00000000c0)=[0xebff], &(0x7f0000000100)=[0x0], 0x0) 22:01:43 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 408.506901] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 408.509576] EXT4-fs (loop1): get root inode failed [ 408.510294] EXT4-fs (loop1): mount failed 22:01:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 2: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r3) sendfile(r3, r0, &(0x7f0000000040)=0xfffffffffffffffa, 0x5) dup2(r1, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x100000001) 22:01:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 2: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 408.799749] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 408.800469] EXT4-fs (loop1): mount failed 22:01:44 executing program 2: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 408.915744] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 408.916501] EXT4-fs (loop1): mount failed 22:01:57 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f0000080000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:01:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 421.796336] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 421.797508] EXT4-fs (loop1): mount failed 22:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:01:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) [ 421.935649] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 421.938986] EXT4-fs (loop1): get root inode failed [ 421.939791] EXT4-fs (loop1): mount failed 22:02:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:11 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x61, 0x8, 0x1, 0x9c, 0x0, 0x7, 0x2ac2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x40, 0x1, 0x80, 0x3, 0x4, 0x1, 0x1, 0x0, 0xfffffffc, 0x0, 0x18ae986a}, 0x0, 0x8, r3, 0x2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_io_uring_setup(0x1ec1, &(0x7f0000000240)={0x0, 0x4012, 0x10, 0x1, 0x1a4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000080)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd_index=0x3, 0x160, {}, 0x9, 0x4, 0x1, {0x0, 0x0, r0}}, 0x3) 22:02:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:11 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 435.840398] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 435.843446] EXT4-fs (loop1): get root inode failed [ 435.844161] EXT4-fs (loop1): mount failed 22:02:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 4: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 4: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x61, 0x8, 0x1, 0x9c, 0x0, 0x7, 0x2ac2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xff, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x40, 0x1, 0x80, 0x3, 0x4, 0x1, 0x1, 0x0, 0xfffffffc, 0x0, 0x18ae986a}, 0x0, 0x8, r3, 0x2) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_io_uring_setup(0x1ec1, &(0x7f0000000240)={0x0, 0x4012, 0x10, 0x1, 0x1a4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000080)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd_index=0x3, 0x160, {}, 0x9, 0x4, 0x1, {0x0, 0x0, r0}}, 0x3) 22:02:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 4: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:26 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 450.835519] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 450.836790] EXT4-fs (loop1): get root inode failed [ 450.837200] EXT4-fs (loop1): mount failed 22:02:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:40 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 465.258079] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 465.258877] EXT4-fs (loop1): group descriptors corrupted! 22:02:40 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 465.321180] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 465.321981] EXT4-fs (loop1): group descriptors corrupted! 22:02:40 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:40 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) socket$unix(0x1, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x406, r2) fcntl$setstatus(r3, 0x4, 0x2c00) connect$unix(r3, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) [ 465.461466] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 465.462998] EXT4-fs (loop1): group descriptors corrupted! 22:02:53 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 478.064842] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 478.065742] EXT4-fs (loop1): group descriptors corrupted! 22:02:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:53 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@private, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @private}}, 0x0, @in6=@private1}}, &(0x7f0000000100)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=@updpolicy={0x144, 0x19, 0x200, 0x70bd29, 0x25dfdbfe, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4e20, 0x81, 0x4e21, 0x0, 0x2, 0xa25efe8b9e9041eb, 0x80, 0x2f, 0x0, r1}, {0x401, 0x7, 0x1, 0x7fff, 0x7, 0xbe, 0x1000, 0x6}, {0x40, 0x7fff, 0x10000, 0x4a}, 0x8, 0x6e6bc0, 0x1, 0x0, 0x158f8a1d75231817, 0x1}, [@algo_aead={0x72, 0x12, {{'aegis256-generic\x00'}, 0x130, 0x160, "26a1ee85613041bf1fa64b6d699b059b90ce81bec1fc7946016aa20dc96c09d4e6a629ad677f"}}, @tfcpad={0x8, 0x16, 0x80000001}, @replay_val={0x10, 0xa, {0x70bd29, 0x70bd27, 0x91}}]}, 0x144}, 0x1, 0x0, 0x0, 0x20}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x9, 0x81) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000d40)=""/244, 0x7ffff000}], 0x1, 0x0, 0x0) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x3) 22:02:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:02:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:02:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:02:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 478.254142] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 478.255240] EXT4-fs (loop1): group descriptors corrupted! 22:03:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000023000000000b000a00000008000300", @ANYRES32=r2, @ANYBLOB="04000b00"], 0x20}}, 0x0) 22:03:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 492.096319] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 492.097857] EXT4-fs (loop1): group descriptors corrupted! 22:03:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:07 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r2 = syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000400)={0x0, 0x0, 0x19, 0x1f, 0xef, &(0x7f0000000000)="d03cf82c542907be1197df79c364deceeae8e2dbbd4c92b26d1e2af8ec4fc48b96057d9b00c14673bdf03cdd2ab7558276cf6c73ffc98b3021f601139244d4113ffd101c353831cec9e7136ac1f6bb6623df51b21109683288a325145db894212682e9c863b8e4d486f9381a8384ecc8a10d69b1ff24f3b5880fbec2c13f470b525c5ac84cf43484282769b1f3621da3bca1b8f6e520ef88500cba8f6e9b630c5d33c28a54c7a627f1d082406e6bf1074dadb8ffb52f7ce6eb1696321f58bb302a1f4e0598be88e2f65d5832c5ffcac89f651c7c7053792fa0f2d7fa4877ade46c0a8fba1cc519bd88a393c4ef2716d0ff50f6cb1fe1653d4fa5cfadde035c4302b639a0e9b5eb0f36ae42d8e5a33ec785002e55ec556efba35ddd2a19d8908c2d6607acc25cfbc2437b451142b4f4444d51d85af67ffeece8aee0a8318c1c5220ab79c4bfd1eafcbf5beed0a98db12c026cfd4c7202ef19ff797615f49e513bf902dd7515d464592ab1af0c50f1a114d7a405b5253ae3b1f31d2167e89fb6cea53ff18e48ae2ef3d9fc044ea04bec0bc1b6c9fc182b93d5e757d002231e9961388b78bddaa0fce36aa440509245ca171ad45d0bf0c96f20908caa02cf96ccd5fbaa3384eed671ed016600d374a541be4d4d89a6970acd4ce01233f54fc07505ece5f1140223d1ca41f34b87c5fad0fab3586bf9edc4301808197add2a37bfbe9398b1a9c83e6edd5d186b121682f1ab05d0d40c1c38ed14dbd2e7f2b5b5c83441ac018c707f653e970e140c7b7619b40683d9b9261a482d4cc6a4ed711b58105a25395aa7631e0698fef3e9c2a41aaba0e2c1b7330d9d46f01eca0a76c4df8269fb98527579c100b1dff3397ad36d3b24dbdd9ac1a887d17755aa9b5b157c381a543f05776cada1a12ffa4c1f3d222c9e11b3f158d3de50eadb109793745d2c08d1d2ff3549f95dbcfac292f9df85bc418a3e89c643d285868fb99d082667f09a049dc0c4d49df51ac8a72e86bb5f6ee3655c33a8e28bfafcbf28c113bcb1931aa815d69bcb8ef5734ac326576d6432a6a4dbd735f2ab22d7fb82ba2328062d2e76e2bfc194ec22e88a5ae9491c3f0c6c4c9766d845255af3f34b8a6bd2b31cca54d56ccba51ae4723304acf17f7e679a5d2972e0eaae06316f095d83295b86be963df57e3fd8d0d1e08b931587eb576050f1593b0ca16eac67acd1ed1fe81d61d982ab6d1f1cd3f533f7b0adb48c6482975084a7e375645d8f090c120a5f9aa12b879ff6bd6aca4cbd66ec4f505aca8af3af35857658954f81d82cd93c8f42d817d573c343d09eabd9acba2444a06098051d44012462f9d7320fb7314a1a7ebf1eff535e2a9cfd36359c0a8eaa3b3e949fb9c3fba78591123c308fce3c8a04aed4f4a4e1d7d664f6000dc90dffc77249e4a52d012ea1754d444ce745f0ce9d"}) [ 492.365128] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 492.365189] EXT4-fs (loop1): group descriptors corrupted! 22:03:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:21 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r2 = syz_open_procfs(r1, &(0x7f0000001700)='net/ipv6_route\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000400)={0x0, 0x0, 0x19, 0x1f, 0xef, &(0x7f0000000000)="d03cf82c542907be1197df79c364deceeae8e2dbbd4c92b26d1e2af8ec4fc48b96057d9b00c14673bdf03cdd2ab7558276cf6c73ffc98b3021f601139244d4113ffd101c353831cec9e7136ac1f6bb6623df51b21109683288a325145db894212682e9c863b8e4d486f9381a8384ecc8a10d69b1ff24f3b5880fbec2c13f470b525c5ac84cf43484282769b1f3621da3bca1b8f6e520ef88500cba8f6e9b630c5d33c28a54c7a627f1d082406e6bf1074dadb8ffb52f7ce6eb1696321f58bb302a1f4e0598be88e2f65d5832c5ffcac89f651c7c7053792fa0f2d7fa4877ade46c0a8fba1cc519bd88a393c4ef2716d0ff50f6cb1fe1653d4fa5cfadde035c4302b639a0e9b5eb0f36ae42d8e5a33ec785002e55ec556efba35ddd2a19d8908c2d6607acc25cfbc2437b451142b4f4444d51d85af67ffeece8aee0a8318c1c5220ab79c4bfd1eafcbf5beed0a98db12c026cfd4c7202ef19ff797615f49e513bf902dd7515d464592ab1af0c50f1a114d7a405b5253ae3b1f31d2167e89fb6cea53ff18e48ae2ef3d9fc044ea04bec0bc1b6c9fc182b93d5e757d002231e9961388b78bddaa0fce36aa440509245ca171ad45d0bf0c96f20908caa02cf96ccd5fbaa3384eed671ed016600d374a541be4d4d89a6970acd4ce01233f54fc07505ece5f1140223d1ca41f34b87c5fad0fab3586bf9edc4301808197add2a37bfbe9398b1a9c83e6edd5d186b121682f1ab05d0d40c1c38ed14dbd2e7f2b5b5c83441ac018c707f653e970e140c7b7619b40683d9b9261a482d4cc6a4ed711b58105a25395aa7631e0698fef3e9c2a41aaba0e2c1b7330d9d46f01eca0a76c4df8269fb98527579c100b1dff3397ad36d3b24dbdd9ac1a887d17755aa9b5b157c381a543f05776cada1a12ffa4c1f3d222c9e11b3f158d3de50eadb109793745d2c08d1d2ff3549f95dbcfac292f9df85bc418a3e89c643d285868fb99d082667f09a049dc0c4d49df51ac8a72e86bb5f6ee3655c33a8e28bfafcbf28c113bcb1931aa815d69bcb8ef5734ac326576d6432a6a4dbd735f2ab22d7fb82ba2328062d2e76e2bfc194ec22e88a5ae9491c3f0c6c4c9766d845255af3f34b8a6bd2b31cca54d56ccba51ae4723304acf17f7e679a5d2972e0eaae06316f095d83295b86be963df57e3fd8d0d1e08b931587eb576050f1593b0ca16eac67acd1ed1fe81d61d982ab6d1f1cd3f533f7b0adb48c6482975084a7e375645d8f090c120a5f9aa12b879ff6bd6aca4cbd66ec4f505aca8af3af35857658954f81d82cd93c8f42d817d573c343d09eabd9acba2444a06098051d44012462f9d7320fb7314a1a7ebf1eff535e2a9cfd36359c0a8eaa3b3e949fb9c3fba78591123c308fce3c8a04aed4f4a4e1d7d664f6000dc90dffc77249e4a52d012ea1754d444ce745f0ce9d"}) 22:03:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 506.643409] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 506.644355] EXT4-fs (loop1): group descriptors corrupted! 22:03:22 executing program 3: r0 = syz_io_uring_setup(0x4d4e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x110}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') syz_io_uring_setup(0x3a75, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x5) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r4, r2, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x5, 0x0, r3, &(0x7f0000000400), &(0x7f0000000080)='./file0\x00', 0x1, 0x800, 0x1}, 0xffffff01) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 22:03:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 506.794131] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 506.794921] EXT4-fs (loop1): group descriptors corrupted! 22:03:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:03:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 506.942594] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 506.943416] EXT4-fs (loop1): group descriptors corrupted! 22:03:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:03:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 22:03:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 519.870207] FAULT_INJECTION: forcing a failure. [ 519.870207] name failslab, interval 1, probability 0, space 0, times 1 [ 519.872078] CPU: 0 PID: 6980 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 519.873133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 519.874412] Call Trace: [ 519.874829] dump_stack+0x107/0x167 [ 519.875400] should_fail.cold+0x5/0xa [ 519.876006] ? getname_flags.part.0+0x50/0x4f0 [ 519.876723] should_failslab+0x5/0x20 [ 519.877316] kmem_cache_alloc+0x5b/0x310 [ 519.877951] getname_flags.part.0+0x50/0x4f0 [ 519.878639] getname_flags+0x9a/0xe0 [ 519.879225] __x64_sys_execveat+0xd6/0x140 [ 519.879891] do_syscall_64+0x33/0x40 [ 519.880471] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 519.881263] RIP: 0033:0x7f9509c8ab19 [ 519.881839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 519.884658] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 519.885832] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 519.886934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 519.888037] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 519.889134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.890237] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 519.911376] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 519.913041] EXT4-fs (loop1): group descriptors corrupted! 22:03:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) [ 520.137072] FAULT_INJECTION: forcing a failure. [ 520.137072] name failslab, interval 1, probability 0, space 0, times 0 [ 520.138930] CPU: 1 PID: 6997 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 520.140007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 520.141304] Call Trace: [ 520.141725] dump_stack+0x107/0x167 [ 520.142306] should_fail.cold+0x5/0xa [ 520.142916] ? create_object.isra.0+0x3a/0xa20 [ 520.143686] should_failslab+0x5/0x20 [ 520.144296] kmem_cache_alloc+0x5b/0x310 [ 520.144944] create_object.isra.0+0x3a/0xa20 [ 520.145643] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 520.146450] kmem_cache_alloc+0x159/0x310 [ 520.147112] getname_flags.part.0+0x50/0x4f0 [ 520.147821] getname_flags+0x9a/0xe0 [ 520.148410] __x64_sys_execveat+0xd6/0x140 [ 520.149078] do_syscall_64+0x33/0x40 [ 520.149661] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 520.150467] RIP: 0033:0x7f9509c8ab19 [ 520.151050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 520.153923] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 520.155108] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 520.156238] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 520.157357] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 520.158485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.159593] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:03:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) [ 534.930489] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 534.931855] EXT4-fs (loop1): group descriptors corrupted! 22:03:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:03:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 534.952480] FAULT_INJECTION: forcing a failure. [ 534.952480] name failslab, interval 1, probability 0, space 0, times 0 [ 534.954106] CPU: 0 PID: 7007 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 534.955059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 534.956221] Call Trace: [ 534.956600] dump_stack+0x107/0x167 [ 534.957111] should_fail.cold+0x5/0xa [ 534.957657] ? create_object.isra.0+0x3a/0xa20 [ 534.958306] should_failslab+0x5/0x20 [ 534.958846] kmem_cache_alloc+0x5b/0x310 [ 534.959426] create_object.isra.0+0x3a/0xa20 [ 534.960058] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 534.960773] kmem_cache_alloc+0x159/0x310 [ 534.961360] getname_flags.part.0+0x50/0x4f0 [ 534.961982] getname_flags+0x9a/0xe0 [ 534.962510] __x64_sys_execveat+0xd6/0x140 [ 534.963110] do_syscall_64+0x33/0x40 [ 534.963644] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 534.964368] RIP: 0033:0x7f9509c8ab19 [ 534.964896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.967435] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 534.968548] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 534.969546] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 534.970547] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 534.971550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.972555] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:03:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:03:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:03:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 535.153498] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 535.154872] EXT4-fs (loop1): group descriptors corrupted! 22:03:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 548.692807] FAULT_INJECTION: forcing a failure. [ 548.692807] name failslab, interval 1, probability 0, space 0, times 0 [ 548.693882] CPU: 0 PID: 7051 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 548.694463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 548.695147] Call Trace: [ 548.695376] dump_stack+0x107/0x167 [ 548.695704] should_fail.cold+0x5/0xa [ 548.696055] ? alloc_bprm+0x51/0x8f0 [ 548.696395] should_failslab+0x5/0x20 [ 548.696739] kmem_cache_alloc_trace+0x55/0x320 [ 548.697127] ? lock_downgrade+0x6d0/0x6d0 [ 548.697477] alloc_bprm+0x51/0x8f0 [ 548.697798] ? __virt_addr_valid+0x170/0x5c0 [ 548.698199] do_execveat_common+0x275/0x8d0 [ 548.698570] ? strncpy_from_user+0x9e/0x470 [ 548.698954] ? bprm_execve+0x1a60/0x1a60 [ 548.699311] __x64_sys_execveat+0xed/0x140 [ 548.699693] do_syscall_64+0x33/0x40 [ 548.700019] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 548.700476] RIP: 0033:0x7f9509c8ab19 [ 548.700814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 548.702328] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 548.703009] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 22:04:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 22:04:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 548.703606] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 548.704438] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 548.705091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.705721] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 548.720993] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 548.721853] EXT4-fs (loop1): group descriptors corrupted! 22:04:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 22:04:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 560.996461] FAULT_INJECTION: forcing a failure. [ 560.996461] name failslab, interval 1, probability 0, space 0, times 0 [ 560.998115] CPU: 0 PID: 7096 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 560.999095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 561.000306] Call Trace: [ 561.000698] dump_stack+0x107/0x167 [ 561.001231] should_fail.cold+0x5/0xa [ 561.001782] ? create_object.isra.0+0x3a/0xa20 [ 561.002449] should_failslab+0x5/0x20 [ 561.003004] kmem_cache_alloc+0x5b/0x310 [ 561.003596] create_object.isra.0+0x3a/0xa20 [ 561.004240] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 561.004982] kmem_cache_alloc_trace+0x151/0x320 [ 561.005665] ? lock_downgrade+0x6d0/0x6d0 [ 561.006272] alloc_bprm+0x51/0x8f0 [ 561.006792] ? __virt_addr_valid+0x170/0x5c0 [ 561.007439] do_execveat_common+0x275/0x8d0 [ 561.008073] ? strncpy_from_user+0x9e/0x470 [ 561.008708] ? bprm_execve+0x1a60/0x1a60 [ 561.009316] __x64_sys_execveat+0xed/0x140 [ 561.009932] do_syscall_64+0x33/0x40 [ 561.010478] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 561.011212] RIP: 0033:0x7f9509c8ab19 [ 561.011749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.014372] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 561.015471] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 561.016499] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 561.017522] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.018540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 561.019560] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:04:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 561.034811] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 561.036260] EXT4-fs (loop1): group descriptors corrupted! 22:04:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 22:04:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 561.238853] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 561.239741] EXT4-fs (loop1): group descriptors corrupted! [ 561.245865] FAULT_INJECTION: forcing a failure. [ 561.245865] name failslab, interval 1, probability 0, space 0, times 0 [ 561.246929] CPU: 1 PID: 7127 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 561.247473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 561.248214] Call Trace: [ 561.248435] dump_stack+0x107/0x167 [ 561.248707] should_fail.cold+0x5/0xa [ 561.248990] ? mm_alloc+0x19/0xd0 [ 561.249362] should_failslab+0x5/0x20 [ 561.249644] kmem_cache_alloc+0x5b/0x310 [ 561.249944] ? kasan_unpoison_shadow+0x33/0x50 [ 561.250335] mm_alloc+0x19/0xd0 [ 561.250628] alloc_bprm+0x1cb/0x8f0 [ 561.250913] ? __virt_addr_valid+0x170/0x5c0 [ 561.251241] do_execveat_common+0x275/0x8d0 [ 561.251690] ? strncpy_from_user+0x9e/0x470 [ 561.252031] ? bprm_execve+0x1a60/0x1a60 [ 561.252347] __x64_sys_execveat+0xed/0x140 [ 561.252687] do_syscall_64+0x33/0x40 [ 561.253087] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 561.253488] RIP: 0033:0x7f9509c8ab19 [ 561.253777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.255309] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 561.255867] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 561.256389] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 561.256904] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.257421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 561.257934] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:04:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:04:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 574.975996] FAULT_INJECTION: forcing a failure. [ 574.975996] name failslab, interval 1, probability 0, space 0, times 0 [ 574.977472] CPU: 0 PID: 7156 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 574.978326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 574.979356] Call Trace: [ 574.979696] dump_stack+0x107/0x167 [ 574.980155] should_fail.cold+0x5/0xa [ 574.980651] ? create_object.isra.0+0x3a/0xa20 [ 574.981231] should_failslab+0x5/0x20 [ 574.981712] kmem_cache_alloc+0x5b/0x310 [ 574.982230] create_object.isra.0+0x3a/0xa20 [ 574.982790] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 574.983449] kmem_cache_alloc+0x159/0x310 [ 574.983985] mm_alloc+0x19/0xd0 [ 574.984424] alloc_bprm+0x1cb/0x8f0 [ 574.984897] ? __virt_addr_valid+0x170/0x5c0 [ 574.985466] do_execveat_common+0x275/0x8d0 [ 574.986019] ? strncpy_from_user+0x9e/0x470 [ 574.986572] ? bprm_execve+0x1a60/0x1a60 [ 574.987110] __x64_sys_execveat+0xed/0x140 [ 574.987656] do_syscall_64+0x33/0x40 [ 574.988136] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 574.988811] RIP: 0033:0x7f9509c8ab19 [ 574.989286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.991614] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 574.992595] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 574.993496] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 574.994402] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.995302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.996200] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 575.006371] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 575.007653] EXT4-fs (loop1): group descriptors corrupted! 22:04:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 575.189106] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 575.190657] EXT4-fs (loop1): group descriptors corrupted! 22:04:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 575.342475] FAULT_INJECTION: forcing a failure. [ 575.342475] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 575.344276] CPU: 0 PID: 7194 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 575.345257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 575.346430] Call Trace: [ 575.346820] dump_stack+0x107/0x167 [ 575.347347] should_fail.cold+0x5/0xa [ 575.347903] __alloc_pages_nodemask+0x182/0x600 [ 575.348586] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 575.349337] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 575.350208] alloc_pages_current+0x187/0x280 [ 575.350843] __get_free_pages+0xc/0xa0 [ 575.351401] pgd_alloc+0x84/0x4e0 [ 575.351899] ? pgd_page_get_mm+0x40/0x40 [ 575.352493] ? lockdep_init_map_type+0x2c7/0x780 [ 575.353173] ? lockdep_init_map_type+0x2c7/0x780 [ 575.353852] mm_init+0x670/0xab0 [ 575.354345] mm_alloc+0xa2/0xd0 [ 575.354819] alloc_bprm+0x1cb/0x8f0 [ 575.355341] ? __virt_addr_valid+0x170/0x5c0 [ 575.355979] do_execveat_common+0x275/0x8d0 [ 575.356616] ? strncpy_from_user+0x9e/0x470 [ 575.357235] ? bprm_execve+0x1a60/0x1a60 [ 575.357832] __x64_sys_execveat+0xed/0x140 [ 575.358441] do_syscall_64+0x33/0x40 [ 575.358976] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 575.359708] RIP: 0033:0x7f9509c8ab19 [ 575.360248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 575.362856] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 575.363943] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 575.364965] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 575.365977] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 575.366990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.368004] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:04:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) [ 588.788452] FAULT_INJECTION: forcing a failure. [ 588.788452] name failslab, interval 1, probability 0, space 0, times 0 [ 588.790188] CPU: 0 PID: 7229 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 588.791217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 588.792474] Call Trace: [ 588.792876] dump_stack+0x107/0x167 [ 588.793431] should_fail.cold+0x5/0xa [ 588.794013] ? vm_area_alloc+0x1c/0x110 [ 588.794619] should_failslab+0x5/0x20 [ 588.795198] kmem_cache_alloc+0x5b/0x310 [ 588.795821] vm_area_alloc+0x1c/0x110 [ 588.796400] alloc_bprm+0x337/0x8f0 [ 588.796950] ? __virt_addr_valid+0x170/0x5c0 [ 588.797620] do_execveat_common+0x275/0x8d0 [ 588.798276] ? strncpy_from_user+0x9e/0x470 [ 588.798936] ? bprm_execve+0x1a60/0x1a60 [ 588.799563] __x64_sys_execveat+0xed/0x140 [ 588.800201] do_syscall_64+0x33/0x40 [ 588.800771] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 588.801545] RIP: 0033:0x7f9509c8ab19 [ 588.802109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.804866] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 588.806013] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 588.807086] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 588.808167] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 588.809238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.810308] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 588.822770] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 588.824329] EXT4-fs (loop1): group descriptors corrupted! 22:04:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 22:04:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 602.173985] FAULT_INJECTION: forcing a failure. [ 602.173985] name failslab, interval 1, probability 0, space 0, times 0 [ 602.175785] CPU: 1 PID: 7241 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 602.176851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.177777] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 602.178136] Call Trace: [ 602.179070] dump_stack+0x107/0x167 [ 602.179644] should_fail.cold+0x5/0xa [ 602.180245] ? create_object.isra.0+0x3a/0xa20 [ 602.180967] should_failslab+0x5/0x20 [ 602.181568] kmem_cache_alloc+0x5b/0x310 [ 602.182203] create_object.isra.0+0x3a/0xa20 [ 602.182883] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 602.183673] kmem_cache_alloc+0x159/0x310 [ 602.184325] vm_area_alloc+0x1c/0x110 [ 602.184925] alloc_bprm+0x337/0x8f0 [ 602.185488] ? __virt_addr_valid+0x170/0x5c0 [ 602.186178] do_execveat_common+0x275/0x8d0 [ 602.186851] ? strncpy_from_user+0x9e/0x470 [ 602.187519] ? bprm_execve+0x1a60/0x1a60 [ 602.188168] __x64_sys_execveat+0xed/0x140 [ 602.188835] do_syscall_64+0x33/0x40 [ 602.189415] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 602.190206] RIP: 0033:0x7f9509c8ab19 [ 602.190783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.193597] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 602.194769] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 602.195865] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 602.196973] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.198069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.199162] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:04:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:57 executing program 7: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 22:04:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 602.358460] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:04:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 602.435036] FAULT_INJECTION: forcing a failure. [ 602.435036] name failslab, interval 1, probability 0, space 0, times 0 [ 602.436934] CPU: 1 PID: 7269 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 602.438044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.439387] Call Trace: [ 602.439836] dump_stack+0x107/0x167 [ 602.440447] should_fail.cold+0x5/0xa [ 602.441088] ? getname_flags.part.0+0x50/0x4f0 [ 602.441855] should_failslab+0x5/0x20 [ 602.442491] kmem_cache_alloc+0x5b/0x310 [ 602.443175] getname_flags.part.0+0x50/0x4f0 [ 602.443912] getname_flags+0x9a/0xe0 [ 602.444531] __x64_sys_execveat+0xd6/0x140 [ 602.445242] do_syscall_64+0x33/0x40 [ 602.445876] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 602.446708] RIP: 0033:0x7f70da682b19 [ 602.447333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.450325] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 602.451616] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 602.452831] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 602.454039] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.455490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.456945] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:04:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 22:04:57 executing program 7: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) [ 602.567553] FAULT_INJECTION: forcing a failure. [ 602.567553] name failslab, interval 1, probability 0, space 0, times 0 [ 602.569290] CPU: 0 PID: 7283 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 602.570289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.571502] Call Trace: [ 602.571900] dump_stack+0x107/0x167 [ 602.572447] should_fail.cold+0x5/0xa [ 602.573268] ? create_object.isra.0+0x3a/0xa20 [ 602.574078] should_failslab+0x5/0x20 [ 602.574730] kmem_cache_alloc+0x5b/0x310 [ 602.575437] create_object.isra.0+0x3a/0xa20 [ 602.576182] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 602.577074] kmem_cache_alloc+0x159/0x310 [ 602.577692] vm_area_alloc+0x1c/0x110 [ 602.578228] alloc_bprm+0x337/0x8f0 [ 602.578757] ? __virt_addr_valid+0x170/0x5c0 [ 602.579391] do_execveat_common+0x275/0x8d0 [ 602.580001] ? strncpy_from_user+0x9e/0x470 [ 602.580621] ? bprm_execve+0x1a60/0x1a60 [ 602.581228] __x64_sys_execveat+0xed/0x140 [ 602.581833] do_syscall_64+0x33/0x40 [ 602.582379] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 602.583114] RIP: 0033:0x7f9509c8ab19 [ 602.583661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.586286] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 602.587380] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 602.588401] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 602.589427] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.590448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.591474] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 602.627354] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 602.632290] FAULT_INJECTION: forcing a failure. [ 602.632290] name failslab, interval 1, probability 0, space 0, times 0 [ 602.634040] CPU: 0 PID: 7291 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 602.635043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.636254] Call Trace: [ 602.636663] dump_stack+0x107/0x167 [ 602.637204] should_fail.cold+0x5/0xa [ 602.637766] ? create_object.isra.0+0x3a/0xa20 [ 602.638444] should_failslab+0x5/0x20 [ 602.639001] kmem_cache_alloc+0x5b/0x310 [ 602.639604] create_object.isra.0+0x3a/0xa20 [ 602.640252] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 602.641011] kmem_cache_alloc+0x159/0x310 [ 602.641630] getname_flags.part.0+0x50/0x4f0 [ 602.642281] getname_flags+0x9a/0xe0 [ 602.642838] __x64_sys_execveat+0xd6/0x140 [ 602.643452] do_syscall_64+0x33/0x40 [ 602.644000] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 602.644759] RIP: 0033:0x7f70da682b19 [ 602.645305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.647961] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 602.649087] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 602.650129] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 602.651163] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.652208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.653254] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:04:58 executing program 7: close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:04:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:04:58 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:04:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 22:04:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 602.929301] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 602.960734] FAULT_INJECTION: forcing a failure. [ 602.960734] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 602.962467] CPU: 1 PID: 7315 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 602.963435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.964607] Call Trace: [ 602.964997] dump_stack+0x107/0x167 [ 602.965532] should_fail.cold+0x5/0xa [ 602.966315] strncpy_from_user+0x34/0x470 [ 602.966961] getname_flags.part.0+0x95/0x4f0 [ 602.967838] getname_flags+0x9a/0xe0 [ 602.968391] __x64_sys_execveat+0xd6/0x140 [ 602.969019] do_syscall_64+0x33/0x40 [ 602.969555] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 602.970292] RIP: 0033:0x7f70da682b19 [ 602.970824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.973428] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 602.974513] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 602.975529] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 602.976539] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.977563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.978667] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:05:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 22:05:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:05:12 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 22:05:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 22:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) [ 616.619610] FAULT_INJECTION: forcing a failure. [ 616.619610] name failslab, interval 1, probability 0, space 0, times 0 [ 616.620790] CPU: 0 PID: 7330 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 616.621408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.622160] Call Trace: [ 616.622407] dump_stack+0x107/0x167 [ 616.622741] should_fail.cold+0x5/0xa [ 616.623091] ? getname_flags.part.0+0x50/0x4f0 [ 616.623512] should_failslab+0x5/0x20 [ 616.623863] kmem_cache_alloc+0x5b/0x310 [ 616.624239] getname_flags.part.0+0x50/0x4f0 [ 616.624643] getname_flags+0x9a/0xe0 [ 616.624996] __x64_sys_execveat+0xd6/0x140 [ 616.625383] do_syscall_64+0x33/0x40 [ 616.625724] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.626197] RIP: 0033:0x7f2f4d86bb19 [ 616.626538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.628193] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.628901] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 616.629562] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.630207] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.630847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.631499] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 616.638920] FAULT_INJECTION: forcing a failure. [ 616.638920] name failslab, interval 1, probability 0, space 0, times 0 [ 616.640791] CPU: 1 PID: 7336 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 616.641771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.642964] Call Trace: [ 616.643360] dump_stack+0x107/0x167 [ 616.643894] should_fail.cold+0x5/0xa [ 616.644455] ? getname_flags.part.0+0x50/0x4f0 [ 616.645131] should_failslab+0x5/0x20 [ 616.645690] kmem_cache_alloc+0x5b/0x310 [ 616.646287] getname_flags.part.0+0x50/0x4f0 [ 616.646928] getname_flags+0x9a/0xe0 [ 616.647479] __x64_sys_execveat+0xd6/0x140 [ 616.648098] do_syscall_64+0x33/0x40 [ 616.648643] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.649414] RIP: 0033:0x7f6383eb9b19 [ 616.649956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.651744] FAULT_INJECTION: forcing a failure. [ 616.651744] name failslab, interval 1, probability 0, space 0, times 0 [ 616.652594] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.652622] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 616.655734] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.656769] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.657798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.658830] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 616.659897] CPU: 0 PID: 7341 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 616.660518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.661272] Call Trace: [ 616.661516] dump_stack+0x107/0x167 [ 616.661846] should_fail.cold+0x5/0xa [ 616.662194] ? alloc_bprm+0x51/0x8f0 [ 616.662534] should_failslab+0x5/0x20 [ 616.662878] kmem_cache_alloc_trace+0x55/0x320 [ 616.663291] ? lock_downgrade+0x6d0/0x6d0 [ 616.663668] alloc_bprm+0x51/0x8f0 [ 616.663989] ? __virt_addr_valid+0x170/0x5c0 [ 616.664391] do_execveat_common+0x275/0x8d0 [ 616.664792] ? strncpy_from_user+0x9e/0x470 [ 616.665181] ? bprm_execve+0x1a60/0x1a60 [ 616.665561] __x64_sys_execveat+0xed/0x140 [ 616.665940] do_syscall_64+0x33/0x40 [ 616.666277] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.666736] RIP: 0033:0x7f70da682b19 [ 616.667073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.668721] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.669429] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 616.670088] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.670722] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.671361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.672036] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 616.673300] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 616.679852] FAULT_INJECTION: forcing a failure. [ 616.679852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.680926] CPU: 0 PID: 7333 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 616.681527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.682264] Call Trace: [ 616.682506] dump_stack+0x107/0x167 [ 616.682833] should_fail.cold+0x5/0xa [ 616.683182] __alloc_pages_nodemask+0x182/0x600 [ 616.683600] ? lock_acquire+0x197/0x470 [ 616.683959] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 616.684501] ? lock_downgrade+0x6d0/0x6d0 [ 616.684885] ? do_raw_spin_lock+0x121/0x260 [ 616.685278] alloc_pages_current+0x187/0x280 [ 616.685675] __pmd_alloc+0x37/0x5e0 [ 616.686008] handle_mm_fault+0x1ac4/0x3500 [ 616.686396] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 616.686867] ? SOFTIRQ_verbose+0x10/0x10 [ 616.687237] ? __pmd_alloc+0x5e0/0x5e0 [ 616.687602] __get_user_pages+0x6ec/0x1620 [ 616.687990] ? follow_page_mask+0x1900/0x1900 [ 616.688400] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 616.688840] __get_user_pages_remote+0x1d5/0x870 [ 616.689272] ? lock_downgrade+0x6d0/0x6d0 [ 616.689649] get_user_pages_remote+0x63/0x90 [ 616.690047] get_arg_page+0xba/0x200 [ 616.690383] ? acct_arg_size+0xe0/0xe0 [ 616.690733] ? downgrade_write+0x3a0/0x3a0 [ 616.691121] ? count.constprop.0+0x1b3/0x290 [ 616.691518] copy_string_kernel+0x1b4/0x450 [ 616.691914] do_execveat_common+0x525/0x8d0 [ 616.692305] ? bprm_execve+0x1a60/0x1a60 [ 616.692680] __x64_sys_execveat+0xed/0x140 [ 616.693064] do_syscall_64+0x33/0x40 [ 616.693399] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.693857] RIP: 0033:0x7f9509c8ab19 [ 616.694194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.695822] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.696499] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 616.697139] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.697773] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.698403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.699031] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:05:12 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 22:05:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 22:05:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 616.783362] FAULT_INJECTION: forcing a failure. [ 616.783362] name failslab, interval 1, probability 0, space 0, times 0 [ 616.785177] CPU: 1 PID: 7348 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 616.786162] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.787360] Call Trace: [ 616.787750] dump_stack+0x107/0x167 [ 616.788286] should_fail.cold+0x5/0xa [ 616.788853] ? create_object.isra.0+0x3a/0xa20 [ 616.789515] ? create_object.isra.0+0x3a/0xa20 [ 616.790186] should_failslab+0x5/0x20 [ 616.790741] kmem_cache_alloc+0x5b/0x310 [ 616.791338] create_object.isra.0+0x3a/0xa20 [ 616.791978] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 616.792717] kmem_cache_alloc+0x159/0x310 [ 616.793318] getname_flags.part.0+0x50/0x4f0 [ 616.793965] getname_flags+0x9a/0xe0 [ 616.794517] __x64_sys_execveat+0xd6/0x140 [ 616.795136] do_syscall_64+0x33/0x40 [ 616.795683] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.796424] RIP: 0033:0x7f2f4d86bb19 [ 616.796972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.799611] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.800714] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 616.801753] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.802782] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.803814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.804845] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:05:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) [ 616.875553] FAULT_INJECTION: forcing a failure. [ 616.875553] name failslab, interval 1, probability 0, space 0, times 0 [ 616.877312] CPU: 1 PID: 7357 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 616.878302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.879504] Call Trace: [ 616.879893] dump_stack+0x107/0x167 [ 616.880430] should_fail.cold+0x5/0xa [ 616.880996] ? __pmd_alloc+0x94/0x5e0 [ 616.881552] should_failslab+0x5/0x20 [ 616.882108] kmem_cache_alloc+0x5b/0x310 [ 616.882701] __pmd_alloc+0x94/0x5e0 [ 616.883238] handle_mm_fault+0x1ac4/0x3500 [ 616.883846] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 616.884602] ? SOFTIRQ_verbose+0x10/0x10 [ 616.885202] ? __pmd_alloc+0x5e0/0x5e0 [ 616.885792] __get_user_pages+0x6ec/0x1620 [ 616.886417] ? follow_page_mask+0x1900/0x1900 [ 616.887074] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 616.887763] __get_user_pages_remote+0x1d5/0x870 [ 616.888459] ? lock_downgrade+0x6d0/0x6d0 [ 616.889075] get_user_pages_remote+0x63/0x90 [ 616.889705] get_arg_page+0xba/0x200 [ 616.890248] ? acct_arg_size+0xe0/0xe0 [ 616.890812] ? downgrade_write+0x3a0/0x3a0 [ 616.891428] ? count.constprop.0+0x1b3/0x290 [ 616.892073] copy_string_kernel+0x1b4/0x450 [ 616.892710] do_execveat_common+0x525/0x8d0 [ 616.893328] ? bprm_execve+0x1a60/0x1a60 [ 616.893935] __x64_sys_execveat+0xed/0x140 [ 616.894551] do_syscall_64+0x33/0x40 [ 616.895089] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.895826] RIP: 0033:0x7f9509c8ab19 [ 616.896374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.899009] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.900109] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 616.901143] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.902167] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.903193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.904218] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 616.907927] FAULT_INJECTION: forcing a failure. [ 616.907927] name failslab, interval 1, probability 0, space 0, times 0 [ 616.909957] CPU: 1 PID: 7360 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 616.910942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.912128] Call Trace: [ 616.912520] dump_stack+0x107/0x167 [ 616.913045] should_fail.cold+0x5/0xa [ 616.913601] ? create_object.isra.0+0x3a/0xa20 [ 616.914265] should_failslab+0x5/0x20 [ 616.914815] kmem_cache_alloc+0x5b/0x310 [ 616.915414] create_object.isra.0+0x3a/0xa20 [ 616.916049] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 616.916791] kmem_cache_alloc+0x159/0x310 [ 616.917398] getname_flags.part.0+0x50/0x4f0 [ 616.918039] getname_flags+0x9a/0xe0 [ 616.918586] __x64_sys_execveat+0xd6/0x140 [ 616.919198] do_syscall_64+0x33/0x40 [ 616.919737] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 616.920476] RIP: 0033:0x7f6383eb9b19 [ 616.921024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.923674] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 616.924749] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 616.925781] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 616.926811] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.927833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.928878] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 616.935569] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:05:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 22:05:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 22:05:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:05:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 629.987847] FAULT_INJECTION: forcing a failure. [ 629.987847] name failslab, interval 1, probability 0, space 0, times 0 [ 629.988375] FAULT_INJECTION: forcing a failure. [ 629.988375] name failslab, interval 1, probability 0, space 0, times 0 [ 629.989553] CPU: 0 PID: 7375 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 629.992159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 629.993373] Call Trace: [ 629.993768] dump_stack+0x107/0x167 [ 629.994309] should_fail.cold+0x5/0xa [ 629.994871] ? create_object.isra.0+0x3a/0xa20 [ 629.995538] should_failslab+0x5/0x20 [ 629.996099] kmem_cache_alloc+0x5b/0x310 [ 629.996698] create_object.isra.0+0x3a/0xa20 [ 629.997357] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 629.998101] kmem_cache_alloc_trace+0x151/0x320 [ 629.998779] ? lock_downgrade+0x6d0/0x6d0 [ 629.999396] alloc_bprm+0x51/0x8f0 [ 629.999917] ? __virt_addr_valid+0x170/0x5c0 [ 630.000570] do_execveat_common+0x275/0x8d0 [ 630.001217] ? strncpy_from_user+0x9e/0x470 [ 630.001849] ? bprm_execve+0x1a60/0x1a60 [ 630.002459] __x64_sys_execveat+0xed/0x140 [ 630.003090] do_syscall_64+0x33/0x40 [ 630.003642] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 630.004388] RIP: 0033:0x7f70da682b19 [ 630.004939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.007593] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 630.008706] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 630.009754] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 630.010793] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 630.011828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.012860] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 630.013929] CPU: 1 PID: 7376 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 630.014943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.016154] Call Trace: [ 630.016551] dump_stack+0x107/0x167 [ 630.017103] should_fail.cold+0x5/0xa [ 630.017665] ? create_object.isra.0+0x3a/0xa20 [ 630.018341] should_failslab+0x5/0x20 [ 630.018897] kmem_cache_alloc+0x5b/0x310 [ 630.019508] create_object.isra.0+0x3a/0xa20 [ 630.020148] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 630.020906] kmem_cache_alloc+0x159/0x310 [ 630.021529] __pmd_alloc+0x94/0x5e0 [ 630.022073] handle_mm_fault+0x1ac4/0x3500 [ 630.022704] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 630.023468] ? SOFTIRQ_verbose+0x10/0x10 [ 630.024065] ? __pmd_alloc+0x5e0/0x5e0 [ 630.024663] __get_user_pages+0x6ec/0x1620 [ 630.025312] ? follow_page_mask+0x1900/0x1900 [ 630.025968] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 630.026661] __get_user_pages_remote+0x1d5/0x870 22:05:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 22:05:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) [ 630.027360] ? lock_downgrade+0x6d0/0x6d0 [ 630.028112] get_user_pages_remote+0x63/0x90 [ 630.028763] get_arg_page+0xba/0x200 [ 630.029319] ? acct_arg_size+0xe0/0xe0 [ 630.029885] ? downgrade_write+0x3a0/0x3a0 [ 630.030507] ? count.constprop.0+0x1b3/0x290 [ 630.031165] copy_string_kernel+0x1b4/0x450 [ 630.031805] do_execveat_common+0x525/0x8d0 [ 630.032440] ? bprm_execve+0x1a60/0x1a60 [ 630.033058] __x64_sys_execveat+0xed/0x140 [ 630.033679] do_syscall_64+0x33/0x40 [ 630.034225] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 630.034967] RIP: 0033:0x7f9509c8ab19 [ 630.035514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.038163] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 630.039267] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 630.040313] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 630.041356] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 630.042392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 630.043435] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 630.047903] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 630.056298] FAULT_INJECTION: forcing a failure. [ 630.056298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 630.058067] CPU: 0 PID: 7380 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 630.059063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.060264] Call Trace: [ 630.060658] dump_stack+0x107/0x167 [ 630.061208] should_fail.cold+0x5/0xa [ 630.061776] strncpy_from_user+0x34/0x470 [ 630.062391] getname_flags.part.0+0x95/0x4f0 [ 630.063039] getname_flags+0x9a/0xe0 [ 630.063591] __x64_sys_execveat+0xd6/0x140 [ 630.064208] do_syscall_64+0x33/0x40 [ 630.064751] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 630.065502] RIP: 0033:0x7f6383eb9b19 [ 630.066049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.068696] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 630.069804] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 630.070841] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 630.071869] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 630.072941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.073989] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 630.075881] FAULT_INJECTION: forcing a failure. [ 630.075881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 630.077618] CPU: 0 PID: 7383 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 630.078609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.079806] Call Trace: [ 630.080194] dump_stack+0x107/0x167 [ 630.080734] should_fail.cold+0x5/0xa [ 630.081303] strncpy_from_user+0x34/0x470 [ 630.081922] getname_flags.part.0+0x95/0x4f0 [ 630.082571] getname_flags+0x9a/0xe0 [ 630.083131] __x64_sys_execveat+0xd6/0x140 [ 630.083762] do_syscall_64+0x33/0x40 [ 630.084311] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 630.085068] RIP: 0033:0x7f2f4d86bb19 [ 630.085618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.088265] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 630.089398] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 630.090439] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 630.091483] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 630.092521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.093560] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:05:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:05:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:05:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 22:05:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 22:05:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 22:05:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 643.197909] FAULT_INJECTION: forcing a failure. [ 643.197909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 643.199673] CPU: 1 PID: 7408 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 643.200666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.201869] Call Trace: [ 643.202265] dump_stack+0x107/0x167 [ 643.202804] should_fail.cold+0x5/0xa [ 643.203371] strncpy_from_user+0x34/0x470 [ 643.203987] getname_flags.part.0+0x95/0x4f0 [ 643.204638] getname_flags+0x9a/0xe0 [ 643.205209] __x64_sys_execveat+0xd6/0x140 [ 643.205835] do_syscall_64+0x33/0x40 [ 643.206386] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.207151] RIP: 0033:0x7f6383eb9b19 [ 643.207697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.210357] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.211469] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 643.212506] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.213549] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.214589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.215638] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 643.219462] FAULT_INJECTION: forcing a failure. [ 643.219462] name failslab, interval 1, probability 0, space 0, times 0 [ 643.221161] CPU: 1 PID: 7407 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 643.222154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.223349] Call Trace: [ 643.223736] dump_stack+0x107/0x167 [ 643.224269] should_fail.cold+0x5/0xa [ 643.224831] ? mm_alloc+0x19/0xd0 [ 643.225349] should_failslab+0x5/0x20 [ 643.225903] kmem_cache_alloc+0x5b/0x310 [ 643.226500] ? kasan_unpoison_shadow+0x33/0x50 [ 643.227174] mm_alloc+0x19/0xd0 [ 643.227662] alloc_bprm+0x1cb/0x8f0 [ 643.228189] ? __virt_addr_valid+0x170/0x5c0 [ 643.228849] do_execveat_common+0x275/0x8d0 [ 643.229497] ? strncpy_from_user+0x9e/0x470 [ 643.230130] ? bprm_execve+0x1a60/0x1a60 [ 643.230746] __x64_sys_execveat+0xed/0x140 [ 643.231374] do_syscall_64+0x33/0x40 [ 643.231920] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.232663] RIP: 0033:0x7f70da682b19 [ 643.233239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.235888] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.237004] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 643.238042] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.239080] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.240125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.241175] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:05:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 643.247424] FAULT_INJECTION: forcing a failure. [ 643.247424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 643.249216] CPU: 0 PID: 7414 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 643.250458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.251645] Call Trace: [ 643.252037] dump_stack+0x107/0x167 [ 643.252569] should_fail.cold+0x5/0xa [ 643.253146] __alloc_pages_nodemask+0x182/0x600 [ 643.253835] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 643.254702] ? find_held_lock+0x2c/0x110 [ 643.255298] ? __pmd_alloc+0x2db/0x5e0 [ 643.255869] ? lock_downgrade+0x6d0/0x6d0 [ 643.256492] ? do_raw_spin_lock+0x121/0x260 [ 643.257134] alloc_pages_current+0x187/0x280 [ 643.257778] pte_alloc_one+0x16/0x1a0 [ 643.258339] __pte_alloc+0x1d/0x330 [ 643.258874] handle_mm_fault+0x287f/0x3500 [ 643.259501] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 643.260267] ? SOFTIRQ_verbose+0x10/0x10 [ 643.260860] ? __pmd_alloc+0x5e0/0x5e0 [ 643.261465] __get_user_pages+0x6ec/0x1620 [ 643.262105] ? follow_page_mask+0x1900/0x1900 [ 643.262757] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 643.263454] __get_user_pages_remote+0x1d5/0x870 [ 643.264138] ? lock_downgrade+0x6d0/0x6d0 [ 643.264743] get_user_pages_remote+0x63/0x90 [ 643.265400] get_arg_page+0xba/0x200 [ 643.265944] ? acct_arg_size+0xe0/0xe0 [ 643.266504] ? downgrade_write+0x3a0/0x3a0 [ 643.267116] ? count.constprop.0+0x1b3/0x290 [ 643.267760] copy_string_kernel+0x1b4/0x450 [ 643.268393] do_execveat_common+0x525/0x8d0 [ 643.269021] ? bprm_execve+0x1a60/0x1a60 [ 643.269638] __x64_sys_execveat+0xed/0x140 [ 643.270257] do_syscall_64+0x33/0x40 [ 643.270799] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.271545] RIP: 0033:0x7f9509c8ab19 [ 643.272082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.274719] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.275811] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 643.276836] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.277870] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.278894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 643.279917] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 643.292918] FAULT_INJECTION: forcing a failure. [ 643.292918] name failslab, interval 1, probability 0, space 0, times 0 [ 643.294593] CPU: 0 PID: 7413 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 643.295584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.296778] Call Trace: [ 643.297178] dump_stack+0x107/0x167 [ 643.297716] should_fail.cold+0x5/0xa [ 643.298273] ? alloc_bprm+0x51/0x8f0 [ 643.298827] should_failslab+0x5/0x20 [ 643.299417] kmem_cache_alloc_trace+0x55/0x320 [ 643.300083] ? lock_downgrade+0x6d0/0x6d0 [ 643.300693] alloc_bprm+0x51/0x8f0 [ 643.301224] ? __virt_addr_valid+0x170/0x5c0 [ 643.301873] do_execveat_common+0x275/0x8d0 [ 643.302507] ? strncpy_from_user+0x9e/0x470 [ 643.303139] ? bprm_execve+0x1a60/0x1a60 [ 643.303749] __x64_sys_execveat+0xed/0x140 [ 643.304375] do_syscall_64+0x33/0x40 [ 643.304921] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.305693] RIP: 0033:0x7f2f4d86bb19 [ 643.306238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.308873] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.310009] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 643.311042] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.312077] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.313114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.314143] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 643.323508] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:05:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 22:05:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 22:05:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:05:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) [ 643.433398] FAULT_INJECTION: forcing a failure. [ 643.433398] name failslab, interval 1, probability 0, space 0, times 0 [ 643.435249] CPU: 0 PID: 7421 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 643.436349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.437558] Call Trace: [ 643.437953] dump_stack+0x107/0x167 [ 643.438486] should_fail.cold+0x5/0xa [ 643.439051] ? alloc_bprm+0x51/0x8f0 [ 643.439599] should_failslab+0x5/0x20 [ 643.440159] kmem_cache_alloc_trace+0x55/0x320 [ 643.440827] ? lock_downgrade+0x6d0/0x6d0 [ 643.441431] alloc_bprm+0x51/0x8f0 [ 643.441943] ? __virt_addr_valid+0x170/0x5c0 [ 643.442596] do_execveat_common+0x275/0x8d0 [ 643.443212] ? strncpy_from_user+0x9e/0x470 [ 643.443845] ? bprm_execve+0x1a60/0x1a60 [ 643.444461] __x64_sys_execveat+0xed/0x140 [ 643.445074] do_syscall_64+0x33/0x40 [ 643.445610] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.446354] RIP: 0033:0x7f6383eb9b19 [ 643.446888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.449525] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.450618] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 643.451641] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.452661] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.453673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.454675] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 643.457676] FAULT_INJECTION: forcing a failure. [ 643.457676] name failslab, interval 1, probability 0, space 0, times 0 [ 643.459380] CPU: 1 PID: 7419 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 643.460357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.461564] Call Trace: [ 643.461948] dump_stack+0x107/0x167 [ 643.462470] should_fail.cold+0x5/0xa [ 643.463027] ? create_object.isra.0+0x3a/0xa20 [ 643.463678] should_failslab+0x5/0x20 [ 643.464247] kmem_cache_alloc+0x5b/0x310 [ 643.464829] create_object.isra.0+0x3a/0xa20 [ 643.465501] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 643.466225] kmem_cache_alloc_trace+0x151/0x320 [ 643.466880] ? lock_downgrade+0x6d0/0x6d0 [ 643.467485] alloc_bprm+0x51/0x8f0 [ 643.468006] ? __virt_addr_valid+0x170/0x5c0 [ 643.468649] do_execveat_common+0x275/0x8d0 [ 643.469289] ? strncpy_from_user+0x9e/0x470 [ 643.469919] ? bprm_execve+0x1a60/0x1a60 [ 643.470522] __x64_sys_execveat+0xed/0x140 [ 643.471152] do_syscall_64+0x33/0x40 [ 643.471700] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.472445] RIP: 0033:0x7f2f4d86bb19 [ 643.472976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.475624] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.476727] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 22:05:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 643.477861] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.478928] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.479965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.480991] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:05:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 643.499858] FAULT_INJECTION: forcing a failure. [ 643.499858] name failslab, interval 1, probability 0, space 0, times 0 [ 643.501540] CPU: 0 PID: 7429 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 643.502524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.503702] Call Trace: [ 643.504100] dump_stack+0x107/0x167 [ 643.504635] should_fail.cold+0x5/0xa [ 643.505218] ? ptlock_alloc+0x1d/0x70 [ 643.505791] should_failslab+0x5/0x20 [ 643.506360] kmem_cache_alloc+0x5b/0x310 [ 643.506959] ptlock_alloc+0x1d/0x70 [ 643.507503] pte_alloc_one+0x68/0x1a0 [ 643.508069] __pte_alloc+0x1d/0x330 [ 643.508617] handle_mm_fault+0x287f/0x3500 [ 643.509254] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 643.510021] ? SOFTIRQ_verbose+0x10/0x10 [ 643.510626] ? __pmd_alloc+0x5e0/0x5e0 [ 643.511220] __get_user_pages+0x6ec/0x1620 [ 643.511851] ? follow_page_mask+0x1900/0x1900 [ 643.512514] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 643.513222] __get_user_pages_remote+0x1d5/0x870 [ 643.513933] ? lock_downgrade+0x6d0/0x6d0 [ 643.514549] get_user_pages_remote+0x63/0x90 [ 643.515206] get_arg_page+0xba/0x200 [ 643.515763] ? acct_arg_size+0xe0/0xe0 [ 643.516333] ? downgrade_write+0x3a0/0x3a0 [ 643.516965] ? count.constprop.0+0x1b3/0x290 [ 643.517033] FAULT_INJECTION: forcing a failure. [ 643.517033] name failslab, interval 1, probability 0, space 0, times 0 [ 643.517613] copy_string_kernel+0x1b4/0x450 [ 643.517643] do_execveat_common+0x525/0x8d0 [ 643.517668] ? bprm_execve+0x1a60/0x1a60 [ 643.521141] __x64_sys_execveat+0xed/0x140 [ 643.521773] do_syscall_64+0x33/0x40 [ 643.522330] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.523081] RIP: 0033:0x7f9509c8ab19 [ 643.523626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.526311] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.527415] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 643.528447] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.529503] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.530555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 643.531608] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 643.532720] CPU: 1 PID: 7432 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 643.533752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 643.534981] Call Trace: [ 643.535383] dump_stack+0x107/0x167 [ 643.535919] should_fail.cold+0x5/0xa [ 643.536485] ? create_object.isra.0+0x3a/0xa20 [ 643.537165] should_failslab+0x5/0x20 [ 643.537732] kmem_cache_alloc+0x5b/0x310 [ 643.538343] create_object.isra.0+0x3a/0xa20 [ 643.538989] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 643.539745] kmem_cache_alloc+0x159/0x310 [ 643.540372] mm_alloc+0x19/0xd0 [ 643.540859] alloc_bprm+0x1cb/0x8f0 [ 643.541411] ? __virt_addr_valid+0x170/0x5c0 [ 643.542073] do_execveat_common+0x275/0x8d0 [ 643.542717] ? strncpy_from_user+0x9e/0x470 [ 643.543385] ? bprm_execve+0x1a60/0x1a60 [ 643.544013] __x64_sys_execveat+0xed/0x140 [ 643.544642] do_syscall_64+0x33/0x40 [ 643.545208] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 643.545961] RIP: 0033:0x7f70da682b19 [ 643.546516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 643.549220] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 643.550354] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 643.551398] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 643.552456] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 643.553516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.554567] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 643.577768] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 657.990389] FAULT_INJECTION: forcing a failure. [ 657.990389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 657.992297] CPU: 1 PID: 7449 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 657.993313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 657.994521] Call Trace: [ 657.994918] dump_stack+0x107/0x167 [ 657.995465] should_fail.cold+0x5/0xa [ 657.996034] __alloc_pages_nodemask+0x182/0x600 [ 657.996732] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 657.997514] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 657.998424] alloc_pages_current+0x187/0x280 [ 657.999084] __get_free_pages+0xc/0xa0 [ 657.999665] pgd_alloc+0x84/0x4e0 [ 658.000189] ? pgd_page_get_mm+0x40/0x40 [ 658.000790] ? lockdep_init_map_type+0x2c7/0x780 [ 658.001498] ? lockdep_init_map_type+0x2c7/0x780 [ 658.002205] mm_init+0x670/0xab0 [ 658.002702] mm_alloc+0xa2/0xd0 [ 658.003200] alloc_bprm+0x1cb/0x8f0 [ 658.003737] ? __virt_addr_valid+0x170/0x5c0 [ 658.004401] do_execveat_common+0x275/0x8d0 [ 658.005018] ? strncpy_from_user+0x9e/0x470 [ 658.005653] ? bprm_execve+0x1a60/0x1a60 [ 658.006257] __x64_sys_execveat+0xed/0x140 [ 658.006882] do_syscall_64+0x33/0x40 [ 658.007430] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 658.008169] RIP: 0033:0x7f70da682b19 22:05:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 22:05:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:05:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:05:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 22:05:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:05:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 22:05:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 658.008709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.011588] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 658.012699] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 658.013749] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 658.014789] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.015832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.016853] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 658.021611] FAULT_INJECTION: forcing a failure. [ 658.021611] name failslab, interval 1, probability 0, space 0, times 0 [ 658.022847] CPU: 0 PID: 7456 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 658.023563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.024436] Call Trace: [ 658.024726] dump_stack+0x107/0x167 [ 658.025110] should_fail.cold+0x5/0xa [ 658.025533] ? create_object.isra.0+0x3a/0xa20 [ 658.026019] should_failslab+0x5/0x20 [ 658.026415] kmem_cache_alloc+0x5b/0x310 [ 658.026842] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 658.027471] create_object.isra.0+0x3a/0xa20 [ 658.027935] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 658.028465] kmem_cache_alloc+0x159/0x310 [ 658.028900] ptlock_alloc+0x1d/0x70 [ 658.029293] pte_alloc_one+0x68/0x1a0 [ 658.029696] __pte_alloc+0x1d/0x330 [ 658.030089] handle_mm_fault+0x287f/0x3500 [ 658.030548] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 658.031078] ? SOFTIRQ_verbose+0x10/0x10 [ 658.031500] ? __pmd_alloc+0x5e0/0x5e0 [ 658.031917] __get_user_pages+0x6ec/0x1620 [ 658.032357] ? follow_page_mask+0x1900/0x1900 [ 658.032838] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 658.033353] __get_user_pages_remote+0x1d5/0x870 [ 658.033852] ? lock_downgrade+0x6d0/0x6d0 [ 658.034290] get_user_pages_remote+0x63/0x90 [ 658.034758] get_arg_page+0xba/0x200 [ 658.035139] ? acct_arg_size+0xe0/0xe0 [ 658.035544] ? downgrade_write+0x3a0/0x3a0 [ 658.035978] ? count.constprop.0+0x1b3/0x290 [ 658.036446] copy_string_kernel+0x1b4/0x450 [ 658.036897] do_execveat_common+0x525/0x8d0 [ 658.037363] ? bprm_execve+0x1a60/0x1a60 [ 658.037788] __x64_sys_execveat+0xed/0x140 [ 658.038064] FAULT_INJECTION: forcing a failure. [ 658.038064] name failslab, interval 1, probability 0, space 0, times 0 [ 658.038250] do_syscall_64+0x33/0x40 [ 658.038266] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 658.038284] RIP: 0033:0x7f9509c8ab19 [ 658.041133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.043006] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 658.043806] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 658.044533] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 658.045283] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.046021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 658.046751] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 658.047518] CPU: 1 PID: 7463 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 658.048513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.049716] Call Trace: [ 658.050103] dump_stack+0x107/0x167 [ 658.050639] should_fail.cold+0x5/0xa [ 658.051201] ? mm_alloc+0x19/0xd0 [ 658.051719] should_failslab+0x5/0x20 [ 658.052279] kmem_cache_alloc+0x5b/0x310 [ 658.052872] ? kasan_unpoison_shadow+0x33/0x50 [ 658.053542] mm_alloc+0x19/0xd0 [ 658.054033] alloc_bprm+0x1cb/0x8f0 [ 658.054563] ? __virt_addr_valid+0x170/0x5c0 [ 658.055210] do_execveat_common+0x275/0x8d0 [ 658.055845] ? strncpy_from_user+0x9e/0x470 [ 658.056473] ? bprm_execve+0x1a60/0x1a60 [ 658.057079] __x64_sys_execveat+0xed/0x140 [ 658.057713] do_syscall_64+0x33/0x40 [ 658.058262] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 658.059010] RIP: 0033:0x7f6383eb9b19 [ 658.059556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.062306] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 658.063397] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 658.064425] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 658.065468] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.066483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.067516] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 658.078454] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:05:53 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 658.087222] FAULT_INJECTION: forcing a failure. [ 658.087222] name failslab, interval 1, probability 0, space 0, times 0 [ 658.088847] CPU: 1 PID: 7465 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 658.089842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.091021] Call Trace: [ 658.091407] dump_stack+0x107/0x167 [ 658.091940] should_fail.cold+0x5/0xa [ 658.092484] ? mm_alloc+0x19/0xd0 [ 658.092997] should_failslab+0x5/0x20 [ 658.093563] kmem_cache_alloc+0x5b/0x310 [ 658.094144] ? kasan_unpoison_shadow+0x33/0x50 [ 658.094810] mm_alloc+0x19/0xd0 [ 658.095293] alloc_bprm+0x1cb/0x8f0 [ 658.095813] ? __virt_addr_valid+0x170/0x5c0 [ 658.096457] do_execveat_common+0x275/0x8d0 [ 658.097084] ? strncpy_from_user+0x9e/0x470 [ 658.097713] ? bprm_execve+0x1a60/0x1a60 [ 658.098320] __x64_sys_execveat+0xed/0x140 [ 658.098945] do_syscall_64+0x33/0x40 [ 658.099485] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 658.100223] RIP: 0033:0x7f2f4d86bb19 [ 658.100763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.103384] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 658.104484] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 658.105513] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 658.106538] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.107568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.108597] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:05:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:05:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:05:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:05:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 658.217975] FAULT_INJECTION: forcing a failure. [ 658.217975] name failslab, interval 1, probability 0, space 0, times 0 [ 658.219110] CPU: 0 PID: 7474 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 658.219769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.220558] Call Trace: [ 658.220823] dump_stack+0x107/0x167 [ 658.221183] should_fail.cold+0x5/0xa [ 658.221567] ? create_object.isra.0+0x3a/0xa20 [ 658.222010] should_failslab+0x5/0x20 [ 658.222377] kmem_cache_alloc+0x5b/0x310 [ 658.222772] create_object.isra.0+0x3a/0xa20 [ 658.223197] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 658.223689] kmem_cache_alloc+0x159/0x310 [ 658.224105] mm_alloc+0x19/0xd0 [ 658.224430] alloc_bprm+0x1cb/0x8f0 [ 658.224779] ? __virt_addr_valid+0x170/0x5c0 [ 658.225203] do_execveat_common+0x275/0x8d0 [ 658.225632] ? strncpy_from_user+0x9e/0x470 [ 658.226045] ? bprm_execve+0x1a60/0x1a60 [ 658.226455] __x64_sys_execveat+0xed/0x140 [ 658.226865] do_syscall_64+0x33/0x40 [ 658.227219] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 658.227715] RIP: 0033:0x7f6383eb9b19 [ 658.228078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.229829] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 658.230559] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 658.231256] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 658.231921] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.232603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.233291] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 658.264869] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:06:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 22:06:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:06:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:06:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:06:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 22:06:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) 22:06:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:06:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 671.577522] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 671.597704] FAULT_INJECTION: forcing a failure. [ 671.597704] name failslab, interval 1, probability 0, space 0, times 0 [ 671.598765] CPU: 1 PID: 7493 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 671.599376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.600117] Call Trace: [ 671.600365] dump_stack+0x107/0x167 [ 671.600707] should_fail.cold+0x5/0xa [ 671.601052] ? vm_area_alloc+0x1c/0x110 [ 671.601420] should_failslab+0x5/0x20 [ 671.601766] kmem_cache_alloc+0x5b/0x310 [ 671.602139] vm_area_alloc+0x1c/0x110 [ 671.602486] alloc_bprm+0x337/0x8f0 [ 671.602818] ? __virt_addr_valid+0x170/0x5c0 [ 671.603223] do_execveat_common+0x275/0x8d0 [ 671.603617] ? strncpy_from_user+0x9e/0x470 [ 671.604006] ? bprm_execve+0x1a60/0x1a60 [ 671.604387] __x64_sys_execveat+0xed/0x140 [ 671.604770] do_syscall_64+0x33/0x40 [ 671.605107] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.605580] RIP: 0033:0x7f70da682b19 [ 671.605916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.607549] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.608237] FAULT_INJECTION: forcing a failure. [ 671.608237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 671.609253] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 671.609897] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.610533] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.611169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.611807] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 671.612469] CPU: 0 PID: 7501 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 671.613513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.614748] Call Trace: [ 671.615163] dump_stack+0x107/0x167 [ 671.615758] should_fail.cold+0x5/0xa [ 671.616324] __alloc_pages_nodemask+0x182/0x600 [ 671.617008] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 671.617777] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 671.618667] alloc_pages_current+0x187/0x280 [ 671.619310] __get_free_pages+0xc/0xa0 [ 671.619882] pgd_alloc+0x84/0x4e0 [ 671.620392] ? pgd_page_get_mm+0x40/0x40 [ 671.620987] ? lockdep_init_map_type+0x2c7/0x780 [ 671.621685] ? lockdep_init_map_type+0x2c7/0x780 [ 671.622385] mm_init+0x670/0xab0 [ 671.622994] mm_alloc+0xa2/0xd0 [ 671.623482] alloc_bprm+0x1cb/0x8f0 [ 671.624049] ? __virt_addr_valid+0x170/0x5c0 [ 671.624699] do_execveat_common+0x275/0x8d0 [ 671.625346] ? strncpy_from_user+0x9e/0x470 [ 671.625999] ? bprm_execve+0x1a60/0x1a60 [ 671.626657] __x64_sys_execveat+0xed/0x140 [ 671.627280] do_syscall_64+0x33/0x40 [ 671.627831] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.628572] RIP: 0033:0x7f6383eb9b19 [ 671.629127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.631884] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.633070] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 671.634170] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.635216] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.636265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.637317] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:06:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 671.657028] FAULT_INJECTION: forcing a failure. [ 671.657028] name failslab, interval 1, probability 0, space 0, times 0 [ 671.658711] CPU: 0 PID: 7500 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 671.659699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.660893] Call Trace: [ 671.661288] dump_stack+0x107/0x167 [ 671.661826] should_fail.cold+0x5/0xa [ 671.662404] ? __anon_vma_prepare+0x62/0x500 [ 671.663065] should_failslab+0x5/0x20 [ 671.663638] kmem_cache_alloc+0x5b/0x310 [ 671.664252] __anon_vma_prepare+0x62/0x500 [ 671.664876] ? __pte_alloc+0x194/0x330 [ 671.665494] handle_mm_fault+0x2b2d/0x3500 [ 671.666129] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 671.666907] ? SOFTIRQ_verbose+0x10/0x10 [ 671.667514] ? __pmd_alloc+0x5e0/0x5e0 [ 671.668118] __get_user_pages+0x6ec/0x1620 [ 671.668768] ? follow_page_mask+0x1900/0x1900 [ 671.669451] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 671.670160] __get_user_pages_remote+0x1d5/0x870 [ 671.670868] ? lock_downgrade+0x6d0/0x6d0 [ 671.671499] get_user_pages_remote+0x63/0x90 [ 671.672157] get_arg_page+0xba/0x200 [ 671.672719] ? acct_arg_size+0xe0/0xe0 [ 671.673299] ? downgrade_write+0x3a0/0x3a0 [ 671.673928] ? count.constprop.0+0x1b3/0x290 [ 671.674596] copy_string_kernel+0x1b4/0x450 [ 671.675253] do_execveat_common+0x525/0x8d0 [ 671.675900] ? bprm_execve+0x1a60/0x1a60 [ 671.676522] __x64_sys_execveat+0xed/0x140 [ 671.677155] do_syscall_64+0x33/0x40 [ 671.677721] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.678478] RIP: 0033:0x7f9509c8ab19 [ 671.679030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.681747] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.682875] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 671.683927] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.684980] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.686043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.687094] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 671.693749] FAULT_INJECTION: forcing a failure. [ 671.693749] name failslab, interval 1, probability 0, space 0, times 0 [ 671.694786] CPU: 1 PID: 7508 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 671.695377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.696090] Call Trace: [ 671.696328] dump_stack+0x107/0x167 [ 671.696646] should_fail.cold+0x5/0xa [ 671.696984] ? getname_flags.part.0+0x50/0x4f0 [ 671.697404] should_failslab+0x5/0x20 [ 671.697741] kmem_cache_alloc+0x5b/0x310 [ 671.698099] getname_flags.part.0+0x50/0x4f0 [ 671.698480] getname_flags+0x9a/0xe0 [ 671.698809] __x64_sys_execveat+0xd6/0x140 [ 671.699178] do_syscall_64+0x33/0x40 [ 671.699507] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.699959] RIP: 0033:0x7f1c8836fb19 22:06:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) [ 671.700288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.701991] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.702641] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 671.703246] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.703858] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.704458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.705065] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 671.710046] FAULT_INJECTION: forcing a failure. [ 671.710046] name failslab, interval 1, probability 0, space 0, times 0 [ 671.711920] CPU: 0 PID: 7504 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 671.712911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.714117] Call Trace: [ 671.714506] dump_stack+0x107/0x167 [ 671.715038] should_fail.cold+0x5/0xa [ 671.715602] ? mm_alloc+0x19/0xd0 [ 671.716116] should_failslab+0x5/0x20 [ 671.716672] kmem_cache_alloc+0x5b/0x310 [ 671.717269] ? kasan_unpoison_shadow+0x33/0x50 [ 671.717948] mm_alloc+0x19/0xd0 [ 671.718430] alloc_bprm+0x1cb/0x8f0 [ 671.718958] ? __virt_addr_valid+0x170/0x5c0 [ 671.719608] do_execveat_common+0x275/0x8d0 [ 671.720240] ? strncpy_from_user+0x9e/0x470 [ 671.720870] ? bprm_execve+0x1a60/0x1a60 [ 671.721486] __x64_sys_execveat+0xed/0x140 [ 671.722103] do_syscall_64+0x33/0x40 [ 671.722647] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.723388] RIP: 0033:0x7f2f4d86bb19 [ 671.723930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.726581] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.727684] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 671.728716] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.729759] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.730791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.731822] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 671.739265] FAULT_INJECTION: forcing a failure. [ 671.739265] name failslab, interval 1, probability 0, space 0, times 0 [ 671.740290] CPU: 1 PID: 7513 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 671.740858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.741567] Call Trace: [ 671.741799] dump_stack+0x107/0x167 [ 671.742125] should_fail.cold+0x5/0xa [ 671.742465] ? create_object.isra.0+0x3a/0xa20 [ 671.742883] should_failslab+0x5/0x20 [ 671.743213] kmem_cache_alloc+0x5b/0x310 [ 671.743578] create_object.isra.0+0x3a/0xa20 [ 671.743959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.744426] kmem_cache_alloc+0x159/0x310 [ 671.744802] vm_area_alloc+0x1c/0x110 [ 671.745155] alloc_bprm+0x337/0x8f0 [ 671.745509] ? __virt_addr_valid+0x170/0x5c0 [ 671.745916] do_execveat_common+0x275/0x8d0 [ 671.746306] ? strncpy_from_user+0x9e/0x470 [ 671.746699] ? bprm_execve+0x1a60/0x1a60 22:06:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) [ 671.747083] __x64_sys_execveat+0xed/0x140 [ 671.747605] do_syscall_64+0x33/0x40 [ 671.747978] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.748424] RIP: 0033:0x7f70da682b19 [ 671.748762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.750312] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.750961] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 671.751588] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.752205] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.752815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.753414] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:06:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 671.786010] FAULT_INJECTION: forcing a failure. [ 671.786010] name failslab, interval 1, probability 0, space 0, times 0 [ 671.786996] CPU: 1 PID: 7519 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 671.787562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.788242] Call Trace: [ 671.788462] dump_stack+0x107/0x167 [ 671.788768] should_fail.cold+0x5/0xa [ 671.789087] ? vm_area_alloc+0x1c/0x110 [ 671.789427] should_failslab+0x5/0x20 [ 671.789752] kmem_cache_alloc+0x5b/0x310 [ 671.790092] vm_area_alloc+0x1c/0x110 [ 671.790412] alloc_bprm+0x337/0x8f0 [ 671.790721] ? __virt_addr_valid+0x170/0x5c0 [ 671.791092] do_execveat_common+0x275/0x8d0 [ 671.791458] ? strncpy_from_user+0x9e/0x470 [ 671.791823] ? bprm_execve+0x1a60/0x1a60 [ 671.792175] __x64_sys_execveat+0xed/0x140 [ 671.792526] do_syscall_64+0x33/0x40 [ 671.792840] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.793269] RIP: 0033:0x7f6383eb9b19 [ 671.793588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.795093] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.795725] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 671.796309] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.796896] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.797493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.798080] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:06:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 671.815413] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 671.820019] EXT4-fs (loop1): get root inode failed [ 671.821476] EXT4-fs (loop1): mount failed 22:06:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 22:06:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 22:06:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 22:06:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 671.880538] FAULT_INJECTION: forcing a failure. [ 671.880538] name failslab, interval 1, probability 0, space 0, times 0 [ 671.882311] CPU: 0 PID: 7525 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 671.883318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.884538] Call Trace: [ 671.884942] dump_stack+0x107/0x167 [ 671.885435] FAULT_INJECTION: forcing a failure. [ 671.885435] name failslab, interval 1, probability 0, space 0, times 0 [ 671.885490] should_fail.cold+0x5/0xa [ 671.886961] ? create_object.isra.0+0x3a/0xa20 [ 671.887641] should_failslab+0x5/0x20 [ 671.888205] kmem_cache_alloc+0x5b/0x310 [ 671.888805] create_object.isra.0+0x3a/0xa20 [ 671.889459] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.890207] kmem_cache_alloc+0x159/0x310 [ 671.890822] getname_flags.part.0+0x50/0x4f0 [ 671.891473] getname_flags+0x9a/0xe0 [ 671.892025] __x64_sys_execveat+0xd6/0x140 [ 671.892659] do_syscall_64+0x33/0x40 [ 671.893208] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.893963] RIP: 0033:0x7f1c8836fb19 [ 671.894510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.897170] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.898285] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 671.899324] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.900367] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.901412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.902449] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 671.903512] CPU: 1 PID: 7528 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 671.904080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.904757] Call Trace: [ 671.904982] dump_stack+0x107/0x167 [ 671.905280] should_fail.cold+0x5/0xa [ 671.905602] ? create_object.isra.0+0x3a/0xa20 [ 671.905977] should_failslab+0x5/0x20 [ 671.906290] kmem_cache_alloc+0x5b/0x310 [ 671.906624] create_object.isra.0+0x3a/0xa20 [ 671.906984] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.907400] kmem_cache_alloc+0x159/0x310 [ 671.907740] vm_area_alloc+0x1c/0x110 [ 671.908051] alloc_bprm+0x337/0x8f0 [ 671.908348] ? __virt_addr_valid+0x170/0x5c0 [ 671.908709] do_execveat_common+0x275/0x8d0 [ 671.909063] ? strncpy_from_user+0x9e/0x470 [ 671.909422] ? bprm_execve+0x1a60/0x1a60 [ 671.909758] __x64_sys_execveat+0xed/0x140 [ 671.910105] do_syscall_64+0x33/0x40 [ 671.910405] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.910820] RIP: 0033:0x7f6383eb9b19 [ 671.911126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.912585] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.913199] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 671.913775] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.914350] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.914920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.915494] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:06:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 671.928658] FAULT_INJECTION: forcing a failure. [ 671.928658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 671.929700] CPU: 1 PID: 7534 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 671.930254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.930918] Call Trace: [ 671.931134] dump_stack+0x107/0x167 [ 671.931436] should_fail.cold+0x5/0xa [ 671.931749] __alloc_pages_nodemask+0x182/0x600 [ 671.932129] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 671.932559] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 671.933063] alloc_pages_current+0x187/0x280 [ 671.933438] __get_free_pages+0xc/0xa0 [ 671.933756] pgd_alloc+0x84/0x4e0 [ 671.934047] ? pgd_page_get_mm+0x40/0x40 [ 671.934384] ? lockdep_init_map_type+0x2c7/0x780 [ 671.934771] ? lockdep_init_map_type+0x2c7/0x780 [ 671.935159] mm_init+0x670/0xab0 [ 671.935433] mm_alloc+0xa2/0xd0 [ 671.935709] alloc_bprm+0x1cb/0x8f0 [ 671.936010] ? __virt_addr_valid+0x170/0x5c0 [ 671.936372] do_execveat_common+0x275/0x8d0 [ 671.936722] ? strncpy_from_user+0x9e/0x470 [ 671.937073] ? bprm_execve+0x1a60/0x1a60 [ 671.937417] __x64_sys_execveat+0xed/0x140 [ 671.937766] do_syscall_64+0x33/0x40 [ 671.938069] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.938484] RIP: 0033:0x7f2f4d86bb19 [ 671.938786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.940259] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.940868] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 671.941441] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.942021] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.942597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.943172] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:06:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 671.955071] FAULT_INJECTION: forcing a failure. [ 671.955071] name failslab, interval 1, probability 0, space 0, times 0 [ 671.955999] CPU: 1 PID: 7535 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 671.956549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.957230] Call Trace: [ 671.957459] dump_stack+0x107/0x167 [ 671.957756] should_fail.cold+0x5/0xa [ 671.958065] ? create_object.isra.0+0x3a/0xa20 [ 671.958437] should_failslab+0x5/0x20 [ 671.958746] kmem_cache_alloc+0x5b/0x310 [ 671.959077] create_object.isra.0+0x3a/0xa20 [ 671.959435] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.959850] kmem_cache_alloc+0x159/0x310 [ 671.960194] __anon_vma_prepare+0x62/0x500 [ 671.960535] ? __pte_alloc+0x194/0x330 [ 671.960850] handle_mm_fault+0x2b2d/0x3500 [ 671.961200] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 671.961633] ? SOFTIRQ_verbose+0x10/0x10 [ 671.961962] ? __pmd_alloc+0x5e0/0x5e0 [ 671.962292] __get_user_pages+0x6ec/0x1620 [ 671.962643] ? follow_page_mask+0x1900/0x1900 [ 671.963008] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 671.963395] __get_user_pages_remote+0x1d5/0x870 [ 671.963778] ? lock_downgrade+0x6d0/0x6d0 [ 671.964118] get_user_pages_remote+0x63/0x90 [ 671.964477] get_arg_page+0xba/0x200 [ 671.964779] ? acct_arg_size+0xe0/0xe0 [ 671.965093] ? downgrade_write+0x3a0/0x3a0 [ 671.965446] ? count.constprop.0+0x1b3/0x290 [ 671.965803] copy_string_kernel+0x1b4/0x450 [ 671.966156] do_execveat_common+0x525/0x8d0 [ 671.966511] ? bprm_execve+0x1a60/0x1a60 [ 671.966851] __x64_sys_execveat+0xed/0x140 [ 671.967198] do_syscall_64+0x33/0x40 [ 671.967501] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 671.967913] RIP: 0033:0x7f9509c8ab19 [ 671.968217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.969694] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 671.970305] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 671.970877] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 671.971451] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.972028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.972601] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:06:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) [ 672.033642] FAULT_INJECTION: forcing a failure. [ 672.033642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 672.035534] CPU: 0 PID: 7542 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 672.036548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 672.037793] Call Trace: [ 672.038194] dump_stack+0x107/0x167 [ 672.038743] should_fail.cold+0x5/0xa [ 672.039319] __alloc_pages_nodemask+0x182/0x600 [ 672.040013] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 672.040901] ? add_mm_counter_fast+0x220/0x220 [ 672.041600] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 672.042381] alloc_pages_current+0x187/0x280 [ 672.043037] get_zeroed_page+0x14/0xb0 [ 672.043608] __pud_alloc+0x33/0x270 [ 672.044153] handle_mm_fault+0x1a73/0x3500 [ 672.044794] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 672.045576] ? SOFTIRQ_verbose+0x10/0x10 [ 672.046180] ? __pmd_alloc+0x5e0/0x5e0 [ 672.046774] __get_user_pages+0x6ec/0x1620 [ 672.047415] ? follow_page_mask+0x1900/0x1900 [ 672.048085] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 672.048790] __get_user_pages_remote+0x1d5/0x870 [ 672.049514] ? lock_downgrade+0x6d0/0x6d0 [ 672.050125] get_user_pages_remote+0x63/0x90 [ 672.050786] get_arg_page+0xba/0x200 [ 672.051337] ? acct_arg_size+0xe0/0xe0 [ 672.051910] ? downgrade_write+0x3a0/0x3a0 [ 672.052538] ? count.constprop.0+0x1b3/0x290 [ 672.053194] copy_string_kernel+0x1b4/0x450 [ 672.053867] do_execveat_common+0x525/0x8d0 [ 672.054509] ? bprm_execve+0x1a60/0x1a60 [ 672.055129] __x64_sys_execveat+0xed/0x140 [ 672.055754] do_syscall_64+0x33/0x40 [ 672.056308] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 672.057057] RIP: 0033:0x7f70da682b19 [ 672.057612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 672.060269] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 672.061395] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 672.062437] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 672.063479] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 672.064517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.065571] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 684.870848] FAULT_INJECTION: forcing a failure. [ 684.870848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 684.871995] CPU: 0 PID: 7558 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 684.872605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.873335] Call Trace: [ 684.873580] dump_stack+0x107/0x167 [ 684.873907] should_fail.cold+0x5/0xa [ 684.874252] __alloc_pages_nodemask+0x182/0x600 [ 684.874665] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 684.875207] ? add_mm_counter_fast+0x220/0x220 [ 684.875623] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 684.876101] alloc_pages_current+0x187/0x280 [ 684.876500] get_zeroed_page+0x14/0xb0 [ 684.876855] __pud_alloc+0x33/0x270 [ 684.877189] handle_mm_fault+0x1a73/0x3500 [ 684.877582] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 684.878055] ? SOFTIRQ_verbose+0x10/0x10 [ 684.878420] ? __pmd_alloc+0x5e0/0x5e0 [ 684.878784] __get_user_pages+0x6ec/0x1620 [ 684.879175] ? follow_page_mask+0x1900/0x1900 [ 684.879581] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 684.880009] __get_user_pages_remote+0x1d5/0x870 [ 684.880436] ? lock_downgrade+0x6d0/0x6d0 [ 684.880810] get_user_pages_remote+0x63/0x90 [ 684.881213] get_arg_page+0xba/0x200 [ 684.881553] ? acct_arg_size+0xe0/0xe0 [ 684.881897] ? downgrade_write+0x3a0/0x3a0 [ 684.882278] ? count.constprop.0+0x1b3/0x290 [ 684.882672] copy_string_kernel+0x1b4/0x450 [ 684.883069] do_execveat_common+0x525/0x8d0 [ 684.883460] ? bprm_execve+0x1a60/0x1a60 [ 684.883830] __x64_sys_execveat+0xed/0x140 [ 684.884205] do_syscall_64+0x33/0x40 [ 684.884539] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 684.884996] RIP: 0033:0x7f6383eb9b19 [ 684.885328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.886925] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 684.887604] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 684.888226] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c 22:06:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 22:06:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 22:06:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:06:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 22:06:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:06:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:06:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 22:06:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) [ 684.888846] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.889662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.890279] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 684.903098] FAULT_INJECTION: forcing a failure. [ 684.903098] name failslab, interval 1, probability 0, space 0, times 0 [ 684.904093] CPU: 0 PID: 7559 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 684.904694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.905435] Call Trace: [ 684.905676] dump_stack+0x107/0x167 [ 684.905999] should_fail.cold+0x5/0xa [ 684.906340] ? __anon_vma_prepare+0x270/0x500 [ 684.906740] should_failslab+0x5/0x20 [ 684.907070] kmem_cache_alloc+0x5b/0x310 [ 684.907442] __anon_vma_prepare+0x270/0x500 [ 684.907824] ? __pte_alloc+0x194/0x330 [ 684.908171] handle_mm_fault+0x2b2d/0x3500 [ 684.908549] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 684.909002] ? SOFTIRQ_verbose+0x10/0x10 [ 684.909362] ? __pmd_alloc+0x5e0/0x5e0 [ 684.909723] __get_user_pages+0x6ec/0x1620 [ 684.910103] ? follow_page_mask+0x1900/0x1900 [ 684.910501] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 684.910915] __get_user_pages_remote+0x1d5/0x870 [ 684.911328] ? lock_downgrade+0x6d0/0x6d0 [ 684.911510] FAULT_INJECTION: forcing a failure. [ 684.911510] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 684.911709] get_user_pages_remote+0x63/0x90 [ 684.913801] get_arg_page+0xba/0x200 [ 684.914131] ? acct_arg_size+0xe0/0xe0 [ 684.914475] ? downgrade_write+0x3a0/0x3a0 [ 684.914846] ? count.constprop.0+0x1b3/0x290 [ 684.915234] copy_string_kernel+0x1b4/0x450 [ 684.915626] do_execveat_common+0x525/0x8d0 [ 684.916006] ? bprm_execve+0x1a60/0x1a60 [ 684.916368] __x64_sys_execveat+0xed/0x140 [ 684.916735] do_syscall_64+0x33/0x40 [ 684.917067] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 684.917517] RIP: 0033:0x7f9509c8ab19 [ 684.917854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.919436] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 684.920096] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 684.920712] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 684.921334] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.921952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.922574] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 684.923215] CPU: 1 PID: 7568 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 684.924231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.925660] Call Trace: [ 684.925755] FAULT_INJECTION: forcing a failure. [ 684.925755] name failslab, interval 1, probability 0, space 0, times 0 [ 684.926054] dump_stack+0x107/0x167 [ 684.927509] should_fail.cold+0x5/0xa [ 684.928068] __alloc_pages_nodemask+0x182/0x600 [ 684.928742] ? lock_acquire+0x197/0x470 [ 684.929319] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 684.930194] ? lock_downgrade+0x6d0/0x6d0 [ 684.930798] ? do_raw_spin_lock+0x121/0x260 [ 684.931430] alloc_pages_current+0x187/0x280 [ 684.932071] __pmd_alloc+0x37/0x5e0 [ 684.932605] handle_mm_fault+0x1ac4/0x3500 [ 684.933242] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 684.934036] ? SOFTIRQ_verbose+0x10/0x10 [ 684.934646] ? __pmd_alloc+0x5e0/0x5e0 [ 684.935236] __get_user_pages+0x6ec/0x1620 [ 684.935877] ? follow_page_mask+0x1900/0x1900 [ 684.936533] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 684.937241] __get_user_pages_remote+0x1d5/0x870 [ 684.937936] ? lock_downgrade+0x6d0/0x6d0 [ 684.938559] get_user_pages_remote+0x63/0x90 [ 684.939207] get_arg_page+0xba/0x200 [ 684.939764] ? acct_arg_size+0xe0/0xe0 [ 684.940329] ? downgrade_write+0x3a0/0x3a0 [ 684.940959] ? count.constprop.0+0x1b3/0x290 [ 684.941609] copy_string_kernel+0x1b4/0x450 [ 684.942260] do_execveat_common+0x525/0x8d0 [ 684.942895] ? bprm_execve+0x1a60/0x1a60 [ 684.943515] __x64_sys_execveat+0xed/0x140 [ 684.944131] do_syscall_64+0x33/0x40 [ 684.944685] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 684.945427] RIP: 0033:0x7f70da682b19 [ 684.945990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.948620] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 684.949744] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 684.950793] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 684.951834] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.952884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.953936] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 684.955008] CPU: 0 PID: 7565 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 684.955594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.956281] Call Trace: [ 684.956505] dump_stack+0x107/0x167 [ 684.956811] should_fail.cold+0x5/0xa [ 684.957133] ? vm_area_alloc+0x1c/0x110 [ 684.957467] should_failslab+0x5/0x20 [ 684.957795] kmem_cache_alloc+0x5b/0x310 [ 684.958145] vm_area_alloc+0x1c/0x110 [ 684.958471] alloc_bprm+0x337/0x8f0 [ 684.958792] ? __virt_addr_valid+0x170/0x5c0 [ 684.959171] do_execveat_common+0x275/0x8d0 [ 684.959536] ? strncpy_from_user+0x9e/0x470 [ 684.959896] ? bprm_execve+0x1a60/0x1a60 [ 684.960246] __x64_sys_execveat+0xed/0x140 [ 684.960608] do_syscall_64+0x33/0x40 [ 684.960920] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 684.961353] RIP: 0033:0x7f2f4d86bb19 [ 684.961672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.963188] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 684.963824] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 684.964416] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 684.965015] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.965616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.966216] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 684.967484] FAULT_INJECTION: forcing a failure. [ 684.967484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.968473] CPU: 0 PID: 7572 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 684.969036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 684.969736] Call Trace: [ 684.969962] dump_stack+0x107/0x167 [ 684.970275] should_fail.cold+0x5/0xa [ 684.970602] strncpy_from_user+0x34/0x470 [ 684.970960] getname_flags.part.0+0x95/0x4f0 [ 684.971342] getname_flags+0x9a/0xe0 [ 684.971670] __x64_sys_execveat+0xd6/0x140 [ 684.972026] do_syscall_64+0x33/0x40 [ 684.972345] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 684.972783] RIP: 0033:0x7f1c8836fb19 [ 684.973101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 684.974649] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 684.975297] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 684.975915] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 684.976522] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 684.977128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.977740] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 685.004393] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 685.006611] EXT4-fs (loop1): get root inode failed [ 685.007403] EXT4-fs (loop1): mount failed 22:06:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) [ 685.064206] FAULT_INJECTION: forcing a failure. [ 685.064206] name failslab, interval 1, probability 0, space 0, times 0 [ 685.065137] CPU: 0 PID: 7577 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 685.065685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.066348] Call Trace: [ 685.066571] dump_stack+0x107/0x167 [ 685.066866] should_fail.cold+0x5/0xa [ 685.067179] ? __pmd_alloc+0x94/0x5e0 [ 685.067492] should_failslab+0x5/0x20 [ 685.067807] kmem_cache_alloc+0x5b/0x310 [ 685.068141] __pmd_alloc+0x94/0x5e0 [ 685.068437] handle_mm_fault+0x1ac4/0x3500 [ 685.068796] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 685.069223] ? SOFTIRQ_verbose+0x10/0x10 [ 685.069561] ? __pmd_alloc+0x5e0/0x5e0 [ 685.069896] __get_user_pages+0x6ec/0x1620 [ 685.070256] ? follow_page_mask+0x1900/0x1900 [ 685.070625] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 685.071020] __get_user_pages_remote+0x1d5/0x870 [ 685.071411] ? lock_downgrade+0x6d0/0x6d0 [ 685.071759] get_user_pages_remote+0x63/0x90 [ 685.072123] get_arg_page+0xba/0x200 [ 685.072436] ? acct_arg_size+0xe0/0xe0 [ 685.072749] ? downgrade_write+0x3a0/0x3a0 [ 685.073099] ? count.constprop.0+0x1b3/0x290 [ 685.073460] copy_string_kernel+0x1b4/0x450 [ 685.073827] do_execveat_common+0x525/0x8d0 [ 685.074178] ? bprm_execve+0x1a60/0x1a60 [ 685.074521] __x64_sys_execveat+0xed/0x140 [ 685.074869] do_syscall_64+0x33/0x40 [ 685.075183] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 685.075598] RIP: 0033:0x7f70da682b19 [ 685.075909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.077380] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 685.078010] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 685.078588] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 685.079156] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 685.079724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.080302] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:06:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 22:06:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 22:06:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 22:06:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:06:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 22:06:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 22:06:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(0x0, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:06:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 704.646314] FAULT_INJECTION: forcing a failure. [ 704.646314] name failslab, interval 1, probability 0, space 0, times 0 [ 704.648114] CPU: 1 PID: 7588 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 704.649113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.650320] Call Trace: [ 704.650715] dump_stack+0x107/0x167 [ 704.651252] should_fail.cold+0x5/0xa [ 704.651814] ? alloc_bprm+0x51/0x8f0 [ 704.652364] should_failslab+0x5/0x20 [ 704.652926] kmem_cache_alloc_trace+0x55/0x320 [ 704.653595] ? lock_downgrade+0x6d0/0x6d0 [ 704.654223] alloc_bprm+0x51/0x8f0 [ 704.654750] ? __virt_addr_valid+0x170/0x5c0 [ 704.655402] do_execveat_common+0x275/0x8d0 [ 704.656033] ? strncpy_from_user+0x9e/0x470 [ 704.656665] ? bprm_execve+0x1a60/0x1a60 [ 704.657276] __x64_sys_execveat+0xed/0x140 [ 704.657909] do_syscall_64+0x33/0x40 [ 704.658458] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.659210] RIP: 0033:0x7f1c8836fb19 [ 704.659757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.662425] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.663534] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 704.664572] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.665030] FAULT_INJECTION: forcing a failure. [ 704.665030] name failslab, interval 1, probability 0, space 0, times 0 [ 704.665607] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.665618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.665629] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 704.670623] CPU: 0 PID: 7586 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 704.671624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.672840] Call Trace: [ 704.673239] dump_stack+0x107/0x167 [ 704.673791] should_fail.cold+0x5/0xa [ 704.674361] ? create_object.isra.0+0x3a/0xa20 [ 704.675035] should_failslab+0x5/0x20 [ 704.675602] kmem_cache_alloc+0x5b/0x310 [ 704.676208] create_object.isra.0+0x3a/0xa20 [ 704.676857] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 704.677605] kmem_cache_alloc+0x159/0x310 [ 704.678215] __pmd_alloc+0x94/0x5e0 [ 704.678759] handle_mm_fault+0x1ac4/0x3500 [ 704.679391] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 704.680160] ? SOFTIRQ_verbose+0x10/0x10 [ 704.680769] ? __pmd_alloc+0x5e0/0x5e0 [ 704.681368] __get_user_pages+0x6ec/0x1620 [ 704.682013] ? follow_page_mask+0x1900/0x1900 [ 704.682679] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 704.683380] __get_user_pages_remote+0x1d5/0x870 [ 704.684086] ? lock_downgrade+0x6d0/0x6d0 [ 704.684706] get_user_pages_remote+0x63/0x90 [ 704.685363] get_arg_page+0xba/0x200 [ 704.685926] ? acct_arg_size+0xe0/0xe0 [ 704.686498] ? downgrade_write+0x3a0/0x3a0 [ 704.687126] ? count.constprop.0+0x1b3/0x290 [ 704.687783] copy_string_kernel+0x1b4/0x450 [ 704.688432] do_execveat_common+0x525/0x8d0 [ 704.689077] ? bprm_execve+0x1a60/0x1a60 [ 704.689698] __x64_sys_execveat+0xed/0x140 [ 704.690315] do_syscall_64+0x33/0x40 [ 704.690867] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.691623] RIP: 0033:0x7f70da682b19 [ 704.692173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.694860] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.695974] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 704.697025] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.698080] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.699128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.700166] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 704.707920] FAULT_INJECTION: forcing a failure. [ 704.707920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.709973] CPU: 0 PID: 7593 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 704.710979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.712192] Call Trace: [ 704.712581] dump_stack+0x107/0x167 [ 704.713123] should_fail.cold+0x5/0xa [ 704.713690] __alloc_pages_nodemask+0x182/0x600 [ 704.714389] ? lock_acquire+0x197/0x470 [ 704.714985] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 704.715875] ? lock_downgrade+0x6d0/0x6d0 [ 704.716493] ? do_raw_spin_lock+0x121/0x260 [ 704.717134] alloc_pages_current+0x187/0x280 [ 704.717801] __pmd_alloc+0x37/0x5e0 [ 704.718347] handle_mm_fault+0x1ac4/0x3500 [ 704.718991] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 704.719758] ? SOFTIRQ_verbose+0x10/0x10 [ 704.720338] ? __pmd_alloc+0x5e0/0x5e0 22:06:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) [ 704.720940] __get_user_pages+0x6ec/0x1620 [ 704.721683] ? follow_page_mask+0x1900/0x1900 [ 704.722363] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 704.723061] __get_user_pages_remote+0x1d5/0x870 [ 704.723757] ? lock_downgrade+0x6d0/0x6d0 [ 704.724374] get_user_pages_remote+0x63/0x90 [ 704.725027] get_arg_page+0xba/0x200 [ 704.725579] ? acct_arg_size+0xe0/0xe0 [ 704.726155] ? downgrade_write+0x3a0/0x3a0 [ 704.726780] ? count.constprop.0+0x1b3/0x290 [ 704.727429] copy_string_kernel+0x1b4/0x450 [ 704.728084] do_execveat_common+0x525/0x8d0 [ 704.728721] ? bprm_execve+0x1a60/0x1a60 [ 704.729335] __x64_sys_execveat+0xed/0x140 [ 704.729962] do_syscall_64+0x33/0x40 [ 704.730517] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.731264] RIP: 0033:0x7f6383eb9b19 [ 704.731812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.734479] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.735591] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 704.736628] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.737668] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.738707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.739740] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 704.753497] FAULT_INJECTION: forcing a failure. [ 704.753497] name failslab, interval 1, probability 0, space 0, times 0 [ 704.755553] CPU: 1 PID: 7599 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 704.756550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.757791] Call Trace: [ 704.758293] dump_stack+0x107/0x167 [ 704.759007] should_fail.cold+0x5/0xa [ 704.759692] ? create_object.isra.0+0x3a/0xa20 [ 704.760366] should_failslab+0x5/0x20 [ 704.760456] FAULT_INJECTION: forcing a failure. [ 704.760456] name failslab, interval 1, probability 0, space 0, times 0 [ 704.760923] kmem_cache_alloc+0x5b/0x310 [ 704.760949] create_object.isra.0+0x3a/0xa20 [ 704.763759] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 704.764508] kmem_cache_alloc+0x159/0x310 [ 704.765125] __anon_vma_prepare+0x270/0x500 [ 704.765753] ? __pte_alloc+0x194/0x330 [ 704.766338] handle_mm_fault+0x2b2d/0x3500 [ 704.766964] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 704.767726] ? SOFTIRQ_verbose+0x10/0x10 [ 704.768320] ? __pmd_alloc+0x5e0/0x5e0 [ 704.768916] __get_user_pages+0x6ec/0x1620 [ 704.769552] ? follow_page_mask+0x1900/0x1900 [ 704.770231] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 704.770942] __get_user_pages_remote+0x1d5/0x870 [ 704.771639] ? lock_downgrade+0x6d0/0x6d0 [ 704.772256] get_user_pages_remote+0x63/0x90 [ 704.772911] get_arg_page+0xba/0x200 [ 704.773458] ? acct_arg_size+0xe0/0xe0 [ 704.774031] ? downgrade_write+0x3a0/0x3a0 [ 704.774652] ? count.constprop.0+0x1b3/0x290 [ 704.775308] copy_string_kernel+0x1b4/0x450 [ 704.775952] do_execveat_common+0x525/0x8d0 [ 704.776585] ? bprm_execve+0x1a60/0x1a60 [ 704.777199] __x64_sys_execveat+0xed/0x140 [ 704.777830] do_syscall_64+0x33/0x40 [ 704.778374] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.779119] RIP: 0033:0x7f9509c8ab19 [ 704.779663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.782314] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.783418] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 704.784448] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.785478] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.786524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.787558] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 704.788617] CPU: 0 PID: 7598 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 704.789621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.790836] Call Trace: [ 704.791230] dump_stack+0x107/0x167 [ 704.791766] should_fail.cold+0x5/0xa [ 704.792337] ? create_object.isra.0+0x3a/0xa20 [ 704.793017] should_failslab+0x5/0x20 [ 704.793584] kmem_cache_alloc+0x5b/0x310 [ 704.794194] create_object.isra.0+0x3a/0xa20 [ 704.794840] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 704.795588] kmem_cache_alloc+0x159/0x310 [ 704.796205] vm_area_alloc+0x1c/0x110 [ 704.796769] alloc_bprm+0x337/0x8f0 [ 704.797301] ? __virt_addr_valid+0x170/0x5c0 [ 704.797970] do_execveat_common+0x275/0x8d0 [ 704.798609] ? strncpy_from_user+0x9e/0x470 [ 704.799247] ? bprm_execve+0x1a60/0x1a60 [ 704.799865] __x64_sys_execveat+0xed/0x140 [ 704.800489] do_syscall_64+0x33/0x40 [ 704.801037] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.801798] RIP: 0033:0x7f2f4d86bb19 [ 704.802347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.805018] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.806139] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 704.807184] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.808233] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.809280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.810335] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 704.831255] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 704.835701] FAULT_INJECTION: forcing a failure. [ 704.835701] name failslab, interval 1, probability 0, space 0, times 0 [ 704.837391] CPU: 0 PID: 7605 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 704.838401] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.839612] Call Trace: [ 704.840004] dump_stack+0x107/0x167 [ 704.840543] should_fail.cold+0x5/0xa [ 704.841114] ? create_object.isra.0+0x3a/0xa20 [ 704.841802] should_failslab+0x5/0x20 [ 704.842369] kmem_cache_alloc+0x5b/0x310 [ 704.842979] create_object.isra.0+0x3a/0xa20 [ 704.843634] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 704.844394] kmem_cache_alloc_trace+0x151/0x320 [ 704.845083] ? lock_downgrade+0x6d0/0x6d0 [ 704.845703] alloc_bprm+0x51/0x8f0 [ 704.846244] ? __virt_addr_valid+0x170/0x5c0 [ 704.846905] do_execveat_common+0x275/0x8d0 [ 704.847552] ? strncpy_from_user+0x9e/0x470 [ 704.848194] ? bprm_execve+0x1a60/0x1a60 [ 704.848817] __x64_sys_execveat+0xed/0x140 [ 704.849457] do_syscall_64+0x33/0x40 [ 704.850017] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 704.850776] RIP: 0033:0x7f1c8836fb19 [ 704.851333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.854011] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 704.855138] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 704.856177] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 704.857217] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.858259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.859295] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 704.868244] EXT4-fs (loop1): get root inode failed [ 704.868972] EXT4-fs (loop1): mount failed 22:06:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:06:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:06:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:06:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:06:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) [ 705.020622] EXT4-fs (loop1): invalid first ino: 0 22:06:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:06:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 705.087500] FAULT_INJECTION: forcing a failure. [ 705.087500] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.089366] CPU: 1 PID: 7623 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 705.090370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.091573] Call Trace: [ 705.091966] dump_stack+0x107/0x167 [ 705.092505] should_fail.cold+0x5/0xa [ 705.093068] __alloc_pages_nodemask+0x182/0x600 [ 705.093754] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 705.094642] ? find_held_lock+0x2c/0x110 [ 705.095242] ? __pmd_alloc+0x2db/0x5e0 [ 705.095816] ? lock_downgrade+0x6d0/0x6d0 [ 705.096426] ? do_raw_spin_lock+0x121/0x260 [ 705.097063] alloc_pages_current+0x187/0x280 [ 705.097721] pte_alloc_one+0x16/0x1a0 [ 705.098290] __pte_alloc+0x1d/0x330 [ 705.098828] handle_mm_fault+0x287f/0x3500 [ 705.099455] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 705.100223] ? SOFTIRQ_verbose+0x10/0x10 [ 705.100817] ? __pmd_alloc+0x5e0/0x5e0 [ 705.101412] __get_user_pages+0x6ec/0x1620 [ 705.102049] ? follow_page_mask+0x1900/0x1900 [ 705.102709] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 705.103404] __get_user_pages_remote+0x1d5/0x870 [ 705.104101] ? lock_downgrade+0x6d0/0x6d0 [ 705.104717] get_user_pages_remote+0x63/0x90 [ 705.105367] get_arg_page+0xba/0x200 [ 705.105923] ? acct_arg_size+0xe0/0xe0 [ 705.106490] ? downgrade_write+0x3a0/0x3a0 [ 705.107111] ? count.constprop.0+0x1b3/0x290 [ 705.107760] copy_string_kernel+0x1b4/0x450 [ 705.108402] do_execveat_common+0x525/0x8d0 [ 705.109037] ? bprm_execve+0x1a60/0x1a60 [ 705.109654] __x64_sys_execveat+0xed/0x140 [ 705.110288] do_syscall_64+0x33/0x40 [ 705.110833] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 705.111590] RIP: 0033:0x7f70da682b19 [ 705.112136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.114802] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 705.115913] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 705.116947] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 705.118001] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.119030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.120048] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:06:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) [ 705.137374] FAULT_INJECTION: forcing a failure. [ 705.137374] name failslab, interval 1, probability 0, space 0, times 0 [ 705.139071] CPU: 0 PID: 7624 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 705.140058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.141259] Call Trace: [ 705.141649] dump_stack+0x107/0x167 [ 705.142196] should_fail.cold+0x5/0xa [ 705.142757] ? create_object.isra.0+0x3a/0xa20 [ 705.143424] should_failslab+0x5/0x20 [ 705.143982] kmem_cache_alloc+0x5b/0x310 [ 705.144578] create_object.isra.0+0x3a/0xa20 [ 705.145221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 705.145969] kmem_cache_alloc+0x159/0x310 [ 705.146589] __anon_vma_prepare+0x270/0x500 [ 705.147218] ? __pte_alloc+0x194/0x330 [ 705.147794] handle_mm_fault+0x2b2d/0x3500 [ 705.148422] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 705.149186] ? SOFTIRQ_verbose+0x10/0x10 [ 705.149791] ? __pmd_alloc+0x5e0/0x5e0 [ 705.150394] __get_user_pages+0x6ec/0x1620 [ 705.151025] ? follow_page_mask+0x1900/0x1900 [ 705.151690] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 705.152383] __get_user_pages_remote+0x1d5/0x870 [ 705.153075] ? lock_downgrade+0x6d0/0x6d0 [ 705.153691] get_user_pages_remote+0x63/0x90 [ 705.154354] get_arg_page+0xba/0x200 [ 705.154897] ? acct_arg_size+0xe0/0xe0 [ 705.155463] ? downgrade_write+0x3a0/0x3a0 [ 705.156091] ? count.constprop.0+0x1b3/0x290 [ 705.156744] copy_string_kernel+0x1b4/0x450 [ 705.157384] do_execveat_common+0x525/0x8d0 [ 705.158026] ? bprm_execve+0x1a60/0x1a60 [ 705.158633] __x64_sys_execveat+0xed/0x140 [ 705.159258] do_syscall_64+0x33/0x40 [ 705.159801] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 705.160551] RIP: 0033:0x7f9509c8ab19 [ 705.161090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.163760] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 705.164870] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 705.165912] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 705.166945] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.167982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.169016] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:06:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 705.218537] FAULT_INJECTION: forcing a failure. [ 705.218537] name failslab, interval 1, probability 0, space 0, times 0 [ 705.220194] CPU: 0 PID: 7626 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 705.221172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.222362] Call Trace: [ 705.222737] dump_stack+0x107/0x167 [ 705.223265] should_fail.cold+0x5/0xa [ 705.223814] ? __pmd_alloc+0x94/0x5e0 [ 705.224361] should_failslab+0x5/0x20 [ 705.224910] kmem_cache_alloc+0x5b/0x310 [ 705.225498] __pmd_alloc+0x94/0x5e0 [ 705.226034] handle_mm_fault+0x1ac4/0x3500 [ 705.226651] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 705.227403] ? SOFTIRQ_verbose+0x10/0x10 [ 705.227963] ? __pmd_alloc+0x5e0/0x5e0 [ 705.228541] __get_user_pages+0x6ec/0x1620 [ 705.229161] ? follow_page_mask+0x1900/0x1900 [ 705.229811] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 705.230500] __get_user_pages_remote+0x1d5/0x870 [ 705.231180] ? lock_downgrade+0x6d0/0x6d0 [ 705.231783] get_user_pages_remote+0x63/0x90 [ 705.232426] get_arg_page+0xba/0x200 [ 705.232961] ? acct_arg_size+0xe0/0xe0 [ 705.233516] ? downgrade_write+0x3a0/0x3a0 [ 705.234115] ? count.constprop.0+0x1b3/0x290 [ 705.234754] copy_string_kernel+0x1b4/0x450 [ 705.235386] do_execveat_common+0x525/0x8d0 [ 705.236009] ? bprm_execve+0x1a60/0x1a60 [ 705.236615] __x64_sys_execveat+0xed/0x140 [ 705.237228] do_syscall_64+0x33/0x40 [ 705.237762] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 705.238505] RIP: 0033:0x7f6383eb9b19 [ 705.239037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.241644] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 705.242692] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 705.243710] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 705.244723] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.245732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.246754] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 705.281053] FAULT_INJECTION: forcing a failure. [ 705.281053] name failslab, interval 1, probability 0, space 0, times 0 [ 705.282826] CPU: 1 PID: 7632 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 705.283810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.285003] Call Trace: [ 705.285396] dump_stack+0x107/0x167 [ 705.285947] should_fail.cold+0x5/0xa [ 705.286514] ? mm_alloc+0x19/0xd0 [ 705.287024] should_failslab+0x5/0x20 [ 705.287586] kmem_cache_alloc+0x5b/0x310 [ 705.288177] ? kasan_unpoison_shadow+0x33/0x50 [ 705.288842] mm_alloc+0x19/0xd0 [ 705.289320] alloc_bprm+0x1cb/0x8f0 [ 705.289863] ? __virt_addr_valid+0x170/0x5c0 [ 705.290506] do_execveat_common+0x275/0x8d0 [ 705.291134] ? strncpy_from_user+0x9e/0x470 [ 705.291754] ? bprm_execve+0x1a60/0x1a60 [ 705.292359] __x64_sys_execveat+0xed/0x140 [ 705.292976] do_syscall_64+0x33/0x40 [ 705.293519] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 705.294265] RIP: 0033:0x7f1c8836fb19 [ 705.294805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.297426] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 705.298526] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 705.299551] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 705.300572] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.301596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.302626] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 717.877305] FAULT_INJECTION: forcing a failure. [ 717.877305] name failslab, interval 1, probability 0, space 0, times 0 [ 717.878365] CPU: 1 PID: 7645 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 717.878959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 717.879691] Call Trace: [ 717.879933] dump_stack+0x107/0x167 [ 717.880258] should_fail.cold+0x5/0xa [ 717.880600] ? create_object.isra.0+0x3a/0xa20 [ 717.881007] should_failslab+0x5/0x20 [ 717.881350] kmem_cache_alloc+0x5b/0x310 [ 717.881715] create_object.isra.0+0x3a/0xa20 [ 717.882149] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 717.882604] kmem_cache_alloc+0x159/0x310 [ 717.882978] __pmd_alloc+0x94/0x5e0 [ 717.883301] handle_mm_fault+0x1ac4/0x3500 [ 717.883693] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 717.884155] ? SOFTIRQ_verbose+0x10/0x10 [ 717.884526] ? __pmd_alloc+0x5e0/0x5e0 [ 717.884883] __get_user_pages+0x6ec/0x1620 [ 717.885266] ? follow_page_mask+0x1900/0x1900 [ 717.885666] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 717.886103] __get_user_pages_remote+0x1d5/0x870 [ 717.886527] ? lock_downgrade+0x6d0/0x6d0 [ 717.886903] get_user_pages_remote+0x63/0x90 [ 717.887293] get_arg_page+0xba/0x200 [ 717.887627] ? acct_arg_size+0xe0/0xe0 [ 717.887972] ? downgrade_write+0x3a0/0x3a0 [ 717.888351] ? count.constprop.0+0x1b3/0x290 [ 717.888739] copy_string_kernel+0x1b4/0x450 [ 717.889125] do_execveat_common+0x525/0x8d0 [ 717.889511] ? bprm_execve+0x1a60/0x1a60 [ 717.889882] __x64_sys_execveat+0xed/0x140 [ 717.890274] do_syscall_64+0x33/0x40 [ 717.890605] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 717.891063] RIP: 0033:0x7f6383eb9b19 [ 717.891395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.893006] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 717.893683] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 717.894320] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 717.894942] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 717.895561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 717.896182] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:06:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 22:06:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:06:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:06:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 22:06:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 22:06:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 22:06:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 717.921906] FAULT_INJECTION: forcing a failure. [ 717.921906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.923022] CPU: 1 PID: 7646 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 717.923614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 717.924331] Call Trace: [ 717.924567] dump_stack+0x107/0x167 [ 717.924888] should_fail.cold+0x5/0xa [ 717.925230] __alloc_pages_nodemask+0x182/0x600 [ 717.925638] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 717.926179] ? add_mm_counter_fast+0x220/0x220 [ 717.926488] FAULT_INJECTION: forcing a failure. [ 717.926488] name failslab, interval 1, probability 0, space 0, times 0 [ 717.926587] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 717.928655] alloc_pages_current+0x187/0x280 [ 717.929041] get_zeroed_page+0x14/0xb0 [ 717.929394] __pud_alloc+0x33/0x270 [ 717.929715] handle_mm_fault+0x1a73/0x3500 [ 717.930116] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 717.930575] ? SOFTIRQ_verbose+0x10/0x10 [ 717.930931] ? __pmd_alloc+0x5e0/0x5e0 [ 717.931286] __get_user_pages+0x6ec/0x1620 [ 717.931667] ? follow_page_mask+0x1900/0x1900 [ 717.932060] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 717.932477] __get_user_pages_remote+0x1d5/0x870 [ 717.932895] ? lock_downgrade+0x6d0/0x6d0 [ 717.933263] get_user_pages_remote+0x63/0x90 [ 717.933649] get_arg_page+0xba/0x200 [ 717.933990] ? acct_arg_size+0xe0/0xe0 [ 717.934326] ? downgrade_write+0x3a0/0x3a0 [ 717.934696] ? count.constprop.0+0x1b3/0x290 [ 717.935077] copy_string_kernel+0x1b4/0x450 [ 717.935460] do_execveat_common+0x525/0x8d0 [ 717.935834] ? bprm_execve+0x1a60/0x1a60 [ 717.936201] __x64_sys_execveat+0xed/0x140 [ 717.936571] do_syscall_64+0x33/0x40 [ 717.936896] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 717.937339] RIP: 0033:0x7f2f4d86bb19 [ 717.937666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.939248] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 717.939902] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 717.940515] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 717.941121] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 717.941729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 717.942365] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 717.942995] CPU: 0 PID: 7660 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 717.944011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 717.945226] Call Trace: [ 717.945626] dump_stack+0x107/0x167 [ 717.946176] should_fail.cold+0x5/0xa [ 717.946748] ? ptlock_alloc+0x1d/0x70 [ 717.947314] should_failslab+0x5/0x20 [ 717.947887] kmem_cache_alloc+0x5b/0x310 [ 717.948496] ptlock_alloc+0x1d/0x70 [ 717.949040] pte_alloc_one+0x68/0x1a0 [ 717.949605] __pte_alloc+0x1d/0x330 [ 717.950164] handle_mm_fault+0x287f/0x3500 [ 717.950811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 717.951581] ? SOFTIRQ_verbose+0x10/0x10 [ 717.952185] ? __pmd_alloc+0x5e0/0x5e0 [ 717.952790] __get_user_pages+0x6ec/0x1620 [ 717.953430] ? follow_page_mask+0x1900/0x1900 [ 717.954107] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 717.954813] __get_user_pages_remote+0x1d5/0x870 [ 717.955518] ? lock_downgrade+0x6d0/0x6d0 [ 717.956139] get_user_pages_remote+0x63/0x90 [ 717.956797] get_arg_page+0xba/0x200 [ 717.957349] ? acct_arg_size+0xe0/0xe0 [ 717.957927] ? downgrade_write+0x3a0/0x3a0 [ 717.958560] ? count.constprop.0+0x1b3/0x290 [ 717.959215] copy_string_kernel+0x1b4/0x450 [ 717.959861] do_execveat_common+0x525/0x8d0 [ 717.960507] ? bprm_execve+0x1a60/0x1a60 [ 717.961125] __x64_sys_execveat+0xed/0x140 [ 717.961760] do_syscall_64+0x33/0x40 [ 717.962319] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 717.963074] RIP: 0033:0x7f70da682b19 [ 717.963624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.965904] EXT4-fs (loop1): invalid first ino: 0 [ 717.966334] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 717.966355] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 717.966365] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 717.966381] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 717.970988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 717.972037] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 717.986601] FAULT_INJECTION: forcing a failure. [ 717.986601] name failslab, interval 1, probability 0, space 0, times 0 [ 717.988363] CPU: 0 PID: 7661 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 717.989353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 717.990551] Call Trace: [ 717.990943] dump_stack+0x107/0x167 [ 717.991474] should_fail.cold+0x5/0xa [ 717.992031] ? dup_fd+0x89/0xcf0 [ 717.992530] should_failslab+0x5/0x20 [ 717.993088] kmem_cache_alloc+0x5b/0x310 [ 717.993681] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 717.994374] dup_fd+0x89/0xcf0 [ 717.994863] unshare_files+0x175/0x270 [ 717.995426] ? __ia32_sys_unshare+0x40/0x40 [ 717.996057] ? get_user_pages_remote+0x63/0x90 [ 717.996722] ? get_user_pages_remote+0x6c/0x90 [ 717.997392] bprm_execve+0xcb/0x1a60 [ 717.997943] ? acct_arg_size+0xe0/0xe0 [ 717.998513] ? downgrade_write+0x3a0/0x3a0 [ 717.999134] ? open_exec+0x70/0x70 [ 717.999660] ? memcpy+0x39/0x60 [ 718.000148] ? copy_string_kernel+0x3b6/0x450 [ 718.000811] do_execveat_common+0x772/0x8d0 [ 718.001560] ? bprm_execve+0x1a60/0x1a60 [ 718.002183] __x64_sys_execveat+0xed/0x140 [ 718.002807] do_syscall_64+0x33/0x40 [ 718.003356] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.004100] RIP: 0033:0x7f9509c8ab19 [ 718.004642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.007307] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.008416] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 718.009452] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.010499] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.011538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.012571] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 718.015962] FAULT_INJECTION: forcing a failure. [ 718.015962] name failslab, interval 1, probability 0, space 0, times 0 [ 718.017197] CPU: 1 PID: 7655 Comm: syz-executor.5 Not tainted 5.10.216 #1 22:06:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) [ 718.017776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.018624] Call Trace: [ 718.018847] dump_stack+0x107/0x167 [ 718.019149] should_fail.cold+0x5/0xa [ 718.019466] ? create_object.isra.0+0x3a/0xa20 [ 718.019847] should_failslab+0x5/0x20 [ 718.020166] kmem_cache_alloc+0x5b/0x310 [ 718.020505] create_object.isra.0+0x3a/0xa20 [ 718.020865] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 718.021283] kmem_cache_alloc+0x159/0x310 [ 718.021631] mm_alloc+0x19/0xd0 [ 718.021905] alloc_bprm+0x1cb/0x8f0 [ 718.022224] ? __virt_addr_valid+0x170/0x5c0 [ 718.022591] do_execveat_common+0x275/0x8d0 [ 718.022951] ? strncpy_from_user+0x9e/0x470 [ 718.023308] ? bprm_execve+0x1a60/0x1a60 [ 718.023647] __x64_sys_execveat+0xed/0x140 [ 718.023996] do_syscall_64+0x33/0x40 [ 718.024304] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.024726] RIP: 0033:0x7f1c8836fb19 [ 718.025034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.026550] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.027171] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 718.027747] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.028325] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.028908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.029489] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 718.072631] FAULT_INJECTION: forcing a failure. [ 718.072631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.073619] CPU: 1 PID: 7665 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 718.074187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.074851] Call Trace: [ 718.075070] dump_stack+0x107/0x167 [ 718.075373] should_fail.cold+0x5/0xa [ 718.075693] __alloc_pages_nodemask+0x182/0x600 [ 718.076074] ? lock_acquire+0x197/0x470 [ 718.076397] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 718.076891] ? lock_downgrade+0x6d0/0x6d0 [ 718.077247] ? do_raw_spin_lock+0x121/0x260 22:06:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 718.077609] alloc_pages_current+0x187/0x280 [ 718.078115] __pmd_alloc+0x37/0x5e0 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 718.078466] handle_mm_fault+0x1ac4/0x3500 [ 718.078929] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 718.079356] ? SOFTIRQ_verbose+0x10/0x10 [ 718.079689] ? __pmd_alloc+0x5e0/0x5e0 [ 718.080015] __get_user_pages+0x6ec/0x1620 [ 718.080371] ? follow_page_mask+0x1900/0x1900 [ 718.080739] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 718.081134] __get_user_pages_remote+0x1d5/0x870 [ 718.081526] ? lock_downgrade+0x6d0/0x6d0 [ 718.081867] get_user_pages_remote+0x63/0x90 [ 718.082249] get_arg_page+0xba/0x200 [ 718.082563] ? acct_arg_size+0xe0/0xe0 [ 718.082883] ? downgrade_write+0x3a0/0x3a0 [ 718.083229] ? count.constprop.0+0x1b3/0x290 [ 718.083591] copy_string_kernel+0x1b4/0x450 [ 718.083947] do_execveat_common+0x525/0x8d0 [ 718.084300] ? bprm_execve+0x1a60/0x1a60 [ 718.084643] __x64_sys_execveat+0xed/0x140 [ 718.084984] do_syscall_64+0x33/0x40 [ 718.085296] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.085714] RIP: 0033:0x7f2f4d86bb19 [ 718.086042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.087591] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.088207] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 718.088780] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.089348] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.089925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.090502] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:06:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:06:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 22:06:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) [ 718.156484] EXT4-fs (loop1): unsupported inode size: 0 [ 718.156945] EXT4-fs (loop1): blocksize: 2048 [ 718.175852] FAULT_INJECTION: forcing a failure. [ 718.175852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.177733] CPU: 0 PID: 7673 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 718.178743] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.179937] Call Trace: [ 718.180331] dump_stack+0x107/0x167 [ 718.180871] should_fail.cold+0x5/0xa [ 718.181448] __alloc_pages_nodemask+0x182/0x600 [ 718.182145] ? lock_acquire+0x197/0x470 [ 718.182733] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 718.183618] ? lock_downgrade+0x6d0/0x6d0 [ 718.184235] ? do_raw_spin_lock+0x121/0x260 [ 718.184874] alloc_pages_current+0x187/0x280 [ 718.185528] __pmd_alloc+0x37/0x5e0 [ 718.186076] handle_mm_fault+0x1ac4/0x3500 [ 718.186704] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 718.187465] ? SOFTIRQ_verbose+0x10/0x10 [ 718.188060] ? __pmd_alloc+0x5e0/0x5e0 [ 718.188662] __get_user_pages+0x6ec/0x1620 [ 718.189290] ? follow_page_mask+0x1900/0x1900 [ 718.189956] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 718.190656] __get_user_pages_remote+0x1d5/0x870 [ 718.191349] ? lock_downgrade+0x6d0/0x6d0 [ 718.191958] get_user_pages_remote+0x63/0x90 [ 718.192611] get_arg_page+0xba/0x200 [ 718.193156] ? acct_arg_size+0xe0/0xe0 [ 718.193723] ? downgrade_write+0x3a0/0x3a0 [ 718.194354] ? count.constprop.0+0x1b3/0x290 [ 718.195006] copy_string_kernel+0x1b4/0x450 [ 718.195651] do_execveat_common+0x525/0x8d0 [ 718.196281] ? bprm_execve+0x1a60/0x1a60 [ 718.196890] __x64_sys_execveat+0xed/0x140 [ 718.197517] do_syscall_64+0x33/0x40 [ 718.198067] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.198813] RIP: 0033:0x7f2f4d86bb19 [ 718.199364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.202028] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.203133] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 718.204162] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.205196] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.206236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.207264] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 718.230579] FAULT_INJECTION: forcing a failure. [ 718.230579] name failslab, interval 1, probability 0, space 0, times 0 [ 718.232254] CPU: 0 PID: 7676 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 718.233390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.234585] Call Trace: [ 718.234972] dump_stack+0x107/0x167 [ 718.235500] should_fail.cold+0x5/0xa [ 718.236052] ? create_object.isra.0+0x3a/0xa20 [ 718.236715] should_failslab+0x5/0x20 [ 718.237265] kmem_cache_alloc+0x5b/0x310 [ 718.237859] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 718.238740] create_object.isra.0+0x3a/0xa20 [ 718.239380] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 718.240112] kmem_cache_alloc+0x159/0x310 [ 718.240719] ptlock_alloc+0x1d/0x70 [ 718.241251] pte_alloc_one+0x68/0x1a0 [ 718.241816] __pte_alloc+0x1d/0x330 [ 718.242362] handle_mm_fault+0x287f/0x3500 [ 718.242982] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 718.243747] ? SOFTIRQ_verbose+0x10/0x10 [ 718.244338] ? __pmd_alloc+0x5e0/0x5e0 [ 718.244927] __get_user_pages+0x6ec/0x1620 [ 718.245550] ? follow_page_mask+0x1900/0x1900 [ 718.246208] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 718.246893] __get_user_pages_remote+0x1d5/0x870 [ 718.247585] ? lock_downgrade+0x6d0/0x6d0 [ 718.248191] get_user_pages_remote+0x63/0x90 [ 718.248830] get_arg_page+0xba/0x200 [ 718.249376] ? acct_arg_size+0xe0/0xe0 [ 718.249944] ? downgrade_write+0x3a0/0x3a0 [ 718.250562] ? count.constprop.0+0x1b3/0x290 [ 718.251206] copy_string_kernel+0x1b4/0x450 [ 718.251842] do_execveat_common+0x525/0x8d0 [ 718.252480] ? bprm_execve+0x1a60/0x1a60 [ 718.253082] __x64_sys_execveat+0xed/0x140 [ 718.253703] do_syscall_64+0x33/0x40 [ 718.254245] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.254980] RIP: 0033:0x7f70da682b19 [ 718.255521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.258154] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.259250] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 22:06:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) 22:06:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 718.260275] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.261466] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.262494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.263522] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 718.277714] FAULT_INJECTION: forcing a failure. [ 718.277714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.279520] CPU: 0 PID: 7679 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 718.280477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.281629] Call Trace: [ 718.282004] dump_stack+0x107/0x167 [ 718.282516] should_fail.cold+0x5/0xa [ 718.283056] __alloc_pages_nodemask+0x182/0x600 [ 718.283713] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 718.284545] ? find_held_lock+0x2c/0x110 [ 718.285127] ? __pmd_alloc+0x2db/0x5e0 [ 718.285678] ? lock_downgrade+0x6d0/0x6d0 [ 718.286299] ? do_raw_spin_lock+0x121/0x260 [ 718.286912] alloc_pages_current+0x187/0x280 [ 718.287533] pte_alloc_one+0x16/0x1a0 [ 718.288070] __pte_alloc+0x1d/0x330 [ 718.288598] handle_mm_fault+0x287f/0x3500 22:06:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) setresuid(0x0, 0x0, 0x0) [ 718.289196] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 718.290030] ? SOFTIRQ_verbose+0x10/0x10 [ 718.290612] ? __pmd_alloc+0x5e0/0x5e0 [ 718.291178] __get_user_pages+0x6ec/0x1620 [ 718.291778] ? follow_page_mask+0x1900/0x1900 [ 718.292436] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 718.293135] __get_user_pages_remote+0x1d5/0x870 [ 718.293797] ? lock_downgrade+0x6d0/0x6d0 [ 718.294421] get_user_pages_remote+0x63/0x90 [ 718.295042] get_arg_page+0xba/0x200 [ 718.295594] ? acct_arg_size+0xe0/0xe0 [ 718.296129] ? downgrade_write+0x3a0/0x3a0 [ 718.296748] ? count.constprop.0+0x1b3/0x290 [ 718.297365] copy_string_kernel+0x1b4/0x450 [ 718.298011] do_execveat_common+0x525/0x8d0 [ 718.298619] ? bprm_execve+0x1a60/0x1a60 [ 718.299237] __x64_sys_execveat+0xed/0x140 [ 718.299833] do_syscall_64+0x33/0x40 [ 718.300381] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.300907] EXT4-fs (loop1): unsupported inode size: 0 [ 718.301084] RIP: 0033:0x7f6383eb9b19 [ 718.301103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.301573] EXT4-fs (loop1): blocksize: 2048 [ 718.302054] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.305179] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 718.306177] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.307172] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.308159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.309140] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 718.317183] FAULT_INJECTION: forcing a failure. [ 718.317183] name failslab, interval 1, probability 0, space 0, times 0 [ 718.318108] CPU: 1 PID: 7684 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 718.318648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.319301] Call Trace: [ 718.319520] dump_stack+0x107/0x167 [ 718.319813] should_fail.cold+0x5/0xa [ 718.320119] ? dup_fd+0x89/0xcf0 [ 718.320394] should_failslab+0x5/0x20 [ 718.320704] kmem_cache_alloc+0x5b/0x310 [ 718.321030] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 718.321406] dup_fd+0x89/0xcf0 [ 718.321678] unshare_files+0x175/0x270 [ 718.322005] ? __ia32_sys_unshare+0x40/0x40 [ 718.322356] ? get_user_pages_remote+0x63/0x90 [ 718.322720] ? get_user_pages_remote+0x6c/0x90 [ 718.323092] bprm_execve+0xcb/0x1a60 [ 718.323395] ? acct_arg_size+0xe0/0xe0 [ 718.323713] ? downgrade_write+0x3a0/0x3a0 [ 718.324052] ? open_exec+0x70/0x70 [ 718.324344] ? memcpy+0x39/0x60 [ 718.324610] ? copy_string_kernel+0x3b6/0x450 [ 718.324976] do_execveat_common+0x772/0x8d0 [ 718.325322] ? bprm_execve+0x1a60/0x1a60 [ 718.325659] __x64_sys_execveat+0xed/0x140 [ 718.326016] do_syscall_64+0x33/0x40 [ 718.326322] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.326735] RIP: 0033:0x7f9509c8ab19 [ 718.327038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.328483] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.329101] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 718.329665] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.330240] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.330801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.331362] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:06:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 718.341063] FAULT_INJECTION: forcing a failure. [ 718.341063] name failslab, interval 1, probability 0, space 0, times 0 [ 718.342663] CPU: 0 PID: 7687 Comm: syz-executor.0 Not tainted 5.10.216 #1 [ 718.343620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.344776] Call Trace: [ 718.345150] dump_stack+0x107/0x167 [ 718.345666] should_fail.cold+0x5/0xa [ 718.346214] ? getname_flags.part.0+0x50/0x4f0 [ 718.346855] should_failslab+0x5/0x20 [ 718.347391] kmem_cache_alloc+0x5b/0x310 [ 718.347992] getname_flags.part.0+0x50/0x4f0 [ 718.348619] getname_flags+0x9a/0xe0 [ 718.349174] __x64_sys_execveat+0xd6/0x140 [ 718.349774] do_syscall_64+0x33/0x40 [ 718.350330] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.351051] RIP: 0033:0x7f7e8236fb19 [ 718.351602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.354145] RSP: 002b:00007f7e7f8e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.355261] RAX: ffffffffffffffda RBX: 00007f7e82482f60 RCX: 00007f7e8236fb19 [ 718.356256] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.357255] RBP: 00007f7e7f8e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.358254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.359304] R13: 00007fff54ed027f R14: 00007f7e7f8e5300 R15: 0000000000022000 [ 718.376470] FAULT_INJECTION: forcing a failure. [ 718.376470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.378410] CPU: 0 PID: 7680 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 718.379412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 718.380622] Call Trace: [ 718.381011] dump_stack+0x107/0x167 [ 718.381550] should_fail.cold+0x5/0xa [ 718.382119] __alloc_pages_nodemask+0x182/0x600 [ 718.382807] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 718.383574] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 718.384469] alloc_pages_current+0x187/0x280 [ 718.385119] __get_free_pages+0xc/0xa0 [ 718.385691] pgd_alloc+0x84/0x4e0 [ 718.386211] ? pgd_page_get_mm+0x40/0x40 [ 718.386808] ? lockdep_init_map_type+0x2c7/0x780 [ 718.387502] ? lockdep_init_map_type+0x2c7/0x780 [ 718.388206] mm_init+0x670/0xab0 [ 718.388707] mm_alloc+0xa2/0xd0 [ 718.389195] alloc_bprm+0x1cb/0x8f0 [ 718.389729] ? __virt_addr_valid+0x170/0x5c0 [ 718.390390] do_execveat_common+0x275/0x8d0 [ 718.391034] ? strncpy_from_user+0x9e/0x470 [ 718.391674] ? bprm_execve+0x1a60/0x1a60 [ 718.392288] __x64_sys_execveat+0xed/0x140 [ 718.392917] do_syscall_64+0x33/0x40 [ 718.393463] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 718.394222] RIP: 0033:0x7f1c8836fb19 [ 718.394772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.397426] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 718.398547] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 718.399598] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 718.400644] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.401684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.402727] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:07:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 22:07:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:07:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 22:07:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 22:07:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 22:07:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 22:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) setresuid(0x0, 0x0, 0x0) [ 733.144559] FAULT_INJECTION: forcing a failure. [ 733.144559] name failslab, interval 1, probability 0, space 0, times 0 [ 733.146282] CPU: 0 PID: 7705 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 733.147238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.148400] Call Trace: [ 733.148776] dump_stack+0x107/0x167 [ 733.149291] should_fail.cold+0x5/0xa [ 733.149833] ? ptlock_alloc+0x1d/0x70 [ 733.150377] should_failslab+0x5/0x20 [ 733.150911] kmem_cache_alloc+0x5b/0x310 [ 733.151490] ptlock_alloc+0x1d/0x70 [ 733.152005] pte_alloc_one+0x68/0x1a0 [ 733.152547] __pte_alloc+0x1d/0x330 [ 733.153090] handle_mm_fault+0x287f/0x3500 [ 733.153695] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.154439] ? SOFTIRQ_verbose+0x10/0x10 [ 733.155020] ? __pmd_alloc+0x5e0/0x5e0 [ 733.155586] __get_user_pages+0x6ec/0x1620 [ 733.156187] ? follow_page_mask+0x1900/0x1900 [ 733.156678] FAULT_INJECTION: forcing a failure. [ 733.156678] name failslab, interval 1, probability 0, space 0, times 0 [ 733.156824] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.158996] __get_user_pages_remote+0x1d5/0x870 [ 733.159667] ? lock_downgrade+0x6d0/0x6d0 [ 733.160258] get_user_pages_remote+0x63/0x90 [ 733.160917] get_arg_page+0xba/0x200 [ 733.161446] ? acct_arg_size+0xe0/0xe0 [ 733.161994] ? downgrade_write+0x3a0/0x3a0 [ 733.162630] ? count.constprop.0+0x1b3/0x290 [ 733.163259] copy_string_kernel+0x1b4/0x450 [ 733.163904] do_execveat_common+0x525/0x8d0 [ 733.164526] ? bprm_execve+0x1a60/0x1a60 [ 733.165142] __x64_sys_execveat+0xed/0x140 [ 733.165744] do_syscall_64+0x33/0x40 [ 733.166307] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.167029] RIP: 0033:0x7f6383eb9b19 [ 733.167574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.170123] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.171236] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 733.172232] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.173226] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.174229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.175212] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 733.176227] CPU: 1 PID: 7710 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 733.177122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.178206] Call Trace: [ 733.178560] dump_stack+0x107/0x167 [ 733.179030] should_fail.cold+0x5/0xa [ 733.179541] ? __anon_vma_prepare+0x62/0x500 [ 733.180110] should_failslab+0x5/0x20 [ 733.180617] kmem_cache_alloc+0x5b/0x310 [ 733.181147] __anon_vma_prepare+0x62/0x500 [ 733.181692] ? __pte_alloc+0x194/0x330 [ 733.182230] handle_mm_fault+0x2b2d/0x3500 [ 733.182787] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.183461] ? SOFTIRQ_verbose+0x10/0x10 [ 733.183992] ? __pmd_alloc+0x5e0/0x5e0 [ 733.184517] __get_user_pages+0x6ec/0x1620 [ 733.185073] ? follow_page_mask+0x1900/0x1900 [ 733.185656] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.186291] __get_user_pages_remote+0x1d5/0x870 [ 733.186903] ? lock_downgrade+0x6d0/0x6d0 [ 733.187443] get_user_pages_remote+0x63/0x90 [ 733.188027] get_arg_page+0xba/0x200 [ 733.188511] ? acct_arg_size+0xe0/0xe0 [ 733.189014] ? downgrade_write+0x3a0/0x3a0 [ 733.189572] ? count.constprop.0+0x1b3/0x290 [ 733.190167] copy_string_kernel+0x1b4/0x450 [ 733.190738] do_execveat_common+0x525/0x8d0 [ 733.191300] ? bprm_execve+0x1a60/0x1a60 [ 733.191843] __x64_sys_execveat+0xed/0x140 [ 733.192395] do_syscall_64+0x33/0x40 [ 733.192890] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.193557] RIP: 0033:0x7f70da682b19 [ 733.194043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.196377] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.197347] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 733.198282] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.199196] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.200111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.201028] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 733.204844] EXT4-fs (loop1): unsupported inode size: 0 [ 733.205763] EXT4-fs (loop1): blocksize: 2048 [ 733.214302] FAULT_INJECTION: forcing a failure. [ 733.214302] name failslab, interval 1, probability 0, space 0, times 0 [ 733.214438] FAULT_INJECTION: forcing a failure. [ 733.214438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 733.215847] CPU: 1 PID: 7717 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 733.215856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.215861] Call Trace: [ 733.215877] dump_stack+0x107/0x167 [ 733.215893] should_fail.cold+0x5/0xa [ 733.215911] ? alloc_fdtable+0x84/0x280 [ 733.215929] should_failslab+0x5/0x20 [ 733.215944] kmem_cache_alloc_trace+0x55/0x320 [ 733.215960] ? rwlock_bug.part.0+0x90/0x90 [ 733.215980] alloc_fdtable+0x84/0x280 [ 733.215997] dup_fd+0x74d/0xcf0 [ 733.216025] unshare_files+0x175/0x270 [ 733.216041] ? __ia32_sys_unshare+0x40/0x40 [ 733.216059] ? get_user_pages_remote+0x63/0x90 [ 733.216073] ? get_user_pages_remote+0x6c/0x90 [ 733.216093] bprm_execve+0xcb/0x1a60 [ 733.216110] ? acct_arg_size+0xe0/0xe0 [ 733.216123] ? downgrade_write+0x3a0/0x3a0 [ 733.216146] ? open_exec+0x70/0x70 [ 733.216162] ? memcpy+0x39/0x60 [ 733.216179] ? copy_string_kernel+0x3b6/0x450 [ 733.216203] do_execveat_common+0x772/0x8d0 [ 733.216222] ? bprm_execve+0x1a60/0x1a60 [ 733.216253] __x64_sys_execveat+0xed/0x140 [ 733.230453] do_syscall_64+0x33/0x40 [ 733.230921] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.231565] RIP: 0033:0x7f9509c8ab19 [ 733.232038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.234353] RSP: 002b:00007f95071df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.235297] RAX: ffffffffffffffda RBX: 00007f9509d9e020 RCX: 00007f9509c8ab19 [ 733.236174] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.237040] RBP: 00007f95071df1d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.237910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.238800] R13: 00007ffc800ea53f R14: 00007f95071df300 R15: 0000000000022000 [ 733.239700] CPU: 0 PID: 7715 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 733.240662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.241812] Call Trace: [ 733.242198] dump_stack+0x107/0x167 [ 733.242718] should_fail.cold+0x5/0xa [ 733.243264] __alloc_pages_nodemask+0x182/0x600 [ 733.243926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.244656] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 733.245593] alloc_pages_current+0x187/0x280 [ 733.246318] __get_free_pages+0xc/0xa0 [ 733.246859] pgd_alloc+0x84/0x4e0 [ 733.247372] ? pgd_page_get_mm+0x40/0x40 [ 733.247941] ? lockdep_init_map_type+0x2c7/0x780 [ 733.248639] ? lockdep_init_map_type+0x2c7/0x780 [ 733.249315] mm_init+0x670/0xab0 [ 733.249813] mm_alloc+0xa2/0xd0 [ 733.250292] alloc_bprm+0x1cb/0x8f0 [ 733.250828] ? __virt_addr_valid+0x170/0x5c0 [ 733.251469] do_execveat_common+0x275/0x8d0 [ 733.252102] ? strncpy_from_user+0x9e/0x470 [ 733.252703] ? bprm_execve+0x1a60/0x1a60 [ 733.253310] __x64_sys_execveat+0xed/0x140 [ 733.253915] do_syscall_64+0x33/0x40 [ 733.254468] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.255188] RIP: 0033:0x7f1c8836fb19 [ 733.255739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.258283] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.259396] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 733.260396] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.261380] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.262370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 733.263360] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:07:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) [ 733.271443] FAULT_INJECTION: forcing a failure. [ 733.271443] name failslab, interval 1, probability 0, space 0, times 0 [ 733.272851] CPU: 1 PID: 7718 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 733.273679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.274704] Call Trace: [ 733.275027] dump_stack+0x107/0x167 [ 733.275470] should_fail.cold+0x5/0xa [ 733.275935] ? create_object.isra.0+0x3a/0xa20 [ 733.276511] should_failslab+0x5/0x20 [ 733.276970] kmem_cache_alloc+0x5b/0x310 [ 733.277485] create_object.isra.0+0x3a/0xa20 [ 733.278024] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.278694] kmem_cache_alloc+0x159/0x310 [ 733.279201] __pmd_alloc+0x94/0x5e0 [ 733.279650] handle_mm_fault+0x1ac4/0x3500 [ 733.280169] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.280808] ? SOFTIRQ_verbose+0x10/0x10 [ 733.281299] ? __pmd_alloc+0x5e0/0x5e0 [ 733.281796] __get_user_pages+0x6ec/0x1620 [ 733.282341] ? follow_page_mask+0x1900/0x1900 [ 733.282892] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.283466] __get_user_pages_remote+0x1d5/0x870 [ 733.284041] ? lock_downgrade+0x6d0/0x6d0 [ 733.284547] get_user_pages_remote+0x63/0x90 [ 733.285083] get_arg_page+0xba/0x200 [ 733.285534] ? acct_arg_size+0xe0/0xe0 [ 733.286003] ? downgrade_write+0x3a0/0x3a0 [ 733.286546] ? count.constprop.0+0x1b3/0x290 [ 733.287097] copy_string_kernel+0x1b4/0x450 [ 733.287632] do_execveat_common+0x525/0x8d0 [ 733.288153] ? bprm_execve+0x1a60/0x1a60 [ 733.288660] __x64_sys_execveat+0xed/0x140 [ 733.289178] do_syscall_64+0x33/0x40 [ 733.289632] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.290293] RIP: 0033:0x7f2f4d86bb19 [ 733.290748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.292960] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.293863] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 733.294728] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.295572] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.296414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.297251] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 22:07:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) [ 733.326669] FAULT_INJECTION: forcing a failure. [ 733.326669] name failslab, interval 1, probability 0, space 0, times 0 [ 733.328389] CPU: 0 PID: 7713 Comm: syz-executor.0 Not tainted 5.10.216 #1 [ 733.329396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.330614] Call Trace: [ 733.331011] dump_stack+0x107/0x167 [ 733.331550] should_fail.cold+0x5/0xa [ 733.332114] ? create_object.isra.0+0x3a/0xa20 [ 733.332789] should_failslab+0x5/0x20 [ 733.333353] kmem_cache_alloc+0x5b/0x310 [ 733.333948] create_object.isra.0+0x3a/0xa20 [ 733.334607] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.335341] kmem_cache_alloc+0x159/0x310 [ 733.335957] getname_flags.part.0+0x50/0x4f0 [ 733.336608] getname_flags+0x9a/0xe0 [ 733.337165] __x64_sys_execveat+0xd6/0x140 [ 733.337788] do_syscall_64+0x33/0x40 [ 733.338343] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.339093] RIP: 0033:0x7f7e8236fb19 [ 733.339644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.342325] RSP: 002b:00007f7e7f8e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.343442] RAX: ffffffffffffffda RBX: 00007f7e82482f60 RCX: 00007f7e8236fb19 [ 733.344481] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.345518] RBP: 00007f7e7f8e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.346559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 733.347592] R13: 00007fff54ed027f R14: 00007f7e7f8e5300 R15: 0000000000022000 [ 733.364113] FAULT_INJECTION: forcing a failure. [ 733.364113] name failslab, interval 1, probability 0, space 0, times 0 [ 733.364185] EXT4-fs (loop1): unsupported inode size: 0 [ 733.365815] CPU: 0 PID: 7721 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 733.366425] EXT4-fs (loop1): blocksize: 2048 [ 733.367398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.367405] Call Trace: [ 733.367428] dump_stack+0x107/0x167 [ 733.367452] should_fail.cold+0x5/0xa [ 733.367473] ? create_object.isra.0+0x3a/0xa20 [ 733.367495] should_failslab+0x5/0x20 [ 733.367514] kmem_cache_alloc+0x5b/0x310 [ 733.367534] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 733.367557] create_object.isra.0+0x3a/0xa20 [ 733.367577] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.367601] kmem_cache_alloc+0x159/0x310 [ 733.367631] ptlock_alloc+0x1d/0x70 [ 733.367654] pte_alloc_one+0x68/0x1a0 [ 733.367674] __pte_alloc+0x1d/0x330 [ 733.367698] handle_mm_fault+0x287f/0x3500 [ 733.367727] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.367745] ? SOFTIRQ_verbose+0x10/0x10 [ 733.367765] ? __pmd_alloc+0x5e0/0x5e0 [ 733.367811] __get_user_pages+0x6ec/0x1620 [ 733.380221] ? follow_page_mask+0x1900/0x1900 [ 733.380886] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.381589] __get_user_pages_remote+0x1d5/0x870 [ 733.382299] ? lock_downgrade+0x6d0/0x6d0 [ 733.382918] get_user_pages_remote+0x63/0x90 [ 733.383566] get_arg_page+0xba/0x200 [ 733.384123] ? acct_arg_size+0xe0/0xe0 [ 733.384697] ? downgrade_write+0x3a0/0x3a0 [ 733.385331] ? count.constprop.0+0x1b3/0x290 [ 733.385975] copy_string_kernel+0x1b4/0x450 [ 733.386632] do_execveat_common+0x525/0x8d0 [ 733.387275] ? bprm_execve+0x1a60/0x1a60 [ 733.387892] __x64_sys_execveat+0xed/0x140 [ 733.388523] do_syscall_64+0x33/0x40 [ 733.389073] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.389833] RIP: 0033:0x7f6383eb9b19 [ 733.390389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.393037] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.394149] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 733.395179] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.396210] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.397242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.398280] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) [ 733.435480] FAULT_INJECTION: forcing a failure. [ 733.435480] name failslab, interval 1, probability 0, space 0, times 0 [ 733.436835] CPU: 1 PID: 7727 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 733.437591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.438538] Call Trace: [ 733.438844] dump_stack+0x107/0x167 [ 733.439266] should_fail.cold+0x5/0xa [ 733.439703] ? create_object.isra.0+0x3a/0xa20 [ 733.440224] should_failslab+0x5/0x20 [ 733.440659] kmem_cache_alloc+0x5b/0x310 [ 733.441129] create_object.isra.0+0x3a/0xa20 [ 733.441622] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.442243] kmem_cache_alloc+0x159/0x310 [ 733.442721] vm_area_alloc+0x1c/0x110 [ 733.443161] alloc_bprm+0x337/0x8f0 [ 733.443571] ? __virt_addr_valid+0x170/0x5c0 [ 733.444077] do_execveat_common+0x275/0x8d0 [ 733.444578] ? strncpy_from_user+0x9e/0x470 [ 733.445074] ? bprm_execve+0x1a60/0x1a60 [ 733.445562] __x64_sys_execveat+0xed/0x140 [ 733.446058] do_syscall_64+0x33/0x40 [ 733.446513] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.447083] RIP: 0033:0x7f1c8836fb19 [ 733.447516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.449553] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.450419] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 733.451216] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.452010] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.452797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.453581] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:07:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 22:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 733.514695] FAULT_INJECTION: forcing a failure. [ 733.514695] name failslab, interval 1, probability 0, space 0, times 0 [ 733.515917] CPU: 1 PID: 7732 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 733.516627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.517484] Call Trace: [ 733.517778] dump_stack+0x107/0x167 [ 733.518186] should_fail.cold+0x5/0xa [ 733.518603] ? create_object.isra.0+0x3a/0xa20 [ 733.519099] ? create_object.isra.0+0x3a/0xa20 [ 733.519604] should_failslab+0x5/0x20 [ 733.520022] kmem_cache_alloc+0x5b/0x310 [ 733.520472] create_object.isra.0+0x3a/0xa20 [ 733.520955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.521508] kmem_cache_alloc+0x159/0x310 [ 733.521973] __anon_vma_prepare+0x62/0x500 [ 733.522469] ? __pte_alloc+0x194/0x330 [ 733.522901] handle_mm_fault+0x2b2d/0x3500 [ 733.523378] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.523945] ? SOFTIRQ_verbose+0x10/0x10 [ 733.524387] ? __pmd_alloc+0x5e0/0x5e0 [ 733.524828] __get_user_pages+0x6ec/0x1620 [ 733.525295] ? follow_page_mask+0x1900/0x1900 [ 733.525778] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.526310] __get_user_pages_remote+0x1d5/0x870 [ 733.526832] ? lock_downgrade+0x6d0/0x6d0 [ 733.527285] get_user_pages_remote+0x63/0x90 [ 733.527762] get_arg_page+0xba/0x200 [ 733.528167] ? acct_arg_size+0xe0/0xe0 [ 733.528584] ? downgrade_write+0x3a0/0x3a0 [ 733.529049] ? count.constprop.0+0x1b3/0x290 [ 733.529538] copy_string_kernel+0x1b4/0x450 [ 733.530012] do_execveat_common+0x525/0x8d0 [ 733.530498] ? bprm_execve+0x1a60/0x1a60 [ 733.530952] __x64_sys_execveat+0xed/0x140 [ 733.531416] do_syscall_64+0x33/0x40 [ 733.531817] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.532365] RIP: 0033:0x7f70da682b19 [ 733.532766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.534674] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.535480] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 733.536233] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.536978] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.537721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.538473] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:07:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:07:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) setresuid(0x0, 0x0, 0x0) [ 733.559918] FAULT_INJECTION: forcing a failure. [ 733.559918] name failslab, interval 1, probability 0, space 0, times 0 [ 733.561182] CPU: 1 PID: 7737 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 733.561878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.562724] Call Trace: [ 733.562994] dump_stack+0x107/0x167 [ 733.563367] should_fail.cold+0x5/0xa [ 733.563758] ? create_object.isra.0+0x3a/0xa20 [ 733.564221] should_failslab+0x5/0x20 [ 733.564604] kmem_cache_alloc+0x5b/0x310 [ 733.565018] create_object.isra.0+0x3a/0xa20 [ 733.565461] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.565977] kmem_cache_alloc_trace+0x151/0x320 [ 733.566485] alloc_fdtable+0x84/0x280 [ 733.566872] dup_fd+0x74d/0xcf0 [ 733.567222] unshare_files+0x175/0x270 [ 733.567614] ? __ia32_sys_unshare+0x40/0x40 [ 733.568055] ? get_user_pages_remote+0x63/0x90 [ 733.568522] ? get_user_pages_remote+0x6c/0x90 [ 733.568995] bprm_execve+0xcb/0x1a60 [ 733.569374] ? acct_arg_size+0xe0/0xe0 [ 733.569767] ? downgrade_write+0x3a0/0x3a0 [ 733.570224] ? open_exec+0x70/0x70 [ 733.570586] ? memcpy+0x39/0x60 [ 733.570920] ? copy_string_kernel+0x3b6/0x450 [ 733.571384] do_execveat_common+0x772/0x8d0 [ 733.571817] ? bprm_execve+0x1a60/0x1a60 [ 733.572236] __x64_sys_execveat+0xed/0x140 [ 733.572664] do_syscall_64+0x33/0x40 [ 733.573038] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.573546] RIP: 0033:0x7f9509c8ab19 [ 733.573925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.575747] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.576524] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 733.577225] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.577942] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.578657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.579357] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 733.599536] FAULT_INJECTION: forcing a failure. [ 733.599536] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 733.601379] CPU: 0 PID: 7742 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 733.602395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.603613] Call Trace: [ 733.604010] dump_stack+0x107/0x167 [ 733.604550] should_fail.cold+0x5/0xa [ 733.605119] __alloc_pages_nodemask+0x182/0x600 [ 733.605815] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 733.606705] ? find_held_lock+0x2c/0x110 [ 733.607310] ? __pmd_alloc+0x2db/0x5e0 [ 733.607887] ? lock_downgrade+0x6d0/0x6d0 [ 733.608497] ? do_raw_spin_lock+0x121/0x260 [ 733.609137] alloc_pages_current+0x187/0x280 [ 733.609788] pte_alloc_one+0x16/0x1a0 [ 733.610364] __pte_alloc+0x1d/0x330 [ 733.610907] handle_mm_fault+0x287f/0x3500 [ 733.611538] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.612304] ? SOFTIRQ_verbose+0x10/0x10 [ 733.612901] ? __pmd_alloc+0x5e0/0x5e0 [ 733.613501] __get_user_pages+0x6ec/0x1620 [ 733.614141] ? follow_page_mask+0x1900/0x1900 [ 733.614805] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.615507] __get_user_pages_remote+0x1d5/0x870 [ 733.616205] ? lock_downgrade+0x6d0/0x6d0 [ 733.616826] get_user_pages_remote+0x63/0x90 [ 733.617479] get_arg_page+0xba/0x200 [ 733.618031] ? acct_arg_size+0xe0/0xe0 [ 733.618610] ? downgrade_write+0x3a0/0x3a0 [ 733.619240] ? count.constprop.0+0x1b3/0x290 [ 733.619892] copy_string_kernel+0x1b4/0x450 [ 733.620541] do_execveat_common+0x525/0x8d0 [ 733.621178] ? bprm_execve+0x1a60/0x1a60 [ 733.621828] __x64_sys_execveat+0xed/0x140 [ 733.622485] do_syscall_64+0x33/0x40 [ 733.623038] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.623776] RIP: 0033:0x7f2f4d86bb19 [ 733.624316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.626948] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.628039] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 733.629056] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.630082] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.631111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.632134] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 733.667600] FAULT_INJECTION: forcing a failure. [ 733.667600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 733.669405] CPU: 0 PID: 7746 Comm: syz-executor.0 Not tainted 5.10.216 #1 [ 733.670408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.671606] Call Trace: [ 733.671996] dump_stack+0x107/0x167 [ 733.672531] should_fail.cold+0x5/0xa [ 733.673098] strncpy_from_user+0x34/0x470 [ 733.673720] getname_flags.part.0+0x95/0x4f0 [ 733.674377] getname_flags+0x9a/0xe0 [ 733.674929] __x64_sys_execveat+0xd6/0x140 [ 733.675551] do_syscall_64+0x33/0x40 [ 733.676095] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.676844] RIP: 0033:0x7f7e8236fb19 [ 733.677378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.680022] RSP: 002b:00007f7e7f8e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.681124] RAX: ffffffffffffffda RBX: 00007f7e82482f60 RCX: 00007f7e8236fb19 [ 733.682162] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.683193] RBP: 00007f7e7f8e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.684221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 733.685250] R13: 00007fff54ed027f R14: 00007f7e7f8e5300 R15: 0000000000022000 22:07:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) [ 733.695002] EXT4-fs (loop1): unsupported inode size: 0 [ 733.695670] EXT4-fs (loop1): blocksize: 2048 22:07:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:07:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) [ 733.749107] FAULT_INJECTION: forcing a failure. [ 733.749107] name failslab, interval 1, probability 0, space 0, times 0 [ 733.750196] CPU: 1 PID: 7748 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 733.750809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.751555] Call Trace: [ 733.751800] dump_stack+0x107/0x167 [ 733.752132] should_fail.cold+0x5/0xa [ 733.752479] ? __anon_vma_prepare+0x62/0x500 [ 733.752876] should_failslab+0x5/0x20 [ 733.753226] kmem_cache_alloc+0x5b/0x310 [ 733.753599] __anon_vma_prepare+0x62/0x500 [ 733.753981] ? __pte_alloc+0x194/0x330 [ 733.754380] handle_mm_fault+0x2b2d/0x3500 [ 733.754773] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 733.755246] ? SOFTIRQ_verbose+0x10/0x10 [ 733.755617] ? __pmd_alloc+0x5e0/0x5e0 [ 733.755981] __get_user_pages+0x6ec/0x1620 [ 733.756372] ? follow_page_mask+0x1900/0x1900 [ 733.756781] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 733.757202] __get_user_pages_remote+0x1d5/0x870 [ 733.757631] ? lock_downgrade+0x6d0/0x6d0 [ 733.758010] get_user_pages_remote+0x63/0x90 [ 733.758437] get_arg_page+0xba/0x200 [ 733.758772] ? acct_arg_size+0xe0/0xe0 [ 733.759121] ? downgrade_write+0x3a0/0x3a0 [ 733.759505] ? count.constprop.0+0x1b3/0x290 [ 733.759903] copy_string_kernel+0x1b4/0x450 [ 733.760299] do_execveat_common+0x525/0x8d0 [ 733.760687] ? bprm_execve+0x1a60/0x1a60 [ 733.761063] __x64_sys_execveat+0xed/0x140 [ 733.761450] do_syscall_64+0x33/0x40 [ 733.761786] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.762274] RIP: 0033:0x7f6383eb9b19 [ 733.762607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.764236] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.764919] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 733.765552] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.766204] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.766832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.767470] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 733.788015] FAULT_INJECTION: forcing a failure. [ 733.788015] name failslab, interval 1, probability 0, space 0, times 0 [ 733.789011] CPU: 1 PID: 7752 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 733.789611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.790345] Call Trace: [ 733.790581] dump_stack+0x107/0x167 [ 733.790901] should_fail.cold+0x5/0xa [ 733.791239] ? kvmalloc_node+0x119/0x170 [ 733.791596] should_failslab+0x5/0x20 [ 733.791933] __kmalloc_node+0x76/0x420 [ 733.792281] kvmalloc_node+0x119/0x170 [ 733.792624] alloc_fdtable+0xd3/0x280 [ 733.792962] dup_fd+0x74d/0xcf0 [ 733.793268] unshare_files+0x175/0x270 [ 733.793612] ? __ia32_sys_unshare+0x40/0x40 [ 733.793992] ? get_user_pages_remote+0x63/0x90 [ 733.794414] ? get_user_pages_remote+0x6c/0x90 [ 733.794815] bprm_execve+0xcb/0x1a60 [ 733.795146] ? acct_arg_size+0xe0/0xe0 [ 733.795488] ? downgrade_write+0x3a0/0x3a0 [ 733.795867] ? open_exec+0x70/0x70 [ 733.796178] ? memcpy+0x39/0x60 [ 733.796472] ? copy_string_kernel+0x3b6/0x450 [ 733.796868] do_execveat_common+0x772/0x8d0 [ 733.797255] ? bprm_execve+0x1a60/0x1a60 [ 733.797616] __x64_sys_execveat+0xed/0x140 [ 733.797992] do_syscall_64+0x33/0x40 [ 733.798329] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 733.798777] RIP: 0033:0x7f9509c8ab19 [ 733.799105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.800698] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 733.801346] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 733.801951] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 733.802583] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 733.803189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.803798] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 748.640480] FAULT_INJECTION: forcing a failure. [ 748.640480] name failslab, interval 1, probability 0, space 0, times 0 [ 748.642205] CPU: 1 PID: 7762 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 748.643201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.644656] Call Trace: [ 748.645153] dump_stack+0x107/0x167 [ 748.645824] should_fail.cold+0x5/0xa [ 748.646406] ? create_object.isra.0+0x3a/0xa20 [ 748.647129] should_failslab+0x5/0x20 [ 748.647686] kmem_cache_alloc+0x5b/0x310 [ 748.648283] create_object.isra.0+0x3a/0xa20 [ 748.648919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 748.649660] kmem_cache_alloc+0x159/0x310 [ 748.650284] __anon_vma_prepare+0x62/0x500 [ 748.650895] ? __pte_alloc+0x194/0x330 [ 748.651463] handle_mm_fault+0x2b2d/0x3500 [ 748.652080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 748.652829] ? SOFTIRQ_verbose+0x10/0x10 [ 748.653415] ? __pmd_alloc+0x5e0/0x5e0 [ 748.654001] __get_user_pages+0x6ec/0x1620 [ 748.654637] ? follow_page_mask+0x1900/0x1900 [ 748.655291] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 748.655979] __get_user_pages_remote+0x1d5/0x870 [ 748.656672] ? lock_downgrade+0x6d0/0x6d0 [ 748.657294] get_user_pages_remote+0x63/0x90 [ 748.657934] get_arg_page+0xba/0x200 [ 748.658485] ? acct_arg_size+0xe0/0xe0 [ 748.659051] ? downgrade_write+0x3a0/0x3a0 [ 748.659664] ? count.constprop.0+0x1b3/0x290 [ 748.660310] copy_string_kernel+0x1b4/0x450 [ 748.660939] do_execveat_common+0x525/0x8d0 [ 748.661574] ? bprm_execve+0x1a60/0x1a60 [ 748.662179] __x64_sys_execveat+0xed/0x140 22:07:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 22:07:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 22:07:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 22:07:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 22:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 22:07:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) setresuid(0x0, 0x0, 0x0) 22:07:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) [ 748.662807] do_syscall_64+0x33/0x40 [ 748.663488] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.664252] RIP: 0033:0x7f6383eb9b19 [ 748.664789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.667409] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.668491] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 748.669508] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.670530] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.671543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.672553] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 748.685003] FAULT_INJECTION: forcing a failure. [ 748.685003] name failslab, interval 1, probability 0, space 0, times 0 [ 748.686791] CPU: 1 PID: 7764 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 748.687791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.688969] Call Trace: [ 748.689358] dump_stack+0x107/0x167 [ 748.689886] should_fail.cold+0x5/0xa [ 748.690456] ? __anon_vma_prepare+0x270/0x500 [ 748.691118] should_failslab+0x5/0x20 [ 748.691674] kmem_cache_alloc+0x5b/0x310 [ 748.692274] __anon_vma_prepare+0x270/0x500 [ 748.692908] ? __pte_alloc+0x194/0x330 [ 748.693478] handle_mm_fault+0x2b2d/0x3500 [ 748.694104] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 748.694878] ? SOFTIRQ_verbose+0x10/0x10 [ 748.695470] ? __pmd_alloc+0x5e0/0x5e0 [ 748.696062] __get_user_pages+0x6ec/0x1620 [ 748.696683] ? follow_page_mask+0x1900/0x1900 [ 748.697345] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 748.698036] __get_user_pages_remote+0x1d5/0x870 [ 748.698738] ? lock_downgrade+0x6d0/0x6d0 [ 748.699351] get_user_pages_remote+0x63/0x90 [ 748.700008] get_arg_page+0xba/0x200 [ 748.700565] ? acct_arg_size+0xe0/0xe0 [ 748.701123] ? downgrade_write+0x3a0/0x3a0 [ 748.701747] ? count.constprop.0+0x1b3/0x290 [ 748.702394] copy_string_kernel+0x1b4/0x450 [ 748.703031] do_execveat_common+0x525/0x8d0 [ 748.703659] ? bprm_execve+0x1a60/0x1a60 [ 748.704270] __x64_sys_execveat+0xed/0x140 [ 748.704888] do_syscall_64+0x33/0x40 [ 748.705428] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.706181] RIP: 0033:0x7f70da682b19 [ 748.706722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.709366] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.710474] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 748.711505] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.712540] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.713580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.714611] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 748.722798] FAULT_INJECTION: forcing a failure. [ 748.722798] name failslab, interval 1, probability 0, space 0, times 0 [ 748.724633] CPU: 0 PID: 7773 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 748.725614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.726815] Call Trace: [ 748.727205] dump_stack+0x107/0x167 [ 748.727737] should_fail.cold+0x5/0xa [ 748.728290] ? create_object.isra.0+0x3a/0xa20 [ 748.728957] should_failslab+0x5/0x20 [ 748.729515] kmem_cache_alloc+0x5b/0x310 [ 748.730104] create_object.isra.0+0x3a/0xa20 [ 748.730746] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 748.731483] __kmalloc_node+0x1ae/0x420 [ 748.732072] kvmalloc_node+0x119/0x170 [ 748.732643] alloc_fdtable+0xd3/0x280 [ 748.733199] dup_fd+0x74d/0xcf0 [ 748.733698] unshare_files+0x175/0x270 [ 748.733781] EXT4-fs (loop1): unsupported inode size: 0 [ 748.734265] ? __ia32_sys_unshare+0x40/0x40 [ 748.734296] ? get_user_pages_remote+0x63/0x90 [ 748.734320] ? get_user_pages_remote+0x6c/0x90 [ 748.735076] EXT4-fs (loop1): blocksize: 2048 [ 748.735694] bprm_execve+0xcb/0x1a60 [ 748.735716] ? acct_arg_size+0xe0/0xe0 [ 748.735740] ? downgrade_write+0x3a0/0x3a0 [ 748.739284] ? open_exec+0x70/0x70 [ 748.739797] ? memcpy+0x39/0x60 [ 748.740277] ? copy_string_kernel+0x3b6/0x450 [ 748.740926] do_execveat_common+0x772/0x8d0 [ 748.741551] ? bprm_execve+0x1a60/0x1a60 [ 748.742156] __x64_sys_execveat+0xed/0x140 [ 748.742780] do_syscall_64+0x33/0x40 [ 748.743319] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.744053] RIP: 0033:0x7f9509c8ab19 [ 748.744590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.747212] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.748301] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 748.749331] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.750353] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.751373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.752390] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 748.754258] FAULT_INJECTION: forcing a failure. [ 748.754258] name failslab, interval 1, probability 0, space 0, times 0 [ 748.755893] CPU: 0 PID: 7769 Comm: syz-executor.0 Not tainted 5.10.216 #1 [ 748.756877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.758062] Call Trace: [ 748.758452] dump_stack+0x107/0x167 [ 748.758984] should_fail.cold+0x5/0xa [ 748.759541] ? alloc_bprm+0x51/0x8f0 [ 748.760087] should_failslab+0x5/0x20 [ 748.760641] kmem_cache_alloc_trace+0x55/0x320 [ 748.761305] ? lock_downgrade+0x6d0/0x6d0 [ 748.761918] alloc_bprm+0x51/0x8f0 [ 748.762453] ? __virt_addr_valid+0x170/0x5c0 [ 748.763102] do_execveat_common+0x275/0x8d0 [ 748.763738] ? strncpy_from_user+0x9e/0x470 [ 748.764371] ? bprm_execve+0x1a60/0x1a60 [ 748.764982] __x64_sys_execveat+0xed/0x140 [ 748.765604] do_syscall_64+0x33/0x40 [ 748.766149] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.766895] RIP: 0033:0x7f7e8236fb19 [ 748.767441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.770071] RSP: 002b:00007f7e7f8e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.771172] RAX: ffffffffffffffda RBX: 00007f7e82482f60 RCX: 00007f7e8236fb19 [ 748.772206] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.773246] RBP: 00007f7e7f8e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.774285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 748.775308] R13: 00007fff54ed027f R14: 00007f7e7f8e5300 R15: 0000000000022000 [ 748.777670] FAULT_INJECTION: forcing a failure. [ 748.777670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 748.779399] CPU: 0 PID: 7779 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 748.780377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.781570] Call Trace: [ 748.781956] dump_stack+0x107/0x167 [ 748.782498] should_fail.cold+0x5/0xa [ 748.783060] __alloc_pages_nodemask+0x182/0x600 [ 748.783732] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 748.784599] ? add_mm_counter_fast+0x220/0x220 [ 748.785273] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 748.786035] alloc_pages_current+0x187/0x280 [ 748.786700] get_zeroed_page+0x14/0xb0 [ 748.787270] __pud_alloc+0x33/0x270 [ 748.787798] handle_mm_fault+0x1a73/0x3500 [ 748.788422] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 748.789166] ? SOFTIRQ_verbose+0x10/0x10 [ 748.789761] ? __pmd_alloc+0x5e0/0x5e0 [ 748.790377] __get_user_pages+0x6ec/0x1620 [ 748.791006] ? follow_page_mask+0x1900/0x1900 [ 748.791663] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 748.792355] __get_user_pages_remote+0x1d5/0x870 [ 748.793039] ? lock_downgrade+0x6d0/0x6d0 [ 748.793639] get_user_pages_remote+0x63/0x90 [ 748.794294] get_arg_page+0xba/0x200 [ 748.794837] ? acct_arg_size+0xe0/0xe0 [ 748.795403] ? downgrade_write+0x3a0/0x3a0 [ 748.796023] ? count.constprop.0+0x1b3/0x290 [ 748.796668] copy_string_kernel+0x1b4/0x450 [ 748.797300] do_execveat_common+0x525/0x8d0 [ 748.797931] ? bprm_execve+0x1a60/0x1a60 [ 748.798546] __x64_sys_execveat+0xed/0x140 [ 748.799167] do_syscall_64+0x33/0x40 [ 748.799707] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.800451] RIP: 0033:0x7f1c8836fb19 [ 748.800992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.803635] RSP: 002b:00007f1c858a3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.804723] RAX: ffffffffffffffda RBX: 00007f1c884830e0 RCX: 00007f1c8836fb19 [ 748.805752] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.806792] RBP: 00007f1c858a31d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.807817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.808847] R13: 00007ffec80ec7af R14: 00007f1c858a3300 R15: 0000000000022000 [ 748.829686] FAULT_INJECTION: forcing a failure. [ 748.829686] name failslab, interval 1, probability 0, space 0, times 0 [ 748.833143] CPU: 1 PID: 7774 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 748.834150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 748.835633] Call Trace: [ 748.836142] dump_stack+0x107/0x167 [ 748.836693] should_fail.cold+0x5/0xa [ 748.837269] ? ptlock_alloc+0x1d/0x70 [ 748.837846] should_failslab+0x5/0x20 [ 748.838435] kmem_cache_alloc+0x5b/0x310 [ 748.839029] ptlock_alloc+0x1d/0x70 [ 748.839652] pte_alloc_one+0x68/0x1a0 [ 748.840218] __pte_alloc+0x1d/0x330 [ 748.840781] handle_mm_fault+0x287f/0x3500 [ 748.841410] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 748.842179] ? SOFTIRQ_verbose+0x10/0x10 [ 748.842806] ? __pmd_alloc+0x5e0/0x5e0 [ 748.843415] __get_user_pages+0x6ec/0x1620 [ 748.844176] ? follow_page_mask+0x1900/0x1900 [ 748.844896] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 748.845762] __get_user_pages_remote+0x1d5/0x870 [ 748.846535] ? lock_downgrade+0x6d0/0x6d0 [ 748.847143] get_user_pages_remote+0x63/0x90 [ 748.847911] get_arg_page+0xba/0x200 [ 748.848595] ? acct_arg_size+0xe0/0xe0 [ 748.849219] ? downgrade_write+0x3a0/0x3a0 [ 748.849948] ? count.constprop.0+0x1b3/0x290 [ 748.850610] copy_string_kernel+0x1b4/0x450 [ 748.851339] do_execveat_common+0x525/0x8d0 [ 748.851987] ? bprm_execve+0x1a60/0x1a60 [ 748.852613] __x64_sys_execveat+0xed/0x140 [ 748.853232] do_syscall_64+0x33/0x40 [ 748.853782] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 748.854540] RIP: 0033:0x7f2f4d86bb19 [ 748.855218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 748.858052] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 748.859437] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 748.860466] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 748.861498] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 748.862527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 748.863558] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:07:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) 22:07:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 22:07:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 22:07:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 22:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 22:07:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) setresuid(0x0, 0x0, 0x0) [ 762.922936] FAULT_INJECTION: forcing a failure. [ 762.922936] name failslab, interval 1, probability 0, space 0, times 0 22:07:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 762.925405] CPU: 0 PID: 7792 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 762.926818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 762.928424] Call Trace: [ 762.928942] dump_stack+0x107/0x167 [ 762.929656] should_fail.cold+0x5/0xa [ 762.930406] ? create_object.isra.0+0x3a/0xa20 [ 762.931303] should_failslab+0x5/0x20 [ 762.932045] kmem_cache_alloc+0x5b/0x310 [ 762.932833] ? create_object.isra.0+0x3ad/0xa20 [ 762.933742] create_object.isra.0+0x3a/0xa20 [ 762.934595] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 762.935590] __kmalloc_node+0x1ae/0x420 [ 762.936374] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 762.937078] FAULT_INJECTION: forcing a failure. [ 762.937078] name failslab, interval 1, probability 0, space 0, times 0 [ 762.937347] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 762.937371] ? trace_hardirqs_on+0x5b/0x180 [ 762.937401] kmem_cache_alloc_trace+0x169/0x320 [ 762.940982] alloc_fdtable+0x84/0x280 [ 762.941693] dup_fd+0x74d/0xcf0 [ 762.942334] unshare_files+0x175/0x270 [ 762.943065] ? __ia32_sys_unshare+0x40/0x40 [ 762.943873] ? get_user_pages_remote+0x63/0x90 [ 762.944716] ? get_user_pages_remote+0x6c/0x90 [ 762.945569] bprm_execve+0xcb/0x1a60 [ 762.946262] ? acct_arg_size+0xe0/0xe0 [ 762.946992] ? downgrade_write+0x3a0/0x3a0 [ 762.947779] ? open_exec+0x70/0x70 [ 762.948447] ? memcpy+0x39/0x60 [ 762.949066] ? copy_string_kernel+0x3b6/0x450 [ 762.949926] do_execveat_common+0x772/0x8d0 [ 762.950738] ? bprm_execve+0x1a60/0x1a60 [ 762.951530] __x64_sys_execveat+0xed/0x140 [ 762.952321] do_syscall_64+0x33/0x40 [ 762.953032] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 762.953977] RIP: 0033:0x7f9509c8ab19 [ 762.954693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 762.958063] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 762.959524] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 762.960693] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 762.961853] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 762.963021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 762.964180] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 762.965353] CPU: 1 PID: 7803 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 762.966020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 762.966786] Call Trace: [ 762.967032] dump_stack+0x107/0x167 [ 762.967369] should_fail.cold+0x5/0xa [ 762.967725] ? create_object.isra.0+0x3a/0xa20 [ 762.968149] should_failslab+0x5/0x20 [ 762.968501] kmem_cache_alloc+0x5b/0x310 [ 762.968878] create_object.isra.0+0x3a/0xa20 [ 762.969286] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 762.969754] kmem_cache_alloc+0x159/0x310 [ 762.970142] __anon_vma_prepare+0x270/0x500 [ 762.970560] ? __pte_alloc+0x194/0x330 [ 762.970924] handle_mm_fault+0x2b2d/0x3500 [ 762.971324] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 762.971807] ? SOFTIRQ_verbose+0x10/0x10 [ 762.972184] ? __pmd_alloc+0x5e0/0x5e0 [ 762.972559] __get_user_pages+0x6ec/0x1620 [ 762.972958] ? follow_page_mask+0x1900/0x1900 [ 762.973377] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 762.973815] __get_user_pages_remote+0x1d5/0x870 [ 762.974281] ? lock_downgrade+0x6d0/0x6d0 [ 762.974682] get_user_pages_remote+0x63/0x90 [ 762.975100] get_arg_page+0xba/0x200 [ 762.975452] ? acct_arg_size+0xe0/0xe0 [ 762.975820] ? downgrade_write+0x3a0/0x3a0 [ 762.976215] ? count.constprop.0+0x1b3/0x290 [ 762.976627] copy_string_kernel+0x1b4/0x450 [ 762.977040] do_execveat_common+0x525/0x8d0 [ 762.977443] ? bprm_execve+0x1a60/0x1a60 [ 762.977833] __x64_sys_execveat+0xed/0x140 [ 762.978239] do_syscall_64+0x33/0x40 [ 762.978610] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 762.979091] RIP: 0033:0x7f70da682b19 [ 762.979434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 762.981115] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 762.981819] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 762.982483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 762.983142] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 762.983799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 762.984460] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 762.986629] FAULT_INJECTION: forcing a failure. [ 762.986629] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.987746] CPU: 1 PID: 7806 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 762.988375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 762.989141] Call Trace: [ 762.989389] dump_stack+0x107/0x167 [ 762.989732] should_fail.cold+0x5/0xa [ 762.990094] __alloc_pages_nodemask+0x182/0x600 [ 762.990539] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 762.991094] ? add_mm_counter_fast+0x220/0x220 [ 762.991530] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 762.992020] alloc_pages_current+0x187/0x280 [ 762.992440] get_zeroed_page+0x14/0xb0 [ 762.992805] __pud_alloc+0x33/0x270 [ 762.993154] handle_mm_fault+0x1a73/0x3500 [ 762.993558] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 762.994049] ? SOFTIRQ_verbose+0x10/0x10 [ 762.994440] ? __pmd_alloc+0x5e0/0x5e0 [ 762.994818] __get_user_pages+0x6ec/0x1620 [ 762.995224] ? follow_page_mask+0x1900/0x1900 [ 762.995647] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 762.996092] __get_user_pages_remote+0x1d5/0x870 [ 762.996536] ? lock_downgrade+0x6d0/0x6d0 [ 762.996926] get_user_pages_remote+0x63/0x90 [ 762.997342] get_arg_page+0xba/0x200 [ 762.997694] ? acct_arg_size+0xe0/0xe0 [ 762.998055] ? downgrade_write+0x3a0/0x3a0 [ 762.998453] ? count.constprop.0+0x1b3/0x290 [ 762.998870] copy_string_kernel+0x1b4/0x450 [ 762.999283] do_execveat_common+0x525/0x8d0 [ 762.999688] ? bprm_execve+0x1a60/0x1a60 [ 763.000081] __x64_sys_execveat+0xed/0x140 [ 763.000477] do_syscall_64+0x33/0x40 [ 763.000829] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.001307] RIP: 0033:0x7f1c8836fb19 [ 763.001656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.003356] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.004067] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 763.004730] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.005398] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.006057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.006716] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 763.010537] FAULT_INJECTION: forcing a failure. [ 763.010537] name failslab, interval 1, probability 0, space 0, times 0 [ 763.011629] CPU: 1 PID: 7805 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 763.012255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.013022] Call Trace: [ 763.013266] dump_stack+0x107/0x167 [ 763.013605] should_fail.cold+0x5/0xa [ 763.013960] ? getname_flags.part.0+0x50/0x4f0 [ 763.014382] should_failslab+0x5/0x20 [ 763.014742] kmem_cache_alloc+0x5b/0x310 [ 763.015127] getname_flags.part.0+0x50/0x4f0 [ 763.015540] getname_flags+0x9a/0xe0 [ 763.015888] __x64_sys_execveat+0xd6/0x140 [ 763.016284] do_syscall_64+0x33/0x40 [ 763.016627] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.017100] RIP: 0033:0x7f2243400b19 [ 763.017443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.019133] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.019831] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 763.020491] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.021145] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.021797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.022456] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 763.026488] FAULT_INJECTION: forcing a failure. [ 763.026488] name failslab, interval 1, probability 0, space 0, times 0 [ 763.026636] FAULT_INJECTION: forcing a failure. [ 763.026636] name failslab, interval 1, probability 0, space 0, times 0 [ 763.028399] CPU: 0 PID: 7801 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 763.030375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.031692] Call Trace: [ 763.032114] dump_stack+0x107/0x167 [ 763.032699] should_fail.cold+0x5/0xa [ 763.033307] ? __anon_vma_prepare+0x270/0x500 [ 763.034024] should_failslab+0x5/0x20 [ 763.034639] kmem_cache_alloc+0x5b/0x310 [ 763.035290] __anon_vma_prepare+0x270/0x500 [ 763.035974] ? __pte_alloc+0x194/0x330 [ 763.036601] handle_mm_fault+0x2b2d/0x3500 [ 763.037285] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.038119] ? SOFTIRQ_verbose+0x10/0x10 [ 763.038775] ? __pmd_alloc+0x5e0/0x5e0 [ 763.039422] __get_user_pages+0x6ec/0x1620 [ 763.040114] ? follow_page_mask+0x1900/0x1900 [ 763.040832] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.041591] __get_user_pages_remote+0x1d5/0x870 [ 763.042351] ? lock_downgrade+0x6d0/0x6d0 [ 763.043027] get_user_pages_remote+0x63/0x90 [ 763.043736] get_arg_page+0xba/0x200 [ 763.044334] ? acct_arg_size+0xe0/0xe0 [ 763.044945] ? downgrade_write+0x3a0/0x3a0 [ 763.045616] ? count.constprop.0+0x1b3/0x290 [ 763.046319] copy_string_kernel+0x1b4/0x450 [ 763.047021] do_execveat_common+0x525/0x8d0 [ 763.047704] ? bprm_execve+0x1a60/0x1a60 [ 763.048370] __x64_sys_execveat+0xed/0x140 [ 763.049042] do_syscall_64+0x33/0x40 [ 763.049633] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.050456] RIP: 0033:0x7f6383eb9b19 [ 763.051052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.053930] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.055131] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 763.056254] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.057381] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.058509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.059630] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 763.060775] CPU: 1 PID: 7794 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 763.061404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.062147] Call Trace: [ 763.062390] dump_stack+0x107/0x167 [ 763.062730] should_fail.cold+0x5/0xa [ 763.063078] ? create_object.isra.0+0x3a/0xa20 [ 763.063494] should_failslab+0x5/0x20 [ 763.063850] kmem_cache_alloc+0x5b/0x310 [ 763.064216] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 763.064756] create_object.isra.0+0x3a/0xa20 [ 763.065158] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 763.065622] kmem_cache_alloc+0x159/0x310 [ 763.066000] ptlock_alloc+0x1d/0x70 [ 763.066334] pte_alloc_one+0x68/0x1a0 [ 763.066684] __pte_alloc+0x1d/0x330 [ 763.067020] handle_mm_fault+0x287f/0x3500 [ 763.067412] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.067887] ? SOFTIRQ_verbose+0x10/0x10 [ 763.068256] ? __pmd_alloc+0x5e0/0x5e0 [ 763.068621] __get_user_pages+0x6ec/0x1620 [ 763.069010] ? follow_page_mask+0x1900/0x1900 [ 763.069418] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.069846] __get_user_pages_remote+0x1d5/0x870 [ 763.070282] ? lock_downgrade+0x6d0/0x6d0 [ 763.070667] get_user_pages_remote+0x63/0x90 [ 763.071076] get_arg_page+0xba/0x200 [ 763.071413] ? acct_arg_size+0xe0/0xe0 [ 763.071768] ? downgrade_write+0x3a0/0x3a0 [ 763.072150] ? count.constprop.0+0x1b3/0x290 [ 763.072552] copy_string_kernel+0x1b4/0x450 [ 763.072951] do_execveat_common+0x525/0x8d0 [ 763.073346] ? bprm_execve+0x1a60/0x1a60 [ 763.073725] __x64_sys_execveat+0xed/0x140 [ 763.074113] do_syscall_64+0x33/0x40 [ 763.074459] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.074919] RIP: 0033:0x7f2f4d86bb19 [ 763.075255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.076906] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.077588] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 763.078233] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.078882] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.079518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.080159] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 763.093543] FAULT_INJECTION: forcing a failure. [ 763.093543] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.095505] CPU: 0 PID: 7800 Comm: syz-executor.0 Not tainted 5.10.216 #1 [ 763.096577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.097897] Call Trace: [ 763.098323] dump_stack+0x107/0x167 [ 763.098916] should_fail.cold+0x5/0xa [ 763.099537] __alloc_pages_nodemask+0x182/0x600 [ 763.100271] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 763.101215] ? kmem_cache_alloc_trace+0x305/0x320 [ 763.101990] alloc_pages_current+0x187/0x280 [ 763.102707] allocate_slab+0x26f/0x380 [ 763.103351] ___slab_alloc+0x470/0x700 [ 763.103979] ? alloc_bprm+0x51/0x8f0 [ 763.104557] ? alloc_bprm+0x51/0x8f0 [ 763.105154] ? kmem_cache_alloc_trace+0x305/0x320 [ 763.105921] ? alloc_bprm+0x51/0x8f0 [ 763.106525] kmem_cache_alloc_trace+0x305/0x320 [ 763.107284] alloc_bprm+0x51/0x8f0 [ 763.107858] ? __virt_addr_valid+0x170/0x5c0 [ 763.108575] do_execveat_common+0x275/0x8d0 [ 763.109259] ? strncpy_from_user+0x9e/0x470 [ 763.109919] ? bprm_execve+0x1a60/0x1a60 [ 763.110599] __x64_sys_execveat+0xed/0x140 [ 763.111286] do_syscall_64+0x33/0x40 [ 763.111890] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.112713] RIP: 0033:0x7f7e8236fb19 [ 763.113294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.116195] RSP: 002b:00007f7e7f8e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.117382] RAX: ffffffffffffffda RBX: 00007f7e82482f60 RCX: 00007f7e8236fb19 [ 763.118544] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.119695] RBP: 00007f7e7f8e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.120788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.121931] R13: 00007fff54ed027f R14: 00007f7e7f8e5300 R15: 0000000000022000 [ 763.123816] EXT4-fs (loop1): unsupported inode size: 0 [ 763.124711] EXT4-fs (loop1): blocksize: 2048 22:07:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 22:07:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) [ 763.195958] FAULT_INJECTION: forcing a failure. [ 763.195958] name failslab, interval 1, probability 0, space 0, times 0 [ 763.197872] CPU: 0 PID: 7812 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 763.198917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.200176] Call Trace: [ 763.200581] dump_stack+0x107/0x167 [ 763.201137] should_fail.cold+0x5/0xa [ 763.201719] ? create_object.isra.0+0x3a/0xa20 [ 763.202417] should_failslab+0x5/0x20 [ 763.203003] kmem_cache_alloc+0x5b/0x310 [ 763.203632] create_object.isra.0+0x3a/0xa20 [ 763.204307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 763.205084] __kmalloc_node+0x1ae/0x420 [ 763.205705] kvmalloc_node+0x119/0x170 [ 763.206301] alloc_fdtable+0x13f/0x280 [ 763.206900] dup_fd+0x74d/0xcf0 [ 763.207421] unshare_files+0x175/0x270 [ 763.208014] ? __ia32_sys_unshare+0x40/0x40 [ 763.208675] ? get_user_pages_remote+0x63/0x90 [ 763.209366] ? get_user_pages_remote+0x6c/0x90 [ 763.210062] bprm_execve+0xcb/0x1a60 [ 763.210638] ? acct_arg_size+0xe0/0xe0 22:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 763.211233] ? downgrade_write+0x3a0/0x3a0 [ 763.212019] ? open_exec+0x70/0x70 [ 763.212562] ? memcpy+0x39/0x60 [ 763.213062] ? copy_string_kernel+0x3b6/0x450 [ 763.213764] do_execveat_common+0x772/0x8d0 [ 763.214421] ? bprm_execve+0x1a60/0x1a60 [ 763.215057] __x64_sys_execveat+0xed/0x140 [ 763.215698] do_syscall_64+0x33/0x40 [ 763.216259] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.217027] RIP: 0033:0x7f9509c8ab19 [ 763.217588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.220328] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.221470] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 763.222546] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.223613] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.224678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.225749] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:07:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 22:07:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) [ 763.260329] EXT4-fs (loop1): unsupported inode size: 0 [ 763.261690] EXT4-fs (loop1): blocksize: 2048 [ 763.303568] FAULT_INJECTION: forcing a failure. [ 763.303568] name failslab, interval 1, probability 0, space 0, times 0 [ 763.305315] CPU: 0 PID: 7820 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 763.306346] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.307603] Call Trace: [ 763.307998] dump_stack+0x107/0x167 [ 763.308555] should_fail.cold+0x5/0xa [ 763.309136] ? __anon_vma_prepare+0x270/0x500 [ 763.309817] should_failslab+0x5/0x20 [ 763.310402] kmem_cache_alloc+0x5b/0x310 [ 763.311031] __anon_vma_prepare+0x270/0x500 [ 763.311684] ? __pte_alloc+0x194/0x330 [ 763.312280] handle_mm_fault+0x2b2d/0x3500 [ 763.312930] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.313722] ? SOFTIRQ_verbose+0x10/0x10 [ 763.314340] ? __pmd_alloc+0x5e0/0x5e0 [ 763.314958] __get_user_pages+0x6ec/0x1620 [ 763.315609] ? follow_page_mask+0x1900/0x1900 [ 763.316293] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.317010] __get_user_pages_remote+0x1d5/0x870 [ 763.317729] ? lock_downgrade+0x6d0/0x6d0 [ 763.318363] get_user_pages_remote+0x63/0x90 [ 763.319041] get_arg_page+0xba/0x200 [ 763.319608] ? acct_arg_size+0xe0/0xe0 [ 763.320196] ? downgrade_write+0x3a0/0x3a0 [ 763.320837] ? count.constprop.0+0x1b3/0x290 [ 763.321511] copy_string_kernel+0x1b4/0x450 [ 763.322172] do_execveat_common+0x525/0x8d0 [ 763.322836] ? bprm_execve+0x1a60/0x1a60 [ 763.323475] __x64_sys_execveat+0xed/0x140 [ 763.324118] do_syscall_64+0x33/0x40 [ 763.324683] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.325456] RIP: 0033:0x7f6383eb9b19 [ 763.326020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.328950] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.330096] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 763.331184] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.332253] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.333322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.334393] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:07:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 763.382052] FAULT_INJECTION: forcing a failure. [ 763.382052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.383869] CPU: 0 PID: 7822 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 763.384907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.386156] Call Trace: [ 763.386569] dump_stack+0x107/0x167 [ 763.387125] should_fail.cold+0x5/0xa [ 763.387707] __alloc_pages_nodemask+0x182/0x600 [ 763.388421] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 763.389343] ? kmem_cache_alloc+0x301/0x310 [ 763.390009] alloc_pages_current+0x187/0x280 [ 763.390691] allocate_slab+0x26f/0x380 [ 763.391290] ___slab_alloc+0x470/0x700 [ 763.391886] ? getname_flags.part.0+0x50/0x4f0 [ 763.392586] ? ksys_write+0x12d/0x260 [ 763.393174] ? getname_flags.part.0+0x50/0x4f0 [ 763.393870] ? kmem_cache_alloc+0x301/0x310 [ 763.394533] ? getname_flags.part.0+0x50/0x4f0 [ 763.395225] kmem_cache_alloc+0x301/0x310 [ 763.395858] getname_flags.part.0+0x50/0x4f0 [ 763.396533] getname_flags+0x9a/0xe0 [ 763.397105] __x64_sys_execveat+0xd6/0x140 [ 763.397750] do_syscall_64+0x33/0x40 [ 763.398316] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.399099] RIP: 0033:0x7f2243400b19 [ 763.399665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.402453] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.403610] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 763.404691] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.405771] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.406861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.407942] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 763.419433] FAULT_INJECTION: forcing a failure. [ 763.419433] name failslab, interval 1, probability 0, space 0, times 0 [ 763.421335] CPU: 1 PID: 7824 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 763.422369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.423628] Call Trace: [ 763.424034] dump_stack+0x107/0x167 [ 763.424595] should_fail.cold+0x5/0xa [ 763.425176] ? __pmd_alloc+0x94/0x5e0 [ 763.425761] should_failslab+0x5/0x20 [ 763.426342] kmem_cache_alloc+0x5b/0x310 [ 763.426973] __pmd_alloc+0x94/0x5e0 [ 763.427536] handle_mm_fault+0x1ac4/0x3500 [ 763.428193] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.428982] ? SOFTIRQ_verbose+0x10/0x10 [ 763.429597] ? __pmd_alloc+0x5e0/0x5e0 [ 763.430213] __get_user_pages+0x6ec/0x1620 [ 763.430879] ? follow_page_mask+0x1900/0x1900 [ 763.431562] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.432281] __get_user_pages_remote+0x1d5/0x870 [ 763.433001] ? lock_downgrade+0x6d0/0x6d0 [ 763.433644] get_user_pages_remote+0x63/0x90 [ 763.434317] get_arg_page+0xba/0x200 [ 763.434898] ? acct_arg_size+0xe0/0xe0 [ 763.435491] ? downgrade_write+0x3a0/0x3a0 [ 763.436134] ? count.constprop.0+0x1b3/0x290 [ 763.436807] copy_string_kernel+0x1b4/0x450 [ 763.437471] do_execveat_common+0x525/0x8d0 [ 763.438131] ? bprm_execve+0x1a60/0x1a60 [ 763.438774] __x64_sys_execveat+0xed/0x140 [ 763.439419] do_syscall_64+0x33/0x40 [ 763.439986] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.440757] RIP: 0033:0x7f1c8836fb19 [ 763.441323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.444091] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.444658] FAULT_INJECTION: forcing a failure. [ 763.444658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.445239] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 763.445251] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.445262] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.445272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.445292] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 763.452316] CPU: 0 PID: 7827 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 763.453359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.454613] Call Trace: [ 763.455018] dump_stack+0x107/0x167 [ 763.455573] should_fail.cold+0x5/0xa [ 763.456158] __alloc_pages_nodemask+0x182/0x600 [ 763.456868] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 763.457776] ? up_write+0x191/0x550 [ 763.458340] ? rwlock_bug.part.0+0x90/0x90 [ 763.458993] ? anon_vma_interval_tree_insert+0x277/0x450 [ 763.459816] alloc_pages_vma+0xbb/0x410 [ 763.460617] handle_mm_fault+0x152f/0x3500 [ 763.461263] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.462052] ? SOFTIRQ_verbose+0x10/0x10 [ 763.462673] ? __pmd_alloc+0x5e0/0x5e0 [ 763.463280] __get_user_pages+0x6ec/0x1620 [ 763.463929] ? follow_page_mask+0x1900/0x1900 [ 763.464609] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.465326] __get_user_pages_remote+0x1d5/0x870 [ 763.466042] ? lock_downgrade+0x6d0/0x6d0 [ 763.466680] get_user_pages_remote+0x63/0x90 [ 763.467349] get_arg_page+0xba/0x200 [ 763.467914] ? acct_arg_size+0xe0/0xe0 [ 763.468500] ? downgrade_write+0x3a0/0x3a0 22:07:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 763.469136] ? count.constprop.0+0x1b3/0x290 [ 763.469948] copy_string_kernel+0x1b4/0x450 [ 763.470596] do_execveat_common+0x525/0x8d0 [ 763.471228] ? bprm_execve+0x1a60/0x1a60 [ 763.471838] __x64_sys_execveat+0xed/0x140 [ 763.472457] do_syscall_64+0x33/0x40 [ 763.473002] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.473751] RIP: 0033:0x7f70da682b19 [ 763.474298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.476953] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.478062] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 763.479108] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.480148] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.481181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.482253] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:07:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 22:07:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 22:07:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) [ 763.571550] FAULT_INJECTION: forcing a failure. [ 763.571550] name failslab, interval 1, probability 0, space 0, times 0 [ 763.573754] CPU: 0 PID: 7832 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 763.574904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.576141] Call Trace: [ 763.576543] dump_stack+0x107/0x167 [ 763.577091] should_fail.cold+0x5/0xa [ 763.577663] ? prepare_creds+0x25/0x5e0 [ 763.578264] should_failslab+0x5/0x20 [ 763.578844] kmem_cache_alloc+0x5b/0x310 [ 763.579454] ? __ia32_sys_unshare+0x40/0x40 [ 763.580101] prepare_creds+0x25/0x5e0 [ 763.580679] prepare_exec_creds+0xd/0x260 [ 763.581299] bprm_execve+0x18f/0x1a60 [ 763.581871] ? acct_arg_size+0xe0/0xe0 [ 763.582458] ? downgrade_write+0x3a0/0x3a0 [ 763.583097] ? open_exec+0x70/0x70 [ 763.583630] ? memcpy+0x39/0x60 [ 763.584127] ? copy_string_kernel+0x3b6/0x450 [ 763.584804] do_execveat_common+0x772/0x8d0 [ 763.585457] ? bprm_execve+0x1a60/0x1a60 [ 763.586084] __x64_sys_execveat+0xed/0x140 [ 763.586731] do_syscall_64+0x33/0x40 [ 763.587289] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.588050] RIP: 0033:0x7f9509c8ab19 [ 763.588608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.591330] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.592468] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 763.593529] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.594600] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.595655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.596718] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 763.610913] FAULT_INJECTION: forcing a failure. [ 763.610913] name failslab, interval 1, probability 0, space 0, times 0 [ 763.612748] CPU: 0 PID: 7836 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 763.613779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.615027] Call Trace: [ 763.615431] dump_stack+0x107/0x167 [ 763.615978] should_fail.cold+0x5/0xa [ 763.616555] ? __anon_vma_prepare+0x62/0x500 [ 763.617227] should_failslab+0x5/0x20 [ 763.617800] kmem_cache_alloc+0x5b/0x310 [ 763.618421] __anon_vma_prepare+0x62/0x500 [ 763.619065] ? __pte_alloc+0x194/0x330 [ 763.619661] handle_mm_fault+0x2b2d/0x3500 [ 763.620307] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.621091] ? SOFTIRQ_verbose+0x10/0x10 [ 763.621705] ? __pmd_alloc+0x5e0/0x5e0 [ 763.622323] __get_user_pages+0x6ec/0x1620 [ 763.622983] ? follow_page_mask+0x1900/0x1900 [ 763.623665] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.624384] __get_user_pages_remote+0x1d5/0x870 [ 763.625097] ? lock_downgrade+0x6d0/0x6d0 [ 763.625728] get_user_pages_remote+0x63/0x90 [ 763.626398] get_arg_page+0xba/0x200 [ 763.626969] ? acct_arg_size+0xe0/0xe0 [ 763.627552] ? downgrade_write+0x3a0/0x3a0 [ 763.628192] ? count.constprop.0+0x1b3/0x290 [ 763.628860] copy_string_kernel+0x1b4/0x450 [ 763.629523] do_execveat_common+0x525/0x8d0 [ 763.630178] ? bprm_execve+0x1a60/0x1a60 [ 763.630819] __x64_sys_execveat+0xed/0x140 [ 763.631461] do_syscall_64+0x33/0x40 [ 763.632022] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.632794] RIP: 0033:0x7f2f4d86bb19 [ 763.633356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.636111] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.637252] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 763.638321] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.639404] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.640469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.641531] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:07:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:07:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 22:07:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) setresuid(0x0, 0x0, 0x0) [ 763.710494] FAULT_INJECTION: forcing a failure. [ 763.710494] name failslab, interval 1, probability 0, space 0, times 0 [ 763.712266] CPU: 1 PID: 7841 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 763.713305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.714567] Call Trace: [ 763.714979] dump_stack+0x107/0x167 [ 763.715545] should_fail.cold+0x5/0xa [ 763.716134] ? create_object.isra.0+0x3a/0xa20 [ 763.716841] should_failslab+0x5/0x20 [ 763.717419] kmem_cache_alloc+0x5b/0x310 [ 763.718047] create_object.isra.0+0x3a/0xa20 [ 763.718725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 763.719505] kmem_cache_alloc+0x159/0x310 [ 763.720150] __anon_vma_prepare+0x270/0x500 [ 763.720803] ? __pte_alloc+0x194/0x330 [ 763.721398] handle_mm_fault+0x2b2d/0x3500 [ 763.722055] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.722868] ? SOFTIRQ_verbose+0x10/0x10 [ 763.723489] ? __pmd_alloc+0x5e0/0x5e0 [ 763.724107] __get_user_pages+0x6ec/0x1620 [ 763.724766] ? follow_page_mask+0x1900/0x1900 [ 763.725458] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.726181] __get_user_pages_remote+0x1d5/0x870 [ 763.726914] ? lock_downgrade+0x6d0/0x6d0 [ 763.727560] get_user_pages_remote+0x63/0x90 [ 763.728242] get_arg_page+0xba/0x200 [ 763.728809] ? acct_arg_size+0xe0/0xe0 [ 763.729400] ? downgrade_write+0x3a0/0x3a0 [ 763.730043] ? count.constprop.0+0x1b3/0x290 [ 763.730726] copy_string_kernel+0x1b4/0x450 [ 763.731399] do_execveat_common+0x525/0x8d0 [ 763.732063] ? bprm_execve+0x1a60/0x1a60 [ 763.732699] __x64_sys_execveat+0xed/0x140 [ 763.733350] do_syscall_64+0x33/0x40 [ 763.733917] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.734709] RIP: 0033:0x7f6383eb9b19 [ 763.735280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.738058] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.739228] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 763.740314] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.741397] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.742485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.743568] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 763.752540] FAULT_INJECTION: forcing a failure. [ 763.752540] name failslab, interval 1, probability 0, space 0, times 0 [ 763.754298] CPU: 0 PID: 7840 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 763.755347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.756599] Call Trace: [ 763.757009] dump_stack+0x107/0x167 [ 763.757571] should_fail.cold+0x5/0xa [ 763.758152] ? create_object.isra.0+0x3a/0xa20 [ 763.758861] should_failslab+0x5/0x20 [ 763.759440] kmem_cache_alloc+0x5b/0x310 [ 763.760061] create_object.isra.0+0x3a/0xa20 [ 763.760729] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 763.761501] kmem_cache_alloc+0x159/0x310 [ 763.762135] __pmd_alloc+0x94/0x5e0 [ 763.762699] handle_mm_fault+0x1ac4/0x3500 [ 763.763352] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 763.764142] ? SOFTIRQ_verbose+0x10/0x10 [ 763.764758] ? __pmd_alloc+0x5e0/0x5e0 [ 763.765374] __get_user_pages+0x6ec/0x1620 [ 763.766024] ? follow_page_mask+0x1900/0x1900 [ 763.766716] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 763.767448] __get_user_pages_remote+0x1d5/0x870 [ 763.768165] ? lock_downgrade+0x6d0/0x6d0 [ 763.768800] get_user_pages_remote+0x63/0x90 [ 763.769474] get_arg_page+0xba/0x200 [ 763.770037] ? acct_arg_size+0xe0/0xe0 [ 763.770633] ? downgrade_write+0x3a0/0x3a0 [ 763.771284] ? count.constprop.0+0x1b3/0x290 [ 763.771958] copy_string_kernel+0x1b4/0x450 [ 763.772630] do_execveat_common+0x525/0x8d0 [ 763.773287] ? bprm_execve+0x1a60/0x1a60 [ 763.773917] __x64_sys_execveat+0xed/0x140 [ 763.774572] do_syscall_64+0x33/0x40 [ 763.775137] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.775907] RIP: 0033:0x7f1c8836fb19 [ 763.776472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.779248] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.780398] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 763.781478] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.782560] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.783643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.784721] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 763.813554] FAULT_INJECTION: forcing a failure. [ 763.813554] name failslab, interval 1, probability 0, space 0, times 0 [ 763.815308] CPU: 0 PID: 7848 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 763.816340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 763.817593] Call Trace: [ 763.817994] dump_stack+0x107/0x167 [ 763.818558] should_fail.cold+0x5/0xa [ 763.819139] ? create_object.isra.0+0x3a/0xa20 [ 763.819826] should_failslab+0x5/0x20 [ 763.820402] kmem_cache_alloc+0x5b/0x310 [ 763.821025] create_object.isra.0+0x3a/0xa20 [ 763.821686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 763.822470] kmem_cache_alloc+0x159/0x310 [ 763.823110] getname_flags.part.0+0x50/0x4f0 [ 763.823784] getname_flags+0x9a/0xe0 [ 763.824365] __x64_sys_execveat+0xd6/0x140 [ 763.825012] do_syscall_64+0x33/0x40 [ 763.825581] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 763.826358] RIP: 0033:0x7f2243400b19 [ 763.826930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.829691] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 763.830857] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 763.831940] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 763.833013] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 763.834093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.835185] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:07:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 22:07:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:07:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 22:07:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) 22:07:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 22:07:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) 22:07:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:07:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) setresuid(0x0, 0x0, 0x0) [ 777.221053] FAULT_INJECTION: forcing a failure. [ 777.221053] name failslab, interval 1, probability 0, space 0, times 0 [ 777.222866] CPU: 0 PID: 7865 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 777.223877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.225101] Call Trace: [ 777.225503] dump_stack+0x107/0x167 [ 777.226050] should_fail.cold+0x5/0xa [ 777.226629] ? create_object.isra.0+0x3a/0xa20 [ 777.227311] should_failslab+0x5/0x20 [ 777.227877] kmem_cache_alloc+0x5b/0x310 [ 777.228491] create_object.isra.0+0x3a/0xa20 [ 777.229149] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 777.229965] kmem_cache_alloc+0x159/0x310 [ 777.230590] prepare_creds+0x25/0x5e0 [ 777.231231] prepare_exec_creds+0xd/0x260 [ 777.231848] bprm_execve+0x18f/0x1a60 [ 777.232415] ? acct_arg_size+0xe0/0xe0 [ 777.232990] ? downgrade_write+0x3a0/0x3a0 [ 777.233622] ? open_exec+0x70/0x70 [ 777.234148] ? memcpy+0x39/0x60 [ 777.234650] ? copy_string_kernel+0x3b6/0x450 [ 777.235322] do_execveat_common+0x772/0x8d0 [ 777.236163] ? bprm_execve+0x1a60/0x1a60 [ 777.236846] __x64_sys_execveat+0xed/0x140 [ 777.237478] do_syscall_64+0x33/0x40 [ 777.238027] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.238786] RIP: 0033:0x7f9509c8ab19 [ 777.239332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.242021] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.243151] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 777.244189] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.245223] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.246260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.247300] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 777.250584] FAULT_INJECTION: forcing a failure. [ 777.250584] name failslab, interval 1, probability 0, space 0, times 0 [ 777.252452] CPU: 0 PID: 7863 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 777.253525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.254129] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 777.254742] Call Trace: [ 777.254765] dump_stack+0x107/0x167 [ 777.256492] should_fail.cold+0x5/0xa [ 777.257056] ? dup_fd+0x89/0xcf0 [ 777.257561] should_failslab+0x5/0x20 [ 777.258120] kmem_cache_alloc+0x5b/0x310 [ 777.258727] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 777.259414] dup_fd+0x89/0xcf0 [ 777.259903] unshare_files+0x175/0x270 [ 777.260477] ? __ia32_sys_unshare+0x40/0x40 [ 777.261122] ? get_user_pages_remote+0x63/0x90 [ 777.261828] ? get_user_pages_remote+0x6c/0x90 [ 777.262505] bprm_execve+0xcb/0x1a60 [ 777.263113] ? acct_arg_size+0xe0/0xe0 [ 777.263684] ? downgrade_write+0x3a0/0x3a0 [ 777.264307] ? open_exec+0x70/0x70 [ 777.264831] ? memcpy+0x39/0x60 [ 777.265320] ? copy_string_kernel+0x3b6/0x450 [ 777.265985] do_execveat_common+0x772/0x8d0 [ 777.266629] ? bprm_execve+0x1a60/0x1a60 [ 777.267245] __x64_sys_execveat+0xed/0x140 [ 777.267872] do_syscall_64+0x33/0x40 [ 777.268424] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.269172] RIP: 0033:0x7f6383eb9b19 [ 777.269719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.272393] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.273511] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 777.274550] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.275598] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.276637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.277678] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 777.281442] FAULT_INJECTION: forcing a failure. [ 777.281442] name failslab, interval 1, probability 0, space 0, times 0 [ 777.283122] CPU: 1 PID: 7873 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 777.284125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.285339] Call Trace: [ 777.285736] dump_stack+0x107/0x167 [ 777.286275] should_fail.cold+0x5/0xa [ 777.286852] ? create_object.isra.0+0x3a/0xa20 [ 777.287529] should_failslab+0x5/0x20 [ 777.288092] kmem_cache_alloc+0x5b/0x310 [ 777.288702] create_object.isra.0+0x3a/0xa20 [ 777.289356] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 777.290108] kmem_cache_alloc+0x159/0x310 [ 777.290730] __anon_vma_prepare+0x62/0x500 [ 777.291354] ? __pte_alloc+0x194/0x330 [ 777.291936] handle_mm_fault+0x2b2d/0x3500 [ 777.292570] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 777.293337] ? SOFTIRQ_verbose+0x10/0x10 [ 777.293938] ? __pmd_alloc+0x5e0/0x5e0 [ 777.294537] __get_user_pages+0x6ec/0x1620 [ 777.295180] ? follow_page_mask+0x1900/0x1900 [ 777.295847] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 777.296547] __get_user_pages_remote+0x1d5/0x870 [ 777.297250] ? lock_downgrade+0x6d0/0x6d0 [ 777.297862] get_user_pages_remote+0x63/0x90 [ 777.298521] get_arg_page+0xba/0x200 [ 777.299084] ? acct_arg_size+0xe0/0xe0 [ 777.299659] ? downgrade_write+0x3a0/0x3a0 [ 777.300278] ? count.constprop.0+0x1b3/0x290 [ 777.300939] copy_string_kernel+0x1b4/0x450 [ 777.301585] do_execveat_common+0x525/0x8d0 [ 777.302227] ? bprm_execve+0x1a60/0x1a60 [ 777.302850] __x64_sys_execveat+0xed/0x140 [ 777.303480] do_syscall_64+0x33/0x40 [ 777.304030] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.304786] RIP: 0033:0x7f2f4d86bb19 [ 777.305337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.308041] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.309155] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 777.310203] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.311263] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.311507] FAULT_INJECTION: forcing a failure. [ 777.311507] name failslab, interval 1, probability 0, space 0, times 0 [ 777.312312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.312323] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 777.316482] CPU: 0 PID: 7869 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 777.317484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.318809] Call Trace: [ 777.319202] dump_stack+0x107/0x167 [ 777.319740] should_fail.cold+0x5/0xa [ 777.320299] ? dup_fd+0x89/0xcf0 [ 777.320804] should_failslab+0x5/0x20 [ 777.321365] kmem_cache_alloc+0x5b/0x310 [ 777.321965] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 777.322661] dup_fd+0x89/0xcf0 [ 777.323150] unshare_files+0x175/0x270 [ 777.323725] ? __ia32_sys_unshare+0x40/0x40 [ 777.324363] ? get_user_pages_remote+0x63/0x90 [ 777.325009] ? get_user_pages_remote+0x6c/0x90 [ 777.325685] bprm_execve+0xcb/0x1a60 [ 777.326235] ? acct_arg_size+0xe0/0xe0 [ 777.326819] ? downgrade_write+0x3a0/0x3a0 [ 777.327444] ? open_exec+0x70/0x70 [ 777.327971] ? memcpy+0x39/0x60 [ 777.328462] ? copy_string_kernel+0x3b6/0x450 [ 777.329130] do_execveat_common+0x772/0x8d0 [ 777.329776] ? bprm_execve+0x1a60/0x1a60 [ 777.330390] __x64_sys_execveat+0xed/0x140 [ 777.331022] do_syscall_64+0x33/0x40 [ 777.331569] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.332323] RIP: 0033:0x7f70da682b19 [ 777.332860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.335548] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.336664] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 777.337706] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.338755] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.339795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.340834] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 777.344915] FAULT_INJECTION: forcing a failure. [ 777.344915] name failslab, interval 1, probability 0, space 0, times 0 [ 777.346694] CPU: 0 PID: 7867 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 777.347706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.348923] Call Trace: [ 777.349321] dump_stack+0x107/0x167 [ 777.349863] should_fail.cold+0x5/0xa [ 777.350431] ? alloc_bprm+0x51/0x8f0 [ 777.350993] should_failslab+0x5/0x20 [ 777.351565] kmem_cache_alloc_trace+0x55/0x320 [ 777.352242] ? lock_downgrade+0x6d0/0x6d0 [ 777.352860] alloc_bprm+0x51/0x8f0 [ 777.353387] ? __virt_addr_valid+0x170/0x5c0 [ 777.354037] do_execveat_common+0x275/0x8d0 [ 777.354695] ? strncpy_from_user+0x9e/0x470 [ 777.355335] ? bprm_execve+0x1a60/0x1a60 [ 777.355955] __x64_sys_execveat+0xed/0x140 [ 777.356589] do_syscall_64+0x33/0x40 [ 777.357144] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.357907] RIP: 0033:0x7f2243400b19 [ 777.358463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.361140] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.362270] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 777.363328] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.364385] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.365441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.366492] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 777.368835] FAULT_INJECTION: forcing a failure. [ 777.368835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.370814] CPU: 0 PID: 7877 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 777.371928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.373137] Call Trace: [ 777.373530] dump_stack+0x107/0x167 [ 777.374075] should_fail.cold+0x5/0xa [ 777.374653] __alloc_pages_nodemask+0x182/0x600 [ 777.375345] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 777.376222] ? find_held_lock+0x2c/0x110 [ 777.376835] ? __pmd_alloc+0x2db/0x5e0 [ 777.377413] ? lock_downgrade+0x6d0/0x6d0 [ 777.378030] ? do_raw_spin_lock+0x121/0x260 [ 777.378686] alloc_pages_current+0x187/0x280 [ 777.379339] pte_alloc_one+0x16/0x1a0 [ 777.379903] __pte_alloc+0x1d/0x330 [ 777.380446] handle_mm_fault+0x287f/0x3500 [ 777.381079] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 777.381849] ? SOFTIRQ_verbose+0x10/0x10 [ 777.382451] ? __pmd_alloc+0x5e0/0x5e0 [ 777.383328] __get_user_pages+0x6ec/0x1620 [ 777.384121] ? follow_page_mask+0x1900/0x1900 [ 777.384922] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 777.385794] __get_user_pages_remote+0x1d5/0x870 [ 777.386664] ? lock_downgrade+0x6d0/0x6d0 [ 777.387342] get_user_pages_remote+0x63/0x90 [ 777.387989] get_arg_page+0xba/0x200 [ 777.388558] ? acct_arg_size+0xe0/0xe0 [ 777.389131] ? downgrade_write+0x3a0/0x3a0 [ 777.389762] ? count.constprop.0+0x1b3/0x290 [ 777.390426] copy_string_kernel+0x1b4/0x450 [ 777.391088] do_execveat_common+0x525/0x8d0 [ 777.391740] ? bprm_execve+0x1a60/0x1a60 [ 777.392394] __x64_sys_execveat+0xed/0x140 [ 777.393020] do_syscall_64+0x33/0x40 [ 777.393723] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.394488] RIP: 0033:0x7f1c8836fb19 [ 777.395057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:07:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) [ 777.397740] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.399060] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 777.400125] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.401189] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.402237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.403295] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 22:07:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) [ 777.467466] FAULT_INJECTION: forcing a failure. [ 777.467466] name failslab, interval 1, probability 0, space 0, times 0 [ 777.469220] CPU: 0 PID: 7883 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 777.470238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.471471] Call Trace: [ 777.471868] dump_stack+0x107/0x167 [ 777.472440] should_fail.cold+0x5/0xa [ 777.473005] ? create_object.isra.0+0x3a/0xa20 [ 777.473697] should_failslab+0x5/0x20 [ 777.474277] kmem_cache_alloc+0x5b/0x310 [ 777.474896] create_object.isra.0+0x3a/0xa20 [ 777.475567] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 777.476333] kmem_cache_alloc+0x159/0x310 [ 777.476953] dup_fd+0x89/0xcf0 [ 777.477458] unshare_files+0x175/0x270 [ 777.478032] ? __ia32_sys_unshare+0x40/0x40 [ 777.478694] ? get_user_pages_remote+0x63/0x90 [ 777.479383] ? get_user_pages_remote+0x6c/0x90 [ 777.480056] bprm_execve+0xcb/0x1a60 [ 777.480639] ? acct_arg_size+0xe0/0xe0 [ 777.481225] ? downgrade_write+0x3a0/0x3a0 [ 777.481858] ? open_exec+0x70/0x70 [ 777.482393] ? memcpy+0x39/0x60 [ 777.482901] ? copy_string_kernel+0x3b6/0x450 [ 777.483585] do_execveat_common+0x772/0x8d0 [ 777.484255] ? bprm_execve+0x1a60/0x1a60 [ 777.484867] __x64_sys_execveat+0xed/0x140 [ 777.485513] do_syscall_64+0x33/0x40 [ 777.486058] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.486833] RIP: 0033:0x7f6383eb9b19 [ 777.487390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.488911] FAULT_INJECTION: forcing a failure. [ 777.488911] name failslab, interval 1, probability 0, space 0, times 0 [ 777.490043] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.490065] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 777.490076] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.490091] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.490114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.496964] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 777.498058] CPU: 1 PID: 7885 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 777.499066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.500270] Call Trace: [ 777.500661] dump_stack+0x107/0x167 [ 777.501197] should_fail.cold+0x5/0xa [ 777.501759] ? create_object.isra.0+0x3a/0xa20 [ 777.502437] should_failslab+0x5/0x20 [ 777.503006] kmem_cache_alloc+0x5b/0x310 [ 777.503608] create_object.isra.0+0x3a/0xa20 [ 777.504251] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 777.505004] kmem_cache_alloc+0x159/0x310 [ 777.505620] dup_fd+0x89/0xcf0 [ 777.506109] unshare_files+0x175/0x270 [ 777.506689] ? __ia32_sys_unshare+0x40/0x40 [ 777.507324] ? get_user_pages_remote+0x63/0x90 [ 777.507987] ? get_user_pages_remote+0x6c/0x90 [ 777.508657] bprm_execve+0xcb/0x1a60 [ 777.509203] ? acct_arg_size+0xe0/0xe0 [ 777.509772] ? downgrade_write+0x3a0/0x3a0 [ 777.510393] ? open_exec+0x70/0x70 [ 777.510926] ? memcpy+0x39/0x60 [ 777.511415] ? copy_string_kernel+0x3b6/0x450 [ 777.512082] do_execveat_common+0x772/0x8d0 [ 777.512721] ? bprm_execve+0x1a60/0x1a60 [ 777.513341] __x64_sys_execveat+0xed/0x140 [ 777.513965] do_syscall_64+0x33/0x40 [ 777.514510] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 777.515269] RIP: 0033:0x7f70da682b19 [ 777.515820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.518502] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 777.519619] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 777.520659] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 777.521696] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.522740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.523779] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:08:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 22:08:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:08:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 22:08:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 22:08:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) setresuid(0x0, 0x0, 0x0) 22:08:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 22:08:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 22:08:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) [ 791.567671] FAULT_INJECTION: forcing a failure. [ 791.567671] name failslab, interval 1, probability 0, space 0, times 0 [ 791.569020] CPU: 0 PID: 7897 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 791.569793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.570733] Call Trace: [ 791.571053] dump_stack+0x107/0x167 [ 791.571470] should_fail.cold+0x5/0xa [ 791.571918] ? create_object.isra.0+0x3a/0xa20 [ 791.572447] should_failslab+0x5/0x20 [ 791.572885] kmem_cache_alloc+0x5b/0x310 [ 791.573349] create_object.isra.0+0x3a/0xa20 [ 791.573851] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.574433] kmem_cache_alloc_trace+0x151/0x320 [ 791.574967] ? lock_downgrade+0x6d0/0x6d0 [ 791.575354] alloc_bprm+0x51/0x8f0 [ 791.575767] ? __virt_addr_valid+0x170/0x5c0 [ 791.576262] do_execveat_common+0x275/0x8d0 [ 791.576752] ? strncpy_from_user+0x9e/0x470 [ 791.577240] ? bprm_execve+0x1a60/0x1a60 [ 791.577718] __x64_sys_execveat+0xed/0x140 [ 791.578191] do_syscall_64+0x33/0x40 [ 791.578611] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.579204] RIP: 0033:0x7f2243400b19 [ 791.579625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.581706] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.582342] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 791.583146] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.583956] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.584752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.585563] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 791.588440] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 791.606713] FAULT_INJECTION: forcing a failure. [ 791.606713] name failslab, interval 1, probability 0, space 0, times 0 [ 791.608566] CPU: 1 PID: 7901 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 791.609584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.610821] Call Trace: [ 791.611221] dump_stack+0x107/0x167 [ 791.611807] should_fail.cold+0x5/0xa [ 791.612375] ? create_object.isra.0+0x3a/0xa20 [ 791.613042] should_failslab+0x5/0x20 [ 791.613597] kmem_cache_alloc+0x5b/0x310 [ 791.614201] create_object.isra.0+0x3a/0xa20 [ 791.614856] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.615593] kmem_cache_alloc+0x159/0x310 [ 791.616222] __anon_vma_prepare+0x62/0x500 [ 791.616852] ? __pte_alloc+0x194/0x330 [ 791.617426] handle_mm_fault+0x2b2d/0x3500 [ 791.618056] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 791.618834] ? SOFTIRQ_verbose+0x10/0x10 [ 791.619431] ? __pmd_alloc+0x5e0/0x5e0 [ 791.620024] __get_user_pages+0x6ec/0x1620 [ 791.620654] ? follow_page_mask+0x1900/0x1900 [ 791.621315] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 791.622023] __get_user_pages_remote+0x1d5/0x870 [ 791.622700] ? lock_downgrade+0x6d0/0x6d0 [ 791.623330] get_user_pages_remote+0x63/0x90 [ 791.623978] get_arg_page+0xba/0x200 [ 791.624524] ? acct_arg_size+0xe0/0xe0 [ 791.625097] ? downgrade_write+0x3a0/0x3a0 [ 791.625725] ? count.constprop.0+0x1b3/0x290 [ 791.626382] copy_string_kernel+0x1b4/0x450 [ 791.627035] do_execveat_common+0x525/0x8d0 [ 791.627677] ? bprm_execve+0x1a60/0x1a60 [ 791.628299] __x64_sys_execveat+0xed/0x140 [ 791.628910] do_syscall_64+0x33/0x40 [ 791.629464] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.630223] RIP: 0033:0x7f2f4d86bb19 [ 791.630784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.633519] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.634646] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 791.635726] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.636797] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.637872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.638960] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 791.644806] FAULT_INJECTION: forcing a failure. [ 791.644806] name failslab, interval 1, probability 0, space 0, times 0 [ 791.646489] CPU: 1 PID: 7905 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 791.647537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.647752] FAULT_INJECTION: forcing a failure. [ 791.647752] name failslab, interval 1, probability 0, space 0, times 0 [ 791.648796] Call Trace: [ 791.648815] dump_stack+0x107/0x167 [ 791.648834] should_fail.cold+0x5/0xa [ 791.648860] ? alloc_fdtable+0x84/0x280 [ 791.652565] should_failslab+0x5/0x20 [ 791.653151] kmem_cache_alloc_trace+0x55/0x320 [ 791.653854] ? rwlock_bug.part.0+0x90/0x90 [ 791.654533] alloc_fdtable+0x84/0x280 [ 791.655152] dup_fd+0x74d/0xcf0 [ 791.655674] unshare_files+0x175/0x270 [ 791.656271] ? __ia32_sys_unshare+0x40/0x40 [ 791.656933] ? get_user_pages_remote+0x63/0x90 [ 791.657629] ? get_user_pages_remote+0x6c/0x90 [ 791.658332] bprm_execve+0xcb/0x1a60 [ 791.658913] ? acct_arg_size+0xe0/0xe0 [ 791.659506] ? downgrade_write+0x3a0/0x3a0 [ 791.660156] ? open_exec+0x70/0x70 [ 791.660701] ? memcpy+0x39/0x60 [ 791.661209] ? copy_string_kernel+0x3b6/0x450 [ 791.661904] do_execveat_common+0x772/0x8d0 [ 791.662567] ? bprm_execve+0x1a60/0x1a60 [ 791.663213] __x64_sys_execveat+0xed/0x140 [ 791.663860] do_syscall_64+0x33/0x40 [ 791.664428] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.665229] RIP: 0033:0x7f70da682b19 [ 791.665799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.668603] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.669767] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 791.670858] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.671944] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.673027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.674110] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 791.675234] CPU: 0 PID: 7908 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 791.676236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.677435] Call Trace: [ 791.677837] dump_stack+0x107/0x167 [ 791.678381] should_fail.cold+0x5/0xa [ 791.678962] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 791.679732] should_failslab+0x5/0x20 [ 791.680295] __kmalloc_node+0x76/0x420 [ 791.680873] ? lock_downgrade+0x6d0/0x6d0 [ 791.681490] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 791.682238] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 791.682976] ? trace_hardirqs_on+0x5b/0x180 [ 791.683613] __kmalloc_node+0x1c6/0x420 [ 791.684208] kvmalloc_node+0x119/0x170 [ 791.684785] alloc_fdtable+0x13f/0x280 [ 791.685360] dup_fd+0x74d/0xcf0 [ 791.685864] unshare_files+0x175/0x270 [ 791.686439] ? __ia32_sys_unshare+0x40/0x40 [ 791.687089] ? get_user_pages_remote+0x63/0x90 [ 791.687759] ? get_user_pages_remote+0x6c/0x90 [ 791.688437] bprm_execve+0xcb/0x1a60 [ 791.688989] ? acct_arg_size+0xe0/0xe0 [ 791.689563] ? downgrade_write+0x3a0/0x3a0 [ 791.690186] ? open_exec+0x70/0x70 [ 791.690714] ? memcpy+0x39/0x60 [ 791.691215] ? copy_string_kernel+0x3b6/0x450 [ 791.691884] do_execveat_common+0x772/0x8d0 [ 791.692521] ? bprm_execve+0x1a60/0x1a60 [ 791.693132] __x64_sys_execveat+0xed/0x140 [ 791.693756] do_syscall_64+0x33/0x40 [ 791.694303] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.695083] RIP: 0033:0x7f9509c8ab19 [ 791.695633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.696664] FAULT_INJECTION: forcing a failure. [ 791.696664] name failslab, interval 1, probability 0, space 0, times 0 [ 791.698247] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.698270] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 791.698290] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.703050] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.704071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.705094] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 791.706147] CPU: 1 PID: 7912 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 791.707217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.708481] Call Trace: [ 791.708886] dump_stack+0x107/0x167 [ 791.709447] should_fail.cold+0x5/0xa [ 791.710031] ? ptlock_alloc+0x1d/0x70 [ 791.710618] should_failslab+0x5/0x20 [ 791.711208] kmem_cache_alloc+0x5b/0x310 [ 791.711837] ptlock_alloc+0x1d/0x70 [ 791.712398] pte_alloc_one+0x68/0x1a0 [ 791.712981] __pte_alloc+0x1d/0x330 [ 791.713544] handle_mm_fault+0x287f/0x3500 [ 791.714199] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 791.715012] ? SOFTIRQ_verbose+0x10/0x10 [ 791.715635] ? __pmd_alloc+0x5e0/0x5e0 [ 791.716256] __get_user_pages+0x6ec/0x1620 [ 791.716918] ? follow_page_mask+0x1900/0x1900 [ 791.717605] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 791.718332] __get_user_pages_remote+0x1d5/0x870 [ 791.719065] ? lock_downgrade+0x6d0/0x6d0 [ 791.719707] get_user_pages_remote+0x63/0x90 [ 791.720391] get_arg_page+0xba/0x200 [ 791.720963] ? acct_arg_size+0xe0/0xe0 [ 791.721556] ? downgrade_write+0x3a0/0x3a0 [ 791.722203] ? count.constprop.0+0x1b3/0x290 [ 791.722893] copy_string_kernel+0x1b4/0x450 [ 791.723564] do_execveat_common+0x525/0x8d0 [ 791.724228] ? bprm_execve+0x1a60/0x1a60 [ 791.724868] __x64_sys_execveat+0xed/0x140 [ 791.725517] do_syscall_64+0x33/0x40 [ 791.726089] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.726881] RIP: 0033:0x7f1c8836fb19 [ 791.727451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.730234] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.731401] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 791.732484] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.733571] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.734654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.735746] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 791.739881] FAULT_INJECTION: forcing a failure. [ 791.739881] name failslab, interval 1, probability 0, space 0, times 0 [ 791.741633] CPU: 1 PID: 7904 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 791.742675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.743944] Call Trace: [ 791.744351] dump_stack+0x107/0x167 [ 791.744913] should_fail.cold+0x5/0xa [ 791.745541] ? create_object.isra.0+0x3a/0xa20 [ 791.746245] should_failslab+0x5/0x20 [ 791.746837] kmem_cache_alloc+0x5b/0x310 [ 791.747465] create_object.isra.0+0x3a/0xa20 [ 791.748139] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.748923] kmem_cache_alloc+0x159/0x310 [ 791.749563] dup_fd+0x89/0xcf0 [ 791.750072] unshare_files+0x175/0x270 [ 791.750669] ? __ia32_sys_unshare+0x40/0x40 [ 791.751343] ? get_user_pages_remote+0x63/0x90 [ 791.752043] ? get_user_pages_remote+0x6c/0x90 [ 791.752747] bprm_execve+0xcb/0x1a60 [ 791.753320] ? acct_arg_size+0xe0/0xe0 [ 791.753917] ? downgrade_write+0x3a0/0x3a0 [ 791.754568] ? open_exec+0x70/0x70 [ 791.755122] ? memcpy+0x39/0x60 [ 791.755631] ? copy_string_kernel+0x3b6/0x450 [ 791.756329] do_execveat_common+0x772/0x8d0 [ 791.756993] ? bprm_execve+0x1a60/0x1a60 [ 791.757632] __x64_sys_execveat+0xed/0x140 [ 791.758289] do_syscall_64+0x33/0x40 [ 791.758865] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.759645] RIP: 0033:0x7f6383eb9b19 [ 791.760213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.763008] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.764170] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 791.765258] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.766342] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.767458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.768543] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:08:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 22:08:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, 0x0) 22:08:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) setresuid(0x0, 0x0, 0x0) 22:08:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 22:08:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) [ 791.835877] FAULT_INJECTION: forcing a failure. [ 791.835877] name failslab, interval 1, probability 0, space 0, times 0 [ 791.838832] CPU: 0 PID: 7917 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 791.839865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.841227] Call Trace: [ 791.841642] dump_stack+0x107/0x167 [ 791.842201] should_fail.cold+0x5/0xa [ 791.842795] ? mm_alloc+0x19/0xd0 [ 791.843336] should_failslab+0x5/0x20 [ 791.843918] kmem_cache_alloc+0x5b/0x310 [ 791.844540] ? kasan_unpoison_shadow+0x33/0x50 [ 791.845234] mm_alloc+0x19/0xd0 [ 791.845742] alloc_bprm+0x1cb/0x8f0 [ 791.846297] ? __virt_addr_valid+0x170/0x5c0 [ 791.846987] do_execveat_common+0x275/0x8d0 [ 791.847647] ? strncpy_from_user+0x9e/0x470 [ 791.848304] ? bprm_execve+0x1a60/0x1a60 [ 791.848940] __x64_sys_execveat+0xed/0x140 [ 791.849588] do_syscall_64+0x33/0x40 [ 791.850156] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.850935] RIP: 0033:0x7f2243400b19 [ 791.851501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.854218] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.855367] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 791.856443] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.857507] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.858571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.859644] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 791.916730] FAULT_INJECTION: forcing a failure. [ 791.916730] name failslab, interval 1, probability 0, space 0, times 0 [ 791.918529] CPU: 0 PID: 7926 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 791.919661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.920822] Call Trace: [ 791.921213] dump_stack+0x107/0x167 [ 791.921742] should_fail.cold+0x5/0xa [ 791.922294] ? create_object.isra.0+0x3a/0xa20 [ 791.922958] should_failslab+0x5/0x20 [ 791.923511] kmem_cache_alloc+0x5b/0x310 [ 791.924101] create_object.isra.0+0x3a/0xa20 [ 791.924739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.925691] __kmalloc+0x16e/0x390 [ 791.926273] security_prepare_creds+0x112/0x190 [ 791.927153] prepare_creds+0x452/0x5e0 [ 791.927728] prepare_exec_creds+0xd/0x260 [ 791.928497] bprm_execve+0x18f/0x1a60 [ 791.929052] ? acct_arg_size+0xe0/0xe0 [ 791.929612] ? downgrade_write+0x3a0/0x3a0 [ 791.930414] ? open_exec+0x70/0x70 [ 791.930945] ? memcpy+0x39/0x60 [ 791.931422] ? copy_string_kernel+0x3b6/0x450 [ 791.932276] do_execveat_common+0x772/0x8d0 [ 791.932910] ? bprm_execve+0x1a60/0x1a60 [ 791.933679] __x64_sys_execveat+0xed/0x140 [ 791.934289] do_syscall_64+0x33/0x40 [ 791.934841] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.935567] RIP: 0033:0x7f9509c8ab19 [ 791.936259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.938827] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 791.940248] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 791.941247] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 791.942258] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 791.943271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.944274] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 791.975710] FAULT_INJECTION: forcing a failure. [ 791.975710] name failslab, interval 1, probability 0, space 0, times 0 [ 791.977633] CPU: 0 PID: 7925 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 791.978609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 791.979806] Call Trace: [ 791.980193] dump_stack+0x107/0x167 [ 791.980720] should_fail.cold+0x5/0xa [ 791.981272] ? create_object.isra.0+0x3a/0xa20 [ 791.981926] should_failslab+0x5/0x20 [ 791.982475] kmem_cache_alloc+0x5b/0x310 [ 791.983081] create_object.isra.0+0x3a/0xa20 [ 791.983726] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 791.984460] kmem_cache_alloc_trace+0x151/0x320 [ 791.985127] ? rwlock_bug.part.0+0x90/0x90 [ 791.985923] alloc_fdtable+0x84/0x280 [ 791.986480] dup_fd+0x74d/0xcf0 [ 791.987123] unshare_files+0x175/0x270 [ 791.987694] ? __ia32_sys_unshare+0x40/0x40 [ 791.988321] ? get_user_pages_remote+0x63/0x90 [ 791.989167] ? get_user_pages_remote+0x6c/0x90 [ 791.989900] bprm_execve+0xcb/0x1a60 [ 791.990444] ? acct_arg_size+0xe0/0xe0 [ 791.991015] ? downgrade_write+0x3a0/0x3a0 [ 791.991625] ? open_exec+0x70/0x70 [ 791.992136] ? memcpy+0x39/0x60 [ 791.992615] ? copy_string_kernel+0x3b6/0x450 [ 791.993265] do_execveat_common+0x772/0x8d0 [ 791.994077] ? bprm_execve+0x1a60/0x1a60 [ 791.994745] __x64_sys_execveat+0xed/0x140 [ 791.995381] do_syscall_64+0x33/0x40 [ 791.995920] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 791.996647] RIP: 0033:0x7f70da682b19 [ 791.997180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 791.999755] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 792.000833] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 792.001844] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.002859] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.003865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 792.004874] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:08:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 22:08:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 22:08:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 22:08:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 792.096095] FAULT_INJECTION: forcing a failure. [ 792.096095] name failslab, interval 1, probability 0, space 0, times 0 [ 792.097791] CPU: 1 PID: 7932 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 792.098798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 792.099995] Call Trace: [ 792.100389] dump_stack+0x107/0x167 [ 792.100922] should_fail.cold+0x5/0xa [ 792.101481] ? create_object.isra.0+0x3a/0xa20 [ 792.102149] should_failslab+0x5/0x20 [ 792.102705] kmem_cache_alloc+0x5b/0x310 [ 792.103306] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 792.104181] create_object.isra.0+0x3a/0xa20 [ 792.104824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 792.105566] kmem_cache_alloc+0x159/0x310 [ 792.106184] ptlock_alloc+0x1d/0x70 [ 792.106717] pte_alloc_one+0x68/0x1a0 [ 792.107280] __pte_alloc+0x1d/0x330 [ 792.107818] handle_mm_fault+0x287f/0x3500 [ 792.108445] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 792.109208] ? SOFTIRQ_verbose+0x10/0x10 [ 792.109806] ? __pmd_alloc+0x5e0/0x5e0 [ 792.110397] __get_user_pages+0x6ec/0x1620 [ 792.111014] FAULT_INJECTION: forcing a failure. [ 792.111014] name failslab, interval 1, probability 0, space 0, times 0 [ 792.112615] ? follow_page_mask+0x1900/0x1900 [ 792.113273] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 792.113967] __get_user_pages_remote+0x1d5/0x870 [ 792.114657] ? lock_downgrade+0x6d0/0x6d0 [ 792.115277] get_user_pages_remote+0x63/0x90 [ 792.115924] get_arg_page+0xba/0x200 [ 792.116471] ? acct_arg_size+0xe0/0xe0 [ 792.117035] ? downgrade_write+0x3a0/0x3a0 [ 792.117655] ? count.constprop.0+0x1b3/0x290 [ 792.118302] copy_string_kernel+0x1b4/0x450 [ 792.118943] do_execveat_common+0x525/0x8d0 [ 792.119579] ? bprm_execve+0x1a60/0x1a60 [ 792.120185] __x64_sys_execveat+0xed/0x140 [ 792.120814] do_syscall_64+0x33/0x40 [ 792.121360] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 792.122101] RIP: 0033:0x7f1c8836fb19 [ 792.122649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 792.125292] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 792.126395] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 792.127434] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.128466] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.129495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 792.130529] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 792.131603] CPU: 0 PID: 7934 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 792.132604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 792.133767] Call Trace: [ 792.134152] dump_stack+0x107/0x167 [ 792.134672] should_fail.cold+0x5/0xa [ 792.135231] ? create_object.isra.0+0x3a/0xa20 [ 792.135876] should_failslab+0x5/0x20 [ 792.136419] kmem_cache_alloc+0x5b/0x310 [ 792.136996] create_object.isra.0+0x3a/0xa20 [ 792.137623] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 792.138347] kmem_cache_alloc_trace+0x151/0x320 [ 792.139021] ? rwlock_bug.part.0+0x90/0x90 [ 792.139628] alloc_fdtable+0x84/0x280 [ 792.140161] dup_fd+0x74d/0xcf0 [ 792.140649] unshare_files+0x175/0x270 [ 792.141201] ? __ia32_sys_unshare+0x40/0x40 [ 792.141815] ? get_user_pages_remote+0x63/0x90 [ 792.142457] ? get_user_pages_remote+0x6c/0x90 [ 792.143117] bprm_execve+0xcb/0x1a60 [ 792.143649] ? acct_arg_size+0xe0/0xe0 [ 792.144197] ? downgrade_write+0x3a0/0x3a0 [ 792.144799] ? open_exec+0x70/0x70 [ 792.145308] ? memcpy+0x39/0x60 [ 792.145779] ? copy_string_kernel+0x3b6/0x450 [ 792.146420] do_execveat_common+0x772/0x8d0 [ 792.147037] ? bprm_execve+0x1a60/0x1a60 [ 792.147632] __x64_sys_execveat+0xed/0x140 [ 792.148236] do_syscall_64+0x33/0x40 [ 792.148763] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 792.149470] RIP: 0033:0x7f6383eb9b19 [ 792.149994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 792.152498] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 22:08:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) 22:08:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) setresuid(0x0, 0x0, 0x0) [ 792.153573] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 792.154957] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.156286] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.157341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 792.158351] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:08:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 792.226350] FAULT_INJECTION: forcing a failure. [ 792.226350] name failslab, interval 1, probability 0, space 0, times 0 [ 792.227983] CPU: 0 PID: 7938 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 792.228938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 792.230087] Call Trace: [ 792.230581] dump_stack+0x107/0x167 [ 792.231114] should_fail.cold+0x5/0xa [ 792.231656] ? create_object.isra.0+0x3a/0xa20 [ 792.232505] should_failslab+0x5/0x20 [ 792.233098] kmem_cache_alloc+0x5b/0x310 [ 792.233864] create_object.isra.0+0x3a/0xa20 [ 792.234494] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 792.235456] kmem_cache_alloc+0x159/0x310 [ 792.236110] __anon_vma_prepare+0x270/0x500 [ 792.236930] ? __pte_alloc+0x194/0x330 [ 792.237498] handle_mm_fault+0x2b2d/0x3500 [ 792.238297] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 792.239115] ? SOFTIRQ_verbose+0x10/0x10 [ 792.239696] ? __pmd_alloc+0x5e0/0x5e0 [ 792.240453] __get_user_pages+0x6ec/0x1620 [ 792.241076] ? follow_page_mask+0x1900/0x1900 [ 792.241918] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 792.242645] __get_user_pages_remote+0x1d5/0x870 [ 792.243552] ? lock_downgrade+0x6d0/0x6d0 [ 792.244198] get_user_pages_remote+0x63/0x90 [ 792.245018] get_arg_page+0xba/0x200 [ 792.245608] ? acct_arg_size+0xe0/0xe0 [ 792.246323] ? downgrade_write+0x3a0/0x3a0 [ 792.246959] ? count.constprop.0+0x1b3/0x290 [ 792.247794] copy_string_kernel+0x1b4/0x450 [ 792.248426] do_execveat_common+0x525/0x8d0 [ 792.249245] ? bprm_execve+0x1a60/0x1a60 [ 792.249850] __x64_sys_execveat+0xed/0x140 [ 792.250458] do_syscall_64+0x33/0x40 [ 792.251168] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 792.251889] RIP: 0033:0x7f2f4d86bb19 [ 792.252580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 792.255158] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 792.256549] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 792.257542] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.258542] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.259568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 792.260568] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 792.273669] FAULT_INJECTION: forcing a failure. [ 792.273669] name failslab, interval 1, probability 0, space 0, times 0 [ 792.275659] CPU: 0 PID: 7942 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 792.276951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 792.278490] Call Trace: [ 792.278921] dump_stack+0x107/0x167 [ 792.279606] should_fail.cold+0x5/0xa [ 792.280165] ? __alloc_file+0x21/0x320 [ 792.280885] should_failslab+0x5/0x20 [ 792.281476] kmem_cache_alloc+0x5b/0x310 [ 792.282240] ? kernel_text_address+0xf2/0x120 [ 792.282906] __alloc_file+0x21/0x320 [ 792.283604] alloc_empty_file+0x6d/0x170 [ 792.284181] path_openat+0xe3/0x26e0 [ 792.284891] ? lock_chain_count+0x20/0x20 [ 792.285661] ? stack_trace_save+0x8c/0xc0 [ 792.286300] ? stack_trace_consume_entry+0x160/0x160 [ 792.287262] ? path_lookupat+0x860/0x860 [ 792.287844] ? kasan_save_stack+0x32/0x40 [ 792.288593] ? kasan_save_stack+0x1b/0x40 [ 792.289180] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 792.290103] ? security_prepare_creds+0x112/0x190 [ 792.290855] ? prepare_creds+0x452/0x5e0 [ 792.291426] ? prepare_exec_creds+0xd/0x260 [ 792.292050] ? bprm_execve+0x18f/0x1a60 [ 792.292796] do_filp_open+0x190/0x3e0 [ 792.293341] ? may_open_dev+0xf0/0xf0 [ 792.294091] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 792.294849] ? SOFTIRQ_verbose+0x10/0x10 [ 792.295615] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 792.296419] ? find_held_lock+0x2c/0x110 [ 792.297176] do_open_execat+0x116/0x690 [ 792.297801] ? __do_sys_uselib+0x5e0/0x5e0 [ 792.298592] ? do_raw_spin_lock+0x121/0x260 [ 792.299225] ? rwlock_bug.part.0+0x90/0x90 [ 792.300028] bprm_execve+0x55e/0x1a60 [ 792.300640] ? open_exec+0x70/0x70 [ 792.301299] ? memcpy+0x39/0x60 [ 792.301787] ? copy_string_kernel+0x3b6/0x450 [ 792.302639] do_execveat_common+0x772/0x8d0 [ 792.303281] ? bprm_execve+0x1a60/0x1a60 [ 792.304056] __x64_sys_execveat+0xed/0x140 [ 792.304671] do_syscall_64+0x33/0x40 [ 792.305373] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 792.306086] RIP: 0033:0x7f9509c8ab19 [ 792.306804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 792.309338] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 792.310754] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 792.311826] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.312833] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.313836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 792.314846] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 792.331394] FAULT_INJECTION: forcing a failure. [ 792.331394] name failslab, interval 1, probability 0, space 0, times 0 [ 792.333201] CPU: 0 PID: 7947 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 792.334166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 792.335309] Call Trace: [ 792.335686] dump_stack+0x107/0x167 [ 792.336363] should_fail.cold+0x5/0xa [ 792.336907] ? create_object.isra.0+0x3a/0xa20 [ 792.337558] should_failslab+0x5/0x20 [ 792.338093] kmem_cache_alloc+0x5b/0x310 [ 792.338868] create_object.isra.0+0x3a/0xa20 [ 792.339494] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 792.340451] kmem_cache_alloc+0x159/0x310 [ 792.341047] mm_alloc+0x19/0xd0 [ 792.341670] alloc_bprm+0x1cb/0x8f0 [ 792.342185] ? __virt_addr_valid+0x170/0x5c0 [ 792.343025] do_execveat_common+0x275/0x8d0 [ 792.343650] ? strncpy_from_user+0x9e/0x470 [ 792.344462] ? bprm_execve+0x1a60/0x1a60 [ 792.345058] __x64_sys_execveat+0xed/0x140 [ 792.345854] do_syscall_64+0x33/0x40 [ 792.346433] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 792.347374] RIP: 0033:0x7f2243400b19 [ 792.347947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 792.351396] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 792.352460] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 792.353451] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 792.354463] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 792.355469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 792.356472] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:08:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 22:08:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:08:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) 22:08:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) setresuid(0x0, 0x0, 0x0) 22:08:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 22:08:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, 0x0) 22:08:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 22:08:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 807.510713] FAULT_INJECTION: forcing a failure. [ 807.510713] name failslab, interval 1, probability 0, space 0, times 0 [ 807.511758] CPU: 1 PID: 7964 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 807.512369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.513100] Call Trace: [ 807.513346] dump_stack+0x107/0x167 [ 807.513678] should_fail.cold+0x5/0xa [ 807.514021] ? kvmalloc_node+0x119/0x170 [ 807.514389] should_failslab+0x5/0x20 [ 807.514731] __kmalloc_node+0x76/0x420 [ 807.515095] kvmalloc_node+0x119/0x170 [ 807.515450] alloc_fdtable+0xd3/0x280 [ 807.515795] dup_fd+0x74d/0xcf0 [ 807.516101] unshare_files+0x175/0x270 [ 807.516456] ? __ia32_sys_unshare+0x40/0x40 [ 807.516848] ? get_user_pages_remote+0x63/0x90 [ 807.517264] ? get_user_pages_remote+0x6c/0x90 [ 807.517700] bprm_execve+0xcb/0x1a60 [ 807.518037] ? acct_arg_size+0xe0/0xe0 [ 807.518387] ? downgrade_write+0x3a0/0x3a0 [ 807.518770] ? open_exec+0x70/0x70 [ 807.519094] ? memcpy+0x39/0x60 [ 807.519368] FAULT_INJECTION: forcing a failure. [ 807.519368] name failslab, interval 1, probability 0, space 0, times 0 [ 807.519391] ? copy_string_kernel+0x3b6/0x450 [ 807.519412] do_execveat_common+0x772/0x8d0 [ 807.521770] ? bprm_execve+0x1a60/0x1a60 [ 807.522144] __x64_sys_execveat+0xed/0x140 [ 807.522523] do_syscall_64+0x33/0x40 [ 807.522859] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.523320] RIP: 0033:0x7f70da682b19 [ 807.523650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.525302] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.525993] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 807.526635] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.527280] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.527914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.528538] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 807.529195] CPU: 0 PID: 7969 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 807.530196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.531406] Call Trace: [ 807.531805] dump_stack+0x107/0x167 [ 807.532343] should_fail.cold+0x5/0xa [ 807.532907] ? kvmalloc_node+0x119/0x170 [ 807.533509] should_failslab+0x5/0x20 [ 807.534063] __kmalloc_node+0x76/0x420 [ 807.534650] kvmalloc_node+0x119/0x170 [ 807.535228] alloc_fdtable+0xd3/0x280 [ 807.535782] dup_fd+0x74d/0xcf0 [ 807.536277] unshare_files+0x175/0x270 [ 807.536845] ? __ia32_sys_unshare+0x40/0x40 [ 807.537480] ? get_user_pages_remote+0x63/0x90 [ 807.538138] ? get_user_pages_remote+0x6c/0x90 [ 807.538810] bprm_execve+0xcb/0x1a60 [ 807.539361] ? acct_arg_size+0xe0/0xe0 [ 807.539929] ? downgrade_write+0x3a0/0x3a0 [ 807.540545] ? open_exec+0x70/0x70 [ 807.541072] ? memcpy+0x39/0x60 [ 807.541557] ? copy_string_kernel+0x3b6/0x450 [ 807.542216] do_execveat_common+0x772/0x8d0 [ 807.542840] ? bprm_execve+0x1a60/0x1a60 [ 807.543459] __x64_sys_execveat+0xed/0x140 [ 807.544090] do_syscall_64+0x33/0x40 [ 807.544635] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.545376] RIP: 0033:0x7f6383eb9b19 [ 807.545929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.548561] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.549671] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 807.550706] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.551749] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.552786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.553821] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 807.564053] FAULT_INJECTION: forcing a failure. [ 807.564053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 807.564712] FAULT_INJECTION: forcing a failure. [ 807.564712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 807.565182] CPU: 1 PID: 7968 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 807.567365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.568083] Call Trace: [ 807.568319] dump_stack+0x107/0x167 [ 807.568638] should_fail.cold+0x5/0xa [ 807.568976] __alloc_pages_nodemask+0x182/0x600 [ 807.569384] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 807.569899] ? up_write+0x191/0x550 [ 807.570227] ? rwlock_bug.part.0+0x90/0x90 [ 807.570607] ? anon_vma_interval_tree_insert+0x277/0x450 [ 807.571103] alloc_pages_vma+0xbb/0x410 [ 807.571466] handle_mm_fault+0x152f/0x3500 [ 807.571842] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.572311] ? SOFTIRQ_verbose+0x10/0x10 [ 807.572678] ? __pmd_alloc+0x5e0/0x5e0 [ 807.573027] __get_user_pages+0x6ec/0x1620 [ 807.573407] ? follow_page_mask+0x1900/0x1900 [ 807.573802] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 807.574222] __get_user_pages_remote+0x1d5/0x870 [ 807.574632] ? lock_downgrade+0x6d0/0x6d0 [ 807.575006] get_user_pages_remote+0x63/0x90 [ 807.575394] get_arg_page+0xba/0x200 [ 807.575722] ? acct_arg_size+0xe0/0xe0 [ 807.576058] ? downgrade_write+0x3a0/0x3a0 [ 807.576428] ? count.constprop.0+0x1b3/0x290 [ 807.576819] copy_string_kernel+0x1b4/0x450 [ 807.577211] do_execveat_common+0x525/0x8d0 [ 807.577600] ? bprm_execve+0x1a60/0x1a60 [ 807.577962] __x64_sys_execveat+0xed/0x140 [ 807.578326] do_syscall_64+0x33/0x40 [ 807.578643] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.579118] RIP: 0033:0x7f2f4d86bb19 [ 807.579492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.581216] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.581862] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 807.582459] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.583071] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.583669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.584272] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 807.584894] CPU: 0 PID: 7967 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 807.585890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.587105] Call Trace: [ 807.587494] dump_stack+0x107/0x167 [ 807.588027] should_fail.cold+0x5/0xa [ 807.588590] __alloc_pages_nodemask+0x182/0x600 [ 807.589273] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.590034] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 807.590926] alloc_pages_current+0x187/0x280 [ 807.591586] __get_free_pages+0xc/0xa0 [ 807.592156] pgd_alloc+0x84/0x4e0 [ 807.592670] ? pgd_page_get_mm+0x40/0x40 [ 807.593266] ? lockdep_init_map_type+0x2c7/0x780 [ 807.593962] ? lockdep_init_map_type+0x2c7/0x780 [ 807.594662] mm_init+0x670/0xab0 [ 807.595179] mm_alloc+0xa2/0xd0 [ 807.595668] alloc_bprm+0x1cb/0x8f0 [ 807.596200] ? __virt_addr_valid+0x170/0x5c0 [ 807.596855] do_execveat_common+0x275/0x8d0 [ 807.597489] ? strncpy_from_user+0x9e/0x470 [ 807.598123] ? bprm_execve+0x1a60/0x1a60 [ 807.598734] __x64_sys_execveat+0xed/0x140 [ 807.599367] do_syscall_64+0x33/0x40 [ 807.599915] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.600662] RIP: 0033:0x7f2243400b19 [ 807.601215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.603889] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.605000] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 807.606036] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.607078] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.608121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 807.609157] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:08:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 22:08:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) setresuid(0x0, 0x0, 0x0) 22:08:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) [ 807.656771] FAULT_INJECTION: forcing a failure. [ 807.656771] name failslab, interval 1, probability 0, space 0, times 0 [ 807.658851] CPU: 0 PID: 7976 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 807.659869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.661087] Call Trace: [ 807.661483] dump_stack+0x107/0x167 [ 807.662016] should_fail.cold+0x5/0xa [ 807.662579] ? create_object.isra.0+0x3a/0xa20 [ 807.663303] should_failslab+0x5/0x20 [ 807.663855] kmem_cache_alloc+0x5b/0x310 [ 807.664455] create_object.isra.0+0x3a/0xa20 [ 807.665092] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.665835] kmem_cache_alloc+0x159/0x310 [ 807.666447] __alloc_file+0x21/0x320 [ 807.667002] alloc_empty_file+0x6d/0x170 [ 807.667626] path_openat+0xe3/0x26e0 [ 807.668177] ? lock_chain_count+0x20/0x20 [ 807.668780] ? stack_trace_save+0x8c/0xc0 [ 807.669388] ? stack_trace_consume_entry+0x160/0x160 [ 807.670127] ? path_lookupat+0x860/0x860 [ 807.670727] ? kasan_save_stack+0x32/0x40 [ 807.671341] ? kasan_save_stack+0x1b/0x40 [ 807.671944] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.672680] ? security_prepare_creds+0x112/0x190 [ 807.673381] ? prepare_creds+0x452/0x5e0 [ 807.673969] ? prepare_exec_creds+0xd/0x260 [ 807.674596] ? bprm_execve+0x18f/0x1a60 [ 807.675185] do_filp_open+0x190/0x3e0 [ 807.675738] ? may_open_dev+0xf0/0xf0 [ 807.676310] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.677067] ? SOFTIRQ_verbose+0x10/0x10 [ 807.677659] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 807.678467] ? find_held_lock+0x2c/0x110 [ 807.679070] do_open_execat+0x116/0x690 [ 807.679650] ? __do_sys_uselib+0x5e0/0x5e0 [ 807.680267] ? do_raw_spin_lock+0x121/0x260 [ 807.680901] ? rwlock_bug.part.0+0x90/0x90 [ 807.681528] bprm_execve+0x55e/0x1a60 [ 807.682100] ? open_exec+0x70/0x70 [ 807.682622] ? memcpy+0x39/0x60 [ 807.683120] ? copy_string_kernel+0x3b6/0x450 [ 807.683791] do_execveat_common+0x772/0x8d0 [ 807.684431] ? bprm_execve+0x1a60/0x1a60 [ 807.685043] __x64_sys_execveat+0xed/0x140 [ 807.685673] do_syscall_64+0x33/0x40 [ 807.686221] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.686971] RIP: 0033:0x7f9509c8ab19 [ 807.687517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.690171] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.691278] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 807.692301] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.693328] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.694355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.695386] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 807.701151] FAULT_INJECTION: forcing a failure. [ 807.701151] name failslab, interval 1, probability 0, space 0, times 0 [ 807.702378] CPU: 1 PID: 7982 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 807.702965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.703637] Call Trace: [ 807.703866] dump_stack+0x107/0x167 [ 807.704168] should_fail.cold+0x5/0xa [ 807.704484] ? __anon_vma_prepare+0x62/0x500 [ 807.704844] should_failslab+0x5/0x20 [ 807.705160] kmem_cache_alloc+0x5b/0x310 [ 807.705500] __anon_vma_prepare+0x62/0x500 [ 807.705846] ? __pte_alloc+0x194/0x330 [ 807.706172] handle_mm_fault+0x2b2d/0x3500 [ 807.706525] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.706962] ? SOFTIRQ_verbose+0x10/0x10 [ 807.707295] ? __pmd_alloc+0x5e0/0x5e0 [ 807.707627] __get_user_pages+0x6ec/0x1620 [ 807.707985] ? follow_page_mask+0x1900/0x1900 [ 807.708355] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 807.708743] __get_user_pages_remote+0x1d5/0x870 [ 807.709136] ? lock_downgrade+0x6d0/0x6d0 [ 807.709481] get_user_pages_remote+0x63/0x90 [ 807.709849] get_arg_page+0xba/0x200 [ 807.710160] ? acct_arg_size+0xe0/0xe0 [ 807.710477] ? downgrade_write+0x3a0/0x3a0 [ 807.710822] ? count.constprop.0+0x1b3/0x290 [ 807.711194] copy_string_kernel+0x1b4/0x450 [ 807.711552] do_execveat_common+0x525/0x8d0 [ 807.711911] ? bprm_execve+0x1a60/0x1a60 [ 807.712254] __x64_sys_execveat+0xed/0x140 [ 807.712607] do_syscall_64+0x33/0x40 [ 807.712914] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.713333] RIP: 0033:0x7f1c8836fb19 [ 807.713638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.715124] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.715748] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 807.716339] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.716916] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.717491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.718088] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 807.733829] FAULT_INJECTION: forcing a failure. [ 807.733829] name failslab, interval 1, probability 0, space 0, times 0 [ 807.734527] FAULT_INJECTION: forcing a failure. [ 807.734527] name failslab, interval 1, probability 0, space 0, times 0 [ 807.735610] CPU: 0 PID: 7981 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 807.737400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.738596] Call Trace: [ 807.738992] dump_stack+0x107/0x167 [ 807.739527] should_fail.cold+0x5/0xa [ 807.740085] ? dup_fd+0x89/0xcf0 [ 807.740586] should_failslab+0x5/0x20 [ 807.741143] kmem_cache_alloc+0x5b/0x310 [ 807.741738] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 807.742411] dup_fd+0x89/0xcf0 [ 807.742898] unshare_files+0x175/0x270 [ 807.743475] ? __ia32_sys_unshare+0x40/0x40 [ 807.744105] ? get_user_pages_remote+0x63/0x90 [ 807.744765] ? get_user_pages_remote+0x6c/0x90 [ 807.745434] bprm_execve+0xcb/0x1a60 [ 807.745973] ? acct_arg_size+0xe0/0xe0 [ 807.746533] ? downgrade_write+0x3a0/0x3a0 [ 807.747185] ? open_exec+0x70/0x70 [ 807.747705] ? memcpy+0x39/0x60 [ 807.748186] ? copy_string_kernel+0x3b6/0x450 [ 807.748849] do_execveat_common+0x772/0x8d0 [ 807.749486] ? bprm_execve+0x1a60/0x1a60 [ 807.750097] __x64_sys_execveat+0xed/0x140 [ 807.750733] do_syscall_64+0x33/0x40 [ 807.751301] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.752046] RIP: 0033:0x7f2f4d86bb19 [ 807.752587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.755235] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.756337] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 807.757366] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.758390] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.759437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.760472] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 807.761534] CPU: 1 PID: 7987 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 807.762092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.762760] Call Trace: [ 807.762989] dump_stack+0x107/0x167 [ 807.763299] should_fail.cold+0x5/0xa [ 807.763624] ? create_object.isra.0+0x3a/0xa20 [ 807.764004] should_failslab+0x5/0x20 [ 807.764324] kmem_cache_alloc+0x5b/0x310 [ 807.764654] create_object.isra.0+0x3a/0xa20 [ 807.765009] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.765417] __kmalloc_node+0x1ae/0x420 [ 807.765745] kvmalloc_node+0x119/0x170 [ 807.766068] alloc_fdtable+0xd3/0x280 [ 807.766379] dup_fd+0x74d/0xcf0 [ 807.766657] unshare_files+0x175/0x270 [ 807.766994] ? __ia32_sys_unshare+0x40/0x40 [ 807.767359] ? get_user_pages_remote+0x63/0x90 [ 807.767734] ? get_user_pages_remote+0x6c/0x90 [ 807.768104] bprm_execve+0xcb/0x1a60 [ 807.768404] ? acct_arg_size+0xe0/0xe0 [ 807.768716] ? downgrade_write+0x3a0/0x3a0 [ 807.769060] ? open_exec+0x70/0x70 [ 807.769349] ? memcpy+0x39/0x60 [ 807.769615] ? copy_string_kernel+0x3b6/0x450 [ 807.769974] do_execveat_common+0x772/0x8d0 [ 807.770329] ? bprm_execve+0x1a60/0x1a60 [ 807.770673] __x64_sys_execveat+0xed/0x140 [ 807.771026] do_syscall_64+0x33/0x40 [ 807.771325] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.771737] RIP: 0033:0x7f70da682b19 [ 807.772035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.773505] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.774122] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 807.774686] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.775261] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.775829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.776525] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 807.821816] FAULT_INJECTION: forcing a failure. [ 807.821816] name failslab, interval 1, probability 0, space 0, times 0 [ 807.822855] CPU: 1 PID: 7991 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 807.823415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.824079] Call Trace: [ 807.824308] dump_stack+0x107/0x167 [ 807.824606] should_fail.cold+0x5/0xa [ 807.824920] ? create_object.isra.0+0x3a/0xa20 [ 807.825317] should_failslab+0x5/0x20 [ 807.825637] kmem_cache_alloc+0x5b/0x310 [ 807.825977] create_object.isra.0+0x3a/0xa20 [ 807.826335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.826759] __kmalloc_node+0x1ae/0x420 [ 807.827094] kvmalloc_node+0x119/0x170 [ 807.827413] alloc_fdtable+0xd3/0x280 [ 807.827720] dup_fd+0x74d/0xcf0 [ 807.827998] unshare_files+0x175/0x270 [ 807.828316] ? __ia32_sys_unshare+0x40/0x40 [ 807.828665] ? get_user_pages_remote+0x63/0x90 [ 807.829029] ? get_user_pages_remote+0x6c/0x90 [ 807.829406] bprm_execve+0xcb/0x1a60 [ 807.829719] ? acct_arg_size+0xe0/0xe0 [ 807.830044] ? downgrade_write+0x3a0/0x3a0 [ 807.830414] ? open_exec+0x70/0x70 [ 807.830706] ? memcpy+0x39/0x60 [ 807.830980] ? copy_string_kernel+0x3b6/0x450 [ 807.831347] do_execveat_common+0x772/0x8d0 [ 807.831701] ? bprm_execve+0x1a60/0x1a60 [ 807.832038] __x64_sys_execveat+0xed/0x140 [ 807.832385] do_syscall_64+0x33/0x40 [ 807.832688] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.833106] RIP: 0033:0x7f6383eb9b19 22:08:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 22:08:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) [ 807.833410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.835082] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.835691] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 807.836255] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.836825] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.837395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.837968] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 807.848324] FAULT_INJECTION: forcing a failure. [ 807.848324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 807.850220] CPU: 0 PID: 7993 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 807.851244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.852468] Call Trace: [ 807.852867] dump_stack+0x107/0x167 [ 807.853413] should_fail.cold+0x5/0xa [ 807.853987] __alloc_pages_nodemask+0x182/0x600 [ 807.854687] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.855477] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 807.856388] alloc_pages_current+0x187/0x280 [ 807.857053] __get_free_pages+0xc/0xa0 [ 807.857636] pgd_alloc+0x84/0x4e0 [ 807.858146] ? pgd_page_get_mm+0x40/0x40 [ 807.858754] ? lockdep_init_map_type+0x2c7/0x780 [ 807.859456] ? lockdep_init_map_type+0x2c7/0x780 [ 807.860174] mm_init+0x670/0xab0 [ 807.860683] mm_alloc+0xa2/0xd0 [ 807.861176] alloc_bprm+0x1cb/0x8f0 [ 807.861717] ? __virt_addr_valid+0x170/0x5c0 [ 807.862385] do_execveat_common+0x275/0x8d0 [ 807.863047] ? strncpy_from_user+0x9e/0x470 [ 807.863689] ? bprm_execve+0x1a60/0x1a60 [ 807.864302] __x64_sys_execveat+0xed/0x140 [ 807.864938] do_syscall_64+0x33/0x40 [ 807.865497] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.866247] RIP: 0033:0x7f2243400b19 [ 807.866802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.869480] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.870586] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 807.871633] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.872678] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.873722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 807.874770] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:08:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) setresuid(0x0, 0x0, 0x0) 22:08:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 22:08:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) [ 807.936430] FAULT_INJECTION: forcing a failure. [ 807.936430] name failslab, interval 1, probability 0, space 0, times 0 [ 807.937452] CPU: 1 PID: 7997 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 807.938001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.938675] Call Trace: [ 807.938898] dump_stack+0x107/0x167 [ 807.939212] should_fail.cold+0x5/0xa [ 807.939528] ? security_file_alloc+0x34/0x170 [ 807.939900] should_failslab+0x5/0x20 [ 807.940214] kmem_cache_alloc+0x5b/0x310 [ 807.940559] security_file_alloc+0x34/0x170 [ 807.940915] __alloc_file+0xb7/0x320 [ 807.941219] alloc_empty_file+0x6d/0x170 [ 807.941558] path_openat+0xe3/0x26e0 [ 807.941868] ? lock_chain_count+0x20/0x20 [ 807.942208] ? stack_trace_save+0x8c/0xc0 [ 807.942551] ? stack_trace_consume_entry+0x160/0x160 [ 807.942968] ? path_lookupat+0x860/0x860 [ 807.943306] ? kasan_save_stack+0x32/0x40 [ 807.943646] ? kasan_save_stack+0x1b/0x40 [ 807.943984] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.944395] ? security_prepare_creds+0x112/0x190 [ 807.944789] ? prepare_creds+0x452/0x5e0 [ 807.945120] ? prepare_exec_creds+0xd/0x260 [ 807.945473] ? bprm_execve+0x18f/0x1a60 22:08:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 1) [ 807.945802] do_filp_open+0x190/0x3e0 [ 807.946231] ? may_open_dev+0xf0/0xf0 [ 807.946551] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 807.946982] ? SOFTIRQ_verbose+0x10/0x10 [ 807.947310] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 807.947761] ? find_held_lock+0x2c/0x110 [ 807.948095] do_open_execat+0x116/0x690 [ 807.948420] ? __do_sys_uselib+0x5e0/0x5e0 [ 807.948764] ? do_raw_spin_lock+0x121/0x260 [ 807.949115] ? rwlock_bug.part.0+0x90/0x90 [ 807.949462] bprm_execve+0x55e/0x1a60 [ 807.949772] ? open_exec+0x70/0x70 [ 807.950065] ? memcpy+0x39/0x60 [ 807.950342] ? copy_string_kernel+0x3b6/0x450 [ 807.950713] do_execveat_common+0x772/0x8d0 [ 807.951071] ? bprm_execve+0x1a60/0x1a60 [ 807.951415] __x64_sys_execveat+0xed/0x140 [ 807.951759] do_syscall_64+0x33/0x40 [ 807.952060] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.952474] RIP: 0033:0x7f9509c8ab19 [ 807.952779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.954248] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 807.954861] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 807.955438] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 807.956013] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 807.956584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 807.957158] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:08:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) [ 807.965363] FAULT_INJECTION: forcing a failure. [ 807.965363] name failslab, interval 1, probability 0, space 0, times 0 [ 807.966409] CPU: 1 PID: 8002 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 807.966965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.967629] Call Trace: [ 807.967842] dump_stack+0x107/0x167 [ 807.968141] should_fail.cold+0x5/0xa [ 807.968450] ? __do_sys_memfd_create+0xfb/0x450 [ 807.968826] should_failslab+0x5/0x20 [ 807.969133] __kmalloc+0x72/0x390 [ 807.969420] __do_sys_memfd_create+0xfb/0x450 [ 807.969782] ? ksys_write+0x1a9/0x260 [ 807.970091] ? memfd_file_seals_ptr+0x170/0x170 [ 807.970476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 807.970898] ? syscall_enter_from_user_mode+0x1d/0x50 [ 807.971320] do_syscall_64+0x33/0x40 [ 807.971623] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 807.972035] RIP: 0033:0x7fc547493b19 [ 807.972335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 807.973807] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 807.974417] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 807.974994] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 807.975563] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 807.976134] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 807.976707] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 807.987424] FAULT_INJECTION: forcing a failure. [ 807.987424] name failslab, interval 1, probability 0, space 0, times 0 [ 807.989249] CPU: 0 PID: 8003 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 807.990248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 807.991463] Call Trace: [ 807.991857] dump_stack+0x107/0x167 [ 807.992394] should_fail.cold+0x5/0xa [ 807.992959] ? create_object.isra.0+0x3a/0xa20 [ 807.993632] should_failslab+0x5/0x20 [ 807.994191] kmem_cache_alloc+0x5b/0x310 [ 807.994791] create_object.isra.0+0x3a/0xa20 [ 807.995449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 807.996203] kmem_cache_alloc+0x159/0x310 [ 807.996814] __anon_vma_prepare+0x62/0x500 [ 807.997227] FAULT_INJECTION: forcing a failure. [ 807.997227] name failslab, interval 1, probability 0, space 0, times 0 [ 807.997432] ? __pte_alloc+0x194/0x330 [ 807.997457] handle_mm_fault+0x2b2d/0x3500 [ 807.999527] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 808.000297] ? SOFTIRQ_verbose+0x10/0x10 [ 808.000897] ? __pmd_alloc+0x5e0/0x5e0 [ 808.001496] __get_user_pages+0x6ec/0x1620 [ 808.002127] ? follow_page_mask+0x1900/0x1900 [ 808.002795] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 808.003500] __get_user_pages_remote+0x1d5/0x870 [ 808.004198] ? lock_downgrade+0x6d0/0x6d0 [ 808.004812] get_user_pages_remote+0x63/0x90 [ 808.005462] get_arg_page+0xba/0x200 [ 808.006010] ? acct_arg_size+0xe0/0xe0 [ 808.006578] ? downgrade_write+0x3a0/0x3a0 [ 808.007207] ? count.constprop.0+0x1b3/0x290 [ 808.007855] copy_string_kernel+0x1b4/0x450 [ 808.008498] do_execveat_common+0x525/0x8d0 [ 808.009126] ? bprm_execve+0x1a60/0x1a60 [ 808.009737] __x64_sys_execveat+0xed/0x140 [ 808.010363] do_syscall_64+0x33/0x40 [ 808.010911] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 808.011668] RIP: 0033:0x7f1c8836fb19 [ 808.012215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 808.014872] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 808.015993] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 808.017036] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 808.018074] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 808.019112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 808.020148] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 808.021207] CPU: 1 PID: 8006 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 808.021766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 808.022432] Call Trace: [ 808.022656] dump_stack+0x107/0x167 [ 808.022958] should_fail.cold+0x5/0xa [ 808.023272] ? kvmalloc_node+0x119/0x170 [ 808.023601] should_failslab+0x5/0x20 [ 808.023909] __kmalloc_node+0x76/0x420 [ 808.024226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 808.024639] kvmalloc_node+0x119/0x170 [ 808.024951] alloc_fdtable+0x13f/0x280 [ 808.025269] dup_fd+0x74d/0xcf0 [ 808.025547] unshare_files+0x175/0x270 [ 808.025864] ? __ia32_sys_unshare+0x40/0x40 [ 808.026217] ? get_user_pages_remote+0x63/0x90 [ 808.026584] ? get_user_pages_remote+0x6c/0x90 [ 808.026962] bprm_execve+0xcb/0x1a60 [ 808.027295] ? acct_arg_size+0xe0/0xe0 [ 808.027753] ? downgrade_write+0x3a0/0x3a0 [ 808.028175] ? open_exec+0x70/0x70 [ 808.028461] ? memcpy+0x39/0x60 [ 808.028771] ? copy_string_kernel+0x3b6/0x450 [ 808.029279] do_execveat_common+0x772/0x8d0 [ 808.029787] ? bprm_execve+0x1a60/0x1a60 [ 808.030126] __x64_sys_execveat+0xed/0x140 [ 808.030471] do_syscall_64+0x33/0x40 [ 808.030769] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 808.031190] RIP: 0033:0x7f6383eb9b19 [ 808.031491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 808.032952] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 808.033577] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 808.034145] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 808.034720] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 808.035296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 808.035864] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:08:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 22:08:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 22:08:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 2) [ 820.993998] FAULT_INJECTION: forcing a failure. [ 820.993998] name failslab, interval 1, probability 0, space 0, times 0 22:08:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 22:08:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) setresuid(0x0, 0x0, 0x0) 22:08:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 22:08:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) 22:08:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) [ 820.996097] CPU: 1 PID: 8016 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 820.997414] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 820.998847] Call Trace: [ 820.999327] dump_stack+0x107/0x167 [ 820.999967] should_fail.cold+0x5/0xa [ 821.000639] ? create_object.isra.0+0x3a/0xa20 [ 821.001443] should_failslab+0x5/0x20 [ 821.002115] kmem_cache_alloc+0x5b/0x310 [ 821.002833] create_object.isra.0+0x3a/0xa20 [ 821.003609] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.004502] __kmalloc+0x16e/0x390 [ 821.005138] __do_sys_memfd_create+0xfb/0x450 [ 821.005925] ? ksys_write+0x1a9/0x260 [ 821.006593] ? memfd_file_seals_ptr+0x170/0x170 [ 821.007291] FAULT_INJECTION: forcing a failure. [ 821.007291] name failslab, interval 1, probability 0, space 0, times 0 [ 821.007425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.009936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.010841] do_syscall_64+0x33/0x40 [ 821.011511] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.012406] RIP: 0033:0x7fc547493b19 [ 821.013062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.016268] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 821.017607] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 821.018845] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 821.020095] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 821.021334] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 821.022570] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 821.023848] CPU: 0 PID: 8017 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 821.024872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.026084] Call Trace: [ 821.026485] dump_stack+0x107/0x167 [ 821.027026] should_fail.cold+0x5/0xa [ 821.027611] ? kvmalloc_node+0x119/0x170 [ 821.028216] should_failslab+0x5/0x20 [ 821.028781] __kmalloc_node+0x76/0x420 [ 821.029364] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.030109] kvmalloc_node+0x119/0x170 [ 821.030689] alloc_fdtable+0x13f/0x280 [ 821.031282] dup_fd+0x74d/0xcf0 [ 821.031793] unshare_files+0x175/0x270 [ 821.032371] ? __ia32_sys_unshare+0x40/0x40 [ 821.033011] ? get_user_pages_remote+0x63/0x90 [ 821.033684] ? get_user_pages_remote+0x6c/0x90 [ 821.034364] bprm_execve+0xcb/0x1a60 [ 821.034917] ? acct_arg_size+0xe0/0xe0 [ 821.035500] ? downgrade_write+0x3a0/0x3a0 [ 821.036129] ? open_exec+0x70/0x70 [ 821.036657] ? memcpy+0x39/0x60 [ 821.037145] ? copy_string_kernel+0x3b6/0x450 [ 821.037817] do_execveat_common+0x772/0x8d0 [ 821.038461] ? bprm_execve+0x1a60/0x1a60 [ 821.039082] __x64_sys_execveat+0xed/0x140 [ 821.039724] do_syscall_64+0x33/0x40 [ 821.040279] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.041025] RIP: 0033:0x7f70da682b19 [ 821.041583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.044233] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.045359] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 821.046404] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.047446] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.048481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.049512] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 821.072636] FAULT_INJECTION: forcing a failure. [ 821.072636] name failslab, interval 1, probability 0, space 0, times 0 [ 821.074877] CPU: 0 PID: 8025 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 821.075878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.077074] Call Trace: [ 821.077459] dump_stack+0x107/0x167 [ 821.077933] FAULT_INJECTION: forcing a failure. [ 821.077933] name failslab, interval 1, probability 0, space 0, times 0 [ 821.077999] should_fail.cold+0x5/0xa [ 821.080176] ? create_object.isra.0+0x3a/0xa20 [ 821.080852] should_failslab+0x5/0x20 [ 821.081416] kmem_cache_alloc+0x5b/0x310 [ 821.082018] create_object.isra.0+0x3a/0xa20 [ 821.082671] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.083423] kmem_cache_alloc+0x159/0x310 [ 821.084038] vm_area_alloc+0x1c/0x110 [ 821.084597] alloc_bprm+0x337/0x8f0 [ 821.085130] ? __virt_addr_valid+0x170/0x5c0 [ 821.085787] do_execveat_common+0x275/0x8d0 [ 821.086419] ? strncpy_from_user+0x9e/0x470 [ 821.087044] ? bprm_execve+0x1a60/0x1a60 [ 821.087665] __x64_sys_execveat+0xed/0x140 [ 821.088286] do_syscall_64+0x33/0x40 [ 821.088822] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.089565] RIP: 0033:0x7f2243400b19 [ 821.090111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.092763] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.093873] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 821.094901] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.095948] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.096989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.098026] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 821.099109] CPU: 1 PID: 8029 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 821.100251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.101648] Call Trace: [ 821.102041] dump_stack+0x107/0x167 [ 821.102577] should_fail.cold+0x5/0xa [ 821.103140] ? create_object.isra.0+0x3a/0xa20 [ 821.103809] should_failslab+0x5/0x20 [ 821.104365] kmem_cache_alloc+0x5b/0x310 [ 821.104970] create_object.isra.0+0x3a/0xa20 [ 821.105608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.106344] __kmalloc_node+0x1ae/0x420 [ 821.106934] kvmalloc_node+0x119/0x170 [ 821.107511] alloc_fdtable+0xd3/0x280 [ 821.108071] dup_fd+0x74d/0xcf0 [ 821.108570] unshare_files+0x175/0x270 [ 821.109139] ? __ia32_sys_unshare+0x40/0x40 [ 821.109774] ? get_user_pages_remote+0x63/0x90 [ 821.110438] ? get_user_pages_remote+0x6c/0x90 [ 821.111118] bprm_execve+0xcb/0x1a60 [ 821.111668] ? acct_arg_size+0xe0/0xe0 [ 821.112233] ? downgrade_write+0x3a0/0x3a0 [ 821.112850] ? open_exec+0x70/0x70 [ 821.113374] ? memcpy+0x39/0x60 [ 821.113869] ? copy_string_kernel+0x3b6/0x450 [ 821.114534] do_execveat_common+0x772/0x8d0 [ 821.115171] ? bprm_execve+0x1a60/0x1a60 [ 821.115776] __x64_sys_execveat+0xed/0x140 [ 821.116393] do_syscall_64+0x33/0x40 [ 821.116932] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.117676] RIP: 0033:0x7f6383eb9b19 [ 821.118223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.120345] FAULT_INJECTION: forcing a failure. [ 821.120345] name failslab, interval 1, probability 0, space 0, times 0 [ 821.120889] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.123591] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 821.124612] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.125636] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.126669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.127702] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 821.128755] CPU: 0 PID: 8031 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 821.129773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.130981] Call Trace: [ 821.131387] dump_stack+0x107/0x167 [ 821.131924] should_fail.cold+0x5/0xa [ 821.132496] ? dup_fd+0x89/0xcf0 [ 821.132993] should_failslab+0x5/0x20 [ 821.133540] FAULT_INJECTION: forcing a failure. [ 821.133540] name failslab, interval 1, probability 0, space 0, times 0 [ 821.135105] kmem_cache_alloc+0x5b/0x310 [ 821.135125] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 821.135148] dup_fd+0x89/0xcf0 [ 821.135180] unshare_files+0x175/0x270 [ 821.137420] ? __ia32_sys_unshare+0x40/0x40 [ 821.138055] ? get_user_pages_remote+0x63/0x90 [ 821.138715] ? get_user_pages_remote+0x6c/0x90 [ 821.139400] bprm_execve+0xcb/0x1a60 [ 821.139948] ? acct_arg_size+0xe0/0xe0 [ 821.140524] ? downgrade_write+0x3a0/0x3a0 [ 821.141151] ? open_exec+0x70/0x70 [ 821.141662] ? memcpy+0x39/0x60 [ 821.142160] ? copy_string_kernel+0x3b6/0x450 [ 821.142823] do_execveat_common+0x772/0x8d0 [ 821.143472] ? bprm_execve+0x1a60/0x1a60 [ 821.144089] __x64_sys_execveat+0xed/0x140 [ 821.144715] do_syscall_64+0x33/0x40 [ 821.145267] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.146018] RIP: 0033:0x7f2f4d86bb19 [ 821.146559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.149233] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.150321] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 821.151368] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.152409] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.153447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.154488] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 [ 821.155564] CPU: 1 PID: 8033 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 821.156585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.157793] Call Trace: [ 821.158187] dump_stack+0x107/0x167 [ 821.158726] should_fail.cold+0x5/0xa [ 821.159295] ? create_object.isra.0+0x3a/0xa20 [ 821.159963] should_failslab+0x5/0x20 [ 821.160525] kmem_cache_alloc+0x5b/0x310 [ 821.161153] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 821.161959] create_object.isra.0+0x3a/0xa20 [ 821.162602] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.163352] kmem_cache_alloc+0x159/0x310 [ 821.163978] security_file_alloc+0x34/0x170 [ 821.164640] __alloc_file+0xb7/0x320 [ 821.165191] alloc_empty_file+0x6d/0x170 [ 821.165776] path_openat+0xe3/0x26e0 [ 821.166343] ? lock_chain_count+0x20/0x20 [ 821.166951] ? stack_trace_save+0x8c/0xc0 [ 821.167570] ? stack_trace_consume_entry+0x160/0x160 [ 821.168307] ? path_lookupat+0x860/0x860 [ 821.168936] ? kasan_save_stack+0x32/0x40 [ 821.169558] ? kasan_save_stack+0x1b/0x40 [ 821.170171] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.170918] ? security_prepare_creds+0x112/0x190 [ 821.171628] ? prepare_creds+0x452/0x5e0 [ 821.172233] ? prepare_exec_creds+0xd/0x260 [ 821.172866] ? bprm_execve+0x18f/0x1a60 [ 821.173449] do_filp_open+0x190/0x3e0 [ 821.174006] ? may_open_dev+0xf0/0xf0 [ 821.174580] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 821.175349] ? SOFTIRQ_verbose+0x10/0x10 [ 821.175941] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 821.176752] ? find_held_lock+0x2c/0x110 [ 821.177349] do_open_execat+0x116/0x690 [ 821.177939] ? __do_sys_uselib+0x5e0/0x5e0 [ 821.178560] ? do_raw_spin_lock+0x121/0x260 [ 821.179200] ? rwlock_bug.part.0+0x90/0x90 [ 821.179829] bprm_execve+0x55e/0x1a60 [ 821.180397] ? open_exec+0x70/0x70 [ 821.180915] ? memcpy+0x39/0x60 [ 821.181406] ? copy_string_kernel+0x3b6/0x450 [ 821.182066] do_execveat_common+0x772/0x8d0 [ 821.182702] ? bprm_execve+0x1a60/0x1a60 [ 821.183321] __x64_sys_execveat+0xed/0x140 [ 821.183952] do_syscall_64+0x33/0x40 [ 821.184493] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.185241] RIP: 0033:0x7f9509c8ab19 [ 821.185794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.188463] RSP: 002b:00007f95071df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.189569] RAX: ffffffffffffffda RBX: 00007f9509d9e020 RCX: 00007f9509c8ab19 [ 821.190606] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.191648] RBP: 00007f95071df1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.192685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.193721] R13: 00007ffc800ea53f R14: 00007f95071df300 R15: 0000000000022000 [ 821.231824] FAULT_INJECTION: forcing a failure. [ 821.231824] name failslab, interval 1, probability 0, space 0, times 0 [ 821.233607] CPU: 1 PID: 8026 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 821.234600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.235819] Call Trace: [ 821.236211] dump_stack+0x107/0x167 [ 821.236753] should_fail.cold+0x5/0xa [ 821.237314] ? __anon_vma_prepare+0x270/0x500 [ 821.237980] should_failslab+0x5/0x20 [ 821.238543] kmem_cache_alloc+0x5b/0x310 [ 821.239155] __anon_vma_prepare+0x270/0x500 [ 821.239782] ? __pte_alloc+0x194/0x330 [ 821.240358] handle_mm_fault+0x2b2d/0x3500 [ 821.240984] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 821.241757] ? SOFTIRQ_verbose+0x10/0x10 [ 821.242354] ? __pmd_alloc+0x5e0/0x5e0 [ 821.242950] __get_user_pages+0x6ec/0x1620 [ 821.243590] ? follow_page_mask+0x1900/0x1900 [ 821.244254] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 821.244937] __get_user_pages_remote+0x1d5/0x870 [ 821.245635] ? lock_downgrade+0x6d0/0x6d0 [ 821.246245] get_user_pages_remote+0x63/0x90 [ 821.246903] get_arg_page+0xba/0x200 [ 821.247463] ? acct_arg_size+0xe0/0xe0 [ 821.248032] ? downgrade_write+0x3a0/0x3a0 [ 821.248654] ? count.constprop.0+0x1b3/0x290 [ 821.249309] copy_string_kernel+0x1b4/0x450 [ 821.249954] do_execveat_common+0x525/0x8d0 [ 821.250595] ? bprm_execve+0x1a60/0x1a60 [ 821.251231] __x64_sys_execveat+0xed/0x140 [ 821.251857] do_syscall_64+0x33/0x40 [ 821.252398] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.253152] RIP: 0033:0x7f1c8836fb19 [ 821.253695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.256361] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.257465] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 821.258503] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.259553] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.260591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.261627] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:08:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) [ 821.288790] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:08:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 22:08:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 22:08:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) setresuid(0x0, 0x0, 0x0) [ 821.338217] FAULT_INJECTION: forcing a failure. [ 821.338217] name failslab, interval 1, probability 0, space 0, times 0 [ 821.339901] CPU: 0 PID: 8042 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 821.340904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.342120] Call Trace: [ 821.342518] dump_stack+0x107/0x167 [ 821.343063] should_fail.cold+0x5/0xa [ 821.343645] ? create_object.isra.0+0x3a/0xa20 [ 821.344333] should_failslab+0x5/0x20 [ 821.344904] kmem_cache_alloc+0x5b/0x310 [ 821.345517] create_object.isra.0+0x3a/0xa20 [ 821.346175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.346939] kmem_cache_alloc+0x159/0x310 [ 821.347568] __anon_vma_prepare+0x270/0x500 [ 821.348211] ? __pte_alloc+0x194/0x330 [ 821.348805] handle_mm_fault+0x2b2d/0x3500 [ 821.349454] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 821.350232] ? SOFTIRQ_verbose+0x10/0x10 [ 821.350836] ? __pmd_alloc+0x5e0/0x5e0 [ 821.351452] __get_user_pages+0x6ec/0x1620 [ 821.352098] ? follow_page_mask+0x1900/0x1900 [ 821.352771] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 821.353474] __get_user_pages_remote+0x1d5/0x870 [ 821.354173] ? lock_downgrade+0x6d0/0x6d0 [ 821.354815] get_user_pages_remote+0x63/0x90 [ 821.355479] get_arg_page+0xba/0x200 [ 821.356029] ? acct_arg_size+0xe0/0xe0 [ 821.356608] ? downgrade_write+0x3a0/0x3a0 [ 821.357241] ? count.constprop.0+0x1b3/0x290 [ 821.357903] copy_string_kernel+0x1b4/0x450 [ 821.358552] do_execveat_common+0x525/0x8d0 [ 821.359251] ? bprm_execve+0x1a60/0x1a60 [ 821.359874] __x64_sys_execveat+0xed/0x140 [ 821.360509] do_syscall_64+0x33/0x40 [ 821.361064] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.361812] RIP: 0033:0x7f1c8836fb19 [ 821.362365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.365046] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.366164] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 821.367213] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.368269] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.369319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.370370] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 821.458034] FAULT_INJECTION: forcing a failure. [ 821.458034] name failslab, interval 1, probability 0, space 0, times 0 [ 821.459728] CPU: 0 PID: 8050 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 821.460734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.461945] Call Trace: [ 821.462340] dump_stack+0x107/0x167 [ 821.462882] should_fail.cold+0x5/0xa [ 821.463458] ? create_object.isra.0+0x3a/0xa20 [ 821.464134] should_failslab+0x5/0x20 [ 821.464701] kmem_cache_alloc+0x5b/0x310 [ 821.465317] create_object.isra.0+0x3a/0xa20 [ 821.465972] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.466728] __kmalloc_node+0x1ae/0x420 [ 821.467338] kvmalloc_node+0x119/0x170 [ 821.467916] alloc_fdtable+0x13f/0x280 [ 821.468497] dup_fd+0x74d/0xcf0 [ 821.469000] unshare_files+0x175/0x270 [ 821.469580] ? __ia32_sys_unshare+0x40/0x40 [ 821.470220] ? get_user_pages_remote+0x63/0x90 [ 821.470891] ? get_user_pages_remote+0x6c/0x90 [ 821.471581] bprm_execve+0xcb/0x1a60 [ 821.472134] ? acct_arg_size+0xe0/0xe0 [ 821.472709] ? downgrade_write+0x3a0/0x3a0 [ 821.473321] ? open_exec+0x70/0x70 [ 821.473846] ? memcpy+0x39/0x60 [ 821.474337] ? copy_string_kernel+0x3b6/0x450 [ 821.475013] do_execveat_common+0x772/0x8d0 [ 821.475661] ? bprm_execve+0x1a60/0x1a60 [ 821.476276] __x64_sys_execveat+0xed/0x140 [ 821.476906] do_syscall_64+0x33/0x40 [ 821.477459] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.478212] RIP: 0033:0x7f70da682b19 [ 821.478761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.481456] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.482552] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 821.483605] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.484643] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.485687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.486733] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 821.493003] FAULT_INJECTION: forcing a failure. [ 821.493003] name failslab, interval 1, probability 0, space 0, times 0 [ 821.494742] CPU: 1 PID: 8051 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 821.495752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.496955] Call Trace: [ 821.497350] dump_stack+0x107/0x167 [ 821.497889] should_fail.cold+0x5/0xa [ 821.498457] ? alloc_fdtable+0x84/0x280 [ 821.499047] should_failslab+0x5/0x20 [ 821.499616] kmem_cache_alloc_trace+0x55/0x320 [ 821.500291] ? rwlock_bug.part.0+0x90/0x90 [ 821.500918] alloc_fdtable+0x84/0x280 [ 821.501481] dup_fd+0x74d/0xcf0 [ 821.501982] unshare_files+0x175/0x270 [ 821.502550] ? __ia32_sys_unshare+0x40/0x40 [ 821.503201] ? get_user_pages_remote+0x63/0x90 [ 821.503867] ? get_user_pages_remote+0x6c/0x90 [ 821.504541] bprm_execve+0xcb/0x1a60 [ 821.505089] ? acct_arg_size+0xe0/0xe0 [ 821.505681] ? downgrade_write+0x3a0/0x3a0 [ 821.506317] ? open_exec+0x70/0x70 [ 821.506842] ? memcpy+0x39/0x60 [ 821.507335] ? copy_string_kernel+0x3b6/0x450 [ 821.508005] do_execveat_common+0x772/0x8d0 [ 821.508639] ? bprm_execve+0x1a60/0x1a60 [ 821.509249] __x64_sys_execveat+0xed/0x140 [ 821.509873] do_syscall_64+0x33/0x40 [ 821.510416] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 821.511173] RIP: 0033:0x7f2f4d86bb19 [ 821.511718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.514386] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 821.515513] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 821.516548] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 821.517582] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.518614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.519659] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:08:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 22:08:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 22:08:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 22:08:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 3) 22:08:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 22:08:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:08:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 22:08:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) setresuid(0x0, 0x0, 0x0) [ 835.963191] FAULT_INJECTION: forcing a failure. [ 835.963191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 835.964448] CPU: 0 PID: 8063 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 835.965145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 835.965981] Call Trace: [ 835.966263] dump_stack+0x107/0x167 [ 835.966635] should_fail.cold+0x5/0xa [ 835.967029] __alloc_pages_nodemask+0x182/0x600 [ 835.967513] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 835.968127] ? kmem_cache_alloc+0x301/0x310 [ 835.968570] alloc_pages_current+0x187/0x280 [ 835.969022] allocate_slab+0x26f/0x380 [ 835.969425] ___slab_alloc+0x470/0x700 [ 835.969830] ? create_object.isra.0+0x3a/0xa20 [ 835.970298] ? fs_reclaim_acquire+0xa5/0x100 [ 835.970750] ? create_object.isra.0+0x3a/0xa20 [ 835.971215] ? kmem_cache_alloc+0x301/0x310 [ 835.971662] kmem_cache_alloc+0x301/0x310 [ 835.972087] create_object.isra.0+0x3a/0xa20 [ 835.972535] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 835.973056] __kmalloc+0x16e/0x390 [ 835.973427] __do_sys_memfd_create+0xfb/0x450 [ 835.973884] ? ksys_write+0x1a9/0x260 [ 835.974272] ? memfd_file_seals_ptr+0x170/0x170 [ 835.974755] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 835.975297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 835.975825] do_syscall_64+0x33/0x40 [ 835.976205] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 835.976735] RIP: 0033:0x7fc547493b19 [ 835.977122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 835.978974] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 835.979762] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 835.980484] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 835.981200] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 835.981917] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 835.982637] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 835.989805] FAULT_INJECTION: forcing a failure. [ 835.989805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 835.991078] CPU: 0 PID: 8069 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 835.991776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 835.992605] Call Trace: [ 835.992875] dump_stack+0x107/0x167 [ 835.993248] should_fail.cold+0x5/0xa [ 835.993638] __alloc_pages_nodemask+0x182/0x600 [ 835.994115] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 835.994719] ? add_mm_counter_fast+0x220/0x220 [ 835.995190] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 835.995728] alloc_pages_current+0x187/0x280 [ 835.996181] get_zeroed_page+0x14/0xb0 [ 835.996577] __pud_alloc+0x33/0x270 [ 835.996949] handle_mm_fault+0x1a73/0x3500 [ 835.997388] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 835.997918] ? SOFTIRQ_verbose+0x10/0x10 [ 835.998334] ? __pmd_alloc+0x5e0/0x5e0 [ 835.998745] __get_user_pages+0x6ec/0x1620 [ 835.999186] ? follow_page_mask+0x1900/0x1900 [ 835.999659] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 836.000138] __get_user_pages_remote+0x1d5/0x870 [ 836.000613] ? lock_downgrade+0x6d0/0x6d0 [ 836.000834] FAULT_INJECTION: forcing a failure. [ 836.000834] name failslab, interval 1, probability 0, space 0, times 0 [ 836.001036] get_user_pages_remote+0x63/0x90 [ 836.001063] get_arg_page+0xba/0x200 [ 836.003516] ? acct_arg_size+0xe0/0xe0 [ 836.003910] ? downgrade_write+0x3a0/0x3a0 [ 836.004344] ? count.constprop.0+0x1b3/0x290 [ 836.004792] copy_string_kernel+0x1b4/0x450 [ 836.005235] do_execveat_common+0x525/0x8d0 [ 836.005672] ? bprm_execve+0x1a60/0x1a60 [ 836.006096] __x64_sys_execveat+0xed/0x140 [ 836.006526] do_syscall_64+0x33/0x40 [ 836.006902] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.007427] RIP: 0033:0x7f2243400b19 [ 836.007808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.009635] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.010399] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 836.011122] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.011845] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.012559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.013278] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 836.014016] CPU: 1 PID: 8071 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 836.015010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.016216] Call Trace: [ 836.016612] dump_stack+0x107/0x167 [ 836.017147] should_fail.cold+0x5/0xa [ 836.017710] ? prepare_creds+0x25/0x5e0 [ 836.018294] should_failslab+0x5/0x20 [ 836.018857] kmem_cache_alloc+0x5b/0x310 [ 836.019463] ? __ia32_sys_unshare+0x40/0x40 [ 836.020097] prepare_creds+0x25/0x5e0 [ 836.020652] prepare_exec_creds+0xd/0x260 [ 836.021262] bprm_execve+0x18f/0x1a60 [ 836.021818] ? acct_arg_size+0xe0/0xe0 [ 836.022384] ? downgrade_write+0x3a0/0x3a0 [ 836.023002] ? open_exec+0x70/0x70 [ 836.023533] ? memcpy+0x39/0x60 [ 836.024019] ? copy_string_kernel+0x3b6/0x450 [ 836.024680] do_execveat_common+0x772/0x8d0 [ 836.025313] ? bprm_execve+0x1a60/0x1a60 [ 836.025923] __x64_sys_execveat+0xed/0x140 [ 836.026548] do_syscall_64+0x33/0x40 [ 836.027092] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.027843] RIP: 0033:0x7f70da682b19 [ 836.028388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.030183] FAULT_INJECTION: forcing a failure. [ 836.030183] name failslab, interval 1, probability 0, space 0, times 0 [ 836.031011] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.033216] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 836.034242] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.035273] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.036298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.037322] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 836.038380] CPU: 0 PID: 8072 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 836.039065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.039897] Call Trace: [ 836.040162] dump_stack+0x107/0x167 [ 836.040535] should_fail.cold+0x5/0xa [ 836.040920] ? kvmalloc_node+0x119/0x170 [ 836.041328] should_failslab+0x5/0x20 [ 836.041709] __kmalloc_node+0x76/0x420 [ 836.042103] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 836.042621] kvmalloc_node+0x119/0x170 [ 836.043014] alloc_fdtable+0x13f/0x280 [ 836.043422] dup_fd+0x74d/0xcf0 [ 836.043763] unshare_files+0x175/0x270 [ 836.044153] ? __ia32_sys_unshare+0x40/0x40 [ 836.044587] ? get_user_pages_remote+0x63/0x90 [ 836.045042] ? get_user_pages_remote+0x6c/0x90 [ 836.045502] bprm_execve+0xcb/0x1a60 [ 836.045890] ? acct_arg_size+0xe0/0xe0 [ 836.046283] ? downgrade_write+0x3a0/0x3a0 [ 836.046720] ? open_exec+0x70/0x70 [ 836.047078] ? memcpy+0x39/0x60 [ 836.047429] ? copy_string_kernel+0x3b6/0x450 [ 836.047887] do_execveat_common+0x772/0x8d0 [ 836.048319] ? bprm_execve+0x1a60/0x1a60 [ 836.048741] __x64_sys_execveat+0xed/0x140 [ 836.049170] do_syscall_64+0x33/0x40 [ 836.049542] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.050054] RIP: 0033:0x7f6383eb9b19 [ 836.050426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.050661] FAULT_INJECTION: forcing a failure. [ 836.050661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 836.052247] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.052261] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 836.052268] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.052276] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.052292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.057508] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 836.058248] CPU: 1 PID: 8076 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 836.059265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.060472] Call Trace: [ 836.060863] dump_stack+0x107/0x167 [ 836.061403] should_fail.cold+0x5/0xa 22:08:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) [ 836.061977] __alloc_pages_nodemask+0x182/0x600 [ 836.062843] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 836.063734] ? SOFTIRQ_verbose+0x10/0x10 [ 836.064342] alloc_pages_current+0x187/0x280 [ 836.064994] __page_cache_alloc+0x2d2/0x360 [ 836.065633] generic_file_buffered_read+0xcd7/0x2920 [ 836.066376] ? lock_chain_count+0x20/0x20 [ 836.067008] ? pagecache_get_page+0xc80/0xc80 [ 836.067675] ? __lock_acquire+0xbb1/0x5b00 [ 836.068307] generic_file_read_iter+0x33f/0x490 [ 836.069002] ext4_file_read_iter+0x184/0x4c0 [ 836.069655] __kernel_read+0x593/0xaa0 [ 836.070230] ? do_sendfile+0x1090/0x1090 [ 836.070831] ? _cond_resched+0x12/0x80 [ 836.071420] ? avc_policy_seqno+0x9/0x70 [ 836.072014] ? selinux_file_permission+0x92/0x520 [ 836.072723] ? lock_downgrade+0x6d0/0x6d0 [ 836.073336] kernel_read+0x52/0x70 [ 836.073870] bprm_execve+0x882/0x1a60 [ 836.074435] ? open_exec+0x70/0x70 [ 836.074958] ? memcpy+0x39/0x60 [ 836.075454] ? copy_string_kernel+0x3b6/0x450 [ 836.076125] do_execveat_common+0x772/0x8d0 [ 836.076756] ? bprm_execve+0x1a60/0x1a60 [ 836.077366] __x64_sys_execveat+0xed/0x140 [ 836.077985] do_syscall_64+0x33/0x40 [ 836.078535] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.079299] RIP: 0033:0x7f9509c8ab19 [ 836.079846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.082484] RSP: 002b:00007f95071df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.083607] RAX: ffffffffffffffda RBX: 00007f9509d9e020 RCX: 00007f9509c8ab19 [ 836.084639] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.085670] RBP: 00007f95071df1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.086695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.087734] R13: 00007ffc800ea53f R14: 00007f95071df300 R15: 0000000000022000 [ 836.102407] FAULT_INJECTION: forcing a failure. [ 836.102407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 836.104544] CPU: 1 PID: 8060 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 836.105535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.106729] Call Trace: [ 836.107115] dump_stack+0x107/0x167 [ 836.107671] should_fail.cold+0x5/0xa [ 836.108231] __alloc_pages_nodemask+0x182/0x600 [ 836.108910] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 836.109774] ? up_write+0x191/0x550 [ 836.110311] ? rwlock_bug.part.0+0x90/0x90 [ 836.110926] ? anon_vma_interval_tree_insert+0x277/0x450 [ 836.111729] alloc_pages_vma+0xbb/0x410 [ 836.112324] handle_mm_fault+0x152f/0x3500 [ 836.112949] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 836.113710] ? SOFTIRQ_verbose+0x10/0x10 [ 836.114306] ? __pmd_alloc+0x5e0/0x5e0 [ 836.114899] __get_user_pages+0x6ec/0x1620 [ 836.115545] ? follow_page_mask+0x1900/0x1900 [ 836.116202] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 836.116902] __get_user_pages_remote+0x1d5/0x870 [ 836.117599] ? lock_downgrade+0x6d0/0x6d0 [ 836.118207] get_user_pages_remote+0x63/0x90 [ 836.118866] get_arg_page+0xba/0x200 [ 836.119418] ? acct_arg_size+0xe0/0xe0 [ 836.119987] ? downgrade_write+0x3a0/0x3a0 [ 836.120608] ? count.constprop.0+0x1b3/0x290 [ 836.121252] copy_string_kernel+0x1b4/0x450 22:08:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) setresuid(0x0, 0x0, 0x0) [ 836.121895] do_execveat_common+0x525/0x8d0 [ 836.122641] ? bprm_execve+0x1a60/0x1a60 [ 836.123286] __x64_sys_execveat+0xed/0x140 [ 836.123909] do_syscall_64+0x33/0x40 [ 836.124636] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.125613] RIP: 0033:0x7f1c8836fb19 [ 836.126223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.128869] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.129969] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 836.130994] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.132029] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.133053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.134083] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 836.136638] FAULT_INJECTION: forcing a failure. [ 836.136638] name failslab, interval 1, probability 0, space 0, times 0 [ 836.138282] CPU: 1 PID: 8073 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 836.139292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.140492] Call Trace: [ 836.140883] dump_stack+0x107/0x167 [ 836.141418] should_fail.cold+0x5/0xa [ 836.141981] ? create_object.isra.0+0x3a/0xa20 [ 836.142653] should_failslab+0x5/0x20 [ 836.143214] kmem_cache_alloc+0x5b/0x310 [ 836.143832] create_object.isra.0+0x3a/0xa20 [ 836.144481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 836.145240] kmem_cache_alloc_trace+0x151/0x320 [ 836.145920] ? rwlock_bug.part.0+0x90/0x90 [ 836.146549] alloc_fdtable+0x84/0x280 [ 836.147111] dup_fd+0x74d/0xcf0 [ 836.147633] unshare_files+0x175/0x270 [ 836.148208] ? __ia32_sys_unshare+0x40/0x40 [ 836.148855] ? get_user_pages_remote+0x63/0x90 [ 836.149522] ? get_user_pages_remote+0x6c/0x90 [ 836.150199] bprm_execve+0xcb/0x1a60 [ 836.150751] ? acct_arg_size+0xe0/0xe0 [ 836.151328] ? downgrade_write+0x3a0/0x3a0 [ 836.151963] ? open_exec+0x70/0x70 [ 836.152490] ? memcpy+0x39/0x60 [ 836.152980] ? copy_string_kernel+0x3b6/0x450 [ 836.153649] do_execveat_common+0x772/0x8d0 [ 836.154287] ? bprm_execve+0x1a60/0x1a60 [ 836.154904] __x64_sys_execveat+0xed/0x140 [ 836.155539] do_syscall_64+0x33/0x40 [ 836.156096] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.156852] RIP: 0033:0x7f2f4d86bb19 [ 836.157403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.160056] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.161166] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 836.162206] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.163244] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.164291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.165327] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 836.181294] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 836.191822] FAULT_INJECTION: forcing a failure. [ 836.191822] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 836.193591] CPU: 1 PID: 8085 Comm: syz-executor.7 Not tainted 5.10.216 #1 22:08:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 22:08:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) [ 836.194586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.195941] Call Trace: [ 836.196358] dump_stack+0x107/0x167 [ 836.196891] should_fail.cold+0x5/0xa [ 836.197453] __alloc_pages_nodemask+0x182/0x600 [ 836.198137] ? lock_acquire+0x197/0x470 [ 836.198723] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 836.199613] ? lock_downgrade+0x6d0/0x6d0 [ 836.200220] ? do_raw_spin_lock+0x121/0x260 [ 836.200855] alloc_pages_current+0x187/0x280 [ 836.201500] __pmd_alloc+0x37/0x5e0 [ 836.202036] handle_mm_fault+0x1ac4/0x3500 [ 836.202662] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 836.203436] ? SOFTIRQ_verbose+0x10/0x10 [ 836.204030] ? __pmd_alloc+0x5e0/0x5e0 [ 836.204626] __get_user_pages+0x6ec/0x1620 [ 836.205254] ? follow_page_mask+0x1900/0x1900 [ 836.205909] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 836.206601] __get_user_pages_remote+0x1d5/0x870 22:08:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 4) [ 836.207303] ? lock_downgrade+0x6d0/0x6d0 [ 836.208052] get_user_pages_remote+0x63/0x90 [ 836.208699] get_arg_page+0xba/0x200 [ 836.209246] ? acct_arg_size+0xe0/0xe0 [ 836.209816] ? downgrade_write+0x3a0/0x3a0 [ 836.210433] ? count.constprop.0+0x1b3/0x290 [ 836.211080] copy_string_kernel+0x1b4/0x450 [ 836.211733] do_execveat_common+0x525/0x8d0 [ 836.212365] ? bprm_execve+0x1a60/0x1a60 [ 836.212973] __x64_sys_execveat+0xed/0x140 [ 836.213594] do_syscall_64+0x33/0x40 [ 836.213730] FAULT_INJECTION: forcing a failure. [ 836.213730] name failslab, interval 1, probability 0, space 0, times 0 [ 836.214136] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.214149] RIP: 0033:0x7f2243400b19 [ 836.214172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.219089] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.220201] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 836.221228] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.222256] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.223292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.224324] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 836.225379] CPU: 0 PID: 8088 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 836.226018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.226789] Call Trace: [ 836.227043] dump_stack+0x107/0x167 [ 836.227390] should_fail.cold+0x5/0xa [ 836.227750] ? create_object.isra.0+0x3a/0xa20 [ 836.228181] should_failslab+0x5/0x20 [ 836.228534] kmem_cache_alloc+0x5b/0x310 [ 836.228917] create_object.isra.0+0x3a/0xa20 [ 836.229320] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 836.229789] kmem_cache_alloc+0x159/0x310 [ 836.230181] prepare_creds+0x25/0x5e0 [ 836.230537] prepare_exec_creds+0xd/0x260 [ 836.230923] bprm_execve+0x18f/0x1a60 [ 836.231288] ? acct_arg_size+0xe0/0xe0 [ 836.231462] FAULT_INJECTION: forcing a failure. [ 836.231462] name failslab, interval 1, probability 0, space 0, times 0 [ 836.231645] ? downgrade_write+0x3a0/0x3a0 [ 836.231664] ? open_exec+0x70/0x70 [ 836.233954] ? memcpy+0x39/0x60 [ 836.234261] ? copy_string_kernel+0x3b6/0x450 [ 836.234683] do_execveat_common+0x772/0x8d0 [ 836.235090] ? bprm_execve+0x1a60/0x1a60 [ 836.235520] __x64_sys_execveat+0xed/0x140 [ 836.235955] do_syscall_64+0x33/0x40 [ 836.236333] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.236805] RIP: 0033:0x7f6383eb9b19 [ 836.237154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.238807] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.239510] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 836.240155] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.240798] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.241439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.242078] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 836.242748] CPU: 1 PID: 8089 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 836.243768] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.244973] Call Trace: [ 836.245365] dump_stack+0x107/0x167 [ 836.245908] should_fail.cold+0x5/0xa [ 836.246472] ? create_object.isra.0+0x3a/0xa20 [ 836.247144] should_failslab+0x5/0x20 [ 836.247711] kmem_cache_alloc+0x5b/0x310 [ 836.248318] create_object.isra.0+0x3a/0xa20 [ 836.248959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 836.249705] kmem_cache_alloc+0x159/0x310 [ 836.250330] prepare_creds+0x25/0x5e0 [ 836.250893] prepare_exec_creds+0xd/0x260 [ 836.251513] bprm_execve+0x18f/0x1a60 [ 836.252074] ? acct_arg_size+0xe0/0xe0 [ 836.252642] ? downgrade_write+0x3a0/0x3a0 [ 836.253262] ? open_exec+0x70/0x70 [ 836.253792] ? memcpy+0x39/0x60 [ 836.254278] ? copy_string_kernel+0x3b6/0x450 [ 836.254949] do_execveat_common+0x772/0x8d0 [ 836.255591] ? bprm_execve+0x1a60/0x1a60 [ 836.256215] __x64_sys_execveat+0xed/0x140 [ 836.256838] do_syscall_64+0x33/0x40 [ 836.257389] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.258131] RIP: 0033:0x7f70da682b19 [ 836.258686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.261347] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.262466] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 836.263521] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.264567] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.265609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.266654] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:08:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 22:08:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) setresuid(0x0, 0x0, 0x0) 22:08:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 836.327622] FAULT_INJECTION: forcing a failure. [ 836.327622] name failslab, interval 1, probability 0, space 0, times 0 [ 836.329506] CPU: 1 PID: 8096 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 836.330511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.331731] Call Trace: [ 836.332129] dump_stack+0x107/0x167 [ 836.332670] should_fail.cold+0x5/0xa [ 836.333246] ? shmem_alloc_inode+0x18/0x40 [ 836.333876] should_failslab+0x5/0x20 [ 836.334441] kmem_cache_alloc+0x5b/0x310 [ 836.335051] ? shmem_destroy_inode+0x70/0x70 [ 836.335711] shmem_alloc_inode+0x18/0x40 [ 836.336314] ? shmem_destroy_inode+0x70/0x70 [ 836.336963] alloc_inode+0x63/0x240 [ 836.337503] new_inode+0x23/0x250 [ 836.338023] shmem_get_inode+0x15e/0xbc0 [ 836.338633] __shmem_file_setup+0xb8/0x320 [ 836.339272] ? _copy_from_user+0xfb/0x1b0 [ 836.339893] __do_sys_memfd_create+0x275/0x450 [ 836.340567] ? memfd_file_seals_ptr+0x170/0x170 [ 836.341261] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 836.342035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 836.342788] do_syscall_64+0x33/0x40 [ 836.343353] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.344101] RIP: 0033:0x7fc547493b19 [ 836.344651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.347336] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 836.348455] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 836.349499] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 836.350543] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 836.351597] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 836.352638] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 22:08:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 836.359863] FAULT_INJECTION: forcing a failure. [ 836.359863] name failslab, interval 1, probability 0, space 0, times 0 [ 836.360918] CPU: 0 PID: 8098 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 836.361507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.362218] Call Trace: [ 836.362453] dump_stack+0x107/0x167 [ 836.362769] should_fail.cold+0x5/0xa [ 836.363108] ? security_prepare_creds+0x112/0x190 [ 836.363540] should_failslab+0x5/0x20 [ 836.363867] __kmalloc+0x72/0x390 [ 836.364175] security_prepare_creds+0x112/0x190 [ 836.364580] prepare_creds+0x452/0x5e0 [ 836.364916] prepare_exec_creds+0xd/0x260 [ 836.365279] bprm_execve+0x18f/0x1a60 [ 836.365607] ? acct_arg_size+0xe0/0xe0 [ 836.365940] ? downgrade_write+0x3a0/0x3a0 [ 836.366308] ? open_exec+0x70/0x70 [ 836.366618] ? memcpy+0x39/0x60 [ 836.366902] ? copy_string_kernel+0x3b6/0x450 [ 836.367300] do_execveat_common+0x772/0x8d0 [ 836.367679] ? bprm_execve+0x1a60/0x1a60 [ 836.368037] __x64_sys_execveat+0xed/0x140 [ 836.368402] do_syscall_64+0x33/0x40 [ 836.368725] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.369166] RIP: 0033:0x7f6383eb9b19 [ 836.369489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.371040] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.371695] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 836.372307] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.372909] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.373513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.374118] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:08:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 22:08:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 22:08:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 836.452068] FAULT_INJECTION: forcing a failure. [ 836.452068] name failslab, interval 1, probability 0, space 0, times 0 [ 836.453071] CPU: 0 PID: 8104 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 836.453623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.454293] Call Trace: [ 836.454520] dump_stack+0x107/0x167 [ 836.454822] should_fail.cold+0x5/0xa [ 836.455145] ? dup_fd+0x89/0xcf0 [ 836.455440] should_failslab+0x5/0x20 [ 836.455755] kmem_cache_alloc+0x5b/0x310 [ 836.456093] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 836.456481] dup_fd+0x89/0xcf0 [ 836.456761] unshare_files+0x175/0x270 [ 836.457078] ? __ia32_sys_unshare+0x40/0x40 [ 836.457445] ? get_user_pages_remote+0x63/0x90 [ 836.457818] ? get_user_pages_remote+0x6c/0x90 [ 836.458200] bprm_execve+0xcb/0x1a60 [ 836.458511] ? acct_arg_size+0xe0/0xe0 [ 836.458832] ? downgrade_write+0x3a0/0x3a0 [ 836.459187] ? open_exec+0x70/0x70 [ 836.459487] ? memcpy+0x39/0x60 [ 836.459762] ? copy_string_kernel+0x3b6/0x450 [ 836.460134] do_execveat_common+0x772/0x8d0 [ 836.460494] ? bprm_execve+0x1a60/0x1a60 [ 836.460842] __x64_sys_execveat+0xed/0x140 [ 836.461194] do_syscall_64+0x33/0x40 [ 836.461507] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.461925] RIP: 0033:0x7f1c8836fb19 [ 836.462240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.463735] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.464365] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 836.464945] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.465525] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.466106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.466687] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 836.467996] FAULT_INJECTION: forcing a failure. [ 836.467996] name failslab, interval 1, probability 0, space 0, times 0 [ 836.468933] FAULT_INJECTION: forcing a failure. [ 836.468933] name failslab, interval 1, probability 0, space 0, times 0 [ 836.469154] CPU: 0 PID: 8103 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 836.471248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.471919] Call Trace: [ 836.472137] dump_stack+0x107/0x167 [ 836.472435] should_fail.cold+0x5/0xa [ 836.472748] ? jbd2__journal_start+0x190/0x7e0 [ 836.473121] should_failslab+0x5/0x20 [ 836.473431] kmem_cache_alloc+0x5b/0x310 [ 836.473767] jbd2__journal_start+0x190/0x7e0 [ 836.474129] __ext4_journal_start_sb+0x214/0x390 [ 836.474519] ext4_dirty_inode+0xbc/0x130 [ 836.474851] ? ext4_setattr+0x2160/0x2160 [ 836.475189] __mark_inode_dirty+0x492/0xd40 [ 836.475552] touch_atime+0x5ea/0x6e0 [ 836.475860] ? atime_needs_update+0x600/0x600 [ 836.476223] ? add_to_page_cache_locked+0x40/0x40 [ 836.476621] generic_file_buffered_read+0x191a/0x2920 [ 836.477051] ? pagecache_get_page+0xc80/0xc80 [ 836.477419] ? __lock_acquire+0xbb1/0x5b00 [ 836.477769] generic_file_read_iter+0x33f/0x490 [ 836.478154] ext4_file_read_iter+0x184/0x4c0 [ 836.478516] __kernel_read+0x593/0xaa0 [ 836.478831] ? do_sendfile+0x1090/0x1090 [ 836.479163] ? _cond_resched+0x12/0x80 [ 836.479492] ? avc_policy_seqno+0x9/0x70 [ 836.479825] ? selinux_file_permission+0x92/0x520 [ 836.480222] ? lock_downgrade+0x6d0/0x6d0 [ 836.480564] kernel_read+0x52/0x70 [ 836.480856] bprm_execve+0x882/0x1a60 [ 836.481172] ? open_exec+0x70/0x70 [ 836.481464] ? memcpy+0x39/0x60 [ 836.481736] ? copy_string_kernel+0x3b6/0x450 [ 836.482106] do_execveat_common+0x772/0x8d0 [ 836.482459] ? bprm_execve+0x1a60/0x1a60 [ 836.482799] __x64_sys_execveat+0xed/0x140 [ 836.483147] do_syscall_64+0x33/0x40 [ 836.483456] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.483871] RIP: 0033:0x7f9509c8ab19 [ 836.484173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.485637] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.486250] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 836.486822] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.487396] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.487969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.488542] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 836.489145] CPU: 1 PID: 8106 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 836.490156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.491368] Call Trace: [ 836.491768] dump_stack+0x107/0x167 [ 836.492308] should_fail.cold+0x5/0xa [ 836.492870] ? __pmd_alloc+0x94/0x5e0 [ 836.493431] should_failslab+0x5/0x20 [ 836.493991] kmem_cache_alloc+0x5b/0x310 [ 836.494590] __pmd_alloc+0x94/0x5e0 [ 836.495129] handle_mm_fault+0x1ac4/0x3500 [ 836.495772] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 836.496534] ? SOFTIRQ_verbose+0x10/0x10 [ 836.497128] ? __pmd_alloc+0x5e0/0x5e0 [ 836.497721] __get_user_pages+0x6ec/0x1620 [ 836.498052] FAULT_INJECTION: forcing a failure. [ 836.498052] name failslab, interval 1, probability 0, space 0, times 0 [ 836.498354] ? follow_page_mask+0x1900/0x1900 [ 836.498379] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 836.500588] __get_user_pages_remote+0x1d5/0x870 [ 836.501284] ? lock_downgrade+0x6d0/0x6d0 [ 836.501897] get_user_pages_remote+0x63/0x90 [ 836.502549] get_arg_page+0xba/0x200 [ 836.503099] ? acct_arg_size+0xe0/0xe0 [ 836.503686] ? downgrade_write+0x3a0/0x3a0 [ 836.504314] ? count.constprop.0+0x1b3/0x290 [ 836.504967] copy_string_kernel+0x1b4/0x450 [ 836.505614] do_execveat_common+0x525/0x8d0 [ 836.506251] ? bprm_execve+0x1a60/0x1a60 [ 836.506864] __x64_sys_execveat+0xed/0x140 [ 836.507497] do_syscall_64+0x33/0x40 [ 836.508049] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.508796] RIP: 0033:0x7f2243400b19 [ 836.509344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.511989] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.513102] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 836.514139] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.515173] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.516217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.517247] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 836.518299] CPU: 0 PID: 8109 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 836.518849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.519520] Call Trace: [ 836.519734] dump_stack+0x107/0x167 [ 836.520030] should_fail.cold+0x5/0xa [ 836.520340] ? create_object.isra.0+0x3a/0xa20 [ 836.520709] should_failslab+0x5/0x20 [ 836.521022] kmem_cache_alloc+0x5b/0x310 [ 836.521356] create_object.isra.0+0x3a/0xa20 [ 836.521710] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 836.522123] __kmalloc+0x16e/0x390 [ 836.522417] security_prepare_creds+0x112/0x190 [ 836.522794] prepare_creds+0x452/0x5e0 [ 836.523111] prepare_exec_creds+0xd/0x260 [ 836.523457] bprm_execve+0x18f/0x1a60 [ 836.523766] ? acct_arg_size+0xe0/0xe0 [ 836.524080] ? downgrade_write+0x3a0/0x3a0 [ 836.524431] ? open_exec+0x70/0x70 [ 836.524721] ? memcpy+0x39/0x60 [ 836.524992] ? copy_string_kernel+0x3b6/0x450 [ 836.525360] do_execveat_common+0x772/0x8d0 [ 836.525712] ? bprm_execve+0x1a60/0x1a60 [ 836.526048] __x64_sys_execveat+0xed/0x140 [ 836.526396] do_syscall_64+0x33/0x40 [ 836.526700] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.527109] RIP: 0033:0x7f6383eb9b19 [ 836.527426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.528893] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.529507] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 836.530075] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.530645] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.531214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.531791] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 836.551562] FAULT_INJECTION: forcing a failure. [ 836.551562] name failslab, interval 1, probability 0, space 0, times 0 [ 836.553321] CPU: 1 PID: 8111 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 836.554323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 836.555541] Call Trace: [ 836.555937] dump_stack+0x107/0x167 [ 836.556480] should_fail.cold+0x5/0xa [ 836.557054] ? alloc_fdtable+0x84/0x280 [ 836.557647] should_failslab+0x5/0x20 [ 836.558216] kmem_cache_alloc_trace+0x55/0x320 [ 836.558895] ? rwlock_bug.part.0+0x90/0x90 [ 836.559541] alloc_fdtable+0x84/0x280 [ 836.560110] dup_fd+0x74d/0xcf0 [ 836.560626] unshare_files+0x175/0x270 [ 836.561205] ? __ia32_sys_unshare+0x40/0x40 [ 836.561854] ? get_user_pages_remote+0x63/0x90 [ 836.562529] ? get_user_pages_remote+0x6c/0x90 [ 836.563208] bprm_execve+0xcb/0x1a60 [ 836.563779] ? acct_arg_size+0xe0/0xe0 [ 836.564350] ? asm_sysvec_call_function_single+0x12/0x20 [ 836.565147] ? open_exec+0x70/0x70 [ 836.565678] ? memcpy+0x39/0x60 [ 836.566170] ? copy_string_kernel+0x3b6/0x450 [ 836.566848] do_execveat_common+0x772/0x8d0 [ 836.567499] ? bprm_execve+0x1a60/0x1a60 [ 836.568120] __x64_sys_execveat+0xed/0x140 [ 836.568755] do_syscall_64+0x33/0x40 [ 836.569303] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 836.570060] RIP: 0033:0x7f2f4d86bb19 [ 836.570618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 836.573291] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 836.574408] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 836.575463] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 836.576503] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 836.577543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 836.578693] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 850.196070] FAULT_INJECTION: forcing a failure. [ 850.196070] name failslab, interval 1, probability 0, space 0, times 0 [ 850.197258] CPU: 0 PID: 8123 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 850.197938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.198709] Call Trace: [ 850.198962] dump_stack+0x107/0x167 [ 850.199310] should_fail.cold+0x5/0xa [ 850.199674] ? create_object.isra.0+0x3a/0xa20 [ 850.200099] should_failslab+0x5/0x20 [ 850.200456] kmem_cache_alloc+0x5b/0x310 [ 850.200836] create_object.isra.0+0x3a/0xa20 [ 850.201277] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.201755] kmem_cache_alloc+0x159/0x310 [ 850.202153] ? shmem_destroy_inode+0x70/0x70 [ 850.202560] shmem_alloc_inode+0x18/0x40 [ 850.202941] ? shmem_destroy_inode+0x70/0x70 [ 850.203381] alloc_inode+0x63/0x240 [ 850.203732] new_inode+0x23/0x250 [ 850.204061] shmem_get_inode+0x15e/0xbc0 [ 850.204450] __shmem_file_setup+0xb8/0x320 [ 850.204875] ? _copy_from_user+0xfb/0x1b0 [ 850.205270] __do_sys_memfd_create+0x275/0x450 [ 850.205735] ? memfd_file_seals_ptr+0x170/0x170 [ 850.206179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 850.206665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 850.207192] do_syscall_64+0x33/0x40 [ 850.207549] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.208065] RIP: 0033:0x7fc547493b19 [ 850.208421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.210093] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 850.210856] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 850.211526] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 850.212186] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 850.212837] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 850.213009] FAULT_INJECTION: forcing a failure. [ 850.213009] name failslab, interval 1, probability 0, space 0, times 0 [ 850.213544] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 850.216394] CPU: 1 PID: 8125 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 850.217371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.218546] Call Trace: [ 850.218936] dump_stack+0x107/0x167 [ 850.219484] should_fail.cold+0x5/0xa 22:09:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 22:09:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 22:09:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 22:09:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) 22:09:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) setresuid(0x0, 0x0, 0x0) 22:09:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 5) 22:09:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 22:09:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) [ 850.220211] ? security_prepare_creds+0x112/0x190 [ 850.221043] should_failslab+0x5/0x20 [ 850.221587] __kmalloc+0x72/0x390 [ 850.222108] security_prepare_creds+0x112/0x190 [ 850.222778] prepare_creds+0x452/0x5e0 [ 850.223352] prepare_exec_creds+0xd/0x260 [ 850.223961] bprm_execve+0x18f/0x1a60 [ 850.224509] ? acct_arg_size+0xe0/0xe0 [ 850.225064] ? downgrade_write+0x3a0/0x3a0 [ 850.225674] ? open_exec+0x70/0x70 [ 850.226191] ? memcpy+0x39/0x60 [ 850.226666] ? copy_string_kernel+0x3b6/0x450 [ 850.227319] do_execveat_common+0x772/0x8d0 [ 850.227952] ? bprm_execve+0x1a60/0x1a60 [ 850.228566] __x64_sys_execveat+0xed/0x140 [ 850.229172] do_syscall_64+0x33/0x40 [ 850.229702] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.230429] RIP: 0033:0x7f6383eb9b19 [ 850.230961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.233545] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.234617] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 850.235630] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.236632] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.237640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.238653] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 850.243822] FAULT_INJECTION: forcing a failure. [ 850.243822] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 850.245562] CPU: 1 PID: 8127 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 850.246534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.246695] FAULT_INJECTION: forcing a failure. [ 850.246695] name failslab, interval 1, probability 0, space 0, times 0 [ 850.247715] Call Trace: [ 850.247734] dump_stack+0x107/0x167 [ 850.247755] should_fail.cold+0x5/0xa [ 850.250231] __alloc_pages_nodemask+0x182/0x600 [ 850.250905] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 850.251785] ? kmem_cache_alloc+0x301/0x310 [ 850.252413] alloc_pages_current+0x187/0x280 [ 850.253054] allocate_slab+0x26f/0x380 [ 850.253621] ___slab_alloc+0x470/0x700 [ 850.254192] ? __pmd_alloc+0x94/0x5e0 [ 850.254752] ? __pmd_alloc+0x94/0x5e0 [ 850.255306] ? kmem_cache_alloc+0x301/0x310 [ 850.255957] kmem_cache_alloc+0x301/0x310 [ 850.256562] __pmd_alloc+0x94/0x5e0 [ 850.257110] handle_mm_fault+0x1ac4/0x3500 [ 850.257730] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 850.258510] ? SOFTIRQ_verbose+0x10/0x10 [ 850.259112] ? __pmd_alloc+0x5e0/0x5e0 [ 850.259722] __get_user_pages+0x6ec/0x1620 [ 850.260368] ? follow_page_mask+0x1900/0x1900 [ 850.261035] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 850.261739] __get_user_pages_remote+0x1d5/0x870 [ 850.262444] ? lock_downgrade+0x6d0/0x6d0 [ 850.263064] get_user_pages_remote+0x63/0x90 [ 850.263729] get_arg_page+0xba/0x200 [ 850.264288] ? acct_arg_size+0xe0/0xe0 [ 850.264862] ? downgrade_write+0x3a0/0x3a0 [ 850.265492] ? count.constprop.0+0x1b3/0x290 [ 850.266149] copy_string_kernel+0x1b4/0x450 [ 850.266798] do_execveat_common+0x525/0x8d0 [ 850.267449] ? bprm_execve+0x1a60/0x1a60 [ 850.268068] __x64_sys_execveat+0xed/0x140 [ 850.268705] do_syscall_64+0x33/0x40 [ 850.269258] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.270015] RIP: 0033:0x7f2243400b19 [ 850.270552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.273266] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.274390] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 850.275446] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.276501] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.277552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.278605] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 850.279685] CPU: 0 PID: 8133 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 850.280391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.281208] Call Trace: [ 850.281473] dump_stack+0x107/0x167 [ 850.281845] should_fail.cold+0x5/0xa [ 850.282232] ? prepare_creds+0x25/0x5e0 [ 850.282631] should_failslab+0x5/0x20 [ 850.283009] kmem_cache_alloc+0x5b/0x310 [ 850.283427] ? __ia32_sys_unshare+0x40/0x40 [ 850.283861] prepare_creds+0x25/0x5e0 [ 850.284246] prepare_exec_creds+0xd/0x260 [ 850.284656] bprm_execve+0x18f/0x1a60 [ 850.285035] ? acct_arg_size+0xe0/0xe0 [ 850.285419] ? downgrade_write+0x3a0/0x3a0 [ 850.285841] ? open_exec+0x70/0x70 [ 850.286196] ? memcpy+0x39/0x60 [ 850.286536] ? copy_string_kernel+0x3b6/0x450 [ 850.286949] do_execveat_common+0x772/0x8d0 [ 850.287389] ? bprm_execve+0x1a60/0x1a60 [ 850.287776] __x64_sys_execveat+0xed/0x140 [ 850.288198] do_syscall_64+0x33/0x40 [ 850.288564] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.289066] RIP: 0033:0x7f70da682b19 [ 850.289438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.291268] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.292030] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 850.292726] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.293422] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.294110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.294805] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 850.306040] FAULT_INJECTION: forcing a failure. [ 850.306040] name failslab, interval 1, probability 0, space 0, times 0 [ 850.307227] CPU: 0 PID: 8132 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 850.307897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.308716] Call Trace: [ 850.308976] dump_stack+0x107/0x167 [ 850.309337] should_fail.cold+0x5/0xa [ 850.309714] ? create_object.isra.0+0x3a/0xa20 [ 850.310172] should_failslab+0x5/0x20 [ 850.310553] kmem_cache_alloc+0x5b/0x310 [ 850.310960] create_object.isra.0+0x3a/0xa20 [ 850.311391] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.311903] kmem_cache_alloc+0x159/0x310 [ 850.312317] dup_fd+0x89/0xcf0 [ 850.312646] unshare_files+0x175/0x270 [ 850.313033] ? __ia32_sys_unshare+0x40/0x40 [ 850.313465] ? get_user_pages_remote+0x63/0x90 [ 850.313908] ? get_user_pages_remote+0x6c/0x90 [ 850.314363] bprm_execve+0xcb/0x1a60 [ 850.314726] ? acct_arg_size+0xe0/0xe0 [ 850.315117] ? downgrade_write+0x3a0/0x3a0 [ 850.315546] ? open_exec+0x70/0x70 [ 850.315897] ? memcpy+0x39/0x60 [ 850.316226] ? copy_string_kernel+0x3b6/0x450 [ 850.316668] do_execveat_common+0x772/0x8d0 [ 850.317092] ? bprm_execve+0x1a60/0x1a60 [ 850.317507] __x64_sys_execveat+0xed/0x140 [ 850.317927] do_syscall_64+0x33/0x40 [ 850.318296] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.318796] RIP: 0033:0x7f1c8836fb19 [ 850.319155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.320949] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.321696] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 850.322405] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.323108] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.323811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.324511] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 850.325379] FAULT_INJECTION: forcing a failure. [ 850.325379] name failslab, interval 1, probability 0, space 0, times 0 [ 850.326491] CPU: 0 PID: 8134 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 850.327156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.327964] Call Trace: [ 850.328228] dump_stack+0x107/0x167 [ 850.328583] should_fail.cold+0x5/0xa [ 850.328963] ? create_object.isra.0+0x3a/0xa20 [ 850.329411] should_failslab+0x5/0x20 [ 850.329777] kmem_cache_alloc+0x5b/0x310 [ 850.330179] create_object.isra.0+0x3a/0xa20 [ 850.330616] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.331114] kmem_cache_alloc+0x159/0x310 [ 850.331536] jbd2__journal_start+0x190/0x7e0 [ 850.331968] __ext4_journal_start_sb+0x214/0x390 [ 850.332444] ext4_dirty_inode+0xbc/0x130 [ 850.332848] ? ext4_setattr+0x2160/0x2160 [ 850.333250] __mark_inode_dirty+0x492/0xd40 [ 850.333671] touch_atime+0x5ea/0x6e0 [ 850.334041] ? atime_needs_update+0x600/0x600 [ 850.334480] ? add_to_page_cache_locked+0x40/0x40 [ 850.334959] generic_file_buffered_read+0x191a/0x2920 [ 850.335486] ? pagecache_get_page+0xc80/0xc80 [ 850.335932] ? __lock_acquire+0xbb1/0x5b00 [ 850.336353] generic_file_read_iter+0x33f/0x490 [ 850.336822] ext4_file_read_iter+0x184/0x4c0 [ 850.337262] __kernel_read+0x593/0xaa0 [ 850.337641] ? do_sendfile+0x1090/0x1090 [ 850.338038] ? _cond_resched+0x12/0x80 [ 850.338422] ? avc_policy_seqno+0x9/0x70 [ 850.338820] ? selinux_file_permission+0x92/0x520 [ 850.339294] ? lock_downgrade+0x6d0/0x6d0 [ 850.339703] kernel_read+0x52/0x70 [ 850.340058] bprm_execve+0x882/0x1a60 [ 850.340438] ? open_exec+0x70/0x70 [ 850.340789] ? memcpy+0x39/0x60 [ 850.341112] ? copy_string_kernel+0x3b6/0x450 [ 850.341555] do_execveat_common+0x772/0x8d0 [ 850.341979] ? bprm_execve+0x1a60/0x1a60 [ 850.342394] __x64_sys_execveat+0xed/0x140 [ 850.342809] do_syscall_64+0x33/0x40 [ 850.343167] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.343666] RIP: 0033:0x7f9509c8ab19 [ 850.344031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.345798] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.346545] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 850.347231] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.347942] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.348618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.349294] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 850.358029] FAULT_INJECTION: forcing a failure. [ 850.358029] name failslab, interval 1, probability 0, space 0, times 0 [ 850.359207] CPU: 0 PID: 8142 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 850.359863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.360642] Call Trace: [ 850.360893] dump_stack+0x107/0x167 [ 850.361242] should_fail.cold+0x5/0xa [ 850.361604] ? create_object.isra.0+0x3a/0xa20 [ 850.362035] should_failslab+0x5/0x20 [ 850.362396] kmem_cache_alloc+0x5b/0x310 [ 850.362781] create_object.isra.0+0x3a/0xa20 [ 850.363200] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.363689] __kmalloc_node+0x1ae/0x420 [ 850.364075] kvmalloc_node+0x119/0x170 [ 850.364447] alloc_fdtable+0xd3/0x280 [ 850.364807] dup_fd+0x74d/0xcf0 [ 850.365133] unshare_files+0x175/0x270 [ 850.365508] ? __ia32_sys_unshare+0x40/0x40 [ 850.365921] ? get_user_pages_remote+0x63/0x90 [ 850.366358] ? get_user_pages_remote+0x6c/0x90 [ 850.366797] bprm_execve+0xcb/0x1a60 [ 850.367154] ? acct_arg_size+0xe0/0xe0 [ 850.367532] ? downgrade_write+0x3a0/0x3a0 [ 850.367934] ? open_exec+0x70/0x70 [ 850.368272] ? memcpy+0x39/0x60 [ 850.368588] ? copy_string_kernel+0x3b6/0x450 [ 850.369022] do_execveat_common+0x772/0x8d0 [ 850.369437] ? bprm_execve+0x1a60/0x1a60 [ 850.369837] __x64_sys_execveat+0xed/0x140 [ 850.370239] do_syscall_64+0x33/0x40 [ 850.370594] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.371078] RIP: 0033:0x7f2f4d86bb19 [ 850.371437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.373158] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.373872] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 850.374548] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.375211] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.375889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.376566] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 22:09:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 850.405842] FAULT_INJECTION: forcing a failure. [ 850.405842] name failslab, interval 1, probability 0, space 0, times 0 [ 850.407633] CPU: 1 PID: 8145 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 850.408632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.409843] Call Trace: [ 850.410242] dump_stack+0x107/0x167 [ 850.410788] should_fail.cold+0x5/0xa [ 850.411355] ? create_object.isra.0+0x3a/0xa20 [ 850.412042] should_failslab+0x5/0x20 [ 850.412606] kmem_cache_alloc+0x5b/0x310 [ 850.413217] create_object.isra.0+0x3a/0xa20 [ 850.413862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.414610] kmem_cache_alloc+0x159/0x310 [ 850.415229] __alloc_file+0x21/0x320 [ 850.415782] alloc_empty_file+0x6d/0x170 [ 850.416381] path_openat+0xe3/0x26e0 [ 850.416931] ? lock_chain_count+0x20/0x20 [ 850.417541] ? stack_trace_save+0x8c/0xc0 [ 850.418150] ? stack_trace_consume_entry+0x160/0x160 [ 850.418905] ? path_lookupat+0x860/0x860 [ 850.419516] ? kasan_save_stack+0x32/0x40 [ 850.420132] ? kasan_save_stack+0x1b/0x40 [ 850.420736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.421491] ? security_prepare_creds+0x112/0x190 [ 850.422191] ? prepare_creds+0x452/0x5e0 [ 850.422794] ? prepare_exec_creds+0xd/0x260 [ 850.423429] ? bprm_execve+0x18f/0x1a60 [ 850.424018] do_filp_open+0x190/0x3e0 [ 850.424577] ? may_open_dev+0xf0/0xf0 [ 850.425155] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 850.425919] ? SOFTIRQ_verbose+0x10/0x10 [ 850.426523] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 850.427337] ? find_held_lock+0x2c/0x110 [ 850.427949] do_open_execat+0x116/0x690 [ 850.428539] ? __do_sys_uselib+0x5e0/0x5e0 [ 850.429162] ? do_raw_spin_lock+0x121/0x260 [ 850.429798] ? rwlock_bug.part.0+0x90/0x90 [ 850.430432] bprm_execve+0x55e/0x1a60 [ 850.431000] ? open_exec+0x70/0x70 [ 850.431535] ? memcpy+0x39/0x60 [ 850.432025] ? copy_string_kernel+0x3b6/0x450 [ 850.432702] do_execveat_common+0x772/0x8d0 [ 850.433336] ? bprm_execve+0x1a60/0x1a60 [ 850.433954] __x64_sys_execveat+0xed/0x140 [ 850.434576] do_syscall_64+0x33/0x40 [ 850.435126] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.435875] RIP: 0033:0x7f6383eb9b19 [ 850.436420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.439039] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.440154] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 850.441189] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.442217] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.443234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.444271] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 850.459279] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:09:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 850.555752] FAULT_INJECTION: forcing a failure. [ 850.555752] name failslab, interval 1, probability 0, space 0, times 0 [ 850.556765] CPU: 0 PID: 8152 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 850.557352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 850.558064] Call Trace: [ 850.558301] dump_stack+0x107/0x167 [ 850.558620] should_fail.cold+0x5/0xa [ 850.558958] ? create_object.isra.0+0x3a/0xa20 [ 850.559357] should_failslab+0x5/0x20 [ 850.559696] kmem_cache_alloc+0x5b/0x310 [ 850.560054] create_object.isra.0+0x3a/0xa20 [ 850.560434] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 850.560876] __kmalloc+0x16e/0x390 [ 850.561197] security_prepare_creds+0x112/0x190 [ 850.561603] prepare_creds+0x452/0x5e0 [ 850.561949] prepare_exec_creds+0xd/0x260 [ 850.562311] bprm_execve+0x18f/0x1a60 [ 850.562638] ? acct_arg_size+0xe0/0xe0 [ 850.562974] ? downgrade_write+0x3a0/0x3a0 [ 850.563344] ? open_exec+0x70/0x70 [ 850.563659] ? memcpy+0x39/0x60 [ 850.563953] ? copy_string_kernel+0x3b6/0x450 [ 850.564349] do_execveat_common+0x772/0x8d0 [ 850.564719] ? bprm_execve+0x1a60/0x1a60 [ 850.565083] __x64_sys_execveat+0xed/0x140 [ 850.565448] do_syscall_64+0x33/0x40 [ 850.565765] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 850.566199] RIP: 0033:0x7f70da682b19 [ 850.566525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 850.568078] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 850.568734] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 850.569337] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 850.569942] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 850.570546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 850.571153] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:09:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 22:09:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 865.541203] FAULT_INJECTION: forcing a failure. [ 865.541203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 865.543746] CPU: 1 PID: 8160 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 865.544961] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.546431] Call Trace: [ 865.546925] dump_stack+0x107/0x167 [ 865.547619] should_fail.cold+0x5/0xa [ 865.548403] __alloc_pages_nodemask+0x182/0x600 22:09:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 22:09:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 6) 22:09:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) setresuid(0x0, 0x0, 0x0) 22:09:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 22:09:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 22:09:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) [ 865.549359] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 865.550845] ? find_held_lock+0x2c/0x110 [ 865.551686] ? __pmd_alloc+0x2db/0x5e0 [ 865.552466] ? lock_downgrade+0x6d0/0x6d0 [ 865.553310] ? do_raw_spin_lock+0x121/0x260 [ 865.554163] alloc_pages_current+0x187/0x280 [ 865.555002] pte_alloc_one+0x16/0x1a0 [ 865.555784] __pte_alloc+0x1d/0x330 [ 865.556485] handle_mm_fault+0x287f/0x3500 [ 865.557291] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 865.558345] ? SOFTIRQ_verbose+0x10/0x10 [ 865.559160] ? __pmd_alloc+0x5e0/0x5e0 [ 865.559943] __get_user_pages+0x6ec/0x1620 [ 865.560705] ? follow_page_mask+0x1900/0x1900 [ 865.561500] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 865.562354] __get_user_pages_remote+0x1d5/0x870 [ 865.563311] ? lock_downgrade+0x6d0/0x6d0 [ 865.564090] get_user_pages_remote+0x63/0x90 [ 865.564923] get_arg_page+0xba/0x200 [ 865.565672] ? acct_arg_size+0xe0/0xe0 [ 865.566406] ? downgrade_write+0x3a0/0x3a0 [ 865.567243] ? count.constprop.0+0x1b3/0x290 [ 865.568130] copy_string_kernel+0x1b4/0x450 [ 865.568991] do_execveat_common+0x525/0x8d0 [ 865.569851] ? bprm_execve+0x1a60/0x1a60 [ 865.570638] __x64_sys_execveat+0xed/0x140 [ 865.571413] FAULT_INJECTION: forcing a failure. [ 865.571413] name failslab, interval 1, probability 0, space 0, times 0 [ 865.573420] do_syscall_64+0x33/0x40 [ 865.574138] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.574976] RIP: 0033:0x7f2243400b19 [ 865.575621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.578712] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.580203] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 865.581577] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.582877] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.584136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.585454] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 865.586862] CPU: 0 PID: 8164 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 865.587920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.589106] Call Trace: [ 865.589494] dump_stack+0x107/0x167 [ 865.590017] should_fail.cold+0x5/0xa [ 865.590573] ? security_file_alloc+0x34/0x170 [ 865.591216] should_failslab+0x5/0x20 [ 865.591776] kmem_cache_alloc+0x5b/0x310 [ 865.592383] security_file_alloc+0x34/0x170 [ 865.593003] __alloc_file+0xb7/0x320 [ 865.593542] alloc_empty_file+0x6d/0x170 [ 865.594124] path_openat+0xe3/0x26e0 [ 865.594679] ? lock_chain_count+0x20/0x20 [ 865.595285] ? stack_trace_save+0x8c/0xc0 [ 865.595891] ? stack_trace_consume_entry+0x160/0x160 [ 865.596635] ? path_lookupat+0x860/0x860 [ 865.597232] ? kasan_save_stack+0x32/0x40 [ 865.597819] ? kasan_save_stack+0x1b/0x40 [ 865.598411] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.599131] ? security_prepare_creds+0x112/0x190 [ 865.599834] ? prepare_creds+0x452/0x5e0 [ 865.600422] ? prepare_exec_creds+0xd/0x260 [ 865.601044] ? bprm_execve+0x18f/0x1a60 [ 865.601620] do_filp_open+0x190/0x3e0 [ 865.602163] ? may_open_dev+0xf0/0xf0 [ 865.602728] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 865.603459] ? SOFTIRQ_verbose+0x10/0x10 [ 865.604042] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 865.604831] ? find_held_lock+0x2c/0x110 [ 865.605652] do_open_execat+0x116/0x690 [ 865.606210] ? __do_sys_uselib+0x5e0/0x5e0 [ 865.606800] ? do_raw_spin_lock+0x121/0x260 [ 865.607409] ? rwlock_bug.part.0+0x90/0x90 [ 865.608016] bprm_execve+0x55e/0x1a60 [ 865.608560] ? open_exec+0x70/0x70 [ 865.609058] ? memcpy+0x39/0x60 [ 865.609516] ? copy_string_kernel+0x3b6/0x450 [ 865.610151] do_execveat_common+0x772/0x8d0 [ 865.610749] ? bprm_execve+0x1a60/0x1a60 [ 865.611336] __x64_sys_execveat+0xed/0x140 [ 865.611931] do_syscall_64+0x33/0x40 [ 865.612457] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.613169] RIP: 0033:0x7f6383eb9b19 [ 865.613689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.616217] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.617320] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 865.618313] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.619304] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.620346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.621382] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 865.633910] FAULT_INJECTION: forcing a failure. [ 865.633910] name failslab, interval 1, probability 0, space 0, times 0 [ 865.634791] FAULT_INJECTION: forcing a failure. [ 865.634791] name failslab, interval 1, probability 0, space 0, times 0 [ 865.635559] CPU: 0 PID: 8167 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 865.638561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.639749] Call Trace: [ 865.640134] dump_stack+0x107/0x167 [ 865.640653] should_fail.cold+0x5/0xa [ 865.641202] ? security_inode_alloc+0x34/0x160 [ 865.641842] should_failslab+0x5/0x20 [ 865.642384] kmem_cache_alloc+0x5b/0x310 [ 865.642972] security_inode_alloc+0x34/0x160 [ 865.643593] inode_init_always+0xa4e/0xd10 [ 865.644203] ? shmem_destroy_inode+0x70/0x70 [ 865.644819] alloc_inode+0x84/0x240 [ 865.645327] new_inode+0x23/0x250 [ 865.645819] shmem_get_inode+0x15e/0xbc0 [ 865.646399] __shmem_file_setup+0xb8/0x320 [ 865.646996] ? _copy_from_user+0xfb/0x1b0 [ 865.647582] __do_sys_memfd_create+0x275/0x450 [ 865.648255] ? memfd_file_seals_ptr+0x170/0x170 [ 865.648914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 865.649645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 865.650374] do_syscall_64+0x33/0x40 [ 865.650899] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.651660] RIP: 0033:0x7fc547493b19 [ 865.652188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.654806] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 865.655940] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 865.656980] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 865.658009] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 865.659054] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 865.660089] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 865.661157] CPU: 1 PID: 8165 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 865.662303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.663581] Call Trace: [ 865.664189] dump_stack+0x107/0x167 [ 865.664999] should_fail.cold+0x5/0xa [ 865.665626] ? security_prepare_creds+0x112/0x190 [ 865.666405] should_failslab+0x5/0x20 [ 865.667016] __kmalloc+0x72/0x390 [ 865.667596] security_prepare_creds+0x112/0x190 [ 865.668348] prepare_creds+0x452/0x5e0 [ 865.668962] prepare_exec_creds+0xd/0x260 [ 865.669635] bprm_execve+0x18f/0x1a60 [ 865.670246] ? acct_arg_size+0xe0/0xe0 [ 865.670846] ? downgrade_write+0x3a0/0x3a0 [ 865.671527] ? open_exec+0x70/0x70 [ 865.672105] ? memcpy+0x39/0x60 [ 865.672694] ? copy_string_kernel+0x3b6/0x450 [ 865.673646] do_execveat_common+0x772/0x8d0 [ 865.674344] ? bprm_execve+0x1a60/0x1a60 [ 865.674987] __x64_sys_execveat+0xed/0x140 [ 865.675680] do_syscall_64+0x33/0x40 [ 865.676276] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.677091] RIP: 0033:0x7f70da682b19 [ 865.677762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.680990] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.681741] FAULT_INJECTION: forcing a failure. [ 865.681741] name failslab, interval 1, probability 0, space 0, times 0 [ 865.682255] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 865.682269] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.682289] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.687194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.688322] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 865.689465] CPU: 0 PID: 8171 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 865.690468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.691679] Call Trace: [ 865.692069] dump_stack+0x107/0x167 [ 865.692602] should_fail.cold+0x5/0xa [ 865.693163] ? alloc_fdtable+0x84/0x280 [ 865.693752] should_failslab+0x5/0x20 [ 865.694299] kmem_cache_alloc_trace+0x55/0x320 [ 865.694973] ? rwlock_bug.part.0+0x90/0x90 [ 865.695597] alloc_fdtable+0x84/0x280 [ 865.696168] dup_fd+0x74d/0xcf0 [ 865.696667] unshare_files+0x175/0x270 [ 865.697222] ? __ia32_sys_unshare+0x40/0x40 [ 865.697862] ? get_user_pages_remote+0x63/0x90 [ 865.698503] ? get_user_pages_remote+0x6c/0x90 [ 865.699153] bprm_execve+0xcb/0x1a60 [ 865.699721] ? acct_arg_size+0xe0/0xe0 [ 865.700283] ? downgrade_write+0x3a0/0x3a0 [ 865.700887] ? open_exec+0x70/0x70 [ 865.701405] ? memcpy+0x39/0x60 [ 865.701884] ? copy_string_kernel+0x3b6/0x450 [ 865.702520] do_execveat_common+0x772/0x8d0 [ 865.703131] ? bprm_execve+0x1a60/0x1a60 [ 865.703750] __x64_sys_execveat+0xed/0x140 [ 865.704386] do_syscall_64+0x33/0x40 [ 865.704919] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.705640] RIP: 0033:0x7f1c8836fb19 [ 865.706168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.709159] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.710474] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 865.711720] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.712838] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.713854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.714891] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 865.724723] FAULT_INJECTION: forcing a failure. 22:09:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 865.724723] name failslab, interval 1, probability 0, space 0, times 0 [ 865.726592] CPU: 1 PID: 8173 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 865.727569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.728769] Call Trace: [ 865.729158] dump_stack+0x107/0x167 [ 865.729689] should_fail.cold+0x5/0xa [ 865.730219] ? __request_module+0x2e0/0x920 [ 865.730848] ? bprm_execve+0xbe6/0x1a60 [ 865.731433] should_failslab+0x5/0x20 [ 865.731968] kmem_cache_alloc_trace+0x55/0x320 [ 865.732649] ? bprm_execve+0xbe6/0x1a60 [ 865.733202] __request_module+0x2e0/0x920 [ 865.733809] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 865.734571] ? free_modprobe_argv+0x90/0x90 [ 865.735205] ? find_held_lock+0x2c/0x110 [ 865.735793] ? find_held_lock+0x2c/0x110 [ 865.736382] ? bprm_execve+0xa13/0x1a60 [ 865.736967] ? lock_downgrade+0x6d0/0x6d0 [ 865.737551] ? elf_core_dump+0x3c50/0x3c50 [ 865.738153] ? do_raw_read_unlock+0x3b/0x70 [ 865.738774] ? _raw_read_unlock+0x1a/0x30 [ 865.739378] ? load_misc_binary+0x605/0xb70 [ 865.740004] bprm_execve+0xbe6/0x1a60 [ 865.740575] ? open_exec+0x70/0x70 [ 865.741075] ? memcpy+0x39/0x60 [ 865.741562] ? copy_string_kernel+0x3b6/0x450 [ 865.742218] do_execveat_common+0x772/0x8d0 [ 865.742826] ? bprm_execve+0x1a60/0x1a60 [ 865.743438] __x64_sys_execveat+0xed/0x140 [ 865.744039] do_syscall_64+0x33/0x40 [ 865.744583] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.745314] RIP: 0033:0x7f9509c8ab19 [ 865.745835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.748484] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.749583] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 865.750609] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.751601] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.752636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.753648] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:09:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) [ 865.762924] FAULT_INJECTION: forcing a failure. [ 865.762924] name failslab, interval 1, probability 0, space 0, times 0 [ 865.764590] CPU: 1 PID: 8174 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 865.765547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.766701] Call Trace: [ 865.767089] dump_stack+0x107/0x167 [ 865.767636] should_fail.cold+0x5/0xa [ 865.768201] ? kvmalloc_node+0x119/0x170 [ 865.768803] should_failslab+0x5/0x20 [ 865.769361] __kmalloc_node+0x76/0x420 [ 865.769936] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.770690] kvmalloc_node+0x119/0x170 [ 865.771248] alloc_fdtable+0x13f/0x280 [ 865.771831] dup_fd+0x74d/0xcf0 [ 865.772336] unshare_files+0x175/0x270 [ 865.772909] ? __ia32_sys_unshare+0x40/0x40 [ 865.773549] ? get_user_pages_remote+0x63/0x90 [ 865.774220] ? get_user_pages_remote+0x6c/0x90 [ 865.774872] bprm_execve+0xcb/0x1a60 [ 865.775429] ? acct_arg_size+0xe0/0xe0 [ 865.775987] ? downgrade_write+0x3a0/0x3a0 [ 865.776611] ? open_exec+0x70/0x70 [ 865.777136] ? memcpy+0x39/0x60 [ 865.777630] ? copy_string_kernel+0x3b6/0x450 [ 865.778303] do_execveat_common+0x772/0x8d0 [ 865.778923] ? bprm_execve+0x1a60/0x1a60 [ 865.779541] __x64_sys_execveat+0xed/0x140 [ 865.780176] do_syscall_64+0x33/0x40 [ 865.780727] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.781476] RIP: 0033:0x7f2f4d86bb19 [ 865.782024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.784579] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.785694] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 865.786730] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.787776] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.788810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.789825] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:09:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) setresuid(0x0, 0x0, 0x0) 22:09:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 7) 22:09:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 865.831748] FAULT_INJECTION: forcing a failure. [ 865.831748] name failslab, interval 1, probability 0, space 0, times 0 [ 865.833581] CPU: 0 PID: 8176 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 865.834587] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.835795] Call Trace: [ 865.836191] dump_stack+0x107/0x167 [ 865.836741] should_fail.cold+0x5/0xa [ 865.837315] ? ptlock_alloc+0x1d/0x70 [ 865.837891] should_failslab+0x5/0x20 [ 865.838458] kmem_cache_alloc+0x5b/0x310 [ 865.839072] ptlock_alloc+0x1d/0x70 [ 865.839638] pte_alloc_one+0x68/0x1a0 [ 865.840209] __pte_alloc+0x1d/0x330 [ 865.840766] handle_mm_fault+0x287f/0x3500 [ 865.841408] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 865.842179] ? SOFTIRQ_verbose+0x10/0x10 [ 865.842790] ? __pmd_alloc+0x5e0/0x5e0 [ 865.843403] __get_user_pages+0x6ec/0x1620 [ 865.844061] ? follow_page_mask+0x1900/0x1900 [ 865.844742] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 865.845459] __get_user_pages_remote+0x1d5/0x870 [ 865.846160] ? lock_downgrade+0x6d0/0x6d0 [ 865.846790] get_user_pages_remote+0x63/0x90 [ 865.847457] get_arg_page+0xba/0x200 [ 865.848029] ? acct_arg_size+0xe0/0xe0 [ 865.848611] ? downgrade_write+0x3a0/0x3a0 [ 865.849243] ? count.constprop.0+0x1b3/0x290 [ 865.849902] copy_string_kernel+0x1b4/0x450 [ 865.850560] do_execveat_common+0x525/0x8d0 [ 865.851207] ? bprm_execve+0x1a60/0x1a60 [ 865.851839] __x64_sys_execveat+0xed/0x140 [ 865.852470] do_syscall_64+0x33/0x40 [ 865.853030] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.853788] RIP: 0033:0x7f2243400b19 [ 865.854339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.857015] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.858130] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 865.859178] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.859759] FAULT_INJECTION: forcing a failure. [ 865.859759] name failslab, interval 1, probability 0, space 0, times 0 [ 865.860227] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.860241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.860264] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 865.864927] CPU: 1 PID: 8182 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 865.865941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.867135] Call Trace: [ 865.867530] dump_stack+0x107/0x167 [ 865.868077] should_fail.cold+0x5/0xa [ 865.868646] ? create_object.isra.0+0x3a/0xa20 [ 865.869317] should_failslab+0x5/0x20 [ 865.869863] kmem_cache_alloc+0x5b/0x310 [ 865.870462] create_object.isra.0+0x3a/0xa20 [ 865.871109] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.871832] kmem_cache_alloc+0x159/0x310 [ 865.872451] security_inode_alloc+0x34/0x160 [ 865.873075] inode_init_always+0xa4e/0xd10 [ 865.873701] ? shmem_destroy_inode+0x70/0x70 [ 865.874349] alloc_inode+0x84/0x240 [ 865.874882] new_inode+0x23/0x250 [ 865.875378] shmem_get_inode+0x15e/0xbc0 [ 865.875990] __shmem_file_setup+0xb8/0x320 [ 865.876599] ? _copy_from_user+0xfb/0x1b0 [ 865.877189] __do_sys_memfd_create+0x275/0x450 [ 865.877863] ? memfd_file_seals_ptr+0x170/0x170 [ 865.878548] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 865.879315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 865.880039] do_syscall_64+0x33/0x40 [ 865.880589] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.881302] RIP: 0033:0x7fc547493b19 [ 865.881848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.884394] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 865.885494] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 865.886483] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 865.887515] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 865.888556] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 865.889586] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 865.894906] FAULT_INJECTION: forcing a failure. [ 865.894906] name failslab, interval 1, probability 0, space 0, times 0 [ 865.896600] CPU: 0 PID: 8184 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 865.897617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.898827] Call Trace: [ 865.899222] dump_stack+0x107/0x167 [ 865.899786] should_fail.cold+0x5/0xa [ 865.900348] ? create_object.isra.0+0x3a/0xa20 [ 865.901012] should_failslab+0x5/0x20 [ 865.901569] kmem_cache_alloc+0x5b/0x310 [ 865.902183] create_object.isra.0+0x3a/0xa20 [ 865.902827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.903599] __kmalloc+0x16e/0x390 [ 865.904150] security_prepare_creds+0x112/0x190 [ 865.904848] prepare_creds+0x452/0x5e0 [ 865.905426] prepare_exec_creds+0xd/0x260 [ 865.906036] bprm_execve+0x18f/0x1a60 [ 865.906605] ? acct_arg_size+0xe0/0xe0 [ 865.907188] ? downgrade_write+0x3a0/0x3a0 [ 865.907822] ? open_exec+0x70/0x70 [ 865.908348] ? memcpy+0x39/0x60 [ 865.908841] ? copy_string_kernel+0x3b6/0x450 [ 865.909504] do_execveat_common+0x772/0x8d0 [ 865.910145] ? bprm_execve+0x1a60/0x1a60 [ 865.910763] __x64_sys_execveat+0xed/0x140 [ 865.911389] do_syscall_64+0x33/0x40 [ 865.911941] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.912694] RIP: 0033:0x7f70da682b19 [ 865.913252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.915952] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.917074] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 865.918126] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.919169] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.920218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.921257] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 865.931692] FAULT_INJECTION: forcing a failure. [ 865.931692] name failslab, interval 1, probability 0, space 0, times 0 [ 865.933372] CPU: 0 PID: 8178 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 865.934374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.935603] Call Trace: [ 865.936013] dump_stack+0x107/0x167 [ 865.936565] should_fail.cold+0x5/0xa [ 865.937144] ? create_object.isra.0+0x3a/0xa20 [ 865.937835] should_failslab+0x5/0x20 [ 865.938410] kmem_cache_alloc+0x5b/0x310 [ 865.939036] create_object.isra.0+0x3a/0xa20 [ 865.939698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.940466] kmem_cache_alloc+0x159/0x310 [ 865.941099] __alloc_file+0x21/0x320 [ 865.941658] alloc_empty_file+0x6d/0x170 [ 865.942264] path_openat+0xe3/0x26e0 [ 865.942834] ? lock_chain_count+0x20/0x20 [ 865.943449] ? stack_trace_save+0x8c/0xc0 [ 865.944076] ? stack_trace_consume_entry+0x160/0x160 [ 865.944834] ? path_lookupat+0x860/0x860 [ 865.945463] ? kasan_save_stack+0x32/0x40 [ 865.946085] ? kasan_save_stack+0x1b/0x40 [ 865.946702] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 865.947452] ? security_prepare_creds+0x112/0x190 [ 865.948192] ? prepare_creds+0x452/0x5e0 [ 865.948800] ? prepare_exec_creds+0xd/0x260 [ 865.949442] ? bprm_execve+0x18f/0x1a60 [ 865.950034] do_filp_open+0x190/0x3e0 [ 865.950607] ? may_open_dev+0xf0/0xf0 [ 865.951207] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 865.951991] ? SOFTIRQ_verbose+0x10/0x10 [ 865.952612] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 865.953444] ? find_held_lock+0x2c/0x110 [ 865.954053] do_open_execat+0x116/0x690 [ 865.954655] ? __do_sys_uselib+0x5e0/0x5e0 [ 865.955292] ? do_raw_spin_lock+0x121/0x260 [ 865.955949] ? rwlock_bug.part.0+0x90/0x90 [ 865.956603] bprm_execve+0x55e/0x1a60 [ 865.957185] ? open_exec+0x70/0x70 [ 865.957713] ? memcpy+0x39/0x60 [ 865.958211] ? copy_string_kernel+0x3b6/0x450 [ 865.958896] do_execveat_common+0x772/0x8d0 [ 865.959541] ? bprm_execve+0x1a60/0x1a60 [ 865.960178] __x64_sys_execveat+0xed/0x140 [ 865.960818] do_syscall_64+0x33/0x40 [ 865.961378] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 865.962145] RIP: 0033:0x7f6383eb9b19 [ 865.962707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.965395] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 865.966521] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 865.967582] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 865.968651] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 865.969699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.970750] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:09:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 22:09:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 22:09:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 22:09:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) [ 866.060744] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 866.073404] FAULT_INJECTION: forcing a failure. [ 866.073404] name failslab, interval 1, probability 0, space 0, times 0 [ 866.075317] CPU: 1 PID: 8195 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 866.076328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.077203] FAULT_INJECTION: forcing a failure. [ 866.077203] name failslab, interval 1, probability 0, space 0, times 0 [ 866.077530] Call Trace: [ 866.079517] dump_stack+0x107/0x167 [ 866.080080] should_fail.cold+0x5/0xa [ 866.080635] ? create_object.isra.0+0x3a/0xa20 [ 866.081324] should_failslab+0x5/0x20 [ 866.081891] kmem_cache_alloc+0x5b/0x310 [ 866.082503] create_object.isra.0+0x3a/0xa20 [ 866.083160] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.083902] kmem_cache_alloc+0x159/0x310 [ 866.084552] jbd2__journal_start+0x190/0x7e0 [ 866.085233] __ext4_journal_start_sb+0x214/0x390 [ 866.085965] ext4_dirty_inode+0xbc/0x130 [ 866.086592] ? ext4_setattr+0x2160/0x2160 [ 866.087223] __mark_inode_dirty+0x492/0xd40 [ 866.087889] touch_atime+0x5ea/0x6e0 [ 866.088419] ? atime_needs_update+0x600/0x600 [ 866.089075] ? add_to_page_cache_locked+0x40/0x40 [ 866.089756] generic_file_buffered_read+0x191a/0x2920 [ 866.090522] ? pagecache_get_page+0xc80/0xc80 [ 866.091162] ? __lock_acquire+0xbb1/0x5b00 [ 866.091826] generic_file_read_iter+0x33f/0x490 [ 866.092527] ext4_file_read_iter+0x184/0x4c0 [ 866.093200] __kernel_read+0x593/0xaa0 [ 866.093800] ? do_sendfile+0x1090/0x1090 [ 866.094430] ? _cond_resched+0x12/0x80 [ 866.095033] ? avc_policy_seqno+0x9/0x70 [ 866.095623] ? selinux_file_permission+0x92/0x520 [ 866.096361] ? lock_downgrade+0x6d0/0x6d0 [ 866.097010] kernel_read+0x52/0x70 [ 866.097559] bprm_execve+0x882/0x1a60 [ 866.098153] ? open_exec+0x70/0x70 [ 866.098694] ? memcpy+0x39/0x60 [ 866.099198] ? copy_string_kernel+0x3b6/0x450 [ 866.099899] do_execveat_common+0x772/0x8d0 [ 866.100565] ? bprm_execve+0x1a60/0x1a60 [ 866.101201] __x64_sys_execveat+0xed/0x140 [ 866.101851] do_syscall_64+0x33/0x40 [ 866.102420] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 866.103169] RIP: 0033:0x7f9509c8ab19 [ 866.103712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.106481] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 866.107574] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 866.108593] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 866.109667] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.110750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.111832] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 866.112876] CPU: 0 PID: 8190 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 866.113896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.115101] Call Trace: [ 866.115500] dump_stack+0x107/0x167 [ 866.116045] should_fail.cold+0x5/0xa [ 866.116620] ? create_object.isra.0+0x3a/0xa20 [ 866.117442] should_failslab+0x5/0x20 [ 866.118033] kmem_cache_alloc+0x5b/0x310 [ 866.118661] create_object.isra.0+0x3a/0xa20 [ 866.119322] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.120095] __kmalloc_node+0x1ae/0x420 [ 866.120709] kvmalloc_node+0x119/0x170 [ 866.121307] alloc_fdtable+0x13f/0x280 [ 866.121895] dup_fd+0x74d/0xcf0 [ 866.122412] unshare_files+0x175/0x270 [ 866.122997] ? __ia32_sys_unshare+0x40/0x40 [ 866.123652] ? get_user_pages_remote+0x63/0x90 [ 866.124345] ? get_user_pages_remote+0x6c/0x90 [ 866.125018] bprm_execve+0xcb/0x1a60 [ 866.125587] ? acct_arg_size+0xe0/0xe0 [ 866.126171] ? downgrade_write+0x3a0/0x3a0 [ 866.126804] ? open_exec+0x70/0x70 [ 866.127331] ? memcpy+0x39/0x60 [ 866.127844] ? copy_string_kernel+0x3b6/0x450 [ 866.128528] do_execveat_common+0x772/0x8d0 [ 866.129169] ? bprm_execve+0x1a60/0x1a60 [ 866.129779] __x64_sys_execveat+0xed/0x140 [ 866.130417] do_syscall_64+0x33/0x40 [ 866.130980] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 866.131754] RIP: 0033:0x7f2f4d86bb19 [ 866.132313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.135046] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 866.136166] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 866.137234] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 866.138307] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.139370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.140418] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:09:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) setresuid(0x0, 0x0, 0x0) [ 866.151789] FAULT_INJECTION: forcing a failure. [ 866.151789] name failslab, interval 1, probability 0, space 0, times 0 [ 866.153614] CPU: 0 PID: 8196 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 866.154628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.155853] Call Trace: [ 866.156253] dump_stack+0x107/0x167 [ 866.156798] should_fail.cold+0x5/0xa [ 866.157388] ? create_object.isra.0+0x3a/0xa20 [ 866.158091] should_failslab+0x5/0x20 [ 866.158670] kmem_cache_alloc+0x5b/0x310 [ 866.159300] create_object.isra.0+0x3a/0xa20 [ 866.159957] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.160718] kmem_cache_alloc_trace+0x151/0x320 [ 866.161428] ? rwlock_bug.part.0+0x90/0x90 [ 866.162074] alloc_fdtable+0x84/0x280 [ 866.162656] dup_fd+0x74d/0xcf0 [ 866.163170] unshare_files+0x175/0x270 [ 866.163771] ? __ia32_sys_unshare+0x40/0x40 [ 866.164435] ? get_user_pages_remote+0x63/0x90 [ 866.165128] ? get_user_pages_remote+0x6c/0x90 [ 866.165840] bprm_execve+0xcb/0x1a60 [ 866.166416] ? acct_arg_size+0xe0/0xe0 [ 866.167009] ? downgrade_write+0x3a0/0x3a0 [ 866.167659] ? open_exec+0x70/0x70 [ 866.168205] ? memcpy+0x39/0x60 [ 866.168709] ? copy_string_kernel+0x3b6/0x450 [ 866.169399] do_execveat_common+0x772/0x8d0 [ 866.170055] ? bprm_execve+0x1a60/0x1a60 [ 866.170691] __x64_sys_execveat+0xed/0x140 [ 866.171336] do_syscall_64+0x33/0x40 [ 866.171894] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 866.172672] RIP: 0033:0x7f1c8836fb19 [ 866.173240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.176006] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 866.177163] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 866.178232] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 866.179253] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.180293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.181319] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 866.249428] FAULT_INJECTION: forcing a failure. [ 866.249428] name failslab, interval 1, probability 0, space 0, times 0 [ 866.251093] CPU: 1 PID: 8201 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 866.252137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.253387] Call Trace: [ 866.253799] dump_stack+0x107/0x167 [ 866.254366] should_fail.cold+0x5/0xa [ 866.254953] ? create_object.isra.0+0x3a/0xa20 [ 866.255628] should_failslab+0x5/0x20 [ 866.256219] kmem_cache_alloc+0x5b/0x310 [ 866.256841] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 866.257760] create_object.isra.0+0x3a/0xa20 [ 866.258433] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.259210] kmem_cache_alloc+0x159/0x310 [ 866.259855] ptlock_alloc+0x1d/0x70 [ 866.260418] pte_alloc_one+0x68/0x1a0 [ 866.260999] __pte_alloc+0x1d/0x330 [ 866.261565] handle_mm_fault+0x287f/0x3500 [ 866.262222] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 866.262997] ? SOFTIRQ_verbose+0x10/0x10 [ 866.263585] ? __pmd_alloc+0x5e0/0x5e0 [ 866.264179] __get_user_pages+0x6ec/0x1620 [ 866.264791] ? follow_page_mask+0x1900/0x1900 [ 866.265434] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 866.266117] __get_user_pages_remote+0x1d5/0x870 [ 866.266801] ? lock_downgrade+0x6d0/0x6d0 [ 866.267408] get_user_pages_remote+0x63/0x90 [ 866.268048] get_arg_page+0xba/0x200 [ 866.268585] ? acct_arg_size+0xe0/0xe0 [ 866.269124] ? downgrade_write+0x3a0/0x3a0 [ 866.269721] ? count.constprop.0+0x1b3/0x290 [ 866.270365] copy_string_kernel+0x1b4/0x450 [ 866.270980] do_execveat_common+0x525/0x8d0 [ 866.271599] ? bprm_execve+0x1a60/0x1a60 [ 866.272197] __x64_sys_execveat+0xed/0x140 [ 866.272800] do_syscall_64+0x33/0x40 [ 866.273326] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 866.274067] RIP: 0033:0x7f2243400b19 [ 866.274604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.277258] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 866.278325] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 866.279333] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 866.280337] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.281350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.282367] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 879.178526] FAULT_INJECTION: forcing a failure. [ 879.178526] name failslab, interval 1, probability 0, space 0, times 0 [ 879.179675] CPU: 1 PID: 8222 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 879.180235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.180903] Call Trace: [ 879.181130] dump_stack+0x107/0x167 [ 879.181425] should_fail.cold+0x5/0xa 22:09:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 22:09:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 22:09:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 22:09:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 22:09:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 8) 22:09:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) [ 879.181739] ? ebitmap_cpy+0xc7/0x330 [ 879.182251] should_failslab+0x5/0x20 [ 879.182602] kmem_cache_alloc+0x5b/0x310 [ 879.182934] ebitmap_cpy+0xc7/0x330 [ 879.183232] mls_compute_sid+0x64b/0x1060 [ 879.183575] ? mark_lock+0xf5/0x2df0 [ 879.183887] ? mls_convert_context+0x6c0/0x6c0 [ 879.184262] security_compute_sid.part.0+0x8e8/0x16e0 [ 879.184687] ? security_compute_validatetrans.part.0+0x960/0x960 [ 879.185179] ? mark_lock+0xf5/0x2df0 [ 879.185483] ? lock_chain_count+0x20/0x20 [ 879.185825] ? lock_acquire+0x197/0x470 [ 879.186141] ? find_held_lock+0x2c/0x110 [ 879.186474] security_transition_sid+0xc0/0x190 [ 879.186854] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 879.187271] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 879.187677] ? selinux_inode_getsecctx+0x90/0x90 [ 879.188067] ? sched_exec+0x1ae/0x1e0 [ 879.188375] ? do_raw_spin_lock+0x121/0x260 [ 879.188728] ? nr_iowait+0x130/0x130 [ 879.189026] ? rwlock_bug.part.0+0x90/0x90 [ 879.189372] security_bprm_creds_for_exec+0x46/0xa0 [ 879.189779] bprm_execve+0x6c1/0x1a60 [ 879.190090] ? open_exec+0x70/0x70 [ 879.190376] ? memcpy+0x39/0x60 [ 879.190646] ? copy_string_kernel+0x3b6/0x450 [ 879.191012] do_execveat_common+0x772/0x8d0 [ 879.191361] ? bprm_execve+0x1a60/0x1a60 [ 879.191699] __x64_sys_execveat+0xed/0x140 [ 879.192044] do_syscall_64+0x33/0x40 [ 879.192347] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.192757] RIP: 0033:0x7f6383eb9b19 [ 879.193054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.194522] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.195131] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 879.195698] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.196269] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.196835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.197407] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 879.198449] FAULT_INJECTION: forcing a failure. [ 879.198449] name failslab, interval 1, probability 0, space 0, times 0 [ 879.199355] CPU: 1 PID: 8225 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 879.199904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.200565] Call Trace: [ 879.200778] dump_stack+0x107/0x167 [ 879.201073] should_fail.cold+0x5/0xa [ 879.201381] ? __d_alloc+0x2a/0x990 [ 879.201677] should_failslab+0x5/0x20 [ 879.201996] kmem_cache_alloc+0x5b/0x310 [ 879.202323] ? trace_hardirqs_on+0x5b/0x180 [ 879.202674] __d_alloc+0x2a/0x990 [ 879.202959] d_alloc_pseudo+0x19/0x70 [ 879.203267] alloc_file_pseudo+0xce/0x250 [ 879.203602] ? alloc_file+0x5a0/0x5a0 [ 879.203921] ? shmem_get_inode+0x55c/0xbc0 [ 879.204277] __shmem_file_setup+0x144/0x320 [ 879.204623] ? _copy_from_user+0xfb/0x1b0 [ 879.204973] __do_sys_memfd_create+0x275/0x450 [ 879.205346] ? memfd_file_seals_ptr+0x170/0x170 [ 879.205725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 879.206150] ? syscall_enter_from_user_mode+0x1d/0x50 [ 879.206571] do_syscall_64+0x33/0x40 [ 879.206874] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.207285] RIP: 0033:0x7fc547493b19 [ 879.207587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.207701] FAULT_INJECTION: forcing a failure. [ 879.207701] name failslab, interval 1, probability 0, space 0, times 0 [ 879.209068] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 879.209079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 879.209085] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 879.209091] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 879.209097] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 879.209103] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 879.211924] FAULT_INJECTION: forcing a failure. [ 879.211924] name failslab, interval 1, probability 0, space 0, times 0 [ 879.212562] CPU: 0 PID: 8223 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 879.212576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.219107] Call Trace: [ 879.219453] dump_stack+0x107/0x167 [ 879.219932] should_fail.cold+0x5/0xa [ 879.220424] ? __anon_vma_prepare+0x62/0x500 [ 879.220990] should_failslab+0x5/0x20 [ 879.221483] kmem_cache_alloc+0x5b/0x310 [ 879.222005] __anon_vma_prepare+0x62/0x500 [ 879.222547] ? __pte_alloc+0x194/0x330 [ 879.223046] handle_mm_fault+0x2b2d/0x3500 [ 879.223600] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.224277] ? SOFTIRQ_verbose+0x10/0x10 [ 879.224800] ? __pmd_alloc+0x5e0/0x5e0 [ 879.225319] __get_user_pages+0x6ec/0x1620 [ 879.225870] ? follow_page_mask+0x1900/0x1900 [ 879.226449] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 879.227055] __get_user_pages_remote+0x1d5/0x870 [ 879.227658] ? lock_downgrade+0x6d0/0x6d0 [ 879.228212] get_user_pages_remote+0x63/0x90 [ 879.228781] get_arg_page+0xba/0x200 [ 879.229260] ? acct_arg_size+0xe0/0xe0 [ 879.229759] ? downgrade_write+0x3a0/0x3a0 [ 879.230306] ? count.constprop.0+0x1b3/0x290 [ 879.230885] copy_string_kernel+0x1b4/0x450 [ 879.231451] do_execveat_common+0x525/0x8d0 [ 879.232018] ? bprm_execve+0x1a60/0x1a60 [ 879.232564] __x64_sys_execveat+0xed/0x140 [ 879.233118] do_syscall_64+0x33/0x40 [ 879.233608] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.234269] RIP: 0033:0x7f2243400b19 [ 879.234753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.237097] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.238085] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 879.238999] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.239916] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.240830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.241744] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 879.242680] CPU: 1 PID: 8219 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 879.243240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.243901] Call Trace: [ 879.244117] dump_stack+0x107/0x167 [ 879.244414] FAULT_INJECTION: forcing a failure. [ 879.244414] name failslab, interval 1, probability 0, space 0, times 0 [ 879.245299] should_fail.cold+0x5/0xa [ 879.245616] ? bprm_execve+0xbe6/0x1a60 [ 879.246014] should_failslab+0x5/0x20 [ 879.246331] __kmalloc_track_caller+0x79/0x370 [ 879.246699] ? __request_module+0x2fe/0x920 [ 879.247051] ? bprm_execve+0xbe6/0x1a60 [ 879.247369] kstrdup+0x36/0x70 [ 879.247633] __request_module+0x2fe/0x920 [ 879.247974] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.248391] ? free_modprobe_argv+0x90/0x90 [ 879.248740] ? find_held_lock+0x2c/0x110 [ 879.249081] ? find_held_lock+0x2c/0x110 [ 879.249409] ? bprm_execve+0xa13/0x1a60 [ 879.249733] ? lock_downgrade+0x6d0/0x6d0 [ 879.250062] ? elf_core_dump+0x3c50/0x3c50 [ 879.250405] ? do_raw_read_unlock+0x3b/0x70 [ 879.250753] ? _raw_read_unlock+0x1a/0x30 [ 879.251088] ? load_misc_binary+0x605/0xb70 [ 879.251438] bprm_execve+0xbe6/0x1a60 [ 879.251754] ? open_exec+0x70/0x70 [ 879.252041] ? memcpy+0x39/0x60 [ 879.252308] ? copy_string_kernel+0x3b6/0x450 [ 879.252672] do_execveat_common+0x772/0x8d0 [ 879.253023] ? bprm_execve+0x1a60/0x1a60 [ 879.253358] __x64_sys_execveat+0xed/0x140 [ 879.253697] do_syscall_64+0x33/0x40 [ 879.254006] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.254414] RIP: 0033:0x7f9509c8ab19 [ 879.254715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.256191] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.256792] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 879.257365] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.257933] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.258503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.259073] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 879.259667] CPU: 0 PID: 8226 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 879.260595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 22:09:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) setresuid(0x0, 0x0, 0x0) 22:09:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) [ 879.261657] Call Trace: [ 879.262136] dump_stack+0x107/0x167 [ 879.262620] should_fail.cold+0x5/0xa [ 879.263134] ? security_file_alloc+0x34/0x170 [ 879.263718] should_failslab+0x5/0x20 [ 879.264227] kmem_cache_alloc+0x5b/0x310 [ 879.264762] security_file_alloc+0x34/0x170 [ 879.265331] __alloc_file+0xb7/0x320 [ 879.265817] alloc_empty_file+0x6d/0x170 [ 879.266359] path_openat+0xe3/0x26e0 [ 879.266846] ? lock_chain_count+0x20/0x20 [ 879.267392] ? stack_trace_save+0x8c/0xc0 [ 879.267938] ? stack_trace_consume_entry+0x160/0x160 [ 879.268605] ? path_lookupat+0x860/0x860 [ 879.269142] ? kasan_save_stack+0x32/0x40 [ 879.269680] ? kasan_save_stack+0x1b/0x40 [ 879.270229] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.270892] ? security_prepare_creds+0x112/0x190 [ 879.271518] ? prepare_creds+0x452/0x5e0 [ 879.272057] ? prepare_exec_creds+0xd/0x260 [ 879.272618] ? bprm_execve+0x18f/0x1a60 [ 879.273144] do_filp_open+0x190/0x3e0 [ 879.273642] ? may_open_dev+0xf0/0xf0 [ 879.274164] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.274838] ? SOFTIRQ_verbose+0x10/0x10 [ 879.275374] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 879.276102] ? find_held_lock+0x2c/0x110 [ 879.276642] do_open_execat+0x116/0x690 [ 879.277164] ? __do_sys_uselib+0x5e0/0x5e0 [ 879.277718] ? do_raw_spin_lock+0x121/0x260 [ 879.278280] ? rwlock_bug.part.0+0x90/0x90 [ 879.278853] bprm_execve+0x55e/0x1a60 [ 879.279361] ? open_exec+0x70/0x70 [ 879.279840] ? memcpy+0x39/0x60 [ 879.280275] ? copy_string_kernel+0x3b6/0x450 [ 879.280872] do_execveat_common+0x772/0x8d0 [ 879.281436] ? bprm_execve+0x1a60/0x1a60 [ 879.281990] __x64_sys_execveat+0xed/0x140 [ 879.282549] do_syscall_64+0x33/0x40 [ 879.283041] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.283709] RIP: 0033:0x7f70da682b19 [ 879.284215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.286579] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.287582] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 879.288535] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.289464] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.290395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.291332] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 879.300286] FAULT_INJECTION: forcing a failure. [ 879.300286] name failslab, interval 1, probability 0, space 0, times 0 [ 879.301779] CPU: 0 PID: 8216 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 879.302676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.303757] Call Trace: [ 879.304114] dump_stack+0x107/0x167 [ 879.304595] should_fail.cold+0x5/0xa [ 879.305111] ? kvmalloc_node+0x119/0x170 [ 879.305647] should_failslab+0x5/0x20 [ 879.306159] __kmalloc_node+0x76/0x420 [ 879.306690] kvmalloc_node+0x119/0x170 [ 879.307221] alloc_fdtable+0xd3/0x280 [ 879.307750] dup_fd+0x74d/0xcf0 [ 879.308214] unshare_files+0x175/0x270 [ 879.308739] ? __ia32_sys_unshare+0x40/0x40 [ 879.309334] ? get_user_pages_remote+0x63/0x90 [ 879.309956] ? get_user_pages_remote+0x6c/0x90 [ 879.310569] bprm_execve+0xcb/0x1a60 [ 879.311080] ? acct_arg_size+0xe0/0xe0 [ 879.311596] ? downgrade_write+0x3a0/0x3a0 [ 879.312179] ? open_exec+0x70/0x70 [ 879.312654] ? memcpy+0x39/0x60 [ 879.313103] ? copy_string_kernel+0x3b6/0x450 [ 879.313717] do_execveat_common+0x772/0x8d0 [ 879.314306] ? bprm_execve+0x1a60/0x1a60 [ 879.314869] __x64_sys_execveat+0xed/0x140 [ 879.315445] do_syscall_64+0x33/0x40 [ 879.315952] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.316642] RIP: 0033:0x7f1c8836fb19 [ 879.317149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.319574] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.320592] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 879.321533] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.322466] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.323402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.324347] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:09:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) 22:09:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 879.361019] FAULT_INJECTION: forcing a failure. [ 879.361019] name failslab, interval 1, probability 0, space 0, times 0 [ 879.362042] CPU: 1 PID: 8229 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 879.362600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.363273] Call Trace: [ 879.363496] dump_stack+0x107/0x167 [ 879.363804] should_fail.cold+0x5/0xa [ 879.364121] ? prepare_creds+0x25/0x5e0 [ 879.364447] should_failslab+0x5/0x20 [ 879.364757] kmem_cache_alloc+0x5b/0x310 [ 879.365091] ? __ia32_sys_unshare+0x40/0x40 [ 879.365446] prepare_creds+0x25/0x5e0 [ 879.365757] prepare_exec_creds+0xd/0x260 [ 879.366094] bprm_execve+0x18f/0x1a60 [ 879.366410] ? acct_arg_size+0xe0/0xe0 [ 879.366728] ? downgrade_write+0x3a0/0x3a0 [ 879.367078] ? open_exec+0x70/0x70 [ 879.367370] ? memcpy+0x39/0x60 [ 879.367643] ? copy_string_kernel+0x3b6/0x450 [ 879.368018] do_execveat_common+0x772/0x8d0 [ 879.368374] ? bprm_execve+0x1a60/0x1a60 [ 879.368711] __x64_sys_execveat+0xed/0x140 [ 879.369059] do_syscall_64+0x33/0x40 [ 879.369366] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.369784] RIP: 0033:0x7f2f4d86bb19 [ 879.370089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.371577] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.372205] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 879.372787] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.373363] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.373942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.374526] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 879.379306] FAULT_INJECTION: forcing a failure. [ 879.379306] name failslab, interval 1, probability 0, space 0, times 0 [ 879.380243] CPU: 1 PID: 8234 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 879.380795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.381461] Call Trace: [ 879.381677] dump_stack+0x107/0x167 [ 879.381973] should_fail.cold+0x5/0xa [ 879.382289] ? create_object.isra.0+0x3a/0xa20 [ 879.382668] should_failslab+0x5/0x20 [ 879.382979] kmem_cache_alloc+0x5b/0x310 [ 879.383317] create_object.isra.0+0x3a/0xa20 [ 879.383681] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.384107] kmem_cache_alloc+0x159/0x310 [ 879.384456] ebitmap_cpy+0xc7/0x330 [ 879.384761] mls_compute_sid+0x64b/0x1060 [ 879.385101] ? mark_lock+0xf5/0x2df0 [ 879.385409] ? mls_convert_context+0x6c0/0x6c0 [ 879.385789] security_compute_sid.part.0+0x8e8/0x16e0 [ 879.386229] ? security_compute_validatetrans.part.0+0x960/0x960 [ 879.386729] ? mark_lock+0xf5/0x2df0 [ 879.387040] ? lock_chain_count+0x20/0x20 [ 879.387389] ? lock_acquire+0x197/0x470 [ 879.387710] ? find_held_lock+0x2c/0x110 [ 879.388053] security_transition_sid+0xc0/0x190 [ 879.388438] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 879.388847] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 879.389260] ? selinux_inode_getsecctx+0x90/0x90 [ 879.389644] ? sched_exec+0x1ae/0x1e0 [ 879.389958] ? do_raw_spin_lock+0x121/0x260 [ 879.390316] ? nr_iowait+0x130/0x130 [ 879.390624] ? rwlock_bug.part.0+0x90/0x90 [ 879.390978] security_bprm_creds_for_exec+0x46/0xa0 [ 879.391384] bprm_execve+0x6c1/0x1a60 [ 879.391704] ? open_exec+0x70/0x70 [ 879.391999] ? memcpy+0x39/0x60 [ 879.392274] ? copy_string_kernel+0x3b6/0x450 [ 879.392649] do_execveat_common+0x772/0x8d0 [ 879.393004] ? bprm_execve+0x1a60/0x1a60 [ 879.393344] __x64_sys_execveat+0xed/0x140 [ 879.393693] do_syscall_64+0x33/0x40 [ 879.393998] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.394417] RIP: 0033:0x7f6383eb9b19 [ 879.394723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.396224] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.396841] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 879.397416] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.397986] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.398562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.399136] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 879.412890] FAULT_INJECTION: forcing a failure. [ 879.412890] name failslab, interval 1, probability 0, space 0, times 0 [ 879.413814] CPU: 1 PID: 8235 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 879.414365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.415031] Call Trace: [ 879.415251] dump_stack+0x107/0x167 [ 879.415547] should_fail.cold+0x5/0xa [ 879.415866] ? create_object.isra.0+0x3a/0xa20 [ 879.416239] should_failslab+0x5/0x20 [ 879.416548] kmem_cache_alloc+0x5b/0x310 [ 879.416881] create_object.isra.0+0x3a/0xa20 [ 879.417247] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.417667] __kmalloc_track_caller+0x177/0x370 [ 879.418044] ? __request_module+0x2fe/0x920 [ 879.418396] ? bprm_execve+0xbe6/0x1a60 [ 879.418723] kstrdup+0x36/0x70 [ 879.418983] __request_module+0x2fe/0x920 [ 879.419323] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.419755] ? free_modprobe_argv+0x90/0x90 [ 879.420114] ? find_held_lock+0x2c/0x110 [ 879.420454] ? find_held_lock+0x2c/0x110 [ 879.420785] ? bprm_execve+0xa13/0x1a60 [ 879.421134] ? lock_downgrade+0x6d0/0x6d0 [ 879.421519] ? elf_core_dump+0x3c50/0x3c50 [ 879.421995] ? do_raw_read_unlock+0x3b/0x70 [ 879.422337] ? _raw_read_unlock+0x1a/0x30 [ 879.422672] ? load_misc_binary+0x605/0xb70 [ 879.423145] bprm_execve+0xbe6/0x1a60 [ 879.423553] ? open_exec+0x70/0x70 [ 879.423931] ? memcpy+0x39/0x60 [ 879.424202] ? copy_string_kernel+0x3b6/0x450 [ 879.424568] do_execveat_common+0x772/0x8d0 [ 879.424923] ? bprm_execve+0x1a60/0x1a60 [ 879.425258] __x64_sys_execveat+0xed/0x140 [ 879.425602] do_syscall_64+0x33/0x40 [ 879.425903] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.426320] RIP: 0033:0x7f9509c8ab19 [ 879.426622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.428099] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 22:09:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 22:09:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 22:09:34 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) [ 879.428712] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 879.429483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.430051] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.430621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.431192] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:09:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) setresuid(0x0, 0x0, 0x0) [ 879.451816] FAULT_INJECTION: forcing a failure. [ 879.451816] name failslab, interval 1, probability 0, space 0, times 0 [ 879.453441] CPU: 0 PID: 8238 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 879.454387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.455528] Call Trace: [ 879.455912] dump_stack+0x107/0x167 [ 879.456426] should_fail.cold+0x5/0xa [ 879.456960] ? create_object.isra.0+0x3a/0xa20 [ 879.457595] should_failslab+0x5/0x20 [ 879.458128] kmem_cache_alloc+0x5b/0x310 [ 879.458692] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 879.459455] create_object.isra.0+0x3a/0xa20 [ 879.460072] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.460778] kmem_cache_alloc+0x159/0x310 [ 879.461367] security_file_alloc+0x34/0x170 [ 879.461965] __alloc_file+0xb7/0x320 [ 879.462489] alloc_empty_file+0x6d/0x170 [ 879.463051] path_openat+0xe3/0x26e0 [ 879.463574] ? lock_chain_count+0x20/0x20 [ 879.464156] ? stack_trace_save+0x8c/0xc0 [ 879.464739] ? stack_trace_consume_entry+0x160/0x160 [ 879.465444] ? path_lookupat+0x860/0x860 [ 879.466015] ? kasan_save_stack+0x32/0x40 [ 879.466589] ? kasan_save_stack+0x1b/0x40 [ 879.467166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.467872] ? security_prepare_creds+0x112/0x190 [ 879.468539] ? prepare_creds+0x452/0x5e0 [ 879.469105] ? prepare_exec_creds+0xd/0x260 [ 879.469699] ? bprm_execve+0x18f/0x1a60 [ 879.470258] do_filp_open+0x190/0x3e0 [ 879.470786] ? may_open_dev+0xf0/0xf0 [ 879.471339] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.472068] ? SOFTIRQ_verbose+0x10/0x10 [ 879.472632] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 879.473409] ? find_held_lock+0x2c/0x110 [ 879.473982] do_open_execat+0x116/0x690 [ 879.474540] ? __do_sys_uselib+0x5e0/0x5e0 [ 879.475129] ? do_raw_spin_lock+0x121/0x260 [ 879.475739] ? rwlock_bug.part.0+0x90/0x90 [ 879.476349] bprm_execve+0x55e/0x1a60 [ 879.476885] ? open_exec+0x70/0x70 [ 879.477389] ? memcpy+0x39/0x60 [ 879.477856] ? copy_string_kernel+0x3b6/0x450 [ 879.478493] do_execveat_common+0x772/0x8d0 [ 879.479095] ? bprm_execve+0x1a60/0x1a60 [ 879.479675] __x64_sys_execveat+0xed/0x140 [ 879.480270] do_syscall_64+0x33/0x40 [ 879.480794] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.481499] RIP: 0033:0x7f70da682b19 [ 879.482024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.484538] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.485597] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 879.486575] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.487553] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.488532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.489511] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 879.502879] FAULT_INJECTION: forcing a failure. [ 879.502879] name failslab, interval 1, probability 0, space 0, times 0 [ 879.503884] CPU: 1 PID: 8246 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 879.504445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.505154] Call Trace: [ 879.505472] dump_stack+0x107/0x167 [ 879.505772] should_fail.cold+0x5/0xa [ 879.506193] ? create_object.isra.0+0x3a/0xa20 [ 879.506697] should_failslab+0x5/0x20 [ 879.507077] kmem_cache_alloc+0x5b/0x310 [ 879.507413] create_object.isra.0+0x3a/0xa20 [ 879.507781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.508201] __kmalloc_node+0x1ae/0x420 [ 879.508529] kvmalloc_node+0x119/0x170 [ 879.508848] alloc_fdtable+0xd3/0x280 [ 879.509158] dup_fd+0x74d/0xcf0 [ 879.509445] unshare_files+0x175/0x270 [ 879.509762] ? __ia32_sys_unshare+0x40/0x40 [ 879.510117] ? get_user_pages_remote+0x63/0x90 [ 879.510482] ? get_user_pages_remote+0x6c/0x90 [ 879.510860] bprm_execve+0xcb/0x1a60 [ 879.511164] ? acct_arg_size+0xe0/0xe0 [ 879.511484] ? downgrade_write+0x3a0/0x3a0 [ 879.511834] ? open_exec+0x70/0x70 [ 879.512123] ? memcpy+0x39/0x60 [ 879.512392] ? copy_string_kernel+0x3b6/0x450 [ 879.512761] do_execveat_common+0x772/0x8d0 [ 879.513115] ? bprm_execve+0x1a60/0x1a60 [ 879.513425] FAULT_INJECTION: forcing a failure. [ 879.513425] name failslab, interval 1, probability 0, space 0, times 0 [ 879.513458] __x64_sys_execveat+0xed/0x140 [ 879.515308] do_syscall_64+0x33/0x40 [ 879.515612] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.516033] RIP: 0033:0x7f1c8836fb19 [ 879.516337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.517812] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.518423] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 879.518998] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.519569] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.520151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.520725] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 879.521320] CPU: 0 PID: 8248 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 879.522264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.523397] Call Trace: [ 879.523775] dump_stack+0x107/0x167 [ 879.524286] should_fail.cold+0x5/0xa [ 879.524813] ? create_object.isra.0+0x3a/0xa20 [ 879.525447] should_failslab+0x5/0x20 [ 879.525974] kmem_cache_alloc+0x5b/0x310 [ 879.526539] create_object.isra.0+0x3a/0xa20 [ 879.527148] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.527857] kmem_cache_alloc+0x159/0x310 [ 879.528433] __anon_vma_prepare+0x62/0x500 [ 879.529014] ? __pte_alloc+0x194/0x330 [ 879.529557] handle_mm_fault+0x2b2d/0x3500 [ 879.530144] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.530866] ? SOFTIRQ_verbose+0x10/0x10 [ 879.531425] ? __pmd_alloc+0x5e0/0x5e0 [ 879.531992] __get_user_pages+0x6ec/0x1620 [ 879.532585] ? follow_page_mask+0x1900/0x1900 [ 879.533206] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 879.533861] __get_user_pages_remote+0x1d5/0x870 [ 879.534519] ? lock_downgrade+0x6d0/0x6d0 [ 879.535094] get_user_pages_remote+0x63/0x90 [ 879.535703] get_arg_page+0xba/0x200 [ 879.536219] ? acct_arg_size+0xe0/0xe0 [ 879.536756] ? downgrade_write+0x3a0/0x3a0 [ 879.537342] ? count.constprop.0+0x1b3/0x290 [ 879.537962] copy_string_kernel+0x1b4/0x450 [ 879.538563] do_execveat_common+0x525/0x8d0 [ 879.539162] ? bprm_execve+0x1a60/0x1a60 [ 879.539732] __x64_sys_execveat+0xed/0x140 [ 879.540325] do_syscall_64+0x33/0x40 [ 879.540839] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.541546] RIP: 0033:0x7f2243400b19 [ 879.542057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.544559] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.545599] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 879.546575] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.547547] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.548529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.549499] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:09:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 9) 22:09:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) setresuid(0x0, 0x0, 0x0) [ 879.577558] FAULT_INJECTION: forcing a failure. [ 879.577558] name failslab, interval 1, probability 0, space 0, times 0 [ 879.578572] CPU: 1 PID: 8252 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 879.579131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.579820] Call Trace: [ 879.580045] dump_stack+0x107/0x167 [ 879.580344] should_fail.cold+0x5/0xa [ 879.580659] ? create_object.isra.0+0x3a/0xa20 [ 879.581034] should_failslab+0x5/0x20 [ 879.581346] kmem_cache_alloc+0x5b/0x310 [ 879.581682] create_object.isra.0+0x3a/0xa20 [ 879.582044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.582461] kmem_cache_alloc+0x159/0x310 [ 879.582798] ? trace_hardirqs_on+0x5b/0x180 [ 879.583152] __d_alloc+0x2a/0x990 [ 879.583442] d_alloc_pseudo+0x19/0x70 [ 879.583757] alloc_file_pseudo+0xce/0x250 [ 879.584099] ? alloc_file+0x5a0/0x5a0 [ 879.584415] ? shmem_get_inode+0x55c/0xbc0 [ 879.584770] __shmem_file_setup+0x144/0x320 [ 879.585123] ? _copy_from_user+0xfb/0x1b0 [ 879.585465] __do_sys_memfd_create+0x275/0x450 [ 879.585845] ? memfd_file_seals_ptr+0x170/0x170 [ 879.586230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 879.586656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 879.587078] do_syscall_64+0x33/0x40 [ 879.587384] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.587808] RIP: 0033:0x7fc547493b19 [ 879.588114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.589599] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 879.590214] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 879.590781] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 879.591355] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 879.591933] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 879.592507] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 22:09:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 22:09:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 22:09:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) [ 879.636219] FAULT_INJECTION: forcing a failure. [ 879.636219] name failslab, interval 1, probability 0, space 0, times 0 [ 879.637278] CPU: 1 PID: 8260 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 879.637829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.638510] Call Trace: [ 879.638737] dump_stack+0x107/0x167 [ 879.639035] should_fail.cold+0x5/0xa [ 879.639351] ? ebitmap_cpy+0xc7/0x330 [ 879.639664] should_failslab+0x5/0x20 [ 879.639987] kmem_cache_alloc+0x5b/0x310 [ 879.640319] ebitmap_cpy+0xc7/0x330 [ 879.640617] mls_compute_sid+0x64b/0x1060 [ 879.640959] ? mark_lock+0xf5/0x2df0 [ 879.641264] ? mls_convert_context+0x6c0/0x6c0 [ 879.641655] security_compute_sid.part.0+0x8e8/0x16e0 [ 879.642085] ? security_compute_validatetrans.part.0+0x960/0x960 [ 879.642583] ? mark_lock+0xf5/0x2df0 [ 879.642889] ? lock_chain_count+0x20/0x20 [ 879.643230] ? lock_acquire+0x197/0x470 [ 879.643552] ? find_held_lock+0x2c/0x110 [ 879.643891] security_transition_sid+0xc0/0x190 [ 879.644275] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 879.644685] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 879.645094] ? selinux_inode_getsecctx+0x90/0x90 [ 879.645477] ? sched_exec+0x1ae/0x1e0 [ 879.645787] ? do_raw_spin_lock+0x121/0x260 [ 879.646137] ? nr_iowait+0x130/0x130 [ 879.646440] ? rwlock_bug.part.0+0x90/0x90 [ 879.646789] security_bprm_creds_for_exec+0x46/0xa0 [ 879.647199] bprm_execve+0x6c1/0x1a60 [ 879.647514] ? open_exec+0x70/0x70 [ 879.647816] ? memcpy+0x39/0x60 [ 879.648085] ? copy_string_kernel+0x3b6/0x450 [ 879.648453] do_execveat_common+0x772/0x8d0 [ 879.648805] ? bprm_execve+0x1a60/0x1a60 [ 879.649145] __x64_sys_execveat+0xed/0x140 [ 879.649492] do_syscall_64+0x33/0x40 [ 879.649795] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.650206] RIP: 0033:0x7f6383eb9b19 [ 879.650506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.651986] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.652605] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 879.653184] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.653755] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.654329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.654909] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 879.667827] FAULT_INJECTION: forcing a failure. [ 879.667827] name failslab, interval 1, probability 0, space 0, times 0 [ 879.668792] CPU: 1 PID: 8261 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 879.669343] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.670022] Call Trace: [ 879.670239] dump_stack+0x107/0x167 [ 879.670540] should_fail.cold+0x5/0xa [ 879.670857] ? create_object.isra.0+0x3a/0xa20 [ 879.671232] should_failslab+0x5/0x20 [ 879.671549] kmem_cache_alloc+0x5b/0x310 [ 879.671900] create_object.isra.0+0x3a/0xa20 [ 879.672262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 879.672679] kmem_cache_alloc+0x159/0x310 [ 879.673028] prepare_creds+0x25/0x5e0 [ 879.673342] prepare_exec_creds+0xd/0x260 [ 879.673685] bprm_execve+0x18f/0x1a60 [ 879.674000] ? acct_arg_size+0xe0/0xe0 [ 879.674318] ? downgrade_write+0x3a0/0x3a0 [ 879.674666] ? open_exec+0x70/0x70 [ 879.674959] ? memcpy+0x39/0x60 [ 879.675234] ? copy_string_kernel+0x3b6/0x450 [ 879.675605] do_execveat_common+0x772/0x8d0 [ 879.675964] ? bprm_execve+0x1a60/0x1a60 [ 879.676314] __x64_sys_execveat+0xed/0x140 [ 879.676660] do_syscall_64+0x33/0x40 [ 879.676968] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.677383] RIP: 0033:0x7f2f4d86bb19 [ 879.677687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.679171] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.679803] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 879.680386] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.680963] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.681545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.682123] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 879.711319] FAULT_INJECTION: forcing a failure. [ 879.711319] name failslab, interval 1, probability 0, space 0, times 0 [ 879.712321] CPU: 1 PID: 8263 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 879.712881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.713562] Call Trace: [ 879.713791] dump_stack+0x107/0x167 [ 879.714092] should_fail.cold+0x5/0xa [ 879.714407] ? call_usermodehelper_setup+0xa2/0x2f0 [ 879.714815] should_failslab+0x5/0x20 [ 879.715127] kmem_cache_alloc_trace+0x55/0x320 [ 879.715502] call_usermodehelper_setup+0xa2/0x2f0 [ 879.715900] ? copy_regset_to_user+0x170/0x170 [ 879.716275] ? bprm_execve+0xbe6/0x1a60 [ 879.716604] __request_module+0x3f9/0x920 [ 879.716948] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.717373] ? free_modprobe_argv+0x90/0x90 [ 879.717725] ? find_held_lock+0x2c/0x110 [ 879.718062] ? find_held_lock+0x2c/0x110 [ 879.718396] ? bprm_execve+0xa13/0x1a60 [ 879.718725] ? lock_downgrade+0x6d0/0x6d0 [ 879.719065] ? elf_core_dump+0x3c50/0x3c50 [ 879.719411] ? do_raw_read_unlock+0x3b/0x70 [ 879.719775] ? _raw_read_unlock+0x1a/0x30 [ 879.720117] ? load_misc_binary+0x605/0xb70 [ 879.720473] bprm_execve+0xbe6/0x1a60 [ 879.720790] ? open_exec+0x70/0x70 [ 879.721082] ? memcpy+0x39/0x60 [ 879.721354] ? copy_string_kernel+0x3b6/0x450 [ 879.721726] do_execveat_common+0x772/0x8d0 [ 879.722088] ? bprm_execve+0x1a60/0x1a60 [ 879.722428] __x64_sys_execveat+0xed/0x140 [ 879.722786] do_syscall_64+0x33/0x40 [ 879.723087] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.723501] RIP: 0033:0x7f9509c8ab19 [ 879.723816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.725290] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.725913] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 879.726491] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.727065] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.727646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.728228] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 22:09:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) [ 879.748973] FAULT_INJECTION: forcing a failure. [ 879.748973] name failslab, interval 1, probability 0, space 0, times 0 [ 879.750532] CPU: 0 PID: 8267 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 879.751419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 879.752499] Call Trace: [ 879.752853] dump_stack+0x107/0x167 [ 879.753342] should_fail.cold+0x5/0xa [ 879.753842] ? __anon_vma_prepare+0x270/0x500 [ 879.754434] should_failslab+0x5/0x20 [ 879.754931] kmem_cache_alloc+0x5b/0x310 [ 879.755467] __anon_vma_prepare+0x270/0x500 [ 879.756030] ? __pte_alloc+0x194/0x330 [ 879.756542] handle_mm_fault+0x2b2d/0x3500 [ 879.757108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 879.757786] ? SOFTIRQ_verbose+0x10/0x10 [ 879.758312] ? __pmd_alloc+0x5e0/0x5e0 [ 879.758844] __get_user_pages+0x6ec/0x1620 [ 879.759404] ? follow_page_mask+0x1900/0x1900 [ 879.759995] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 879.760612] __get_user_pages_remote+0x1d5/0x870 [ 879.761230] ? lock_downgrade+0x6d0/0x6d0 [ 879.761767] get_user_pages_remote+0x63/0x90 [ 879.762335] get_arg_page+0xba/0x200 [ 879.762819] ? acct_arg_size+0xe0/0xe0 [ 879.763312] ? downgrade_write+0x3a0/0x3a0 [ 879.763862] ? count.constprop.0+0x1b3/0x290 [ 879.764431] copy_string_kernel+0x1b4/0x450 [ 879.764997] do_execveat_common+0x525/0x8d0 [ 879.765556] ? bprm_execve+0x1a60/0x1a60 [ 879.766091] __x64_sys_execveat+0xed/0x140 [ 879.766639] do_syscall_64+0x33/0x40 [ 879.767119] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 879.767776] RIP: 0033:0x7f2243400b19 [ 879.768263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 879.770558] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 879.771535] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 879.772455] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 879.773357] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 879.774263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 879.775166] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 879.851374] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 892.560201] FAULT_INJECTION: forcing a failure. [ 892.560201] name failslab, interval 1, probability 0, space 0, times 0 [ 892.561175] FAULT_INJECTION: forcing a failure. [ 892.561175] name failslab, interval 1, probability 0, space 0, times 0 [ 892.561280] CPU: 1 PID: 8284 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 892.563804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.564555] Call Trace: [ 892.564803] dump_stack+0x107/0x167 [ 892.565133] should_fail.cold+0x5/0xa [ 892.565480] ? __alloc_file+0x21/0x320 [ 892.565834] should_failslab+0x5/0x20 [ 892.566190] kmem_cache_alloc+0x5b/0x310 [ 892.566561] __alloc_file+0x21/0x320 [ 892.566902] alloc_empty_file+0x6d/0x170 [ 892.567272] alloc_file+0x5e/0x5a0 [ 892.567597] alloc_file_pseudo+0x16a/0x250 [ 892.567982] ? alloc_file+0x5a0/0x5a0 [ 892.568329] ? shmem_get_inode+0x55c/0xbc0 [ 892.568721] __shmem_file_setup+0x144/0x320 [ 892.569110] ? _copy_from_user+0xfb/0x1b0 [ 892.569487] __do_sys_memfd_create+0x275/0x450 [ 892.569896] ? memfd_file_seals_ptr+0x170/0x170 [ 892.570322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 892.570796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 892.571257] do_syscall_64+0x33/0x40 [ 892.571597] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.572061] RIP: 0033:0x7fc547493b19 [ 892.572396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.574025] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.574702] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 892.575342] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 892.575980] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 892.576620] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 892.577252] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 892.577920] CPU: 0 PID: 8276 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 892.579131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.580581] Call Trace: [ 892.581056] dump_stack+0x107/0x167 [ 892.581705] should_fail.cold+0x5/0xa [ 892.582381] ? create_object.isra.0+0x3a/0xa20 [ 892.583206] should_failslab+0x5/0x20 [ 892.583878] kmem_cache_alloc+0x5b/0x310 22:09:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 22:09:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 22:09:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) 22:09:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) setresuid(0x0, 0x0, 0x0) 22:09:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 22:09:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:09:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 22:09:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 10) [ 892.584615] create_object.isra.0+0x3a/0xa20 [ 892.585594] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 892.586488] kmem_cache_alloc+0x159/0x310 [ 892.587226] __anon_vma_prepare+0x270/0x500 [ 892.588000] ? __pte_alloc+0x194/0x330 [ 892.588699] handle_mm_fault+0x2b2d/0x3500 [ 892.589456] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 892.590369] ? SOFTIRQ_verbose+0x10/0x10 [ 892.591089] ? __pmd_alloc+0x5e0/0x5e0 [ 892.591793] __get_user_pages+0x6ec/0x1620 [ 892.592559] ? follow_page_mask+0x1900/0x1900 [ 892.593344] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 892.594176] __get_user_pages_remote+0x1d5/0x870 [ 892.594998] ? lock_downgrade+0x6d0/0x6d0 [ 892.595735] get_user_pages_remote+0x63/0x90 [ 892.596517] get_arg_page+0xba/0x200 [ 892.597176] ? acct_arg_size+0xe0/0xe0 [ 892.597851] ? downgrade_write+0x3a0/0x3a0 [ 892.598599] ? count.constprop.0+0x1b3/0x290 [ 892.599380] copy_string_kernel+0x1b4/0x450 [ 892.600159] do_execveat_common+0x525/0x8d0 [ 892.600908] ? bprm_execve+0x1a60/0x1a60 [ 892.601639] __x64_sys_execveat+0xed/0x140 [ 892.602375] do_syscall_64+0x33/0x40 [ 892.603035] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.603925] RIP: 0033:0x7f2243400b19 [ 892.604582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.607254] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.608363] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 892.609391] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.610425] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.611451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.612487] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 892.617925] FAULT_INJECTION: forcing a failure. [ 892.617925] name failslab, interval 1, probability 0, space 0, times 0 [ 892.619872] CPU: 1 PID: 8279 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 892.620484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.621223] Call Trace: [ 892.621463] dump_stack+0x107/0x167 [ 892.621793] should_fail.cold+0x5/0xa [ 892.622143] ? create_object.isra.0+0x3a/0xa20 [ 892.622548] should_failslab+0x5/0x20 [ 892.622887] kmem_cache_alloc+0x5b/0x310 [ 892.623249] ? mark_held_locks+0x9e/0xe0 [ 892.623611] create_object.isra.0+0x3a/0xa20 [ 892.624008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 892.624467] kmem_cache_alloc+0x159/0x310 [ 892.624840] ebitmap_cpy+0xc7/0x330 [ 892.625167] mls_compute_sid+0x64b/0x1060 [ 892.625536] ? mls_convert_context+0x6c0/0x6c0 [ 892.625943] security_compute_sid.part.0+0x8e8/0x16e0 [ 892.626413] ? security_compute_validatetrans.part.0+0x960/0x960 [ 892.626944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 892.627401] ? _raw_spin_unlock_irq+0x1f/0x30 [ 892.627794] ? trace_hardirqs_on+0x5b/0x180 [ 892.628179] ? _raw_spin_unlock_irq+0x1f/0x30 [ 892.628578] ? wait_for_completion+0x1d5/0x270 [ 892.628986] ? bit_wait_io_timeout+0x160/0x160 [ 892.629393] ? io_schedule_timeout+0x140/0x140 [ 892.629799] ? lockdep_init_map_type+0x2c7/0x780 [ 892.630227] ? stop_cpus.constprop.0+0x160/0x160 [ 892.630640] ? lock_acquire+0x197/0x470 [ 892.630989] ? find_held_lock+0x2c/0x110 [ 892.631349] ? set_cpus_allowed_ptr+0x10/0x10 [ 892.631746] security_transition_sid+0xc0/0x190 [ 892.632170] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 892.632618] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 892.633070] ? selinux_inode_getsecctx+0x90/0x90 [ 892.633491] ? sched_exec+0x16e/0x1e0 [ 892.633790] FAULT_INJECTION: forcing a failure. [ 892.633790] name failslab, interval 1, probability 0, space 0, times 0 [ 892.634768] ? nr_iowait+0x130/0x130 [ 892.634780] ? rwlock_bug.part.0+0x90/0x90 [ 892.634797] security_bprm_creds_for_exec+0x46/0xa0 [ 892.634821] bprm_execve+0x6c1/0x1a60 [ 892.636499] ? open_exec+0x70/0x70 [ 892.636818] ? memcpy+0x39/0x60 [ 892.637112] ? copy_string_kernel+0x3b6/0x450 [ 892.637517] do_execveat_common+0x772/0x8d0 [ 892.637896] ? bprm_execve+0x1a60/0x1a60 [ 892.638265] __x64_sys_execveat+0xed/0x140 [ 892.638637] do_syscall_64+0x33/0x40 [ 892.638971] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.639418] RIP: 0033:0x7f6383eb9b19 [ 892.639753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.641356] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.642025] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 892.642649] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.643276] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.643908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.644527] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 892.645173] CPU: 0 PID: 8290 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 892.646172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.647364] Call Trace: 22:09:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 11) [ 892.647754] dump_stack+0x107/0x167 [ 892.648421] should_fail.cold+0x5/0xa [ 892.648986] ? ebitmap_cpy+0xc7/0x330 [ 892.649542] should_failslab+0x5/0x20 [ 892.650102] kmem_cache_alloc+0x5b/0x310 [ 892.650704] ebitmap_cpy+0xc7/0x330 [ 892.651245] mls_compute_sid+0x64b/0x1060 [ 892.651851] ? mark_lock+0xf5/0x2df0 [ 892.652409] ? mls_convert_context+0x6c0/0x6c0 [ 892.653088] security_compute_sid.part.0+0x8e8/0x16e0 [ 892.653865] ? security_compute_validatetrans.part.0+0x960/0x960 [ 892.654761] ? mark_lock+0xf5/0x2df0 [ 892.655318] ? lock_chain_count+0x20/0x20 [ 892.655941] ? lock_acquire+0x197/0x470 [ 892.656531] ? find_held_lock+0x2c/0x110 [ 892.657138] security_transition_sid+0xc0/0x190 [ 892.657829] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 892.658571] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 892.659305] ? selinux_inode_getsecctx+0x90/0x90 [ 892.660013] ? sched_exec+0x1ae/0x1e0 [ 892.660576] ? do_raw_spin_lock+0x121/0x260 [ 892.661108] FAULT_INJECTION: forcing a failure. [ 892.661108] name failslab, interval 1, probability 0, space 0, times 0 [ 892.661208] ? nr_iowait+0x130/0x130 [ 892.662676] ? rwlock_bug.part.0+0x90/0x90 [ 892.663298] security_bprm_creds_for_exec+0x46/0xa0 [ 892.664052] bprm_execve+0x6c1/0x1a60 [ 892.664618] ? open_exec+0x70/0x70 [ 892.665138] ? memcpy+0x39/0x60 [ 892.665623] ? copy_string_kernel+0x3b6/0x450 [ 892.666287] do_execveat_common+0x772/0x8d0 [ 892.666918] ? bprm_execve+0x1a60/0x1a60 [ 892.667530] __x64_sys_execveat+0xed/0x140 [ 892.668154] do_syscall_64+0x33/0x40 [ 892.668694] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.669433] RIP: 0033:0x7f70da682b19 [ 892.669973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.672605] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.673708] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 892.674731] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.675758] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.676794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.677823] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 892.678874] CPU: 1 PID: 8292 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 892.679496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.680193] Call Trace: [ 892.680419] dump_stack+0x107/0x167 [ 892.680726] should_fail.cold+0x5/0xa [ 892.681046] ? create_object.isra.0+0x3a/0xa20 [ 892.681435] should_failslab+0x5/0x20 [ 892.681753] kmem_cache_alloc+0x5b/0x310 [ 892.681998] FAULT_INJECTION: forcing a failure. [ 892.681998] name failslab, interval 1, probability 0, space 0, times 0 [ 892.682103] create_object.isra.0+0x3a/0xa20 [ 892.682115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 892.682138] kmem_cache_alloc+0x159/0x310 [ 892.684849] __alloc_file+0x21/0x320 [ 892.685163] alloc_empty_file+0x6d/0x170 [ 892.685507] alloc_file+0x5e/0x5a0 [ 892.685809] alloc_file_pseudo+0x16a/0x250 [ 892.686163] ? alloc_file+0x5a0/0x5a0 [ 892.686492] ? shmem_get_inode+0x55c/0xbc0 [ 892.686851] __shmem_file_setup+0x144/0x320 [ 892.687213] ? _copy_from_user+0xfb/0x1b0 [ 892.687564] __do_sys_memfd_create+0x275/0x450 [ 892.687958] ? memfd_file_seals_ptr+0x170/0x170 [ 892.688351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 892.688788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 892.689220] do_syscall_64+0x33/0x40 [ 892.689534] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.689965] RIP: 0033:0x7fc547493b19 [ 892.690282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.691803] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.692469] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 892.693063] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 892.693653] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 892.694244] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 892.694839] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 892.695458] CPU: 0 PID: 8288 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 892.696474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.697674] Call Trace: [ 892.698070] dump_stack+0x107/0x167 [ 892.698609] should_fail.cold+0x5/0xa [ 892.699153] FAULT_INJECTION: forcing a failure. [ 892.699153] name failslab, interval 1, probability 0, space 0, times 0 [ 892.700740] ? create_object.isra.0+0x3a/0xa20 [ 892.701406] should_failslab+0x5/0x20 [ 892.701964] kmem_cache_alloc+0x5b/0x310 [ 892.702563] create_object.isra.0+0x3a/0xa20 [ 892.703204] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 892.703953] kmem_cache_alloc_trace+0x151/0x320 [ 892.704646] call_usermodehelper_setup+0xa2/0x2f0 [ 892.705336] ? copy_regset_to_user+0x170/0x170 [ 892.706001] ? bprm_execve+0xbe6/0x1a60 [ 892.706570] __request_module+0x3f9/0x920 [ 892.707177] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 892.707959] ? free_modprobe_argv+0x90/0x90 [ 892.708591] ? find_held_lock+0x2c/0x110 [ 892.709188] ? find_held_lock+0x2c/0x110 [ 892.709788] ? bprm_execve+0xa13/0x1a60 [ 892.710365] ? lock_downgrade+0x6d0/0x6d0 [ 892.710972] ? elf_core_dump+0x3c50/0x3c50 [ 892.711581] ? do_raw_read_unlock+0x3b/0x70 [ 892.712214] ? _raw_read_unlock+0x1a/0x30 [ 892.712806] ? load_misc_binary+0x605/0xb70 [ 892.713446] bprm_execve+0xbe6/0x1a60 [ 892.714002] ? open_exec+0x70/0x70 [ 892.714531] ? memcpy+0x39/0x60 [ 892.715017] ? copy_string_kernel+0x3b6/0x450 [ 892.715686] do_execveat_common+0x772/0x8d0 [ 892.716320] ? bprm_execve+0x1a60/0x1a60 [ 892.716935] __x64_sys_execveat+0xed/0x140 [ 892.717553] do_syscall_64+0x33/0x40 [ 892.718100] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.718830] RIP: 0033:0x7f9509c8ab19 [ 892.719377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.721980] RSP: 002b:00007f9507200188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.723089] RAX: ffffffffffffffda RBX: 00007f9509d9df60 RCX: 00007f9509c8ab19 [ 892.724108] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.725115] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.726148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.727158] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 892.728222] CPU: 1 PID: 8294 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 892.728797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.729484] Call Trace: [ 892.729705] dump_stack+0x107/0x167 [ 892.730008] should_fail.cold+0x5/0xa [ 892.730331] ? kvmalloc_node+0x119/0x170 [ 892.730720] should_failslab+0x5/0x20 [ 892.731234] __kmalloc_node+0x76/0x420 [ 892.731613] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 892.732054] kvmalloc_node+0x119/0x170 [ 892.732389] alloc_fdtable+0x13f/0x280 [ 892.732717] dup_fd+0x74d/0xcf0 [ 892.732999] unshare_files+0x175/0x270 [ 892.733333] ? __ia32_sys_unshare+0x40/0x40 [ 892.733688] ? get_user_pages_remote+0x63/0x90 [ 892.734072] ? get_user_pages_remote+0x6c/0x90 [ 892.734521] bprm_execve+0xcb/0x1a60 [ 892.734935] ? acct_arg_size+0xe0/0xe0 [ 892.735433] ? downgrade_write+0x3a0/0x3a0 [ 892.735830] ? open_exec+0x70/0x70 [ 892.736133] ? memcpy+0x39/0x60 [ 892.736417] ? copy_string_kernel+0x3b6/0x450 [ 892.736793] do_execveat_common+0x772/0x8d0 [ 892.736811] FAULT_INJECTION: forcing a failure. [ 892.736811] name failslab, interval 1, probability 0, space 0, times 0 [ 892.738070] ? bprm_execve+0x1a60/0x1a60 [ 892.738424] __x64_sys_execveat+0xed/0x140 [ 892.738774] do_syscall_64+0x33/0x40 [ 892.739081] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.739498] RIP: 0033:0x7f1c8836fb19 [ 892.739812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.741316] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.741955] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 892.742536] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.743116] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.743697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.744286] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 892.744891] CPU: 0 PID: 8289 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 892.745903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.747106] Call Trace: [ 892.747494] dump_stack+0x107/0x167 [ 892.748031] should_fail.cold+0x5/0xa [ 892.748589] ? security_prepare_creds+0x112/0x190 [ 892.749288] should_failslab+0x5/0x20 [ 892.749843] __kmalloc+0x72/0x390 [ 892.750361] security_prepare_creds+0x112/0x190 [ 892.751042] prepare_creds+0x452/0x5e0 [ 892.751613] prepare_exec_creds+0xd/0x260 [ 892.752225] bprm_execve+0x18f/0x1a60 [ 892.752794] ? acct_arg_size+0xe0/0xe0 [ 892.753365] ? downgrade_write+0x3a0/0x3a0 [ 892.753986] ? open_exec+0x70/0x70 [ 892.754512] ? memcpy+0x39/0x60 [ 892.754997] ? copy_string_kernel+0x3b6/0x450 [ 892.755663] do_execveat_common+0x772/0x8d0 [ 892.756306] ? bprm_execve+0x1a60/0x1a60 [ 892.756916] __x64_sys_execveat+0xed/0x140 [ 892.757538] do_syscall_64+0x33/0x40 [ 892.758082] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.758835] RIP: 0033:0x7f2f4d86bb19 [ 892.759380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.762013] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.763112] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 892.764148] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.765177] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.766199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.767228] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:09:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 22:09:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) setresuid(0x0, 0x0, 0x0) 22:09:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) setresuid(0x0, 0x0, 0x0) [ 892.876916] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:09:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 12) [ 892.917694] FAULT_INJECTION: forcing a failure. [ 892.917694] name failslab, interval 1, probability 0, space 0, times 0 [ 892.918650] CPU: 1 PID: 8313 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 892.919204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.919867] Call Trace: [ 892.920101] dump_stack+0x107/0x167 [ 892.920432] should_fail.cold+0x5/0xa [ 892.920892] ? security_file_alloc+0x34/0x170 [ 892.921255] should_failslab+0x5/0x20 [ 892.921566] kmem_cache_alloc+0x5b/0x310 [ 892.921905] security_file_alloc+0x34/0x170 [ 892.922252] __alloc_file+0xb7/0x320 [ 892.922552] alloc_empty_file+0x6d/0x170 [ 892.922953] alloc_file+0x5e/0x5a0 [ 892.923322] alloc_file_pseudo+0x16a/0x250 [ 892.923810] ? alloc_file+0x5a0/0x5a0 [ 892.924250] ? shmem_get_inode+0x55c/0xbc0 [ 892.924604] __shmem_file_setup+0x144/0x320 [ 892.924956] ? _copy_from_user+0xfb/0x1b0 [ 892.925298] __do_sys_memfd_create+0x275/0x450 [ 892.925664] ? memfd_file_seals_ptr+0x170/0x170 [ 892.926046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 892.926470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 892.926888] do_syscall_64+0x33/0x40 [ 892.927189] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.927609] RIP: 0033:0x7fc547493b19 [ 892.927920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.929393] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 892.930005] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 892.930566] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 892.931133] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 892.931698] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 892.932269] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 892.964844] FAULT_INJECTION: forcing a failure. [ 892.964844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 892.966685] CPU: 0 PID: 8314 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 892.967665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 892.968843] Call Trace: [ 892.969236] dump_stack+0x107/0x167 [ 892.969766] should_fail.cold+0x5/0xa [ 892.970323] __alloc_pages_nodemask+0x182/0x600 [ 892.970995] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 892.971854] ? up_write+0x191/0x550 [ 892.972400] ? rwlock_bug.part.0+0x90/0x90 [ 892.973010] ? anon_vma_interval_tree_insert+0x277/0x450 [ 892.973789] alloc_pages_vma+0xbb/0x410 [ 892.974369] handle_mm_fault+0x152f/0x3500 [ 892.974994] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 892.975746] ? SOFTIRQ_verbose+0x10/0x10 [ 892.976337] ? __pmd_alloc+0x5e0/0x5e0 [ 892.976915] __get_user_pages+0x6ec/0x1620 [ 892.977536] ? follow_page_mask+0x1900/0x1900 [ 892.978187] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 892.978868] __get_user_pages_remote+0x1d5/0x870 [ 892.979546] ? lock_downgrade+0x6d0/0x6d0 [ 892.980154] get_user_pages_remote+0x63/0x90 [ 892.980809] get_arg_page+0xba/0x200 [ 892.981354] ? acct_arg_size+0xe0/0xe0 [ 892.981909] ? downgrade_write+0x3a0/0x3a0 [ 892.982520] ? count.constprop.0+0x1b3/0x290 [ 892.983154] copy_string_kernel+0x1b4/0x450 [ 892.983778] do_execveat_common+0x525/0x8d0 [ 892.984425] ? bprm_execve+0x1a60/0x1a60 [ 892.985018] __x64_sys_execveat+0xed/0x140 [ 892.985635] do_syscall_64+0x33/0x40 [ 892.986172] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 892.986906] RIP: 0033:0x7f2243400b19 [ 892.987437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.990039] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 892.991126] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 892.992143] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 892.993155] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.994165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.995175] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:10:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 906.049615] FAULT_INJECTION: forcing a failure. [ 906.049615] name failslab, interval 1, probability 0, space 0, times 0 [ 906.050727] CPU: 1 PID: 8329 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 906.051332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.052055] Call Trace: [ 906.052294] dump_stack+0x107/0x167 [ 906.052616] should_fail.cold+0x5/0xa [ 906.052957] ? create_object.isra.0+0x3a/0xa20 [ 906.053359] should_failslab+0x5/0x20 [ 906.053695] kmem_cache_alloc+0x5b/0x310 [ 906.054055] create_object.isra.0+0x3a/0xa20 [ 906.054439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.054887] kmem_cache_alloc+0x159/0x310 [ 906.055260] ebitmap_cpy+0xc7/0x330 [ 906.055587] mls_compute_sid+0x64b/0x1060 [ 906.055952] ? mark_lock+0xf5/0x2df0 [ 906.056284] ? mls_convert_context+0x6c0/0x6c0 [ 906.056695] security_compute_sid.part.0+0x8e8/0x16e0 [ 906.057161] ? security_compute_validatetrans.part.0+0x960/0x960 [ 906.057699] ? mark_lock+0xf5/0x2df0 [ 906.058032] ? lock_chain_count+0x20/0x20 [ 906.058579] ? lock_acquire+0x197/0x470 22:10:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) setresuid(0x0, 0x0, 0x0) 22:10:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 22:10:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 13) 22:10:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 22:10:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 22:10:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 22:10:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) [ 906.059032] ? find_held_lock+0x2c/0x110 [ 906.059427] security_transition_sid+0xc0/0x190 [ 906.059832] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 906.060290] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 906.060736] ? selinux_inode_getsecctx+0x90/0x90 [ 906.061147] ? sched_exec+0x1ae/0x1e0 [ 906.061475] ? do_raw_spin_lock+0x121/0x260 [ 906.061849] ? nr_iowait+0x130/0x130 [ 906.062176] ? rwlock_bug.part.0+0x90/0x90 [ 906.062547] security_bprm_creds_for_exec+0x46/0xa0 [ 906.062982] bprm_execve+0x6c1/0x1a60 [ 906.063315] ? open_exec+0x70/0x70 [ 906.063626] ? memcpy+0x39/0x60 [ 906.063917] ? copy_string_kernel+0x3b6/0x450 [ 906.064325] do_execveat_common+0x772/0x8d0 [ 906.064701] ? bprm_execve+0x1a60/0x1a60 [ 906.065064] __x64_sys_execveat+0xed/0x140 [ 906.065432] do_syscall_64+0x33/0x40 [ 906.065754] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.066201] RIP: 0033:0x7f70da682b19 [ 906.066526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.068096] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.068754] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 906.068803] FAULT_INJECTION: forcing a failure. [ 906.068803] name failslab, interval 1, probability 0, space 0, times 0 [ 906.069363] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.069371] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.069379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.069386] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 906.073083] FAULT_INJECTION: forcing a failure. [ 906.073083] name failslab, interval 1, probability 0, space 0, times 0 [ 906.073265] CPU: 0 PID: 8333 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 906.077453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.078659] Call Trace: [ 906.079059] dump_stack+0x107/0x167 [ 906.079603] should_fail.cold+0x5/0xa [ 906.080176] ? create_object.isra.0+0x3a/0xa20 [ 906.080849] should_failslab+0x5/0x20 [ 906.081416] kmem_cache_alloc+0x5b/0x310 [ 906.082016] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 906.082830] create_object.isra.0+0x3a/0xa20 [ 906.083480] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.084239] kmem_cache_alloc+0x159/0x310 [ 906.084865] security_file_alloc+0x34/0x170 [ 906.085505] __alloc_file+0xb7/0x320 [ 906.086054] alloc_empty_file+0x6d/0x170 [ 906.086652] alloc_file+0x5e/0x5a0 [ 906.087180] alloc_file_pseudo+0x16a/0x250 [ 906.087799] ? alloc_file+0x5a0/0x5a0 [ 906.088380] ? shmem_get_inode+0x55c/0xbc0 [ 906.089016] __shmem_file_setup+0x144/0x320 [ 906.089655] ? _copy_from_user+0xfb/0x1b0 [ 906.090269] __do_sys_memfd_create+0x275/0x450 [ 906.090950] ? memfd_file_seals_ptr+0x170/0x170 [ 906.091646] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.092427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.093187] do_syscall_64+0x33/0x40 [ 906.093742] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.094494] RIP: 0033:0x7fc547493b19 [ 906.095041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.097727] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 906.098840] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc547493b19 [ 906.099885] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007fc5474ed0fb [ 906.100931] RBP: 0000000000000003 R08: 0000000000002100 R09: ffffffffffffffff [ 906.101972] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 906.103016] R13: 0000000020000040 R14: 0000000004040004 R15: 0000000020000140 [ 906.104093] CPU: 1 PID: 8335 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 906.104677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.105386] Call Trace: [ 906.105630] dump_stack+0x107/0x167 [ 906.105953] should_fail.cold+0x5/0xa [ 906.106282] ? create_object.isra.0+0x3a/0xa20 [ 906.106670] should_failslab+0x5/0x20 [ 906.106996] kmem_cache_alloc+0x5b/0x310 [ 906.107343] ? mark_held_locks+0x9e/0xe0 [ 906.107694] create_object.isra.0+0x3a/0xa20 [ 906.108078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.108515] kmem_cache_alloc+0x159/0x310 [ 906.108873] ebitmap_cpy+0xc7/0x330 [ 906.109187] mls_compute_sid+0x64b/0x1060 [ 906.109544] ? mark_lock+0xf5/0x2df0 [ 906.109861] ? mls_convert_context+0x6c0/0x6c0 [ 906.110255] security_compute_sid.part.0+0x8e8/0x16e0 [ 906.110703] ? security_compute_validatetrans.part.0+0x960/0x960 [ 906.111223] ? mark_lock+0xf5/0x2df0 [ 906.111543] ? lock_chain_count+0x20/0x20 [ 906.111899] ? lock_acquire+0x197/0x470 [ 906.112246] ? find_held_lock+0x2c/0x110 [ 906.112595] security_transition_sid+0xc0/0x190 [ 906.112991] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 906.113418] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 906.113848] ? selinux_inode_getsecctx+0x90/0x90 [ 906.114251] ? sched_exec+0x1ae/0x1e0 [ 906.114575] ? do_raw_spin_lock+0x121/0x260 [ 906.114941] ? nr_iowait+0x130/0x130 [ 906.115259] ? rwlock_bug.part.0+0x90/0x90 [ 906.115629] security_bprm_creds_for_exec+0x46/0xa0 [ 906.116060] bprm_execve+0x6c1/0x1a60 [ 906.116395] ? open_exec+0x70/0x70 [ 906.116702] ? memcpy+0x39/0x60 [ 906.116985] ? copy_string_kernel+0x3b6/0x450 [ 906.117370] do_execveat_common+0x772/0x8d0 [ 906.117737] ? bprm_execve+0x1a60/0x1a60 [ 906.118097] __x64_sys_execveat+0xed/0x140 [ 906.118461] do_syscall_64+0x33/0x40 [ 906.118781] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.119216] RIP: 0033:0x7f6383eb9b19 [ 906.119532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.119851] FAULT_INJECTION: forcing a failure. [ 906.119851] name failslab, interval 1, probability 0, space 0, times 0 [ 906.121067] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.121079] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 906.121086] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.121093] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.121100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.121116] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 906.126328] CPU: 0 PID: 8337 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 906.127343] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.128560] Call Trace: [ 906.128954] dump_stack+0x107/0x167 [ 906.129498] should_fail.cold+0x5/0xa [ 906.130063] ? create_object.isra.0+0x3a/0xa20 [ 906.130950] should_failslab+0x5/0x20 [ 906.131514] kmem_cache_alloc+0x5b/0x310 [ 906.132138] create_object.isra.0+0x3a/0xa20 [ 906.132785] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.133531] kmem_cache_alloc_trace+0x151/0x320 [ 906.134217] call_usermodehelper_setup+0xa2/0x2f0 [ 906.134931] ? copy_regset_to_user+0x170/0x170 [ 906.135598] ? bprm_execve+0xbe6/0x1a60 [ 906.136191] __request_module+0x3f9/0x920 [ 906.136794] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 906.137558] ? free_modprobe_argv+0x90/0x90 [ 906.138195] ? find_held_lock+0x2c/0x110 [ 906.138797] ? find_held_lock+0x2c/0x110 [ 906.139401] ? bprm_execve+0xa13/0x1a60 [ 906.139983] ? lock_downgrade+0x6d0/0x6d0 [ 906.140602] ? elf_core_dump+0x3c50/0x3c50 [ 906.141224] ? do_raw_read_unlock+0x3b/0x70 [ 906.141864] ? _raw_read_unlock+0x1a/0x30 [ 906.142467] ? load_misc_binary+0x605/0xb70 [ 906.143115] bprm_execve+0xbe6/0x1a60 [ 906.143677] ? open_exec+0x70/0x70 [ 906.144215] ? memcpy+0x39/0x60 [ 906.144709] ? copy_string_kernel+0x3b6/0x450 [ 906.145392] do_execveat_common+0x772/0x8d0 [ 906.146024] ? bprm_execve+0x1a60/0x1a60 [ 906.146647] __x64_sys_execveat+0xed/0x140 [ 906.147264] do_syscall_64+0x33/0x40 [ 906.147810] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.148556] RIP: 0033:0x7f9509c8ab19 [ 906.149103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.151719] RSP: 002b:00007f95071df188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.152834] RAX: ffffffffffffffda RBX: 00007f9509d9e020 RCX: 00007f9509c8ab19 [ 906.153862] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.154892] RBP: 00007f95071df1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.155913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.156943] R13: 00007ffc800ea53f R14: 00007f95071df300 R15: 0000000000022000 [ 906.160196] FAULT_INJECTION: forcing a failure. [ 906.160196] name failslab, interval 1, probability 0, space 0, times 0 [ 906.161174] CPU: 1 PID: 8327 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 906.161745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.162434] Call Trace: [ 906.162665] dump_stack+0x107/0x167 [ 906.162971] should_fail.cold+0x5/0xa [ 906.163292] ? create_object.isra.0+0x3a/0xa20 [ 906.163677] should_failslab+0x5/0x20 [ 906.163998] kmem_cache_alloc+0x5b/0x310 [ 906.164351] create_object.isra.0+0x3a/0xa20 [ 906.164721] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.165152] kmem_cache_alloc+0x159/0x310 [ 906.165506] prepare_creds+0x25/0x5e0 [ 906.165829] prepare_exec_creds+0xd/0x260 [ 906.166181] bprm_execve+0x18f/0x1a60 [ 906.166502] ? acct_arg_size+0xe0/0xe0 [ 906.166830] ? downgrade_write+0x3a0/0x3a0 [ 906.167190] ? open_exec+0x70/0x70 [ 906.167488] ? memcpy+0x39/0x60 [ 906.167766] ? copy_string_kernel+0x3b6/0x450 [ 906.168157] do_execveat_common+0x772/0x8d0 [ 906.168523] ? bprm_execve+0x1a60/0x1a60 [ 906.168877] __x64_sys_execveat+0xed/0x140 [ 906.169235] do_syscall_64+0x33/0x40 [ 906.169546] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.169975] RIP: 0033:0x7f2f4d86bb19 [ 906.170289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.171816] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.172461] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 906.173053] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.173644] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.174238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.174828] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 906.178062] FAULT_INJECTION: forcing a failure. [ 906.178062] name failslab, interval 1, probability 0, space 0, times 0 [ 906.179759] CPU: 0 PID: 8321 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 906.180779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.181983] Call Trace: [ 906.182382] dump_stack+0x107/0x167 [ 906.182919] should_fail.cold+0x5/0xa [ 906.183491] ? dup_fd+0x89/0xcf0 [ 906.183995] should_failslab+0x5/0x20 [ 906.184559] kmem_cache_alloc+0x5b/0x310 [ 906.185156] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 906.185846] dup_fd+0x89/0xcf0 [ 906.186343] unshare_files+0x175/0x270 [ 906.186914] ? __ia32_sys_unshare+0x40/0x40 [ 906.187553] ? get_user_pages_remote+0x63/0x90 [ 906.188245] ? get_user_pages_remote+0x6c/0x90 [ 906.188922] bprm_execve+0xcb/0x1a60 [ 906.189478] ? acct_arg_size+0xe0/0xe0 [ 906.190046] ? downgrade_write+0x3a0/0x3a0 [ 906.190674] ? open_exec+0x70/0x70 [ 906.191204] ? memcpy+0x39/0x60 [ 906.191698] ? copy_string_kernel+0x3b6/0x450 [ 906.192375] do_execveat_common+0x772/0x8d0 [ 906.193019] ? bprm_execve+0x1a60/0x1a60 [ 906.193638] __x64_sys_execveat+0xed/0x140 [ 906.194270] do_syscall_64+0x33/0x40 [ 906.194820] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.195578] RIP: 0033:0x7f2243400b19 [ 906.196134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.198803] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.199886] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 906.200933] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.201983] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.203027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.204084] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 906.224795] FAULT_INJECTION: forcing a failure. [ 906.224795] name failslab, interval 1, probability 0, space 0, times 0 [ 906.226490] CPU: 0 PID: 8334 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 906.227497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.228717] Call Trace: [ 906.229107] dump_stack+0x107/0x167 [ 906.229651] should_fail.cold+0x5/0xa [ 906.230219] ? create_object.isra.0+0x3a/0xa20 [ 906.230896] should_failslab+0x5/0x20 [ 906.231464] kmem_cache_alloc+0x5b/0x310 [ 906.232071] create_object.isra.0+0x3a/0xa20 [ 906.232725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.233476] __kmalloc_node+0x1ae/0x420 [ 906.234073] kvmalloc_node+0x119/0x170 [ 906.234644] alloc_fdtable+0x13f/0x280 [ 906.235219] dup_fd+0x74d/0xcf0 [ 906.235721] unshare_files+0x175/0x270 [ 906.236302] ? __ia32_sys_unshare+0x40/0x40 [ 906.236942] ? get_user_pages_remote+0x63/0x90 [ 906.237612] ? get_user_pages_remote+0x6c/0x90 [ 906.238286] bprm_execve+0xcb/0x1a60 [ 906.238836] ? acct_arg_size+0xe0/0xe0 [ 906.239410] ? downgrade_write+0x3a0/0x3a0 [ 906.240034] ? open_exec+0x70/0x70 [ 906.240566] ? memcpy+0x39/0x60 [ 906.241058] ? copy_string_kernel+0x3b6/0x450 [ 906.241731] do_execveat_common+0x772/0x8d0 [ 906.242371] ? bprm_execve+0x1a60/0x1a60 [ 906.242983] __x64_sys_execveat+0xed/0x140 [ 906.243601] do_syscall_64+0x33/0x40 [ 906.244155] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.244910] RIP: 0033:0x7f1c8836fb19 [ 906.245460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.248133] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.249245] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 906.250288] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.251323] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.252375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.253415] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:10:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 22:10:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 22:10:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) [ 906.301549] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 906.305541] FAULT_INJECTION: forcing a failure. [ 906.305541] name failslab, interval 1, probability 0, space 0, times 0 [ 906.306542] CPU: 1 PID: 8350 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 906.307092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.307764] Call Trace: [ 906.307990] dump_stack+0x107/0x167 [ 906.308299] should_fail.cold+0x5/0xa [ 906.308617] ? create_object.isra.0+0x3a/0xa20 [ 906.308993] should_failslab+0x5/0x20 [ 906.309304] kmem_cache_alloc+0x5b/0x310 [ 906.309637] create_object.isra.0+0x3a/0xa20 [ 906.309995] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.310413] kmem_cache_alloc+0x159/0x310 [ 906.310759] ebitmap_cpy+0xc7/0x330 [ 906.311061] mls_compute_sid+0x64b/0x1060 [ 906.311406] ? mark_lock+0xf5/0x2df0 [ 906.311711] ? mls_convert_context+0x6c0/0x6c0 [ 906.312104] security_compute_sid.part.0+0x8e8/0x16e0 [ 906.312536] ? security_compute_validatetrans.part.0+0x960/0x960 [ 906.313040] ? mark_lock+0xf5/0x2df0 [ 906.313351] ? lock_chain_count+0x20/0x20 [ 906.313700] ? lock_acquire+0x197/0x470 [ 906.314022] ? find_held_lock+0x2c/0x110 [ 906.314360] security_transition_sid+0xc0/0x190 [ 906.314746] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 906.315163] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 906.315575] ? selinux_inode_getsecctx+0x90/0x90 [ 906.315964] ? sched_exec+0x1ae/0x1e0 [ 906.316284] ? do_raw_spin_lock+0x121/0x260 [ 906.316639] ? nr_iowait+0x130/0x130 [ 906.316946] ? rwlock_bug.part.0+0x90/0x90 [ 906.317299] security_bprm_creds_for_exec+0x46/0xa0 [ 906.317708] bprm_execve+0x6c1/0x1a60 [ 906.318036] ? open_exec+0x70/0x70 [ 906.318325] ? memcpy+0x39/0x60 [ 906.318598] ? copy_string_kernel+0x3b6/0x450 [ 906.318967] do_execveat_common+0x772/0x8d0 [ 906.319323] ? bprm_execve+0x1a60/0x1a60 [ 906.319663] __x64_sys_execveat+0xed/0x140 [ 906.320011] do_syscall_64+0x33/0x40 [ 906.320324] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.320744] RIP: 0033:0x7f70da682b19 [ 906.321046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.322540] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.323159] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 906.323732] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.324316] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.324890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.325463] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:10:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) setresuid(0x0, 0x0, 0x0) 22:10:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) [ 906.366014] FAULT_INJECTION: forcing a failure. [ 906.366014] name failslab, interval 1, probability 0, space 0, times 0 [ 906.367672] CPU: 0 PID: 8354 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 906.368665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.369944] Call Trace: [ 906.370341] dump_stack+0x107/0x167 [ 906.370871] should_fail.cold+0x5/0xa [ 906.371434] ? __alloc_file+0x21/0x320 [ 906.372005] should_failslab+0x5/0x20 [ 906.372580] kmem_cache_alloc+0x5b/0x310 [ 906.373176] ? kernel_text_address+0xf2/0x120 [ 906.373841] __alloc_file+0x21/0x320 [ 906.374384] alloc_empty_file+0x6d/0x170 [ 906.374981] path_openat+0xe3/0x26e0 [ 906.375529] ? lock_chain_count+0x20/0x20 [ 906.376142] ? stack_trace_save+0x8c/0xc0 [ 906.376747] ? stack_trace_consume_entry+0x160/0x160 [ 906.377491] ? path_lookupat+0x860/0x860 [ 906.378094] ? kasan_save_stack+0x32/0x40 [ 906.378702] ? kasan_save_stack+0x1b/0x40 [ 906.379311] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 22:10:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) [ 906.380060] ? security_prepare_creds+0x112/0x190 [ 906.380978] ? prepare_creds+0x452/0x5e0 [ 906.381572] ? prepare_exec_creds+0xd/0x260 [ 906.382203] ? bprm_execve+0x18f/0x1a60 [ 906.382789] do_filp_open+0x190/0x3e0 [ 906.383348] ? may_open_dev+0xf0/0xf0 [ 906.383919] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 906.384693] ? SOFTIRQ_verbose+0x10/0x10 [ 906.385289] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 906.386105] ? find_held_lock+0x2c/0x110 [ 906.386701] do_open_execat+0x116/0x690 [ 906.387288] ? __do_sys_uselib+0x5e0/0x5e0 [ 906.387903] ? do_raw_spin_lock+0x121/0x260 [ 906.388555] ? rwlock_bug.part.0+0x90/0x90 [ 906.389180] bprm_execve+0x55e/0x1a60 [ 906.389750] ? open_exec+0x70/0x70 [ 906.390272] ? memcpy+0x39/0x60 [ 906.390758] ? copy_string_kernel+0x3b6/0x450 [ 906.391422] do_execveat_common+0x772/0x8d0 [ 906.392067] ? bprm_execve+0x1a60/0x1a60 [ 906.392677] __x64_sys_execveat+0xed/0x140 [ 906.393306] do_syscall_64+0x33/0x40 [ 906.393854] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.394600] RIP: 0033:0x7f2f4d86bb19 [ 906.395144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.397795] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.398889] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 906.399924] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.400963] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.401998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.403030] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 906.462798] FAULT_INJECTION: forcing a failure. [ 906.462798] name failslab, interval 1, probability 0, space 0, times 0 [ 906.464485] CPU: 0 PID: 8362 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 906.465489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.466693] Call Trace: [ 906.467087] dump_stack+0x107/0x167 [ 906.467633] should_fail.cold+0x5/0xa [ 906.468206] ? create_object.isra.0+0x3a/0xa20 [ 906.468884] should_failslab+0x5/0x20 [ 906.469450] kmem_cache_alloc+0x5b/0x310 [ 906.470052] create_object.isra.0+0x3a/0xa20 [ 906.470705] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.471450] kmem_cache_alloc+0x159/0x310 [ 906.472080] dup_fd+0x89/0xcf0 [ 906.472568] unshare_files+0x175/0x270 [ 906.473150] ? __ia32_sys_unshare+0x40/0x40 [ 906.473786] ? get_user_pages_remote+0x63/0x90 [ 906.474461] ? get_user_pages_remote+0x6c/0x90 [ 906.475136] bprm_execve+0xcb/0x1a60 [ 906.475687] ? acct_arg_size+0xe0/0xe0 [ 906.476266] ? downgrade_write+0x3a0/0x3a0 [ 906.476894] ? open_exec+0x70/0x70 [ 906.477420] ? memcpy+0x39/0x60 [ 906.477911] ? copy_string_kernel+0x3b6/0x450 [ 906.478583] do_execveat_common+0x772/0x8d0 [ 906.479225] ? bprm_execve+0x1a60/0x1a60 [ 906.479841] __x64_sys_execveat+0xed/0x140 [ 906.480482] do_syscall_64+0x33/0x40 [ 906.481029] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.481784] RIP: 0033:0x7f2243400b19 [ 906.482328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.485005] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.486114] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 906.487160] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.488214] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.489258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.490303] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 906.521046] FAULT_INJECTION: forcing a failure. [ 906.521046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 906.523058] CPU: 0 PID: 8361 Comm: syz-executor.3 Not tainted 5.10.216 #1 [ 906.524063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.525262] Call Trace: [ 906.525653] dump_stack+0x107/0x167 [ 906.526200] should_fail.cold+0x5/0xa [ 906.526767] _copy_to_user+0x2e/0x180 [ 906.527342] simple_read_from_buffer+0xcc/0x160 [ 906.528033] proc_fail_nth_read+0x198/0x230 [ 906.528680] ? proc_sessionid_read+0x230/0x230 [ 906.529359] ? security_file_permission+0x24e/0x570 [ 906.530087] ? perf_trace_initcall_start+0xf1/0x380 [ 906.530835] ? proc_sessionid_read+0x230/0x230 [ 906.531503] vfs_read+0x228/0x580 [ 906.532023] ksys_read+0x12d/0x260 [ 906.532551] ? vfs_write+0xa70/0xa70 [ 906.533109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.533876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.534637] do_syscall_64+0x33/0x40 [ 906.535181] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.535930] RIP: 0033:0x7f9509c3d69c [ 906.536482] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 906.539120] RSP: 002b:00007f9507200170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 906.540234] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f9509c3d69c [ 906.541265] RDX: 000000000000000f RSI: 00007f95072001e0 RDI: 0000000000000003 [ 906.542296] RBP: 00007f95072001d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.543338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.544385] R13: 00007ffc800ea53f R14: 00007f9507200300 R15: 0000000000022000 [ 906.547670] FAULT_INJECTION: forcing a failure. [ 906.547670] name failslab, interval 1, probability 0, space 0, times 0 [ 906.549325] CPU: 0 PID: 8364 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 906.550328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.551525] Call Trace: [ 906.551912] dump_stack+0x107/0x167 [ 906.552462] should_fail.cold+0x5/0xa [ 906.553041] ? kvmalloc_node+0x119/0x170 [ 906.553645] should_failslab+0x5/0x20 [ 906.554204] __kmalloc_node+0x76/0x420 [ 906.554781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 906.555529] kvmalloc_node+0x119/0x170 [ 906.556115] alloc_fdtable+0x13f/0x280 [ 906.556689] dup_fd+0x74d/0xcf0 [ 906.557196] unshare_files+0x175/0x270 [ 906.557771] ? __ia32_sys_unshare+0x40/0x40 [ 906.558424] ? get_user_pages_remote+0x63/0x90 [ 906.559094] ? get_user_pages_remote+0x6c/0x90 [ 906.559776] bprm_execve+0xcb/0x1a60 [ 906.560331] ? acct_arg_size+0xe0/0xe0 [ 906.560906] ? downgrade_write+0x3a0/0x3a0 [ 906.561528] ? open_exec+0x70/0x70 [ 906.562059] ? memcpy+0x39/0x60 [ 906.562546] ? copy_string_kernel+0x3b6/0x450 [ 906.563223] do_execveat_common+0x772/0x8d0 [ 906.563857] ? bprm_execve+0x1a60/0x1a60 [ 906.564487] __x64_sys_execveat+0xed/0x140 [ 906.565109] do_syscall_64+0x33/0x40 [ 906.565657] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 906.566404] RIP: 0033:0x7f1c8836fb19 [ 906.566952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.569613] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 906.570735] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 906.571785] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 906.572835] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.573879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.574932] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:10:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 22:10:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 22:10:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 22:10:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) [ 919.334567] FAULT_INJECTION: forcing a failure. [ 919.334567] name failslab, interval 1, probability 0, space 0, times 0 [ 919.336352] CPU: 0 PID: 8374 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 919.337347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.338544] Call Trace: [ 919.338935] dump_stack+0x107/0x167 [ 919.339471] should_fail.cold+0x5/0xa [ 919.340033] ? create_object.isra.0+0x3a/0xa20 [ 919.340713] should_failslab+0x5/0x20 [ 919.341271] kmem_cache_alloc+0x5b/0x310 [ 919.341870] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 919.342676] create_object.isra.0+0x3a/0xa20 22:10:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 22:10:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 14) [ 919.343320] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.344149] kmem_cache_alloc+0x159/0x310 [ 919.344780] security_file_alloc+0x34/0x170 [ 919.345414] __alloc_file+0xb7/0x320 [ 919.345958] alloc_empty_file+0x6d/0x170 [ 919.346549] path_openat+0xe3/0x26e0 [ 919.347091] ? lock_chain_count+0x20/0x20 [ 919.347696] ? stack_trace_save+0x8c/0xc0 [ 919.348308] ? stack_trace_consume_entry+0x160/0x160 [ 919.349042] ? path_lookupat+0x860/0x860 [ 919.349637] ? kasan_save_stack+0x32/0x40 [ 919.350240] ? kasan_save_stack+0x1b/0x40 [ 919.350842] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.351578] ? security_prepare_creds+0x112/0x190 [ 919.352278] ? prepare_creds+0x452/0x5e0 [ 919.352865] ? prepare_exec_creds+0xd/0x260 [ 919.353493] ? bprm_execve+0x18f/0x1a60 [ 919.354073] do_filp_open+0x190/0x3e0 [ 919.354623] ? may_open_dev+0xf0/0xf0 [ 919.355199] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 919.355958] ? SOFTIRQ_verbose+0x10/0x10 [ 919.356560] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 919.357368] ? find_held_lock+0x2c/0x110 [ 919.357971] do_open_execat+0x116/0x690 [ 919.358003] FAULT_INJECTION: forcing a failure. [ 919.358003] name failslab, interval 1, probability 0, space 0, times 0 [ 919.358553] ? __do_sys_uselib+0x5e0/0x5e0 [ 919.358580] ? do_raw_spin_lock+0x121/0x260 [ 919.360802] ? rwlock_bug.part.0+0x90/0x90 [ 919.361431] bprm_execve+0x55e/0x1a60 [ 919.361996] ? open_exec+0x70/0x70 [ 919.362516] ? memcpy+0x39/0x60 [ 919.363001] ? copy_string_kernel+0x3b6/0x450 [ 919.363664] do_execveat_common+0x772/0x8d0 [ 919.364303] ? bprm_execve+0x1a60/0x1a60 [ 919.364914] __x64_sys_execveat+0xed/0x140 [ 919.365532] do_syscall_64+0x33/0x40 [ 919.366074] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.366809] RIP: 0033:0x7f70da682b19 [ 919.367352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.369997] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.371097] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 919.372121] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.373154] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.374175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.375201] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 919.376256] CPU: 1 PID: 8380 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 919.376893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.377259] FAULT_INJECTION: forcing a failure. [ 919.377259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 919.377624] Call Trace: [ 919.377646] dump_stack+0x107/0x167 [ 919.377664] should_fail.cold+0x5/0xa [ 919.377682] ? alloc_fdtable+0x84/0x280 [ 919.380688] should_failslab+0x5/0x20 [ 919.381032] kmem_cache_alloc_trace+0x55/0x320 [ 919.381444] ? rwlock_bug.part.0+0x90/0x90 [ 919.381825] alloc_fdtable+0x84/0x280 [ 919.382165] dup_fd+0x74d/0xcf0 [ 919.382471] unshare_files+0x175/0x270 [ 919.382820] ? __ia32_sys_unshare+0x40/0x40 [ 919.383205] ? get_user_pages_remote+0x63/0x90 [ 919.383610] ? get_user_pages_remote+0x6c/0x90 [ 919.384022] bprm_execve+0xcb/0x1a60 [ 919.384377] ? acct_arg_size+0xe0/0xe0 [ 919.384723] ? downgrade_write+0x3a0/0x3a0 [ 919.385104] ? open_exec+0x70/0x70 [ 919.385418] ? memcpy+0x39/0x60 [ 919.385715] ? copy_string_kernel+0x3b6/0x450 [ 919.386113] do_execveat_common+0x772/0x8d0 [ 919.386496] ? bprm_execve+0x1a60/0x1a60 [ 919.386864] __x64_sys_execveat+0xed/0x140 [ 919.387244] do_syscall_64+0x33/0x40 [ 919.387581] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.388032] RIP: 0033:0x7f2243400b19 [ 919.388375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.389972] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.390643] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 919.391268] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.391889] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.392513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.393131] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 919.393776] CPU: 0 PID: 8382 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 919.394787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.396003] Call Trace: [ 919.396404] dump_stack+0x107/0x167 [ 919.396945] should_fail.cold+0x5/0xa [ 919.397516] __alloc_pages_nodemask+0x182/0x600 [ 919.398212] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 919.399086] ? lock_downgrade+0x6d0/0x6d0 [ 919.399696] ? lock_acquire+0x197/0x470 [ 919.400311] alloc_pages_vma+0xbb/0x410 [ 919.400905] shmem_alloc_page+0x10f/0x1e0 [ 919.401512] ? shmem_init_inode+0x20/0x20 [ 919.402148] ? percpu_counter_add_batch+0x8b/0x140 [ 919.402870] ? __vm_enough_memory+0x184/0x360 [ 919.403535] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 919.404340] ? shmem_unuse_inode+0xf60/0xf60 [ 919.404984] ? ktime_get_coarse_real_ts64+0x15a/0x190 22:10:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) setresuid(0x0, 0x0, 0x0) 22:10:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:10:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) [ 919.405741] ? iov_iter_fault_in_readable+0x9a/0x410 [ 919.406531] shmem_write_begin+0xf7/0x1d0 [ 919.407136] generic_perform_write+0x20a/0x4f0 [ 919.407814] ? page_cache_prev_miss+0x310/0x310 [ 919.408496] ? evict_inodes+0x420/0x420 [ 919.409079] ? generic_write_checks+0x2ad/0x390 [ 919.409764] __generic_file_write_iter+0x39d/0x5d0 [ 919.410480] generic_file_write_iter+0xdb/0x230 [ 919.411151] ? iov_iter_init+0x3c/0x130 [ 919.411732] new_sync_write+0x42c/0x660 [ 919.412314] ? new_sync_read+0x6f0/0x6f0 [ 919.412905] ? __x64_sys_pwrite64+0x201/0x260 [ 919.413564] ? lock_release+0x680/0x680 [ 919.414141] ? selinux_file_permission+0x92/0x520 [ 919.414859] vfs_write+0x747/0xa70 [ 919.415391] __x64_sys_pwrite64+0x201/0x260 [ 919.416020] ? ksys_pwrite64+0x1b0/0x1b0 [ 919.416625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 919.417381] ? syscall_enter_from_user_mode+0x1d/0x50 [ 919.418129] do_syscall_64+0x33/0x40 [ 919.418671] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.419415] RIP: 0033:0x7fc547446ab7 [ 919.419955] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 919.422592] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 919.423687] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 919.424715] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 919.425742] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 919.426761] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 919.427786] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 919.439735] FAULT_INJECTION: forcing a failure. [ 919.439735] name failslab, interval 1, probability 0, space 0, times 0 [ 919.440945] CPU: 1 PID: 8392 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 919.441611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.442477] Call Trace: [ 919.442803] dump_stack+0x107/0x167 [ 919.443167] should_fail.cold+0x5/0xa [ 919.443497] ? create_object.isra.0+0x3a/0xa20 [ 919.443899] should_failslab+0x5/0x20 [ 919.444233] kmem_cache_alloc+0x5b/0x310 [ 919.444589] create_object.isra.0+0x3a/0xa20 [ 919.444967] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.445404] kmem_cache_alloc_trace+0x151/0x320 [ 919.445807] ? rwlock_bug.part.0+0x90/0x90 [ 919.446175] alloc_fdtable+0x84/0x280 [ 919.446504] dup_fd+0x74d/0xcf0 [ 919.446811] unshare_files+0x175/0x270 [ 919.447165] ? __ia32_sys_unshare+0x40/0x40 [ 919.447556] ? get_user_pages_remote+0x63/0x90 [ 919.447960] ? get_user_pages_remote+0x6c/0x90 [ 919.448372] bprm_execve+0xcb/0x1a60 [ 919.448705] ? acct_arg_size+0xe0/0xe0 [ 919.449040] ? downgrade_write+0x3a0/0x3a0 [ 919.449408] ? open_exec+0x70/0x70 [ 919.449712] ? memcpy+0x39/0x60 [ 919.450004] ? copy_string_kernel+0x3b6/0x450 [ 919.450391] do_execveat_common+0x772/0x8d0 [ 919.450763] ? bprm_execve+0x1a60/0x1a60 [ 919.451128] __x64_sys_execveat+0xed/0x140 [ 919.451496] do_syscall_64+0x33/0x40 [ 919.451825] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.452265] RIP: 0033:0x7f2243400b19 [ 919.452583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.454131] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.454772] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 919.455383] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.455991] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.456600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.457200] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 919.458632] FAULT_INJECTION: forcing a failure. [ 919.458632] name failslab, interval 1, probability 0, space 0, times 0 [ 919.459618] CPU: 1 PID: 8378 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 919.460212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.460935] Call Trace: [ 919.461166] dump_stack+0x107/0x167 [ 919.461490] should_fail.cold+0x5/0xa [ 919.461825] ? create_object.isra.0+0x3a/0xa20 [ 919.462227] should_failslab+0x5/0x20 [ 919.462562] kmem_cache_alloc+0x5b/0x310 [ 919.462925] create_object.isra.0+0x3a/0xa20 [ 919.463315] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.463758] kmem_cache_alloc+0x159/0x310 [ 919.464128] prepare_creds+0x25/0x5e0 [ 919.464481] prepare_exec_creds+0xd/0x260 [ 919.464845] bprm_execve+0x18f/0x1a60 [ 919.465179] ? acct_arg_size+0xe0/0xe0 [ 919.465523] ? downgrade_write+0x3a0/0x3a0 [ 919.465895] ? open_exec+0x70/0x70 [ 919.466211] ? memcpy+0x39/0x60 [ 919.466503] ? copy_string_kernel+0x3b6/0x450 [ 919.466902] do_execveat_common+0x772/0x8d0 [ 919.467283] ? bprm_execve+0x1a60/0x1a60 [ 919.467648] __x64_sys_execveat+0xed/0x140 [ 919.468017] do_syscall_64+0x33/0x40 [ 919.468355] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.468797] RIP: 0033:0x7f1c8836fb19 [ 919.469123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.470690] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.471343] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 919.471956] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.472579] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.473192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.473802] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 919.478658] FAULT_INJECTION: forcing a failure. [ 919.478658] name failslab, interval 1, probability 0, space 0, times 0 [ 919.480325] CPU: 0 PID: 8376 Comm: syz-executor.6 Not tainted 5.10.216 #1 22:10:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) [ 919.481320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.482608] Call Trace: [ 919.482995] dump_stack+0x107/0x167 [ 919.483531] should_fail.cold+0x5/0xa [ 919.484094] ? prepare_creds+0x25/0x5e0 [ 919.484692] should_failslab+0x5/0x20 [ 919.485246] kmem_cache_alloc+0x5b/0x310 [ 919.485838] ? __ia32_sys_unshare+0x40/0x40 [ 919.486471] prepare_creds+0x25/0x5e0 [ 919.487029] prepare_exec_creds+0xd/0x260 [ 919.487627] bprm_execve+0x18f/0x1a60 [ 919.488190] ? acct_arg_size+0xe0/0xe0 [ 919.488779] ? downgrade_write+0x3a0/0x3a0 [ 919.489400] ? open_exec+0x70/0x70 [ 919.489930] ? memcpy+0x39/0x60 [ 919.490420] ? copy_string_kernel+0x3b6/0x450 [ 919.491088] do_execveat_common+0x772/0x8d0 [ 919.491726] ? bprm_execve+0x1a60/0x1a60 [ 919.492351] __x64_sys_execveat+0xed/0x140 [ 919.492971] do_syscall_64+0x33/0x40 [ 919.493516] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.494257] RIP: 0033:0x7f2f4d86bb19 [ 919.494803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.497445] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.498547] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 919.499579] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.500617] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.501650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.502680] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 919.512982] FAULT_INJECTION: forcing a failure. [ 919.512982] name failslab, interval 1, probability 0, space 0, times 0 [ 919.514191] CPU: 1 PID: 8394 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 919.514866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.515559] Call Trace: [ 919.515794] dump_stack+0x107/0x167 [ 919.516102] should_fail.cold+0x5/0xa [ 919.516438] ? create_object.isra.0+0x3a/0xa20 [ 919.516828] should_failslab+0x5/0x20 [ 919.517150] kmem_cache_alloc+0x5b/0x310 [ 919.517492] ? mark_held_locks+0x9e/0xe0 [ 919.517833] create_object.isra.0+0x3a/0xa20 [ 919.518204] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.518631] kmem_cache_alloc+0x159/0x310 [ 919.518986] ebitmap_cpy+0xc7/0x330 [ 919.519299] mls_compute_sid+0x64b/0x1060 [ 919.519652] ? mls_convert_context+0x6c0/0x6c0 [ 919.520042] security_compute_sid.part.0+0x8e8/0x16e0 [ 919.520492] ? security_compute_validatetrans.part.0+0x960/0x960 [ 919.521001] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 919.521435] ? _raw_spin_unlock_irq+0x1f/0x30 [ 919.521812] ? trace_hardirqs_on+0x5b/0x180 [ 919.522176] ? _raw_spin_unlock_irq+0x1f/0x30 [ 919.522555] ? wait_for_completion+0x1d5/0x270 [ 919.522937] ? bit_wait_io_timeout+0x160/0x160 [ 919.523328] ? io_schedule_timeout+0x140/0x140 [ 919.523713] ? lockdep_init_map_type+0x2c7/0x780 [ 919.524125] ? stop_cpus.constprop.0+0x160/0x160 [ 919.524527] ? lock_acquire+0x197/0x470 [ 919.524861] ? find_held_lock+0x2c/0x110 [ 919.525200] ? set_cpus_allowed_ptr+0x10/0x10 [ 919.525579] security_transition_sid+0xc0/0x190 [ 919.525974] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 919.526394] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 919.526814] ? selinux_inode_getsecctx+0x90/0x90 [ 919.527208] ? sched_exec+0x16e/0x1e0 [ 919.527527] ? nr_iowait+0x130/0x130 [ 919.527839] ? rwlock_bug.part.0+0x90/0x90 [ 919.528211] security_bprm_creds_for_exec+0x46/0xa0 [ 919.528634] bprm_execve+0x6c1/0x1a60 [ 919.528962] ? open_exec+0x70/0x70 [ 919.529267] ? memcpy+0x39/0x60 [ 919.529543] ? copy_string_kernel+0x3b6/0x450 [ 919.529926] do_execveat_common+0x772/0x8d0 [ 919.530289] ? bprm_execve+0x1a60/0x1a60 [ 919.530644] __x64_sys_execveat+0xed/0x140 [ 919.530997] do_syscall_64+0x33/0x40 [ 919.531308] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.531729] RIP: 0033:0x7f6383eb9b19 [ 919.532044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.533540] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.534171] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 919.534749] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.535327] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.535903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.536485] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:10:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 22:10:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) setresuid(0x0, 0x0, 0x0) 22:10:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 22:10:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 22:10:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) [ 919.645061] FAULT_INJECTION: forcing a failure. [ 919.645061] name failslab, interval 1, probability 0, space 0, times 0 [ 919.646396] CPU: 1 PID: 8407 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 919.646989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.647656] Call Trace: [ 919.647881] dump_stack+0x107/0x167 [ 919.648186] should_fail.cold+0x5/0xa [ 919.648525] ? kvmalloc_node+0x119/0x170 [ 919.648861] should_failslab+0x5/0x20 [ 919.649177] __kmalloc_node+0x76/0x420 [ 919.649500] kvmalloc_node+0x119/0x170 [ 919.649823] alloc_fdtable+0xd3/0x280 [ 919.650131] dup_fd+0x74d/0xcf0 [ 919.650411] unshare_files+0x175/0x270 [ 919.650731] ? __ia32_sys_unshare+0x40/0x40 [ 919.651090] ? get_user_pages_remote+0x63/0x90 [ 919.651459] ? get_user_pages_remote+0x6c/0x90 [ 919.651839] bprm_execve+0xcb/0x1a60 [ 919.652144] ? acct_arg_size+0xe0/0xe0 [ 919.652466] ? downgrade_write+0x3a0/0x3a0 [ 919.652815] ? open_exec+0x70/0x70 [ 919.653109] ? memcpy+0x39/0x60 [ 919.653380] ? copy_string_kernel+0x3b6/0x450 [ 919.653752] do_execveat_common+0x772/0x8d0 [ 919.654114] ? bprm_execve+0x1a60/0x1a60 [ 919.654454] __x64_sys_execveat+0xed/0x140 [ 919.654800] do_syscall_64+0x33/0x40 [ 919.655111] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.655527] RIP: 0033:0x7f2243400b19 [ 919.655827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.657315] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.657929] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 919.658510] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.659090] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.659662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.660249] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:10:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 919.683693] FAULT_INJECTION: forcing a failure. [ 919.683693] name failslab, interval 1, probability 0, space 0, times 0 [ 919.685349] CPU: 0 PID: 8412 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 919.686344] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.687547] Call Trace: 22:10:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) [ 919.687942] dump_stack+0x107/0x167 [ 919.688575] should_fail.cold+0x5/0xa [ 919.689141] ? ebitmap_cpy+0xc7/0x330 [ 919.689698] should_failslab+0x5/0x20 [ 919.690251] kmem_cache_alloc+0x5b/0x310 [ 919.690853] ebitmap_cpy+0xc7/0x330 [ 919.691386] mls_compute_sid+0x64b/0x1060 [ 919.691991] ? mark_lock+0xf5/0x2df0 22:10:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 919.692547] ? mls_convert_context+0x6c0/0x6c0 [ 919.693244] security_compute_sid.part.0+0x8e8/0x16e0 [ 919.693263] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 919.694013] ? security_compute_validatetrans.part.0+0x960/0x960 [ 919.695342] ? mark_lock+0xf5/0x2df0 [ 919.695892] ? lock_chain_count+0x20/0x20 [ 919.696516] ? lock_acquire+0x197/0x470 [ 919.697091] ? find_held_lock+0x2c/0x110 [ 919.697691] security_transition_sid+0xc0/0x190 [ 919.698374] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 919.699111] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 919.699841] ? selinux_inode_getsecctx+0x90/0x90 [ 919.700535] ? sched_exec+0x1ae/0x1e0 [ 919.701090] ? do_raw_spin_lock+0x121/0x260 [ 919.701719] ? nr_iowait+0x130/0x130 [ 919.702266] ? rwlock_bug.part.0+0x90/0x90 [ 919.702891] security_bprm_creds_for_exec+0x46/0xa0 [ 919.703616] bprm_execve+0x6c1/0x1a60 [ 919.704181] ? open_exec+0x70/0x70 [ 919.704706] ? memcpy+0x39/0x60 [ 919.705194] ? copy_string_kernel+0x3b6/0x450 [ 919.705859] do_execveat_common+0x772/0x8d0 [ 919.706500] ? bprm_execve+0x1a60/0x1a60 [ 919.707110] __x64_sys_execveat+0xed/0x140 [ 919.707730] do_syscall_64+0x33/0x40 [ 919.708284] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.709027] RIP: 0033:0x7f70da682b19 [ 919.709568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.712217] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.713313] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 919.714339] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.715365] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.716392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.717411] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 919.746833] FAULT_INJECTION: forcing a failure. [ 919.746833] name failslab, interval 1, probability 0, space 0, times 0 [ 919.748694] CPU: 0 PID: 8415 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 919.749687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.750882] Call Trace: [ 919.751272] dump_stack+0x107/0x167 [ 919.751808] should_fail.cold+0x5/0xa [ 919.752378] ? prepare_creds+0x25/0x5e0 [ 919.752962] should_failslab+0x5/0x20 [ 919.753518] kmem_cache_alloc+0x5b/0x310 [ 919.754118] ? __ia32_sys_unshare+0x40/0x40 [ 919.754754] prepare_creds+0x25/0x5e0 [ 919.755316] prepare_exec_creds+0xd/0x260 [ 919.755925] bprm_execve+0x18f/0x1a60 [ 919.756499] ? acct_arg_size+0xe0/0xe0 [ 919.757064] ? downgrade_write+0x3a0/0x3a0 [ 919.757690] ? open_exec+0x70/0x70 [ 919.758213] ? memcpy+0x39/0x60 [ 919.758704] ? copy_string_kernel+0x3b6/0x450 22:10:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) [ 919.759377] do_execveat_common+0x772/0x8d0 [ 919.760096] ? bprm_execve+0x1a60/0x1a60 [ 919.760715] __x64_sys_execveat+0xed/0x140 [ 919.761335] do_syscall_64+0x33/0x40 [ 919.761875] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.762626] RIP: 0033:0x7f1c8836fb19 [ 919.763175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.765807] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.766916] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 919.767952] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.768994] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.770021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.771048] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 919.783336] FAULT_INJECTION: forcing a failure. [ 919.783336] name failslab, interval 1, probability 0, space 0, times 0 [ 919.785047] CPU: 0 PID: 8416 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 919.786037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.787236] Call Trace: [ 919.787627] dump_stack+0x107/0x167 [ 919.788164] should_fail.cold+0x5/0xa [ 919.788735] ? security_file_alloc+0x34/0x170 [ 919.789391] should_failslab+0x5/0x20 [ 919.789946] kmem_cache_alloc+0x5b/0x310 [ 919.790551] security_file_alloc+0x34/0x170 [ 919.791188] __alloc_file+0xb7/0x320 [ 919.791731] alloc_empty_file+0x6d/0x170 [ 919.792331] path_openat+0xe3/0x26e0 [ 919.792879] ? lock_chain_count+0x20/0x20 [ 919.793482] ? stack_trace_save+0x8c/0xc0 [ 919.794092] ? stack_trace_consume_entry+0x160/0x160 [ 919.794830] ? path_lookupat+0x860/0x860 [ 919.795434] ? kasan_save_stack+0x32/0x40 [ 919.796037] ? kasan_save_stack+0x1b/0x40 [ 919.796649] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.797389] ? security_prepare_creds+0x112/0x190 [ 919.798084] ? prepare_creds+0x452/0x5e0 [ 919.798673] ? prepare_exec_creds+0xd/0x260 [ 919.799299] ? bprm_execve+0x18f/0x1a60 [ 919.799880] do_filp_open+0x190/0x3e0 [ 919.800443] ? may_open_dev+0xf0/0xf0 [ 919.801017] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 919.801781] ? SOFTIRQ_verbose+0x10/0x10 [ 919.802252] FAULT_INJECTION: forcing a failure. [ 919.802252] name failslab, interval 1, probability 0, space 0, times 0 [ 919.802380] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 919.804085] ? find_held_lock+0x2c/0x110 [ 919.804691] do_open_execat+0x116/0x690 [ 919.805274] ? __do_sys_uselib+0x5e0/0x5e0 [ 919.805890] ? do_raw_spin_lock+0x121/0x260 [ 919.806528] ? rwlock_bug.part.0+0x90/0x90 [ 919.807156] bprm_execve+0x55e/0x1a60 [ 919.807725] ? open_exec+0x70/0x70 [ 919.808256] ? memcpy+0x39/0x60 [ 919.808741] ? copy_string_kernel+0x3b6/0x450 [ 919.809406] do_execveat_common+0x772/0x8d0 [ 919.810039] ? bprm_execve+0x1a60/0x1a60 [ 919.810655] __x64_sys_execveat+0xed/0x140 [ 919.811277] do_syscall_64+0x33/0x40 [ 919.811821] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.812572] RIP: 0033:0x7f2f4d86bb19 [ 919.813116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.815757] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.816875] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 919.817904] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.818929] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.819961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.820996] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 919.822053] CPU: 1 PID: 8423 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 919.822628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.823303] Call Trace: [ 919.823526] dump_stack+0x107/0x167 [ 919.823826] should_fail.cold+0x5/0xa [ 919.824143] ? create_object.isra.0+0x3a/0xa20 [ 919.824525] should_failslab+0x5/0x20 [ 919.824844] kmem_cache_alloc+0x5b/0x310 [ 919.825181] create_object.isra.0+0x3a/0xa20 [ 919.825541] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.825958] __kmalloc_node+0x1ae/0x420 [ 919.826295] kvmalloc_node+0x119/0x170 [ 919.826624] alloc_fdtable+0xd3/0x280 [ 919.826937] dup_fd+0x74d/0xcf0 [ 919.827218] unshare_files+0x175/0x270 [ 919.827537] ? __ia32_sys_unshare+0x40/0x40 [ 919.827893] ? get_user_pages_remote+0x63/0x90 [ 919.828275] ? get_user_pages_remote+0x6c/0x90 [ 919.828655] bprm_execve+0xcb/0x1a60 [ 919.828963] ? acct_arg_size+0xe0/0xe0 [ 919.829287] ? downgrade_write+0x3a0/0x3a0 [ 919.829632] ? open_exec+0x70/0x70 [ 919.829928] ? memcpy+0x39/0x60 [ 919.830201] ? copy_string_kernel+0x3b6/0x450 [ 919.830573] do_execveat_common+0x772/0x8d0 [ 919.830924] ? bprm_execve+0x1a60/0x1a60 [ 919.831268] __x64_sys_execveat+0xed/0x140 [ 919.831619] do_syscall_64+0x33/0x40 [ 919.831766] FAULT_INJECTION: forcing a failure. [ 919.831766] name failslab, interval 1, probability 0, space 0, times 0 [ 919.831927] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.831945] RIP: 0033:0x7f2243400b19 [ 919.834225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.835702] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.836319] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 919.836888] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.837457] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.838028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.838595] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 919.839191] CPU: 0 PID: 8425 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 919.840209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 919.841410] Call Trace: [ 919.841802] dump_stack+0x107/0x167 [ 919.842340] should_fail.cold+0x5/0xa [ 919.842900] ? create_object.isra.0+0x3a/0xa20 [ 919.843572] should_failslab+0x5/0x20 [ 919.844131] kmem_cache_alloc+0x5b/0x310 [ 919.844730] ? mark_held_locks+0x9e/0xe0 [ 919.845332] create_object.isra.0+0x3a/0xa20 [ 919.845973] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 919.846723] kmem_cache_alloc+0x159/0x310 [ 919.847339] ebitmap_cpy+0xc7/0x330 [ 919.847878] mls_compute_sid+0x64b/0x1060 [ 919.848504] ? mark_lock+0xf5/0x2df0 [ 919.849051] ? mls_convert_context+0x6c0/0x6c0 [ 919.849731] security_compute_sid.part.0+0x8e8/0x16e0 [ 919.850509] ? security_compute_validatetrans.part.0+0x960/0x960 [ 919.851407] ? mark_lock+0xf5/0x2df0 [ 919.851962] ? lock_chain_count+0x20/0x20 [ 919.852593] ? lock_acquire+0x197/0x470 [ 919.853175] ? find_held_lock+0x2c/0x110 [ 919.853780] security_transition_sid+0xc0/0x190 [ 919.854474] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 919.855214] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 919.855963] ? selinux_inode_getsecctx+0x90/0x90 [ 919.856675] ? sched_exec+0x1ae/0x1e0 [ 919.857237] ? do_raw_spin_lock+0x121/0x260 [ 919.857863] ? nr_iowait+0x130/0x130 [ 919.858411] ? rwlock_bug.part.0+0x90/0x90 [ 919.859041] security_bprm_creds_for_exec+0x46/0xa0 [ 919.859766] bprm_execve+0x6c1/0x1a60 [ 919.860343] ? open_exec+0x70/0x70 [ 919.860878] ? memcpy+0x39/0x60 [ 919.861372] ? copy_string_kernel+0x3b6/0x450 [ 919.862045] do_execveat_common+0x772/0x8d0 [ 919.862690] ? bprm_execve+0x1a60/0x1a60 [ 919.863309] __x64_sys_execveat+0xed/0x140 [ 919.863947] do_syscall_64+0x33/0x40 [ 919.864509] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 919.865264] RIP: 0033:0x7f6383eb9b19 [ 919.865814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.868487] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 919.869592] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 919.870631] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 919.871670] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.872712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.873751] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 932.571693] FAULT_INJECTION: forcing a failure. [ 932.571693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 932.573468] CPU: 1 PID: 8445 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 932.573640] FAULT_INJECTION: forcing a failure. [ 932.573640] name failslab, interval 1, probability 0, space 0, times 0 [ 932.574460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.574468] Call Trace: [ 932.574494] dump_stack+0x107/0x167 [ 932.574516] should_fail.cold+0x5/0xa [ 932.578201] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 932.578990] ? shmem_write_begin+0xf7/0x1d0 [ 932.579637] ? shmem_write_begin+0x100/0x1d0 [ 932.580289] generic_perform_write+0x279/0x4f0 [ 932.580973] ? page_cache_prev_miss+0x310/0x310 [ 932.581653] ? evict_inodes+0x420/0x420 [ 932.582241] ? generic_write_checks+0x2ad/0x390 [ 932.582934] __generic_file_write_iter+0x39d/0x5d0 [ 932.583658] generic_file_write_iter+0xdb/0x230 [ 932.584337] ? iov_iter_init+0x3c/0x130 [ 932.584934] new_sync_write+0x42c/0x660 [ 932.585521] ? new_sync_read+0x6f0/0x6f0 [ 932.586121] ? __x64_sys_pwrite64+0x201/0x260 [ 932.586783] ? lock_release+0x680/0x680 [ 932.587367] ? selinux_file_permission+0x92/0x520 [ 932.588096] vfs_write+0x747/0xa70 [ 932.588638] __x64_sys_pwrite64+0x201/0x260 [ 932.589273] ? ksys_pwrite64+0x1b0/0x1b0 [ 932.589870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 932.590638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 932.591392] do_syscall_64+0x33/0x40 [ 932.591942] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.592693] RIP: 0033:0x7fc547446ab7 [ 932.593234] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 932.595867] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 932.596979] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 932.598006] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 932.599033] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 932.600064] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 932.601107] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 932.602170] CPU: 0 PID: 8444 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 932.602789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.603532] Call Trace: [ 932.603782] dump_stack+0x107/0x167 [ 932.604115] should_fail.cold+0x5/0xa [ 932.604461] ? jbd2__journal_start+0x190/0x7e0 [ 932.604872] should_failslab+0x5/0x20 [ 932.605215] kmem_cache_alloc+0x5b/0x310 [ 932.605579] jbd2__journal_start+0x190/0x7e0 [ 932.605984] __ext4_journal_start_sb+0x214/0x390 [ 932.606639] ext4_dirty_inode+0xbc/0x130 [ 932.607061] ? ext4_setattr+0x2160/0x2160 [ 932.607424] __mark_inode_dirty+0x492/0xd40 [ 932.607808] touch_atime+0x5ea/0x6e0 [ 932.608140] ? atime_needs_update+0x600/0x600 [ 932.608543] ? add_to_page_cache_locked+0x40/0x40 [ 932.608979] generic_file_buffered_read+0x191a/0x2920 [ 932.609446] ? pagecache_get_page+0xc80/0xc80 [ 932.609855] ? __lock_acquire+0xbb1/0x5b00 [ 932.610233] generic_file_read_iter+0x33f/0x490 [ 932.610652] ext4_file_read_iter+0x184/0x4c0 [ 932.611053] __kernel_read+0x593/0xaa0 [ 932.611426] ? do_sendfile+0x1090/0x1090 [ 932.611792] ? _cond_resched+0x12/0x80 [ 932.612145] ? avc_policy_seqno+0x9/0x70 [ 932.612511] ? selinux_file_permission+0x92/0x520 [ 932.612940] ? lock_downgrade+0x6d0/0x6d0 [ 932.613314] kernel_read+0x52/0x70 [ 932.613633] bprm_execve+0x882/0x1a60 [ 932.613980] ? open_exec+0x70/0x70 [ 932.614301] ? memcpy+0x39/0x60 [ 932.614594] ? copy_string_kernel+0x3b6/0x450 [ 932.614996] do_execveat_common+0x772/0x8d0 [ 932.615380] ? bprm_execve+0x1a60/0x1a60 [ 932.615754] __x64_sys_execveat+0xed/0x140 [ 932.616129] do_syscall_64+0x33/0x40 [ 932.616464] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.616919] RIP: 0033:0x7f6383eb9b19 [ 932.617248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.618856] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.619521] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 932.620151] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.620773] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.621399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.622017] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:10:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 22:10:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) setresuid(0x0, 0x0, 0x0) 22:10:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 22:10:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 22:10:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 22:10:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 15) 22:10:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:10:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 932.625268] FAULT_INJECTION: forcing a failure. [ 932.625268] name failslab, interval 1, probability 0, space 0, times 0 [ 932.626297] CPU: 0 PID: 8442 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 932.626898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.627627] Call Trace: [ 932.627871] dump_stack+0x107/0x167 [ 932.628202] should_fail.cold+0x5/0xa [ 932.628583] ? kvmalloc_node+0x119/0x170 [ 932.629063] should_failslab+0x5/0x20 [ 932.629409] __kmalloc_node+0x76/0x420 [ 932.629755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 932.630214] kvmalloc_node+0x119/0x170 [ 932.630563] alloc_fdtable+0x13f/0x280 [ 932.630915] dup_fd+0x74d/0xcf0 [ 932.631223] unshare_files+0x175/0x270 [ 932.631571] ? __ia32_sys_unshare+0x40/0x40 [ 932.631962] ? get_user_pages_remote+0x63/0x90 [ 932.632376] ? get_user_pages_remote+0x6c/0x90 [ 932.632794] bprm_execve+0xcb/0x1a60 [ 932.633125] ? acct_arg_size+0xe0/0xe0 [ 932.633479] ? downgrade_write+0x3a0/0x3a0 [ 932.633857] ? open_exec+0x70/0x70 [ 932.634179] ? memcpy+0x39/0x60 [ 932.634478] ? copy_string_kernel+0x3b6/0x450 [ 932.634883] do_execveat_common+0x772/0x8d0 [ 932.635263] ? bprm_execve+0x1a60/0x1a60 [ 932.635645] __x64_sys_execveat+0xed/0x140 [ 932.636026] do_syscall_64+0x33/0x40 [ 932.636364] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.636816] RIP: 0033:0x7f2243400b19 [ 932.637151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.638772] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.639437] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 932.640062] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.640689] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.641308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.641925] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 932.645541] FAULT_INJECTION: forcing a failure. [ 932.645541] name failslab, interval 1, probability 0, space 0, times 0 [ 932.646618] CPU: 0 PID: 8446 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 932.647216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.647941] Call Trace: [ 932.648177] dump_stack+0x107/0x167 [ 932.648509] should_fail.cold+0x5/0xa [ 932.648861] ? create_object.isra.0+0x3a/0xa20 [ 932.649266] should_failslab+0x5/0x20 [ 932.649606] kmem_cache_alloc+0x5b/0x310 [ 932.649964] ? mark_held_locks+0x9e/0xe0 [ 932.650332] create_object.isra.0+0x3a/0xa20 [ 932.650724] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 932.651176] kmem_cache_alloc+0x159/0x310 [ 932.651558] ebitmap_cpy+0xc7/0x330 [ 932.651888] mls_compute_sid+0x64b/0x1060 [ 932.652262] ? mark_lock+0xf5/0x2df0 [ 932.652600] ? mls_convert_context+0x6c0/0x6c0 [ 932.653016] security_compute_sid.part.0+0x8e8/0x16e0 [ 932.653488] ? security_compute_validatetrans.part.0+0x960/0x960 [ 932.654032] ? mark_lock+0xf5/0x2df0 [ 932.654372] ? lock_chain_count+0x20/0x20 [ 932.654749] ? lock_acquire+0x197/0x470 [ 932.655105] ? find_held_lock+0x2c/0x110 [ 932.655474] security_transition_sid+0xc0/0x190 [ 932.655895] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 932.656355] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 932.656802] ? selinux_inode_getsecctx+0x90/0x90 [ 932.657228] ? sched_exec+0x1ae/0x1e0 [ 932.657563] ? do_raw_spin_lock+0x121/0x260 [ 932.657951] ? nr_iowait+0x130/0x130 [ 932.658287] ? rwlock_bug.part.0+0x90/0x90 [ 932.658673] security_bprm_creds_for_exec+0x46/0xa0 [ 932.659116] bprm_execve+0x6c1/0x1a60 [ 932.659459] ? open_exec+0x70/0x70 [ 932.659776] ? memcpy+0x39/0x60 [ 932.660072] ? copy_string_kernel+0x3b6/0x450 [ 932.660481] do_execveat_common+0x772/0x8d0 [ 932.660870] ? bprm_execve+0x1a60/0x1a60 [ 932.661243] __x64_sys_execveat+0xed/0x140 [ 932.661626] do_syscall_64+0x33/0x40 [ 932.661954] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.662413] RIP: 0033:0x7f70da682b19 [ 932.662743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.664554] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.665214] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 932.665839] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.666465] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.667092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.667724] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:10:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) [ 932.675752] FAULT_INJECTION: forcing a failure. [ 932.675752] name failslab, interval 1, probability 0, space 0, times 0 [ 932.677529] CPU: 1 PID: 8443 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 932.678518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.679717] Call Trace: [ 932.680110] dump_stack+0x107/0x167 [ 932.680664] should_fail.cold+0x5/0xa [ 932.681015] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 932.681218] ? create_object.isra.0+0x3a/0xa20 [ 932.681243] should_failslab+0x5/0x20 [ 932.683132] kmem_cache_alloc+0x5b/0x310 [ 932.683731] create_object.isra.0+0x3a/0xa20 [ 932.684383] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 932.685115] __kmalloc+0x16e/0x390 [ 932.685647] security_prepare_creds+0x112/0x190 [ 932.686331] prepare_creds+0x452/0x5e0 [ 932.686901] prepare_exec_creds+0xd/0x260 [ 932.687506] bprm_execve+0x18f/0x1a60 [ 932.688064] ? acct_arg_size+0xe0/0xe0 [ 932.688635] ? downgrade_write+0x3a0/0x3a0 [ 932.689257] ? open_exec+0x70/0x70 [ 932.689777] ? memcpy+0x39/0x60 [ 932.690262] ? copy_string_kernel+0x3b6/0x450 [ 932.690916] do_execveat_common+0x772/0x8d0 [ 932.691550] ? bprm_execve+0x1a60/0x1a60 [ 932.692159] __x64_sys_execveat+0xed/0x140 [ 932.692789] do_syscall_64+0x33/0x40 [ 932.693334] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.694076] RIP: 0033:0x7f1c8836fb19 [ 932.694623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.697255] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.698352] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 932.699381] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.700413] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.701442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.702470] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 932.708411] FAULT_INJECTION: forcing a failure. [ 932.708411] name failslab, interval 1, probability 0, space 0, times 0 [ 932.710072] CPU: 1 PID: 8458 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 932.711059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 22:10:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 932.712263] Call Trace: [ 932.712782] dump_stack+0x107/0x167 [ 932.713314] should_fail.cold+0x5/0xa [ 932.713871] ? __alloc_file+0x21/0x320 [ 932.714439] should_failslab+0x5/0x20 [ 932.714992] kmem_cache_alloc+0x5b/0x310 [ 932.715583] ? kernel_text_address+0xf2/0x120 [ 932.716242] __alloc_file+0x21/0x320 [ 932.716788] alloc_empty_file+0x6d/0x170 [ 932.717380] path_openat+0xe3/0x26e0 [ 932.717925] ? lock_chain_count+0x20/0x20 [ 932.718527] ? stack_trace_save+0x8c/0xc0 [ 932.719130] ? stack_trace_consume_entry+0x160/0x160 [ 932.719861] ? path_lookupat+0x860/0x860 [ 932.720469] ? kasan_save_stack+0x32/0x40 [ 932.721067] ? kasan_save_stack+0x1b/0x40 [ 932.721668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 932.722405] ? security_prepare_creds+0x112/0x190 [ 932.723100] ? prepare_creds+0x452/0x5e0 [ 932.723688] ? prepare_exec_creds+0xd/0x260 [ 932.724313] ? bprm_execve+0x18f/0x1a60 [ 932.724901] do_filp_open+0x190/0x3e0 [ 932.725454] ? may_open_dev+0xf0/0xf0 [ 932.726027] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 932.726791] ? SOFTIRQ_verbose+0x10/0x10 [ 932.727382] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 932.728186] ? find_held_lock+0x2c/0x110 [ 932.728791] do_open_execat+0x116/0x690 [ 932.729372] ? __do_sys_uselib+0x5e0/0x5e0 [ 932.729983] ? do_raw_spin_lock+0x121/0x260 [ 932.730611] ? rwlock_bug.part.0+0x90/0x90 [ 932.731243] bprm_execve+0x55e/0x1a60 [ 932.731807] ? open_exec+0x70/0x70 [ 932.732326] ? memcpy+0x39/0x60 [ 932.732819] ? copy_string_kernel+0x3b6/0x450 [ 932.733480] do_execveat_common+0x772/0x8d0 [ 932.734105] ? bprm_execve+0x1a60/0x1a60 [ 932.734713] __x64_sys_execveat+0xed/0x140 [ 932.735333] do_syscall_64+0x33/0x40 [ 932.735871] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.736613] RIP: 0033:0x7f2f4d86bb19 [ 932.737153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.739774] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.740876] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 932.741901] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.742923] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.743946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.744981] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 [ 932.777662] FAULT_INJECTION: forcing a failure. [ 932.777662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 932.779454] CPU: 1 PID: 8462 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 932.780475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 932.781692] Call Trace: [ 932.782095] dump_stack+0x107/0x167 [ 932.782642] should_fail.cold+0x5/0xa [ 932.783225] __alloc_pages_nodemask+0x182/0x600 [ 932.783926] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 932.784826] ? SOFTIRQ_verbose+0x10/0x10 [ 932.785444] alloc_pages_current+0x187/0x280 [ 932.786108] __page_cache_alloc+0x2d2/0x360 [ 932.786757] generic_file_buffered_read+0xcd7/0x2920 [ 932.787508] ? lock_chain_count+0x20/0x20 [ 932.788159] ? pagecache_get_page+0xc80/0xc80 [ 932.788824] ? __lock_acquire+0xbb1/0x5b00 [ 932.789465] generic_file_read_iter+0x33f/0x490 [ 932.790172] ext4_file_read_iter+0x184/0x4c0 [ 932.790835] __kernel_read+0x593/0xaa0 [ 932.791421] ? do_sendfile+0x1090/0x1090 [ 932.792036] ? _cond_resched+0x12/0x80 [ 932.792626] ? avc_policy_seqno+0x9/0x70 [ 932.793227] ? selinux_file_permission+0x92/0x520 [ 932.793948] ? lock_downgrade+0x6d0/0x6d0 [ 932.794577] kernel_read+0x52/0x70 [ 932.795112] bprm_execve+0x882/0x1a60 [ 932.795692] ? open_exec+0x70/0x70 [ 932.796224] ? memcpy+0x39/0x60 [ 932.796729] ? copy_string_kernel+0x3b6/0x450 [ 932.797405] do_execveat_common+0x772/0x8d0 [ 932.798059] ? bprm_execve+0x1a60/0x1a60 [ 932.798692] __x64_sys_execveat+0xed/0x140 [ 932.799330] do_syscall_64+0x33/0x40 [ 932.799877] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 932.800647] RIP: 0033:0x7f70da682b19 [ 932.801203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 932.803886] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 932.805014] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 932.806058] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 932.807099] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 932.808148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 932.809203] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 22:10:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 22:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 22:10:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 22:10:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5005) setresuid(0x0, 0x0, 0x0) 22:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 16) 22:10:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 22:10:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) [ 945.768285] FAULT_INJECTION: forcing a failure. [ 945.768285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 945.770120] CPU: 1 PID: 8480 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 945.770272] FAULT_INJECTION: forcing a failure. [ 945.770272] name failslab, interval 1, probability 0, space 0, times 0 [ 945.771103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.771112] Call Trace: [ 945.771136] dump_stack+0x107/0x167 [ 945.771157] should_fail.cold+0x5/0xa [ 945.774804] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 945.775587] ? shmem_write_begin+0xf7/0x1d0 [ 945.776219] ? shmem_write_begin+0x100/0x1d0 [ 945.776879] generic_perform_write+0x279/0x4f0 [ 945.777560] ? page_cache_prev_miss+0x310/0x310 [ 945.778239] ? evict_inodes+0x420/0x420 [ 945.778828] ? generic_write_checks+0x2ad/0x390 [ 945.779521] __generic_file_write_iter+0x39d/0x5d0 [ 945.780246] generic_file_write_iter+0xdb/0x230 [ 945.780925] ? iov_iter_init+0x3c/0x130 [ 945.781514] new_sync_write+0x42c/0x660 [ 945.782095] ? new_sync_read+0x6f0/0x6f0 [ 945.782694] ? __x64_sys_pwrite64+0x201/0x260 [ 945.783368] ? lock_release+0x680/0x680 [ 945.783955] ? selinux_file_permission+0x92/0x520 [ 945.784693] vfs_write+0x747/0xa70 [ 945.785228] __x64_sys_pwrite64+0x201/0x260 [ 945.785862] ? ksys_pwrite64+0x1b0/0x1b0 [ 945.786467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 945.787228] ? syscall_enter_from_user_mode+0x1d/0x50 [ 945.787979] do_syscall_64+0x33/0x40 [ 945.788536] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.789282] RIP: 0033:0x7fc547446ab7 [ 945.789831] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 945.792479] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 945.793595] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 945.794630] RDX: 000000000000005a RSI: 0000000020010000 RDI: 0000000000000004 [ 945.795660] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 945.796702] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 945.797729] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 945.798784] CPU: 0 PID: 8476 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 945.799405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.800134] Call Trace: [ 945.800379] dump_stack+0x107/0x167 [ 945.800710] should_fail.cold+0x5/0xa [ 945.801053] ? create_object.isra.0+0x3a/0xa20 [ 945.801463] should_failslab+0x5/0x20 [ 945.801802] kmem_cache_alloc+0x5b/0x310 [ 945.802161] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 945.802647] create_object.isra.0+0x3a/0xa20 [ 945.803042] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.803493] kmem_cache_alloc+0x159/0x310 [ 945.803876] security_file_alloc+0x34/0x170 [ 945.804263] __alloc_file+0xb7/0x320 [ 945.804623] alloc_empty_file+0x6d/0x170 [ 945.804989] path_openat+0xe3/0x26e0 [ 945.805333] ? lock_chain_count+0x20/0x20 [ 945.805701] ? stack_trace_save+0x8c/0xc0 [ 945.806067] ? stack_trace_consume_entry+0x160/0x160 [ 945.806511] ? path_lookupat+0x860/0x860 [ 945.806873] ? kasan_save_stack+0x32/0x40 [ 945.807240] ? kasan_save_stack+0x1b/0x40 [ 945.807603] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.808046] ? security_prepare_creds+0x112/0x190 [ 945.808473] ? prepare_creds+0x452/0x5e0 [ 945.808834] ? prepare_exec_creds+0xd/0x260 [ 945.809214] ? bprm_execve+0x18f/0x1a60 [ 945.809571] do_filp_open+0x190/0x3e0 [ 945.809907] ? may_open_dev+0xf0/0xf0 [ 945.810257] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 945.810714] ? SOFTIRQ_verbose+0x10/0x10 [ 945.811071] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 945.811559] ? find_held_lock+0x2c/0x110 [ 945.811927] do_open_execat+0x116/0x690 [ 945.812282] ? __do_sys_uselib+0x5e0/0x5e0 [ 945.812667] ? do_raw_spin_lock+0x121/0x260 [ 945.813045] ? rwlock_bug.part.0+0x90/0x90 [ 945.813429] bprm_execve+0x55e/0x1a60 [ 945.813771] ? open_exec+0x70/0x70 [ 945.814085] ? memcpy+0x39/0x60 [ 945.814381] ? copy_string_kernel+0x3b6/0x450 [ 945.814782] do_execveat_common+0x772/0x8d0 [ 945.815167] ? bprm_execve+0x1a60/0x1a60 [ 945.815538] __x64_sys_execveat+0xed/0x140 [ 945.815914] do_syscall_64+0x33/0x40 [ 945.816246] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.816699] RIP: 0033:0x7f2f4d86bb19 [ 945.817035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.818628] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 945.819296] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 945.819936] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 945.819984] FAULT_INJECTION: forcing a failure. [ 945.819984] name failslab, interval 1, probability 0, space 0, times 0 [ 945.820562] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.820570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 945.820578] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 945.825645] CPU: 1 PID: 8485 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 945.825971] FAULT_INJECTION: forcing a failure. [ 945.825971] name failslab, interval 1, probability 0, space 0, times 0 [ 945.826618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.826624] Call Trace: [ 945.826649] dump_stack+0x107/0x167 [ 945.829672] should_fail.cold+0x5/0xa [ 945.830229] ? create_object.isra.0+0x3a/0xa20 [ 945.830893] should_failslab+0x5/0x20 [ 945.831445] kmem_cache_alloc+0x5b/0x310 [ 945.832039] create_object.isra.0+0x3a/0xa20 [ 945.832681] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.833420] kmem_cache_alloc+0x159/0x310 [ 945.834028] jbd2__journal_start+0x190/0x7e0 [ 945.834676] __ext4_journal_start_sb+0x214/0x390 [ 945.835367] ext4_dirty_inode+0xbc/0x130 [ 945.835957] ? ext4_setattr+0x2160/0x2160 [ 945.836558] __mark_inode_dirty+0x492/0xd40 [ 945.837195] touch_atime+0x5ea/0x6e0 [ 945.837741] ? atime_needs_update+0x600/0x600 [ 945.838393] ? add_to_page_cache_locked+0x40/0x40 [ 945.839106] generic_file_buffered_read+0x191a/0x2920 [ 945.839880] ? pagecache_get_page+0xc80/0xc80 [ 945.840550] ? __lock_acquire+0xbb1/0x5b00 [ 945.841175] generic_file_read_iter+0x33f/0x490 [ 945.841854] ext4_file_read_iter+0x184/0x4c0 [ 945.842503] __kernel_read+0x593/0xaa0 [ 945.843076] ? do_sendfile+0x1090/0x1090 [ 945.843670] ? _cond_resched+0x12/0x80 [ 945.844240] ? avc_policy_seqno+0x9/0x70 [ 945.844843] ? selinux_file_permission+0x92/0x520 [ 945.845552] ? lock_downgrade+0x6d0/0x6d0 [ 945.846165] kernel_read+0x52/0x70 [ 945.846690] bprm_execve+0x882/0x1a60 [ 945.847262] ? open_exec+0x70/0x70 [ 945.847784] ? memcpy+0x39/0x60 [ 945.848274] ? copy_string_kernel+0x3b6/0x450 [ 945.848942] do_execveat_common+0x772/0x8d0 [ 945.849569] ? bprm_execve+0x1a60/0x1a60 [ 945.850182] __x64_sys_execveat+0xed/0x140 [ 945.850798] do_syscall_64+0x33/0x40 [ 945.851342] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.852080] RIP: 0033:0x7f6383eb9b19 [ 945.852630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.855262] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 945.856362] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 945.857409] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 945.858439] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.859469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 945.860503] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 945.861564] CPU: 0 PID: 8478 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 945.862177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.862888] Call Trace: [ 945.863128] dump_stack+0x107/0x167 [ 945.863450] should_fail.cold+0x5/0xa [ 945.863791] ? kvmalloc_node+0x119/0x170 [ 945.864147] should_failslab+0x5/0x20 [ 945.864479] __kmalloc_node+0x76/0x420 [ 945.864824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.865264] kvmalloc_node+0x119/0x170 [ 945.865608] alloc_fdtable+0x13f/0x280 [ 945.865940] dup_fd+0x74d/0xcf0 [ 945.866355] unshare_files+0x175/0x270 [ 945.866732] ? __ia32_sys_unshare+0x40/0x40 [ 945.867107] ? get_user_pages_remote+0x63/0x90 [ 945.867501] ? get_user_pages_remote+0x6c/0x90 [ 945.867902] bprm_execve+0xcb/0x1a60 [ 945.868222] ? acct_arg_size+0xe0/0xe0 [ 945.868571] ? downgrade_write+0x3a0/0x3a0 [ 945.868944] ? open_exec+0x70/0x70 [ 945.869251] ? memcpy+0x39/0x60 [ 945.869538] ? copy_string_kernel+0x3b6/0x450 [ 945.869604] FAULT_INJECTION: forcing a failure. [ 945.869604] name failslab, interval 1, probability 0, space 0, times 0 [ 945.869932] do_execveat_common+0x772/0x8d0 [ 945.869946] ? bprm_execve+0x1a60/0x1a60 [ 945.869970] __x64_sys_execveat+0xed/0x140 [ 945.872607] do_syscall_64+0x33/0x40 [ 945.872925] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.873361] RIP: 0033:0x7f2243400b19 [ 945.873680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.875228] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 945.875873] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 945.876478] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 945.877082] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.877686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 945.878287] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 945.878916] CPU: 1 PID: 8486 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 945.879715] FAULT_INJECTION: forcing a failure. [ 945.879715] name failslab, interval 1, probability 0, space 0, times 0 [ 945.879937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.882064] Call Trace: [ 945.882452] dump_stack+0x107/0x167 [ 945.882987] should_fail.cold+0x5/0xa [ 945.883545] ? create_object.isra.0+0x3a/0xa20 [ 945.884212] should_failslab+0x5/0x20 [ 945.884782] kmem_cache_alloc+0x5b/0x310 [ 945.885376] ? mark_held_locks+0x9e/0xe0 [ 945.885970] create_object.isra.0+0x3a/0xa20 [ 945.886615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.887356] kmem_cache_alloc+0x159/0x310 [ 945.887971] ebitmap_cpy+0xc7/0x330 [ 945.888514] mls_compute_sid+0x64b/0x1060 [ 945.889125] ? mark_lock+0xf5/0x2df0 [ 945.889668] ? mls_convert_context+0x6c0/0x6c0 [ 945.890353] security_compute_sid.part.0+0x8e8/0x16e0 [ 945.891127] ? security_compute_validatetrans.part.0+0x960/0x960 [ 945.892022] ? mark_lock+0xf5/0x2df0 [ 945.892582] ? lock_chain_count+0x20/0x20 [ 945.893205] ? lock_acquire+0x197/0x470 [ 945.893782] ? find_held_lock+0x2c/0x110 [ 945.894384] security_transition_sid+0xc0/0x190 [ 945.895063] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 945.895804] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 945.896542] ? selinux_inode_getsecctx+0x90/0x90 [ 945.897237] ? sched_exec+0x1ae/0x1e0 [ 945.897796] ? do_raw_spin_lock+0x121/0x260 [ 945.898425] ? nr_iowait+0x130/0x130 [ 945.898969] ? rwlock_bug.part.0+0x90/0x90 [ 945.899601] security_bprm_creds_for_exec+0x46/0xa0 [ 945.900323] bprm_execve+0x6c1/0x1a60 [ 945.900907] ? open_exec+0x70/0x70 [ 945.901427] ? memcpy+0x39/0x60 [ 945.901916] ? copy_string_kernel+0x3b6/0x450 [ 945.902579] do_execveat_common+0x772/0x8d0 [ 945.903214] ? bprm_execve+0x1a60/0x1a60 [ 945.903823] __x64_sys_execveat+0xed/0x140 [ 945.904447] do_syscall_64+0x33/0x40 [ 945.904995] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.905738] RIP: 0033:0x7f70da682b19 [ 945.906282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.908925] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 945.910023] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 945.911053] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 945.912083] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.913123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 945.914148] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 945.915203] CPU: 0 PID: 8490 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 945.915973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 945.916733] Call Trace: [ 945.916958] dump_stack+0x107/0x167 [ 945.917267] should_fail.cold+0x5/0xa [ 945.917587] ? create_object.isra.0+0x3a/0xa20 [ 945.917974] should_failslab+0x5/0x20 [ 945.918294] kmem_cache_alloc+0x5b/0x310 [ 945.918637] create_object.isra.0+0x3a/0xa20 [ 945.919005] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 945.919430] __kmalloc+0x16e/0x390 [ 945.919737] security_prepare_creds+0x112/0x190 [ 945.920129] prepare_creds+0x452/0x5e0 [ 945.920458] prepare_exec_creds+0xd/0x260 [ 945.920808] bprm_execve+0x18f/0x1a60 [ 945.921130] ? acct_arg_size+0xe0/0xe0 [ 945.921457] ? downgrade_write+0x3a0/0x3a0 [ 945.921813] ? open_exec+0x70/0x70 [ 945.922112] ? memcpy+0x39/0x60 [ 945.922393] ? copy_string_kernel+0x3b6/0x450 [ 945.922773] do_execveat_common+0x772/0x8d0 [ 945.923139] ? bprm_execve+0x1a60/0x1a60 [ 945.923494] __x64_sys_execveat+0xed/0x140 [ 945.923853] do_syscall_64+0x33/0x40 [ 945.924168] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 945.924608] RIP: 0033:0x7f1c8836fb19 [ 945.924920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.926447] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 945.927081] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 945.927663] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 945.928251] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.928840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 945.929426] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 22:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) [ 945.964769] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:10:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) setresuid(0x0, 0x0, 0x0) 22:10:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 17) 22:10:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 22:10:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) [ 946.064395] FAULT_INJECTION: forcing a failure. [ 946.064395] name failslab, interval 1, probability 0, space 0, times 0 [ 946.066227] CPU: 1 PID: 8505 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 946.067225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.068418] Call Trace: [ 946.068818] dump_stack+0x107/0x167 [ 946.069356] should_fail.cold+0x5/0xa [ 946.069915] ? prepare_creds+0x25/0x5e0 [ 946.070502] should_failslab+0x5/0x20 [ 946.071057] kmem_cache_alloc+0x5b/0x310 [ 946.071649] ? __ia32_sys_unshare+0x40/0x40 [ 946.072284] prepare_creds+0x25/0x5e0 [ 946.072844] prepare_exec_creds+0xd/0x260 [ 946.073453] bprm_execve+0x18f/0x1a60 [ 946.074016] ? acct_arg_size+0xe0/0xe0 [ 946.074582] ? downgrade_write+0x3a0/0x3a0 [ 946.075201] ? open_exec+0x70/0x70 [ 946.075723] ? memcpy+0x39/0x60 [ 946.076207] ? copy_string_kernel+0x3b6/0x450 [ 946.076875] do_execveat_common+0x772/0x8d0 [ 946.077509] ? bprm_execve+0x1a60/0x1a60 [ 946.078119] __x64_sys_execveat+0xed/0x140 [ 946.078739] do_syscall_64+0x33/0x40 [ 946.079288] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.080033] RIP: 0033:0x7f2243400b19 [ 946.080589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.083231] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.084342] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 946.085374] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.086404] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.087431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.088463] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 946.108506] FAULT_INJECTION: forcing a failure. [ 946.108506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 946.109526] CPU: 0 PID: 8509 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 946.110083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.110759] Call Trace: [ 946.110987] dump_stack+0x107/0x167 [ 946.111292] should_fail.cold+0x5/0xa [ 946.111614] __alloc_pages_nodemask+0x182/0x600 [ 946.112001] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 946.112507] ? lock_downgrade+0x6d0/0x6d0 [ 946.112853] ? lock_acquire+0x197/0x470 [ 946.113202] alloc_pages_vma+0xbb/0x410 [ 946.113535] shmem_alloc_page+0x10f/0x1e0 [ 946.113878] ? shmem_init_inode+0x20/0x20 [ 946.114242] ? percpu_counter_add_batch+0x8b/0x140 [ 946.114644] ? __vm_enough_memory+0x184/0x360 [ 946.115014] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 946.115457] ? shmem_unuse_inode+0xf60/0xf60 [ 946.115914] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 946.116440] ? iov_iter_fault_in_readable+0x9a/0x410 [ 946.116863] shmem_write_begin+0xf7/0x1d0 [ 946.117209] generic_perform_write+0x20a/0x4f0 [ 946.117589] ? page_cache_prev_miss+0x310/0x310 [ 946.117968] ? evict_inodes+0x420/0x420 [ 946.118300] ? generic_write_checks+0x2ad/0x390 [ 946.118685] __generic_file_write_iter+0x39d/0x5d0 [ 946.119083] generic_file_write_iter+0xdb/0x230 [ 946.119462] ? iov_iter_init+0x3c/0x130 [ 946.119786] new_sync_write+0x42c/0x660 [ 946.120115] ? new_sync_read+0x6f0/0x6f0 [ 946.120449] ? __x64_sys_pwrite64+0x201/0x260 [ 946.120822] ? lock_release+0x680/0x680 [ 946.121146] ? selinux_file_permission+0x92/0x520 [ 946.121553] vfs_write+0x747/0xa70 [ 946.121851] __x64_sys_pwrite64+0x201/0x260 [ 946.122214] ? ksys_pwrite64+0x1b0/0x1b0 [ 946.122550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 946.122981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 946.123398] do_syscall_64+0x33/0x40 [ 946.123708] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.124126] RIP: 0033:0x7fc547446ab7 [ 946.124430] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 946.125899] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 946.126524] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 946.127099] RDX: 000000000000001d RSI: 0000000020000000 RDI: 0000000000000004 [ 946.127672] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 946.128252] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 946.128835] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 946.140790] FAULT_INJECTION: forcing a failure. [ 946.140790] name failslab, interval 1, probability 0, space 0, times 0 [ 946.141741] CPU: 0 PID: 8513 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 946.142304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.142972] Call Trace: [ 946.143188] dump_stack+0x107/0x167 [ 946.143486] should_fail.cold+0x5/0xa [ 946.143802] ? jbd2__journal_start+0x190/0x7e0 [ 946.144184] should_failslab+0x5/0x20 [ 946.144506] kmem_cache_alloc+0x5b/0x310 [ 946.144844] jbd2__journal_start+0x190/0x7e0 [ 946.145222] __ext4_journal_start_sb+0x214/0x390 [ 946.145616] ext4_dirty_inode+0xbc/0x130 [ 946.145949] ? ext4_setattr+0x2160/0x2160 [ 946.146290] __mark_inode_dirty+0x492/0xd40 [ 946.146646] touch_atime+0x5ea/0x6e0 [ 946.146957] ? atime_needs_update+0x600/0x600 [ 946.147327] ? add_to_page_cache_locked+0x40/0x40 [ 946.147735] generic_file_buffered_read+0x191a/0x2920 [ 946.148170] ? pagecache_get_page+0xc80/0xc80 [ 946.148545] ? __lock_acquire+0xbb1/0x5b00 [ 946.148896] generic_file_read_iter+0x33f/0x490 [ 946.149285] ext4_file_read_iter+0x184/0x4c0 [ 946.149648] __kernel_read+0x593/0xaa0 [ 946.149969] ? do_sendfile+0x1090/0x1090 [ 946.150303] ? _cond_resched+0x12/0x80 [ 946.150624] ? avc_policy_seqno+0x9/0x70 [ 946.150966] ? selinux_file_permission+0x92/0x520 [ 946.151365] ? lock_downgrade+0x6d0/0x6d0 [ 946.151706] kernel_read+0x52/0x70 [ 946.152004] bprm_execve+0x882/0x1a60 [ 946.152325] ? open_exec+0x70/0x70 [ 946.152624] ? memcpy+0x39/0x60 [ 946.152896] ? copy_string_kernel+0x3b6/0x450 [ 946.153285] do_execveat_common+0x772/0x8d0 [ 946.153646] ? bprm_execve+0x1a60/0x1a60 [ 946.153998] __x64_sys_execveat+0xed/0x140 [ 946.154354] do_syscall_64+0x33/0x40 [ 946.154659] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.155083] RIP: 0033:0x7f6383eb9b19 [ 946.155394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.156895] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.157517] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 946.158094] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.158672] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.159253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.159837] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 22:10:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 22:10:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 946.182363] FAULT_INJECTION: forcing a failure. [ 946.182363] name failslab, interval 1, probability 0, space 0, times 0 [ 946.183289] CPU: 0 PID: 8511 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 946.183843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.184517] Call Trace: [ 946.184734] dump_stack+0x107/0x167 [ 946.185038] should_fail.cold+0x5/0xa [ 946.185354] ? create_object.isra.0+0x3a/0xa20 [ 946.185728] should_failslab+0x5/0x20 [ 946.186041] kmem_cache_alloc+0x5b/0x310 [ 946.186377] create_object.isra.0+0x3a/0xa20 [ 946.186736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 946.187157] kmem_cache_alloc+0x159/0x310 [ 946.187499] ebitmap_cpy+0xc7/0x330 [ 946.187808] mls_compute_sid+0x64b/0x1060 [ 946.188147] ? mark_lock+0xf5/0x2df0 [ 946.188455] ? mls_convert_context+0x6c0/0x6c0 [ 946.188850] security_compute_sid.part.0+0x8e8/0x16e0 [ 946.189280] ? security_compute_validatetrans.part.0+0x960/0x960 [ 946.189784] ? mark_lock+0xf5/0x2df0 [ 946.190099] ? lock_chain_count+0x20/0x20 [ 946.190445] ? lock_acquire+0x197/0x470 [ 946.190773] ? find_held_lock+0x2c/0x110 [ 946.191119] security_transition_sid+0xc0/0x190 [ 946.191501] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 946.191917] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 946.192338] ? selinux_inode_getsecctx+0x90/0x90 [ 946.192732] ? sched_exec+0x1ae/0x1e0 [ 946.193041] ? do_raw_spin_lock+0x121/0x260 [ 946.193392] ? nr_iowait+0x130/0x130 [ 946.193698] ? rwlock_bug.part.0+0x90/0x90 [ 946.194056] security_bprm_creds_for_exec+0x46/0xa0 [ 946.194469] bprm_execve+0x6c1/0x1a60 [ 946.194792] ? open_exec+0x70/0x70 [ 946.195086] ? memcpy+0x39/0x60 [ 946.195361] ? copy_string_kernel+0x3b6/0x450 [ 946.195738] do_execveat_common+0x772/0x8d0 [ 946.196094] ? bprm_execve+0x1a60/0x1a60 [ 946.196435] __x64_sys_execveat+0xed/0x140 [ 946.196791] do_syscall_64+0x33/0x40 [ 946.197099] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.197513] RIP: 0033:0x7f2f4d86bb19 [ 946.197821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.199305] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.199926] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 946.200509] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.201093] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.201666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.202243] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 946.221613] FAULT_INJECTION: forcing a failure. [ 946.221613] name failslab, interval 1, probability 0, space 0, times 0 [ 946.222535] CPU: 0 PID: 8519 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 946.223084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.223751] Call Trace: [ 946.223965] dump_stack+0x107/0x167 [ 946.224266] should_fail.cold+0x5/0xa [ 946.224581] ? create_object.isra.0+0x3a/0xa20 [ 946.224955] should_failslab+0x5/0x20 [ 946.225265] kmem_cache_alloc+0x5b/0x310 [ 946.225600] create_object.isra.0+0x3a/0xa20 [ 946.225954] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 946.226359] kmem_cache_alloc+0x159/0x310 [ 946.226698] __alloc_file+0x21/0x320 [ 946.227005] alloc_empty_file+0x6d/0x170 [ 946.227339] path_openat+0xe3/0x26e0 [ 946.227642] ? lock_chain_count+0x20/0x20 [ 946.227980] ? stack_trace_save+0x8c/0xc0 [ 946.228322] ? stack_trace_consume_entry+0x160/0x160 [ 946.228729] ? path_lookupat+0x860/0x860 [ 946.229063] ? kasan_save_stack+0x32/0x40 [ 946.229401] ? kasan_save_stack+0x1b/0x40 [ 946.229732] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 946.230149] ? security_prepare_creds+0x112/0x190 [ 946.230538] ? prepare_creds+0x452/0x5e0 [ 946.230862] ? prepare_exec_creds+0xd/0x260 [ 946.231210] ? bprm_execve+0x18f/0x1a60 [ 946.231535] do_filp_open+0x190/0x3e0 [ 946.231847] ? may_open_dev+0xf0/0xf0 [ 946.232164] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 946.232591] ? SOFTIRQ_verbose+0x10/0x10 [ 946.232924] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 946.233374] ? find_held_lock+0x2c/0x110 [ 946.233708] do_open_execat+0x116/0x690 [ 946.234033] ? __do_sys_uselib+0x5e0/0x5e0 [ 946.234378] ? do_raw_spin_lock+0x121/0x260 [ 946.234726] ? rwlock_bug.part.0+0x90/0x90 [ 946.235071] bprm_execve+0x55e/0x1a60 [ 946.235384] ? open_exec+0x70/0x70 [ 946.235669] ? memcpy+0x39/0x60 [ 946.235939] ? copy_string_kernel+0x3b6/0x450 [ 946.236307] do_execveat_common+0x772/0x8d0 [ 946.236655] ? bprm_execve+0x1a60/0x1a60 [ 946.236993] __x64_sys_execveat+0xed/0x140 [ 946.237338] do_syscall_64+0x33/0x40 [ 946.237641] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.238049] RIP: 0033:0x7f1c8836fb19 [ 946.238350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.239810] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.240419] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 946.240992] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.241557] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.242129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.242694] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:10:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:10:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) setresuid(0x0, 0x0, 0x0) 22:10:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 22:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) [ 946.293655] FAULT_INJECTION: forcing a failure. [ 946.293655] name failslab, interval 1, probability 0, space 0, times 0 [ 946.295550] CPU: 1 PID: 8526 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 946.296564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.297763] Call Trace: [ 946.298161] dump_stack+0x107/0x167 [ 946.298700] should_fail.cold+0x5/0xa [ 946.299264] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 946.300033] should_failslab+0x5/0x20 [ 946.300602] __kmalloc_node+0x76/0x420 [ 946.301179] ? lock_downgrade+0x6d0/0x6d0 [ 946.301794] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 946.302546] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 946.303275] ? trace_hardirqs_on+0x5b/0x180 [ 946.303910] __kmalloc_node+0x1c6/0x420 [ 946.304514] kvmalloc_node+0x119/0x170 [ 946.305089] alloc_fdtable+0x13f/0x280 [ 946.305668] dup_fd+0x74d/0xcf0 [ 946.306175] unshare_files+0x175/0x270 [ 946.306750] ? __ia32_sys_unshare+0x40/0x40 [ 946.307387] ? get_user_pages_remote+0x63/0x90 [ 946.308054] ? get_user_pages_remote+0x6c/0x90 [ 946.308739] bprm_execve+0xcb/0x1a60 [ 946.309296] ? acct_arg_size+0xe0/0xe0 [ 946.309865] ? downgrade_write+0x3a0/0x3a0 [ 946.310489] ? open_exec+0x70/0x70 [ 946.311012] ? memcpy+0x39/0x60 [ 946.311500] ? copy_string_kernel+0x3b6/0x450 [ 946.312176] do_execveat_common+0x772/0x8d0 [ 946.312816] ? bprm_execve+0x1a60/0x1a60 [ 946.313433] __x64_sys_execveat+0xed/0x140 [ 946.314059] do_syscall_64+0x33/0x40 [ 946.314610] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.315357] RIP: 0033:0x7f2243400b19 [ 946.315904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.318549] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.319664] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 946.320713] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.321753] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.322789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.323826] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 946.342697] FAULT_INJECTION: forcing a failure. [ 946.342697] name failslab, interval 1, probability 0, space 0, times 0 [ 946.343706] CPU: 0 PID: 8534 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 946.344264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 946.344945] Call Trace: [ 946.345173] dump_stack+0x107/0x167 [ 946.345475] should_fail.cold+0x5/0xa [ 946.345795] ? create_object.isra.0+0x3a/0xa20 22:10:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) setresuid(0x0, 0x0, 0x0) 22:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) [ 946.346179] should_failslab+0x5/0x20 [ 946.346675] kmem_cache_alloc+0x5b/0x310 [ 946.347003] create_object.isra.0+0x3a/0xa20 [ 946.347360] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 946.347872] kmem_cache_alloc+0x159/0x310 [ 946.348210] jbd2__journal_start+0x190/0x7e0 [ 946.348589] __ext4_journal_start_sb+0x214/0x390 [ 946.349020] ext4_dirty_inode+0xbc/0x130 [ 946.349355] ? ext4_setattr+0x2160/0x2160 [ 946.349693] __mark_inode_dirty+0x492/0xd40 [ 946.350050] touch_atime+0x5ea/0x6e0 [ 946.350359] ? atime_needs_update+0x600/0x600 [ 946.350723] ? add_to_page_cache_locked+0x40/0x40 [ 946.351120] generic_file_buffered_read+0x191a/0x2920 [ 946.351554] ? pagecache_get_page+0xc80/0xc80 [ 946.351927] ? __lock_acquire+0xbb1/0x5b00 [ 946.352279] generic_file_read_iter+0x33f/0x490 [ 946.352669] ext4_file_read_iter+0x184/0x4c0 [ 946.353029] __kernel_read+0x593/0xaa0 [ 946.353348] ? do_sendfile+0x1090/0x1090 [ 946.353686] ? _cond_resched+0x12/0x80 [ 946.354007] ? avc_policy_seqno+0x9/0x70 [ 946.354341] ? selinux_file_permission+0x92/0x520 [ 946.354735] ? lock_downgrade+0x6d0/0x6d0 [ 946.355081] kernel_read+0x52/0x70 [ 946.355375] bprm_execve+0x882/0x1a60 [ 946.355692] ? open_exec+0x70/0x70 [ 946.355983] ? memcpy+0x39/0x60 [ 946.356256] ? copy_string_kernel+0x3b6/0x450 [ 946.356637] do_execveat_common+0x772/0x8d0 [ 946.356991] ? bprm_execve+0x1a60/0x1a60 [ 946.357333] __x64_sys_execveat+0xed/0x140 [ 946.357680] do_syscall_64+0x33/0x40 [ 946.357990] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 946.358403] RIP: 0033:0x7f70da682b19 [ 946.358710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.360183] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 946.360806] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 946.361380] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 946.361953] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 946.362529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 946.363103] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 946.408953] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 946.410448] EXT4-fs (loop1): get root inode failed [ 946.410855] EXT4-fs (loop1): mount failed 22:10:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 22:10:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) setresuid(0x0, 0x0, 0x0) 22:10:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 22:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 22:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 22:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 18) [ 959.822071] FAULT_INJECTION: forcing a failure. [ 959.822071] name failslab, interval 1, probability 0, space 0, times 0 [ 959.823323] CPU: 0 PID: 8558 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 959.823957] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 959.824740] Call Trace: [ 959.824997] dump_stack+0x107/0x167 [ 959.825350] should_fail.cold+0x5/0xa [ 959.825713] ? xas_alloc+0x336/0x440 [ 959.826068] should_failslab+0x5/0x20 [ 959.826435] kmem_cache_alloc+0x5b/0x310 [ 959.826818] ? trace_hardirqs_on+0x5b/0x180 [ 959.827234] xas_alloc+0x336/0x440 [ 959.827574] xas_create+0x60f/0x10d0 [ 959.827951] xas_create_range+0x189/0x620 [ 959.828360] shmem_add_to_page_cache+0x760/0x1130 [ 959.828830] ? shmem_getattr+0x180/0x180 [ 959.829230] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 959.829826] ? shmem_unuse_inode+0xf60/0xf60 [ 959.830377] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 959.830859] ? iov_iter_fault_in_readable+0x9a/0x410 [ 959.831349] shmem_write_begin+0xf7/0x1d0 22:10:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 22:10:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) [ 959.831741] generic_perform_write+0x20a/0x4f0 [ 959.832326] ? page_cache_prev_miss+0x310/0x310 [ 959.832777] ? evict_inodes+0x420/0x420 [ 959.833161] ? generic_write_checks+0x2ad/0x390 [ 959.833606] __generic_file_write_iter+0x39d/0x5d0 [ 959.834073] generic_file_write_iter+0xdb/0x230 [ 959.834507] ? iov_iter_init+0x3c/0x130 [ 959.834891] new_sync_write+0x42c/0x660 [ 959.835268] ? new_sync_read+0x6f0/0x6f0 [ 959.835653] ? __x64_sys_pwrite64+0x201/0x260 [ 959.836084] ? lock_release+0x680/0x680 [ 959.836458] ? selinux_file_permission+0x92/0x520 [ 959.836934] vfs_write+0x747/0xa70 [ 959.837282] __x64_sys_pwrite64+0x201/0x260 [ 959.837687] ? ksys_pwrite64+0x1b0/0x1b0 [ 959.838081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 959.838573] ? syscall_enter_from_user_mode+0x1d/0x50 [ 959.839056] do_syscall_64+0x33/0x40 [ 959.839410] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 959.839890] RIP: 0033:0x7fc547446ab7 [ 959.840247] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 959.841947] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 959.842659] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 959.843331] RDX: 000000000000001d RSI: 0000000020000000 RDI: 0000000000000004 [ 959.843996] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 959.844665] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 959.845333] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 959.850716] FAULT_INJECTION: forcing a failure. [ 959.850716] name failslab, interval 1, probability 0, space 0, times 0 [ 959.851993] CPU: 0 PID: 8559 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 959.852732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 959.853503] Call Trace: [ 959.853752] dump_stack+0x107/0x167 [ 959.854097] should_fail.cold+0x5/0xa [ 959.854454] ? __request_module+0x2e0/0x920 [ 959.854856] ? bprm_execve+0xbe6/0x1a60 [ 959.855228] should_failslab+0x5/0x20 [ 959.855585] kmem_cache_alloc_trace+0x55/0x320 [ 959.856018] ? bprm_execve+0xbe6/0x1a60 [ 959.856393] __request_module+0x2e0/0x920 [ 959.856787] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 959.857276] ? free_modprobe_argv+0x90/0x90 [ 959.857680] ? find_held_lock+0x2c/0x110 [ 959.858071] ? find_held_lock+0x2c/0x110 [ 959.858458] ? bprm_execve+0xa13/0x1a60 [ 959.858834] ? lock_downgrade+0x6d0/0x6d0 [ 959.859228] ? elf_core_dump+0x3c50/0x3c50 [ 959.859627] ? do_raw_read_unlock+0x3b/0x70 [ 959.860034] ? _raw_read_unlock+0x1a/0x30 [ 959.860429] ? load_misc_binary+0x605/0xb70 [ 959.860850] bprm_execve+0xbe6/0x1a60 [ 959.861215] ? open_exec+0x70/0x70 [ 959.861545] ? memcpy+0x39/0x60 [ 959.861857] ? copy_string_kernel+0x3b6/0x450 [ 959.862292] do_execveat_common+0x772/0x8d0 [ 959.862700] ? bprm_execve+0x1a60/0x1a60 [ 959.863094] __x64_sys_execveat+0xed/0x140 [ 959.863485] do_syscall_64+0x33/0x40 [ 959.863832] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 959.864313] RIP: 0033:0x7f70da682b19 [ 959.864669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 959.866370] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 959.867076] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 959.867738] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 959.868401] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 959.869071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 959.869730] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 959.875022] FAULT_INJECTION: forcing a failure. [ 959.875022] name failslab, interval 1, probability 0, space 0, times 0 [ 959.878287] CPU: 1 PID: 8554 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 959.879301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 959.880510] Call Trace: [ 959.880923] dump_stack+0x107/0x167 [ 959.881463] should_fail.cold+0x5/0xa [ 959.882031] ? security_file_alloc+0x34/0x170 [ 959.882696] should_failslab+0x5/0x20 [ 959.883259] kmem_cache_alloc+0x5b/0x310 [ 959.883877] security_file_alloc+0x34/0x170 [ 959.884521] __alloc_file+0xb7/0x320 [ 959.885084] alloc_empty_file+0x6d/0x170 [ 959.885685] path_openat+0xe3/0x26e0 [ 959.886246] ? lock_chain_count+0x20/0x20 [ 959.886860] ? stack_trace_save+0x8c/0xc0 [ 959.887472] ? stack_trace_consume_entry+0x160/0x160 [ 959.888220] ? path_lookupat+0x860/0x860 [ 959.888835] ? kasan_save_stack+0x32/0x40 [ 959.889445] ? kasan_save_stack+0x1b/0x40 [ 959.890066] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 959.890814] ? security_prepare_creds+0x112/0x190 [ 959.891528] ? prepare_creds+0x452/0x5e0 [ 959.892129] ? prepare_exec_creds+0xd/0x260 [ 959.892778] ? bprm_execve+0x18f/0x1a60 [ 959.893372] do_filp_open+0x190/0x3e0 [ 959.893936] ? may_open_dev+0xf0/0xf0 [ 959.894519] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 959.895294] ? SOFTIRQ_verbose+0x10/0x10 [ 959.895897] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 959.896727] ? find_held_lock+0x2c/0x110 [ 959.897334] do_open_execat+0x116/0x690 [ 959.897925] ? __do_sys_uselib+0x5e0/0x5e0 [ 959.898550] ? do_raw_spin_lock+0x121/0x260 [ 959.899197] ? rwlock_bug.part.0+0x90/0x90 [ 959.899835] bprm_execve+0x55e/0x1a60 [ 959.900412] ? open_exec+0x70/0x70 [ 959.900946] ? memcpy+0x39/0x60 [ 959.901443] ? copy_string_kernel+0x3b6/0x450 [ 959.902120] do_execveat_common+0x772/0x8d0 [ 959.902765] ? bprm_execve+0x1a60/0x1a60 [ 959.903381] __x64_sys_execveat+0xed/0x140 [ 959.904012] do_syscall_64+0x33/0x40 [ 959.904563] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 959.905333] RIP: 0033:0x7f1c8836fb19 [ 959.905880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 959.908554] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 959.909673] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 959.910715] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 959.911758] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 959.912803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 959.913848] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 959.918724] FAULT_INJECTION: forcing a failure. [ 959.918724] name failslab, interval 1, probability 0, space 0, times 0 [ 959.919765] CPU: 0 PID: 8561 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 959.920376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 959.921126] Call Trace: [ 959.921371] dump_stack+0x107/0x167 [ 959.921712] should_fail.cold+0x5/0xa [ 959.922064] ? security_prepare_creds+0x112/0x190 [ 959.922500] should_failslab+0x5/0x20 [ 959.922851] __kmalloc+0x72/0x390 [ 959.923177] security_prepare_creds+0x112/0x190 [ 959.923601] prepare_creds+0x452/0x5e0 [ 959.923960] prepare_exec_creds+0xd/0x260 [ 959.924335] bprm_execve+0x18f/0x1a60 [ 959.924687] ? acct_arg_size+0xe0/0xe0 [ 959.925036] ? downgrade_write+0x3a0/0x3a0 [ 959.925438] ? open_exec+0x70/0x70 [ 959.925762] ? memcpy+0x39/0x60 [ 959.926079] ? copy_string_kernel+0x3b6/0x450 [ 959.926490] do_execveat_common+0x772/0x8d0 [ 959.926884] ? bprm_execve+0x1a60/0x1a60 [ 959.927272] __x64_sys_execveat+0xed/0x140 [ 959.927658] do_syscall_64+0x33/0x40 [ 959.927995] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 959.928467] RIP: 0033:0x7f2243400b19 [ 959.928810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 959.930495] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 959.931186] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 959.931827] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 959.932473] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 959.933119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 959.933763] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 959.938290] FAULT_INJECTION: forcing a failure. [ 959.938290] name failslab, interval 1, probability 0, space 0, times 0 [ 959.940059] CPU: 1 PID: 8566 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 959.941067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 959.942284] Call Trace: [ 959.942678] dump_stack+0x107/0x167 [ 959.943216] should_fail.cold+0x5/0xa [ 959.943778] ? create_object.isra.0+0x3a/0xa20 [ 959.944455] should_failslab+0x5/0x20 [ 959.945026] kmem_cache_alloc+0x5b/0x310 [ 959.945635] create_object.isra.0+0x3a/0xa20 [ 959.946285] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 959.947035] kmem_cache_alloc_trace+0x151/0x320 [ 959.947729] ? bprm_execve+0xbe6/0x1a60 [ 959.948321] __request_module+0x2e0/0x920 [ 959.948938] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 959.949710] ? free_modprobe_argv+0x90/0x90 [ 959.950350] ? find_held_lock+0x2c/0x110 [ 959.950958] ? find_held_lock+0x2c/0x110 [ 959.951570] ? bprm_execve+0xa13/0x1a60 [ 959.952158] ? lock_downgrade+0x6d0/0x6d0 [ 959.952772] ? elf_core_dump+0x3c50/0x3c50 [ 959.953396] ? do_raw_read_unlock+0x3b/0x70 [ 959.954036] ? _raw_read_unlock+0x1a/0x30 [ 959.954640] ? load_misc_binary+0x605/0xb70 [ 959.955290] bprm_execve+0xbe6/0x1a60 [ 959.955862] ? open_exec+0x70/0x70 [ 959.956391] ? memcpy+0x39/0x60 [ 959.956890] ? copy_string_kernel+0x3b6/0x450 [ 959.957566] do_execveat_common+0x772/0x8d0 [ 959.958207] ? bprm_execve+0x1a60/0x1a60 [ 959.958828] __x64_sys_execveat+0xed/0x140 [ 959.959464] do_syscall_64+0x33/0x40 [ 959.960022] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 959.960783] RIP: 0033:0x7f6383eb9b19 [ 959.961336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 959.963995] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 959.965124] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 959.966165] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 959.967203] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 959.968237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 959.969287] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:10:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 22:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) [ 959.983244] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 959.997303] FAULT_INJECTION: forcing a failure. [ 959.997303] name failslab, interval 1, probability 0, space 0, times 0 [ 959.998978] CPU: 1 PID: 8571 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 959.999984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.001200] Call Trace: [ 960.001597] dump_stack+0x107/0x167 [ 960.002144] should_fail.cold+0x5/0xa [ 960.002710] ? ebitmap_cpy+0xc7/0x330 [ 960.003278] should_failslab+0x5/0x20 [ 960.003841] kmem_cache_alloc+0x5b/0x310 [ 960.004447] ebitmap_cpy+0xc7/0x330 [ 960.004996] mls_compute_sid+0x64b/0x1060 [ 960.005616] ? mark_lock+0xf5/0x2df0 [ 960.006168] ? mls_convert_context+0x6c0/0x6c0 [ 960.006857] security_compute_sid.part.0+0x8e8/0x16e0 [ 960.007638] ? security_compute_validatetrans.part.0+0x960/0x960 [ 960.008543] ? lock_chain_count+0x20/0x20 [ 960.009177] ? mark_lock+0xf5/0x2df0 [ 960.009738] ? lock_chain_count+0x20/0x20 [ 960.010368] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 960.011145] security_transition_sid+0xc0/0x190 [ 960.011838] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 960.012595] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 960.013347] ? selinux_inode_getsecctx+0x90/0x90 [ 960.014053] ? sched_exec+0x1ae/0x1e0 [ 960.014619] ? do_raw_spin_lock+0x121/0x260 [ 960.015254] ? nr_iowait+0x130/0x130 [ 960.015803] ? rwlock_bug.part.0+0x90/0x90 [ 960.016443] security_bprm_creds_for_exec+0x46/0xa0 [ 960.017187] bprm_execve+0x6c1/0x1a60 [ 960.017766] ? open_exec+0x70/0x70 [ 960.018293] ? memcpy+0x39/0x60 [ 960.018790] ? copy_string_kernel+0x3b6/0x450 [ 960.019462] do_execveat_common+0x772/0x8d0 [ 960.020110] ? bprm_execve+0x1a60/0x1a60 [ 960.020740] __x64_sys_execveat+0xed/0x140 [ 960.021378] do_syscall_64+0x33/0x40 [ 960.021935] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.022691] RIP: 0033:0x7f2f4d86bb19 [ 960.023245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.025955] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.027068] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 960.028122] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.029170] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.030218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.031266] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:10:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 960.095552] FAULT_INJECTION: forcing a failure. [ 960.095552] name failslab, interval 1, probability 0, space 0, times 0 [ 960.096627] CPU: 0 PID: 8577 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 960.097231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.097956] Call Trace: [ 960.098200] dump_stack+0x107/0x167 [ 960.098522] should_fail.cold+0x5/0xa [ 960.098863] ? create_object.isra.0+0x3a/0xa20 [ 960.099270] should_failslab+0x5/0x20 [ 960.099611] kmem_cache_alloc+0x5b/0x310 [ 960.099978] create_object.isra.0+0x3a/0xa20 [ 960.100375] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.100829] kmem_cache_alloc_trace+0x151/0x320 [ 960.101245] ? bprm_execve+0xbe6/0x1a60 [ 960.101601] __request_module+0x2e0/0x920 [ 960.101981] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 960.102451] ? free_modprobe_argv+0x90/0x90 [ 960.102834] ? find_held_lock+0x2c/0x110 [ 960.103203] ? find_held_lock+0x2c/0x110 [ 960.103566] ? bprm_execve+0xa13/0x1a60 [ 960.103921] ? lock_downgrade+0x6d0/0x6d0 [ 960.104293] ? elf_core_dump+0x3c50/0x3c50 [ 960.104678] ? do_raw_read_unlock+0x3b/0x70 [ 960.105061] ? _raw_read_unlock+0x1a/0x30 [ 960.105425] ? load_misc_binary+0x605/0xb70 [ 960.105813] bprm_execve+0xbe6/0x1a60 [ 960.106157] ? open_exec+0x70/0x70 [ 960.106476] ? memcpy+0x39/0x60 [ 960.106775] ? copy_string_kernel+0x3b6/0x450 [ 960.107180] do_execveat_common+0x772/0x8d0 [ 960.107564] ? bprm_execve+0x1a60/0x1a60 [ 960.107936] __x64_sys_execveat+0xed/0x140 [ 960.108314] do_syscall_64+0x33/0x40 [ 960.108645] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.109109] RIP: 0033:0x7f70da682b19 [ 960.109451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.111024] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.111693] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 960.112316] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.112931] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.113547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.114161] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 960.128302] FAULT_INJECTION: forcing a failure. [ 960.128302] name failslab, interval 1, probability 0, space 0, times 0 [ 960.130133] CPU: 1 PID: 8580 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 960.131138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.132343] Call Trace: [ 960.132748] dump_stack+0x107/0x167 [ 960.133288] should_fail.cold+0x5/0xa [ 960.133855] ? create_object.isra.0+0x3a/0xa20 [ 960.134535] should_failslab+0x5/0x20 [ 960.135097] kmem_cache_alloc+0x5b/0x310 [ 960.135703] create_object.isra.0+0x3a/0xa20 [ 960.136348] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.137095] __kmalloc+0x16e/0x390 [ 960.137634] security_prepare_creds+0x112/0x190 [ 960.138325] prepare_creds+0x452/0x5e0 [ 960.138899] prepare_exec_creds+0xd/0x260 [ 960.139504] bprm_execve+0x18f/0x1a60 [ 960.140070] ? acct_arg_size+0xe0/0xe0 [ 960.140647] ? downgrade_write+0x3a0/0x3a0 [ 960.141279] ? open_exec+0x70/0x70 [ 960.141804] ? memcpy+0x39/0x60 [ 960.142304] ? copy_string_kernel+0x3b6/0x450 [ 960.142977] do_execveat_common+0x772/0x8d0 [ 960.143624] ? bprm_execve+0x1a60/0x1a60 [ 960.144240] __x64_sys_execveat+0xed/0x140 [ 960.144880] do_syscall_64+0x33/0x40 [ 960.145432] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.146184] RIP: 0033:0x7f2243400b19 [ 960.146738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.149412] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.150522] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 960.151566] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.152607] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.153651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.154689] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:10:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 19) 22:10:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) setresuid(0x0, 0x0, 0x0) 22:10:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 22:10:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 22:10:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 22:10:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f) setresuid(0x0, 0x0, 0x0) [ 960.257633] FAULT_INJECTION: forcing a failure. [ 960.257633] name failslab, interval 1, probability 0, space 0, times 0 22:10:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 960.258602] CPU: 0 PID: 8588 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 960.259257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.259926] Call Trace: [ 960.260154] dump_stack+0x107/0x167 [ 960.260457] should_fail.cold+0x5/0xa [ 960.260780] ? create_object.isra.0+0x3a/0xa20 [ 960.261154] should_failslab+0x5/0x20 [ 960.261465] kmem_cache_alloc+0x5b/0x310 [ 960.261800] ? mark_held_locks+0x9e/0xe0 [ 960.262129] create_object.isra.0+0x3a/0xa20 [ 960.262484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.262910] kmem_cache_alloc+0x159/0x310 [ 960.263258] ebitmap_cpy+0xc7/0x330 [ 960.263557] mls_compute_sid+0x64b/0x1060 [ 960.263901] ? mark_lock+0xf5/0x2df0 [ 960.264207] ? mls_convert_context+0x6c0/0x6c0 [ 960.264591] security_compute_sid.part.0+0x8e8/0x16e0 [ 960.265028] ? security_compute_validatetrans.part.0+0x960/0x960 [ 960.265528] ? mark_lock+0xf5/0x2df0 [ 960.265836] ? lock_chain_count+0x20/0x20 [ 960.266180] ? lock_acquire+0x197/0x470 [ 960.266500] ? find_held_lock+0x2c/0x110 [ 960.266837] security_transition_sid+0xc0/0x190 [ 960.267218] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 960.267634] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 960.268040] ? selinux_inode_getsecctx+0x90/0x90 [ 960.268429] ? sched_exec+0x1ae/0x1e0 [ 960.268742] ? do_raw_spin_lock+0x121/0x260 [ 960.268998] FAULT_INJECTION: forcing a failure. [ 960.268998] name failslab, interval 1, probability 0, space 0, times 0 [ 960.269960] ? nr_iowait+0x130/0x130 [ 960.269981] ? rwlock_bug.part.0+0x90/0x90 [ 960.270883] security_bprm_creds_for_exec+0x46/0xa0 [ 960.271289] bprm_execve+0x6c1/0x1a60 [ 960.271608] ? open_exec+0x70/0x70 [ 960.271898] ? memcpy+0x39/0x60 [ 960.272170] ? copy_string_kernel+0x3b6/0x450 [ 960.272540] do_execveat_common+0x772/0x8d0 [ 960.272892] ? bprm_execve+0x1a60/0x1a60 [ 960.273231] __x64_sys_execveat+0xed/0x140 [ 960.273576] do_syscall_64+0x33/0x40 [ 960.273876] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.274286] RIP: 0033:0x7f2f4d86bb19 [ 960.274585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.276047] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.276650] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 960.277217] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.277781] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.278339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.278894] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 960.279476] CPU: 1 PID: 8593 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 960.280527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.281735] Call Trace: [ 960.282136] dump_stack+0x107/0x167 [ 960.282674] should_fail.cold+0x5/0xa [ 960.283237] ? create_object.isra.0+0x3a/0xa20 [ 960.283914] should_failslab+0x5/0x20 [ 960.284477] kmem_cache_alloc+0x5b/0x310 [ 960.285093] create_object.isra.0+0x3a/0xa20 [ 960.285744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.286493] kmem_cache_alloc+0x159/0x310 [ 960.287104] ? trace_hardirqs_on+0x5b/0x180 [ 960.287747] xas_alloc+0x336/0x440 [ 960.288276] xas_create+0x60f/0x10d0 [ 960.288880] xas_create_range+0x189/0x620 [ 960.289513] shmem_add_to_page_cache+0x760/0x1130 [ 960.290240] ? shmem_getattr+0x180/0x180 [ 960.290873] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 960.291674] ? shmem_unuse_inode+0xf60/0xf60 [ 960.292331] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 960.293091] ? iov_iter_fault_in_readable+0x9a/0x410 [ 960.293843] shmem_write_begin+0xf7/0x1d0 [ 960.294461] generic_perform_write+0x20a/0x4f0 [ 960.295154] ? page_cache_prev_miss+0x310/0x310 [ 960.295839] ? evict_inodes+0x420/0x420 [ 960.296433] ? generic_write_checks+0x2ad/0x390 [ 960.297135] __generic_file_write_iter+0x39d/0x5d0 [ 960.297864] generic_file_write_iter+0xdb/0x230 [ 960.298539] ? iov_iter_init+0x3c/0x130 [ 960.299131] new_sync_write+0x42c/0x660 [ 960.299722] ? new_sync_read+0x6f0/0x6f0 [ 960.300331] ? __x64_sys_pwrite64+0x201/0x260 [ 960.301000] ? lock_release+0x680/0x680 [ 960.301593] ? selinux_file_permission+0x92/0x520 [ 960.302318] vfs_write+0x747/0xa70 [ 960.302855] __x64_sys_pwrite64+0x201/0x260 [ 960.303490] ? ksys_pwrite64+0x1b0/0x1b0 [ 960.304100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 960.304876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 960.305637] do_syscall_64+0x33/0x40 [ 960.306183] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.306932] RIP: 0033:0x7fc547446ab7 [ 960.307487] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 960.310163] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 960.311271] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 960.312317] RDX: 000000000000001d RSI: 0000000020000000 RDI: 0000000000000004 [ 960.313363] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 960.314401] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 960.315435] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 960.343587] FAULT_INJECTION: forcing a failure. [ 960.343587] name failslab, interval 1, probability 0, space 0, times 0 [ 960.345380] CPU: 1 PID: 8592 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 960.346384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.347588] Call Trace: [ 960.347980] dump_stack+0x107/0x167 [ 960.348527] should_fail.cold+0x5/0xa [ 960.349107] ? bprm_execve+0xbe6/0x1a60 [ 960.349697] should_failslab+0x5/0x20 [ 960.350264] __kmalloc_track_caller+0x79/0x370 [ 960.350940] ? __request_module+0x2fe/0x920 [ 960.351583] ? bprm_execve+0xbe6/0x1a60 [ 960.352176] kstrdup+0x36/0x70 [ 960.352666] __request_module+0x2fe/0x920 [ 960.353285] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 960.354062] ? free_modprobe_argv+0x90/0x90 [ 960.354706] ? find_held_lock+0x2c/0x110 [ 960.355321] ? find_held_lock+0x2c/0x110 [ 960.355934] ? bprm_execve+0xa13/0x1a60 [ 960.356771] ? lock_downgrade+0x6d0/0x6d0 [ 960.357668] ? elf_core_dump+0x3c50/0x3c50 [ 960.358291] ? do_raw_read_unlock+0x3b/0x70 [ 960.358916] ? _raw_read_unlock+0x1a/0x30 [ 960.359522] ? load_misc_binary+0x605/0xb70 [ 960.360167] bprm_execve+0xbe6/0x1a60 [ 960.360745] ? open_exec+0x70/0x70 [ 960.361278] ? memcpy+0x39/0x60 [ 960.361765] ? copy_string_kernel+0x3b6/0x450 [ 960.362437] do_execveat_common+0x772/0x8d0 [ 960.363069] ? bprm_execve+0x1a60/0x1a60 [ 960.363686] __x64_sys_execveat+0xed/0x140 [ 960.364305] do_syscall_64+0x33/0x40 [ 960.364859] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.365602] RIP: 0033:0x7f6383eb9b19 [ 960.366152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.368778] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.369889] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 960.370918] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.371948] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.373005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.374047] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 22:10:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) setresuid(0x0, 0x0, 0x0) [ 960.414620] FAULT_INJECTION: forcing a failure. [ 960.414620] name failslab, interval 1, probability 0, space 0, times 0 [ 960.415613] CPU: 0 PID: 8604 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 960.416159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 960.416832] Call Trace: [ 960.417060] dump_stack+0x107/0x167 [ 960.417356] should_fail.cold+0x5/0xa [ 960.417667] ? create_object.isra.0+0x3a/0xa20 [ 960.418038] should_failslab+0x5/0x20 [ 960.418351] kmem_cache_alloc+0x5b/0x310 [ 960.418677] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 960.419125] create_object.isra.0+0x3a/0xa20 [ 960.419483] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.419897] kmem_cache_alloc+0x159/0x310 [ 960.420237] security_file_alloc+0x34/0x170 [ 960.420591] __alloc_file+0xb7/0x320 [ 960.420899] alloc_empty_file+0x6d/0x170 [ 960.421234] path_openat+0xe3/0x26e0 [ 960.421541] ? lock_chain_count+0x20/0x20 [ 960.421874] ? stack_trace_save+0x8c/0xc0 [ 960.422210] ? stack_trace_consume_entry+0x160/0x160 [ 960.422614] ? path_lookupat+0x860/0x860 [ 960.422949] ? kasan_save_stack+0x32/0x40 [ 960.423284] ? kasan_save_stack+0x1b/0x40 [ 960.423615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 960.424033] ? security_prepare_creds+0x112/0x190 [ 960.424422] ? prepare_creds+0x452/0x5e0 [ 960.424757] ? prepare_exec_creds+0xd/0x260 [ 960.425109] ? bprm_execve+0x18f/0x1a60 [ 960.425436] do_filp_open+0x190/0x3e0 [ 960.425743] ? may_open_dev+0xf0/0xf0 [ 960.426065] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 960.426482] ? SOFTIRQ_verbose+0x10/0x10 [ 960.426812] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 960.427260] ? find_held_lock+0x2c/0x110 [ 960.427591] do_open_execat+0x116/0x690 [ 960.427911] ? __do_sys_uselib+0x5e0/0x5e0 [ 960.428255] ? do_raw_spin_lock+0x121/0x260 [ 960.428601] ? rwlock_bug.part.0+0x90/0x90 [ 960.428956] bprm_execve+0x55e/0x1a60 [ 960.429267] ? open_exec+0x70/0x70 [ 960.429565] ? memcpy+0x39/0x60 [ 960.429834] ? copy_string_kernel+0x3b6/0x450 [ 960.430207] do_execveat_common+0x772/0x8d0 [ 960.430555] ? bprm_execve+0x1a60/0x1a60 [ 960.430893] __x64_sys_execveat+0xed/0x140 [ 960.431234] do_syscall_64+0x33/0x40 [ 960.431534] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 960.431946] RIP: 0033:0x7f1c8836fb19 [ 960.432247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 960.433729] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 960.434338] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 960.434899] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 960.435464] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 960.436025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 960.436591] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 960.462597] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:11:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 22:11:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) [ 973.841314] FAULT_INJECTION: forcing a failure. [ 973.841314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 973.843100] CPU: 0 PID: 8619 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 973.844091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.845296] Call Trace: [ 973.845686] dump_stack+0x107/0x167 [ 973.846231] should_fail.cold+0x5/0xa [ 973.846795] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 973.847577] ? shmem_write_begin+0xf7/0x1d0 [ 973.848204] ? shmem_write_begin+0x100/0x1d0 [ 973.848864] generic_perform_write+0x279/0x4f0 [ 973.849549] ? page_cache_prev_miss+0x310/0x310 [ 973.850224] ? evict_inodes+0x420/0x420 [ 973.850808] ? generic_write_checks+0x2ad/0x390 [ 973.851498] __generic_file_write_iter+0x39d/0x5d0 [ 973.852217] generic_file_write_iter+0xdb/0x230 [ 973.852804] FAULT_INJECTION: forcing a failure. [ 973.852804] name failslab, interval 1, probability 0, space 0, times 0 [ 973.852893] ? iov_iter_init+0x3c/0x130 [ 973.852920] new_sync_write+0x42c/0x660 [ 973.855693] ? new_sync_read+0x6f0/0x6f0 [ 973.856286] ? __x64_sys_pwrite64+0x201/0x260 [ 973.857001] ? lock_release+0x680/0x680 [ 973.857586] ? selinux_file_permission+0x92/0x520 [ 973.858308] vfs_write+0x747/0xa70 [ 973.858855] __x64_sys_pwrite64+0x201/0x260 [ 973.859489] ? ksys_pwrite64+0x1b0/0x1b0 [ 973.860092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 973.860858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 973.861608] do_syscall_64+0x33/0x40 [ 973.862152] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 973.862889] RIP: 0033:0x7fc547446ab7 [ 973.863435] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 973.866083] RSP: 002b:00007fc544a08f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 973.867188] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446ab7 [ 973.868211] RDX: 000000000000001d RSI: 0000000020000000 RDI: 0000000000000004 [ 973.869249] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 973.870271] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000004 [ 973.871299] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 973.872361] CPU: 1 PID: 8625 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 973.873364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.874547] Call Trace: [ 973.874939] dump_stack+0x107/0x167 [ 973.875474] should_fail.cold+0x5/0xa [ 973.876040] ? call_usermodehelper_setup+0xa2/0x2f0 [ 973.876765] should_failslab+0x5/0x20 [ 973.877325] kmem_cache_alloc_trace+0x55/0x320 [ 973.877997] call_usermodehelper_setup+0xa2/0x2f0 [ 973.878701] ? copy_regset_to_user+0x170/0x170 [ 973.879364] ? bprm_execve+0xbe6/0x1a60 [ 973.879936] __request_module+0x3f9/0x920 [ 973.880539] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 973.881309] ? free_modprobe_argv+0x90/0x90 [ 973.881935] ? find_held_lock+0x2c/0x110 [ 973.882544] ? find_held_lock+0x2c/0x110 [ 973.883146] ? bprm_execve+0xa13/0x1a60 [ 973.883721] ? lock_downgrade+0x6d0/0x6d0 [ 973.884330] ? elf_core_dump+0x3c50/0x3c50 22:11:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 20) 22:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 22:11:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 22:11:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 22:11:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 22:11:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) setresuid(0x0, 0x0, 0x0) [ 973.884950] ? do_raw_read_unlock+0x3b/0x70 [ 973.885801] ? _raw_read_unlock+0x1a/0x30 [ 973.886421] ? load_misc_binary+0x605/0xb70 [ 973.887063] bprm_execve+0xbe6/0x1a60 [ 973.887632] ? open_exec+0x70/0x70 [ 973.888150] ? memcpy+0x39/0x60 [ 973.888474] FAULT_INJECTION: forcing a failure. [ 973.888474] name failslab, interval 1, probability 0, space 0, times 0 [ 973.888641] ? copy_string_kernel+0x3b6/0x450 [ 973.890884] do_execveat_common+0x772/0x8d0 [ 973.891514] ? bprm_execve+0x1a60/0x1a60 [ 973.892123] __x64_sys_execveat+0xed/0x140 [ 973.892741] do_syscall_64+0x33/0x40 [ 973.893289] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 973.894028] RIP: 0033:0x7f70da682b19 [ 973.894570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.897191] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 973.898286] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 973.899310] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 973.900337] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 973.901361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 973.902383] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 973.903432] CPU: 0 PID: 8627 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 973.904430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.905620] Call Trace: [ 973.906005] dump_stack+0x107/0x167 [ 973.906539] should_fail.cold+0x5/0xa [ 973.907104] ? create_object.isra.0+0x3a/0xa20 [ 973.907768] should_failslab+0x5/0x20 [ 973.908322] kmem_cache_alloc+0x5b/0x310 [ 973.908925] create_object.isra.0+0x3a/0xa20 [ 973.909565] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 973.910305] __kmalloc_track_caller+0x177/0x370 [ 973.910975] ? __request_module+0x2fe/0x920 [ 973.911609] ? bprm_execve+0xbe6/0x1a60 [ 973.912182] kstrdup+0x36/0x70 [ 973.912653] __request_module+0x2fe/0x920 [ 973.913273] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 973.914030] ? free_modprobe_argv+0x90/0x90 [ 973.914656] ? find_held_lock+0x2c/0x110 [ 973.915254] ? find_held_lock+0x2c/0x110 [ 973.915847] ? bprm_execve+0xa13/0x1a60 [ 973.916426] ? lock_downgrade+0x6d0/0x6d0 [ 973.917036] ? elf_core_dump+0x3c50/0x3c50 [ 973.917651] ? do_raw_read_unlock+0x3b/0x70 [ 973.918269] ? _raw_read_unlock+0x1a/0x30 [ 973.918867] ? load_misc_binary+0x605/0xb70 [ 973.919500] bprm_execve+0xbe6/0x1a60 [ 973.920065] ? open_exec+0x70/0x70 [ 973.920585] ? memcpy+0x39/0x60 [ 973.921084] ? copy_string_kernel+0x3b6/0x450 [ 973.921742] do_execveat_common+0x772/0x8d0 [ 973.922373] ? bprm_execve+0x1a60/0x1a60 [ 973.922979] __x64_sys_execveat+0xed/0x140 [ 973.923595] do_syscall_64+0x33/0x40 [ 973.924134] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 973.924877] RIP: 0033:0x7f6383eb9b19 [ 973.925415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.928029] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 973.929128] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 973.930149] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 973.931169] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 973.932186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 973.933213] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 973.944929] FAULT_INJECTION: forcing a failure. [ 973.944929] name failslab, interval 1, probability 0, space 0, times 0 [ 973.945453] FAULT_INJECTION: forcing a failure. [ 973.945453] name failslab, interval 1, probability 0, space 0, times 0 [ 973.946665] CPU: 0 PID: 8622 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 973.949112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.950293] Call Trace: [ 973.950680] dump_stack+0x107/0x167 [ 973.951212] should_fail.cold+0x5/0xa [ 973.951766] ? ebitmap_cpy+0xc7/0x330 [ 973.952326] should_failslab+0x5/0x20 [ 973.952885] kmem_cache_alloc+0x5b/0x310 [ 973.953480] ebitmap_cpy+0xc7/0x330 [ 973.954018] mls_compute_sid+0x64b/0x1060 [ 973.954624] ? mls_convert_context+0x6c0/0x6c0 [ 973.955297] security_compute_sid.part.0+0x8e8/0x16e0 [ 973.956068] ? security_compute_validatetrans.part.0+0x960/0x960 [ 973.956951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 973.957706] ? _raw_spin_unlock_irq+0x1f/0x30 [ 973.958348] ? trace_hardirqs_on+0x5b/0x180 [ 973.958969] ? _raw_spin_unlock_irq+0x1f/0x30 [ 973.959618] ? wait_for_completion+0x1d5/0x270 [ 973.960286] ? bit_wait_io_timeout+0x160/0x160 [ 973.960951] ? io_schedule_timeout+0x140/0x140 [ 973.961614] ? lockdep_init_map_type+0x2c7/0x780 [ 973.962317] ? stop_cpus.constprop.0+0x160/0x160 [ 973.963000] ? lock_acquire+0x197/0x470 [ 973.963577] ? find_held_lock+0x2c/0x110 [ 973.964167] ? set_cpus_allowed_ptr+0x10/0x10 [ 973.964825] security_transition_sid+0xc0/0x190 [ 973.965518] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 973.966284] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 973.967041] ? selinux_inode_getsecctx+0x90/0x90 [ 973.967747] ? sched_exec+0x16e/0x1e0 [ 973.968323] ? nr_iowait+0x130/0x130 [ 973.968888] ? rwlock_bug.part.0+0x90/0x90 [ 973.969534] security_bprm_creds_for_exec+0x46/0xa0 [ 973.970281] bprm_execve+0x6c1/0x1a60 [ 973.970860] ? open_exec+0x70/0x70 [ 973.971397] ? memcpy+0x39/0x60 [ 973.971895] ? copy_string_kernel+0x3b6/0x450 [ 973.972579] do_execveat_common+0x772/0x8d0 [ 973.973240] ? bprm_execve+0x1a60/0x1a60 [ 973.973870] __x64_sys_execveat+0xed/0x140 [ 973.974512] do_syscall_64+0x33/0x40 [ 973.975074] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 973.975841] RIP: 0033:0x7f2f4d86bb19 [ 973.976402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.979133] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 973.980270] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 973.981350] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 973.982422] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 973.983490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 973.984559] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 973.985669] CPU: 1 PID: 8626 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 973.986697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.987930] Call Trace: [ 973.988335] dump_stack+0x107/0x167 [ 973.988887] should_fail.cold+0x5/0xa [ 973.989464] ? __alloc_file+0x21/0x320 [ 973.990054] should_failslab+0x5/0x20 [ 973.990199] FAULT_INJECTION: forcing a failure. [ 973.990199] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 973.990626] kmem_cache_alloc+0x5b/0x310 [ 973.990653] ? kernel_text_address+0xf2/0x120 [ 973.993639] __alloc_file+0x21/0x320 [ 973.994204] alloc_empty_file+0x6d/0x170 [ 973.994826] path_openat+0xe3/0x26e0 [ 973.995404] ? lock_chain_count+0x20/0x20 [ 973.996031] ? stack_trace_save+0x8c/0xc0 [ 973.996665] ? stack_trace_consume_entry+0x160/0x160 [ 973.997432] ? path_lookupat+0x860/0x860 [ 973.998055] ? kasan_save_stack+0x32/0x40 [ 973.998674] ? kasan_save_stack+0x1b/0x40 [ 973.999297] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 974.000053] ? security_prepare_creds+0x112/0x190 [ 974.000770] ? prepare_creds+0x452/0x5e0 [ 974.001383] ? prepare_exec_creds+0xd/0x260 [ 974.002027] ? bprm_execve+0x18f/0x1a60 [ 974.002625] do_filp_open+0x190/0x3e0 [ 974.003191] ? may_open_dev+0xf0/0xf0 [ 974.003779] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 974.004560] ? SOFTIRQ_verbose+0x10/0x10 [ 974.005165] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 974.005978] ? find_held_lock+0x2c/0x110 [ 974.006577] do_open_execat+0x116/0x690 [ 974.007162] ? __do_sys_uselib+0x5e0/0x5e0 [ 974.007785] ? do_raw_spin_lock+0x121/0x260 [ 974.008424] ? rwlock_bug.part.0+0x90/0x90 [ 974.009072] bprm_execve+0x55e/0x1a60 [ 974.009637] ? open_exec+0x70/0x70 [ 974.010157] ? memcpy+0x39/0x60 [ 974.010651] ? copy_string_kernel+0x3b6/0x450 [ 974.011317] do_execveat_common+0x772/0x8d0 [ 974.011955] ? bprm_execve+0x1a60/0x1a60 [ 974.012565] __x64_sys_execveat+0xed/0x140 [ 974.013203] do_syscall_64+0x33/0x40 [ 974.013748] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 974.014493] RIP: 0033:0x7f2243400b19 [ 974.015037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.017689] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 974.018794] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 974.019827] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 974.020871] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 974.021907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 974.022941] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 974.024006] CPU: 0 PID: 8620 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 974.025033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 974.026248] Call Trace: [ 974.026642] dump_stack+0x107/0x167 [ 974.027204] should_fail.cold+0x5/0xa [ 974.027785] __alloc_pages_nodemask+0x182/0x600 [ 974.028482] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 974.029380] ? SOFTIRQ_verbose+0x10/0x10 [ 974.029981] alloc_pages_current+0x187/0x280 [ 974.030638] __page_cache_alloc+0x2d2/0x360 [ 974.031273] generic_file_buffered_read+0xcd7/0x2920 [ 974.032021] ? lock_chain_count+0x20/0x20 [ 974.032649] ? pagecache_get_page+0xc80/0xc80 [ 974.033324] ? __lock_acquire+0xbb1/0x5b00 [ 974.033948] generic_file_read_iter+0x33f/0x490 [ 974.034646] ext4_file_read_iter+0x184/0x4c0 [ 974.035292] __kernel_read+0x593/0xaa0 [ 974.035873] ? do_sendfile+0x1090/0x1090 [ 974.036466] ? _cond_resched+0x12/0x80 [ 974.037056] ? avc_policy_seqno+0x9/0x70 [ 974.037644] ? selinux_file_permission+0x92/0x520 [ 974.038361] ? lock_downgrade+0x6d0/0x6d0 [ 974.038977] kernel_read+0x52/0x70 [ 974.039509] bprm_execve+0x882/0x1a60 [ 974.040074] ? open_exec+0x70/0x70 [ 974.040605] ? memcpy+0x39/0x60 [ 974.041100] ? copy_string_kernel+0x3b6/0x450 [ 974.041772] do_execveat_common+0x772/0x8d0 [ 974.042404] ? bprm_execve+0x1a60/0x1a60 [ 974.043028] __x64_sys_execveat+0xed/0x140 [ 974.043652] do_syscall_64+0x33/0x40 [ 974.044206] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 974.044955] RIP: 0033:0x7f1c8836fb19 [ 974.045508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.048138] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 974.049265] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 974.050291] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 974.051309] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 974.052335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 974.053374] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:11:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 22:11:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 22:11:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 22:11:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) setresuid(0x0, 0x0, 0x0) [ 974.155932] FAULT_INJECTION: forcing a failure. [ 974.155932] name failslab, interval 1, probability 0, space 0, times 0 [ 974.157701] CPU: 1 PID: 8638 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 974.158703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 974.159916] Call Trace: [ 974.159988] FAULT_INJECTION: forcing a failure. [ 974.159988] name failslab, interval 1, probability 0, space 0, times 0 [ 974.160313] dump_stack+0x107/0x167 [ 974.160335] should_fail.cold+0x5/0xa [ 974.160364] ? bprm_execve+0xbe6/0x1a60 [ 974.163621] should_failslab+0x5/0x20 [ 974.164187] __kmalloc_track_caller+0x79/0x370 [ 974.164866] ? __request_module+0x2fe/0x920 [ 974.165511] ? bprm_execve+0xbe6/0x1a60 [ 974.166104] kstrdup+0x36/0x70 [ 974.166583] __request_module+0x2fe/0x920 [ 974.167196] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 974.167967] ? free_modprobe_argv+0x90/0x90 [ 974.168599] ? find_held_lock+0x2c/0x110 [ 974.169222] ? find_held_lock+0x2c/0x110 [ 974.169819] ? bprm_execve+0xa13/0x1a60 [ 974.170406] ? lock_downgrade+0x6d0/0x6d0 [ 974.171010] ? elf_core_dump+0x3c50/0x3c50 [ 974.171638] ? do_raw_read_unlock+0x3b/0x70 [ 974.172266] ? _raw_read_unlock+0x1a/0x30 [ 974.172877] ? load_misc_binary+0x605/0xb70 [ 974.173523] bprm_execve+0xbe6/0x1a60 [ 974.174092] ? open_exec+0x70/0x70 [ 974.174617] ? memcpy+0x39/0x60 [ 974.175105] ? copy_string_kernel+0x3b6/0x450 [ 974.175769] do_execveat_common+0x772/0x8d0 [ 974.176412] ? bprm_execve+0x1a60/0x1a60 [ 974.177032] __x64_sys_execveat+0xed/0x140 [ 974.177660] do_syscall_64+0x33/0x40 [ 974.178214] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 974.178961] RIP: 0033:0x7f70da682b19 [ 974.179503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.182175] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 974.183285] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 974.184322] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 974.185370] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 974.186414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 974.187455] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 974.188532] CPU: 0 PID: 8640 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 974.189561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 974.190771] Call Trace: [ 974.191176] dump_stack+0x107/0x167 [ 974.191717] should_fail.cold+0x5/0xa [ 974.192290] ? create_object.isra.0+0x3a/0xa20 [ 974.192975] should_failslab+0x5/0x20 [ 974.193550] kmem_cache_alloc+0x5b/0x310 [ 974.194157] create_object.isra.0+0x3a/0xa20 [ 974.194806] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 974.195554] kmem_cache_alloc+0x159/0x310 [ 974.196181] __alloc_file+0x21/0x320 [ 974.196725] alloc_empty_file+0x6d/0x170 [ 974.197341] path_openat+0xe3/0x26e0 [ 974.197901] ? lock_chain_count+0x20/0x20 [ 974.198513] ? stack_trace_save+0x8c/0xc0 [ 974.199122] ? stack_trace_consume_entry+0x160/0x160 [ 974.199868] ? path_lookupat+0x860/0x860 [ 974.200479] ? kasan_save_stack+0x32/0x40 [ 974.201102] ? kasan_save_stack+0x1b/0x40 [ 974.201705] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 974.202458] ? security_prepare_creds+0x112/0x190 [ 974.203162] ? prepare_creds+0x452/0x5e0 [ 974.203760] ? prepare_exec_creds+0xd/0x260 [ 974.204405] ? bprm_execve+0x18f/0x1a60 [ 974.204999] do_filp_open+0x190/0x3e0 [ 974.205569] ? may_open_dev+0xf0/0xf0 [ 974.206159] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 974.206930] ? SOFTIRQ_verbose+0x10/0x10 [ 974.207538] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 974.208345] ? find_held_lock+0x2c/0x110 [ 974.208968] do_open_execat+0x116/0x690 [ 974.209558] ? __do_sys_uselib+0x5e0/0x5e0 [ 974.210192] ? do_raw_spin_lock+0x121/0x260 [ 974.210833] ? rwlock_bug.part.0+0x90/0x90 [ 974.211474] bprm_execve+0x55e/0x1a60 [ 974.212048] ? open_exec+0x70/0x70 [ 974.212580] ? memcpy+0x39/0x60 [ 974.213077] ? copy_string_kernel+0x3b6/0x450 [ 974.213750] do_execveat_common+0x772/0x8d0 [ 974.214392] ? bprm_execve+0x1a60/0x1a60 [ 974.215010] __x64_sys_execveat+0xed/0x140 [ 974.215642] do_syscall_64+0x33/0x40 [ 974.216196] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 974.216954] RIP: 0033:0x7f2243400b19 [ 974.217504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 974.220152] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 974.221285] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 974.222333] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 974.223384] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 974.224437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 974.225497] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 974.271296] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 987.008705] FAULT_INJECTION: forcing a failure. [ 987.008705] name failslab, interval 1, probability 0, space 0, times 0 [ 987.009745] CPU: 1 PID: 8664 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 987.010280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.010929] Call Trace: [ 987.011155] dump_stack+0x107/0x167 [ 987.011448] should_fail.cold+0x5/0xa [ 987.011764] ? __alloc_file+0x21/0x320 [ 987.012085] should_failslab+0x5/0x20 [ 987.012402] kmem_cache_alloc+0x5b/0x310 [ 987.012738] ? kernel_text_address+0xf2/0x120 [ 987.013114] __alloc_file+0x21/0x320 [ 987.013419] alloc_empty_file+0x6d/0x170 [ 987.013745] path_openat+0xe3/0x26e0 [ 987.014054] ? lock_chain_count+0x20/0x20 [ 987.014386] ? stack_trace_save+0x8c/0xc0 [ 987.014722] ? stack_trace_consume_entry+0x160/0x160 [ 987.015135] ? path_lookupat+0x860/0x860 [ 987.015472] ? kasan_save_stack+0x32/0x40 [ 987.015810] ? kasan_save_stack+0x1b/0x40 [ 987.016150] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.016556] ? security_prepare_creds+0x112/0x190 [ 987.016951] ? prepare_creds+0x452/0x5e0 [ 987.017282] ? prepare_exec_creds+0xd/0x260 [ 987.017625] ? bprm_execve+0x18f/0x1a60 [ 987.017954] do_filp_open+0x190/0x3e0 [ 987.018264] ? may_open_dev+0xf0/0xf0 [ 987.018579] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.018994] ? SOFTIRQ_verbose+0x10/0x10 [ 987.019031] FAULT_INJECTION: forcing a failure. [ 987.019031] name failslab, interval 1, probability 0, space 0, times 0 [ 987.019321] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 987.019339] ? find_held_lock+0x2c/0x110 [ 987.019358] do_open_execat+0x116/0x690 [ 987.021874] ? __do_sys_uselib+0x5e0/0x5e0 [ 987.022216] ? do_raw_spin_lock+0x121/0x260 [ 987.022573] ? rwlock_bug.part.0+0x90/0x90 [ 987.022920] bprm_execve+0x55e/0x1a60 [ 987.023228] ? open_exec+0x70/0x70 [ 987.023523] ? memcpy+0x39/0x60 [ 987.023787] ? copy_string_kernel+0x3b6/0x450 [ 987.024158] do_execveat_common+0x772/0x8d0 [ 987.024506] ? bprm_execve+0x1a60/0x1a60 [ 987.024848] __x64_sys_execveat+0xed/0x140 [ 987.025195] do_syscall_64+0x33/0x40 [ 987.025493] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.025899] RIP: 0033:0x7f2243400b19 [ 987.026200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.027644] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.028251] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 987.028812] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.029380] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.029943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.030510] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 987.031100] CPU: 0 PID: 8669 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 987.031976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.033040] Call Trace: [ 987.033391] dump_stack+0x107/0x167 [ 987.033865] should_fail.cold+0x5/0xa [ 987.034369] ? call_usermodehelper_setup+0xa2/0x2f0 [ 987.035013] should_failslab+0x5/0x20 [ 987.035513] kmem_cache_alloc_trace+0x55/0x320 22:11:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 22:11:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 22:11:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 22:11:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 22:11:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 22:11:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) setresuid(0x0, 0x0, 0x0) 22:11:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 21) 22:11:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) [ 987.036284] call_usermodehelper_setup+0xa2/0x2f0 [ 987.037085] ? copy_regset_to_user+0x170/0x170 [ 987.037674] ? bprm_execve+0xbe6/0x1a60 [ 987.038188] __request_module+0x3f9/0x920 [ 987.038721] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.039401] ? free_modprobe_argv+0x90/0x90 [ 987.039954] ? find_held_lock+0x2c/0x110 [ 987.040485] ? find_held_lock+0x2c/0x110 [ 987.041013] ? bprm_execve+0xa13/0x1a60 [ 987.041526] ? lock_downgrade+0x6d0/0x6d0 [ 987.042053] ? elf_core_dump+0x3c50/0x3c50 [ 987.042600] ? do_raw_read_unlock+0x3b/0x70 [ 987.043154] ? _raw_read_unlock+0x1a/0x30 [ 987.043685] ? load_misc_binary+0x605/0xb70 [ 987.044247] bprm_execve+0xbe6/0x1a60 [ 987.044749] ? open_exec+0x70/0x70 [ 987.045234] ? memcpy+0x39/0x60 [ 987.045671] ? copy_string_kernel+0x3b6/0x450 [ 987.046252] do_execveat_common+0x772/0x8d0 [ 987.046807] ? bprm_execve+0x1a60/0x1a60 [ 987.047343] __x64_sys_execveat+0xed/0x140 [ 987.047890] do_syscall_64+0x33/0x40 [ 987.048375] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.049044] RIP: 0033:0x7f70da682b19 [ 987.049523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.051849] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.052828] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 987.053755] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.054669] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.055589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.056511] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 987.058628] FAULT_INJECTION: forcing a failure. [ 987.058628] name failslab, interval 1, probability 0, space 0, times 0 [ 987.060240] CPU: 0 PID: 8670 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 987.061204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.062248] Call Trace: [ 987.062592] dump_stack+0x107/0x167 [ 987.063065] should_fail.cold+0x5/0xa [ 987.063564] ? getname_flags.part.0+0x50/0x4f0 [ 987.064160] should_failslab+0x5/0x20 [ 987.064655] kmem_cache_alloc+0x5b/0x310 [ 987.065199] getname_flags.part.0+0x50/0x4f0 [ 987.065776] getname+0x8e/0xd0 [ 987.066199] do_sys_openat2+0xf9/0x420 [ 987.066708] ? build_open_flags+0x6f0/0x6f0 [ 987.067284] ? rcu_read_lock_any_held+0x75/0xa0 [ 987.067894] __x64_sys_openat+0x13f/0x1f0 [ 987.068441] ? __ia32_sys_open+0x1c0/0x1c0 [ 987.069005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 987.069679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 987.070351] do_syscall_64+0x33/0x40 [ 987.070833] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.071494] RIP: 0033:0x7fc547446a04 [ 987.071977] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 987.074322] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 987.075302] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 987.076220] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 987.077146] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 987.078055] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 987.078436] FAULT_INJECTION: forcing a failure. 22:11:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 987.078436] name failslab, interval 1, probability 0, space 0, times 0 [ 987.078965] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 987.080708] CPU: 1 PID: 8673 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 987.081256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.081915] Call Trace: [ 987.082127] dump_stack+0x107/0x167 [ 987.082423] should_fail.cold+0x5/0xa [ 987.082724] ? create_object.isra.0+0x3a/0xa20 [ 987.083096] should_failslab+0x5/0x20 [ 987.083396] kmem_cache_alloc+0x5b/0x310 [ 987.083731] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 987.084168] create_object.isra.0+0x3a/0xa20 [ 987.084522] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.084928] kmem_cache_alloc+0x159/0x310 [ 987.085277] security_file_alloc+0x34/0x170 [ 987.085624] __alloc_file+0xb7/0x320 [ 987.085925] alloc_empty_file+0x6d/0x170 [ 987.086252] path_openat+0xe3/0x26e0 [ 987.086556] ? lock_chain_count+0x20/0x20 [ 987.086887] ? stack_trace_save+0x8c/0xc0 [ 987.087227] ? stack_trace_consume_entry+0x160/0x160 [ 987.087628] ? path_lookupat+0x860/0x860 [ 987.087962] ? kasan_save_stack+0x32/0x40 [ 987.088291] ? kasan_save_stack+0x1b/0x40 [ 987.088630] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.089036] ? security_prepare_creds+0x112/0x190 [ 987.089424] ? prepare_creds+0x452/0x5e0 [ 987.089745] ? prepare_exec_creds+0xd/0x260 [ 987.090094] ? bprm_execve+0x18f/0x1a60 [ 987.090412] do_filp_open+0x190/0x3e0 [ 987.090717] ? may_open_dev+0xf0/0xf0 [ 987.091030] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.091453] ? SOFTIRQ_verbose+0x10/0x10 [ 987.091776] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 987.092224] ? find_held_lock+0x2c/0x110 [ 987.092548] do_open_execat+0x116/0x690 [ 987.092873] ? __do_sys_uselib+0x5e0/0x5e0 [ 987.093212] ? do_raw_spin_lock+0x121/0x260 [ 987.093564] ? rwlock_bug.part.0+0x90/0x90 [ 987.093907] bprm_execve+0x55e/0x1a60 [ 987.094217] ? open_exec+0x70/0x70 [ 987.094502] ? memcpy+0x39/0x60 [ 987.094772] ? copy_string_kernel+0x3b6/0x450 [ 987.095135] do_execveat_common+0x772/0x8d0 [ 987.095484] ? bprm_execve+0x1a60/0x1a60 [ 987.095817] __x64_sys_execveat+0xed/0x140 [ 987.096161] do_syscall_64+0x33/0x40 [ 987.096458] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.096867] RIP: 0033:0x7f2243400b19 [ 987.097169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.098629] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.099227] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 987.099787] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.100344] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.100901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.101477] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 987.103499] FAULT_INJECTION: forcing a failure. [ 987.103499] name failslab, interval 1, probability 0, space 0, times 0 [ 987.105437] CPU: 0 PID: 8676 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 987.106470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.107630] Call Trace: [ 987.108003] dump_stack+0x107/0x167 [ 987.108526] should_fail.cold+0x5/0xa [ 987.109075] ? create_object.isra.0+0x3a/0xa20 [ 987.109720] should_failslab+0x5/0x20 [ 987.110258] kmem_cache_alloc+0x5b/0x310 [ 987.110817] create_object.isra.0+0x3a/0xa20 [ 987.111441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.112126] kmem_cache_alloc_trace+0x151/0x320 [ 987.112782] ? bprm_execve+0xbe6/0x1a60 [ 987.113325] __request_module+0x2e0/0x920 [ 987.113910] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.114620] ? free_modprobe_argv+0x90/0x90 [ 987.115235] ? find_held_lock+0x2c/0x110 [ 987.115796] ? find_held_lock+0x2c/0x110 [ 987.116373] ? bprm_execve+0xa13/0x1a60 [ 987.116913] ? lock_downgrade+0x6d0/0x6d0 22:11:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 22) [ 987.117511] ? elf_core_dump+0x3c50/0x3c50 [ 987.118199] ? do_raw_read_unlock+0x3b/0x70 [ 987.118804] ? _raw_read_unlock+0x1a/0x30 [ 987.119383] ? load_misc_binary+0x605/0xb70 [ 987.119997] bprm_execve+0xbe6/0x1a60 [ 987.120547] ? open_exec+0x70/0x70 [ 987.121056] ? memcpy+0x39/0x60 [ 987.121512] ? copy_string_kernel+0x3b6/0x450 [ 987.122152] do_execveat_common+0x772/0x8d0 [ 987.122745] ? bprm_execve+0x1a60/0x1a60 [ 987.123341] __x64_sys_execveat+0xed/0x140 [ 987.123914] do_syscall_64+0x33/0x40 [ 987.124447] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.125147] RIP: 0033:0x7f2f4d86bb19 [ 987.125681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.126501] FAULT_INJECTION: forcing a failure. [ 987.126501] name failslab, interval 1, probability 0, space 0, times 0 [ 987.128119] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.128139] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 987.128150] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.128166] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.132860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.133807] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 [ 987.134790] CPU: 1 PID: 8679 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 987.135384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.136032] Call Trace: [ 987.136243] dump_stack+0x107/0x167 [ 987.136579] should_fail.cold+0x5/0xa [ 987.136883] ? create_object.isra.0+0x3a/0xa20 [ 987.137261] should_failslab+0x5/0x20 [ 987.137566] kmem_cache_alloc+0x5b/0x310 [ 987.137896] ? __generic_file_write_iter+0x1a4/0x5d0 [ 987.138298] create_object.isra.0+0x3a/0xa20 [ 987.138651] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.139059] kmem_cache_alloc+0x159/0x310 [ 987.139396] getname_flags.part.0+0x50/0x4f0 [ 987.139769] getname+0x8e/0xd0 [ 987.140031] do_sys_openat2+0xf9/0x420 [ 987.140347] ? build_open_flags+0x6f0/0x6f0 [ 987.140700] ? rcu_read_lock_any_held+0x75/0xa0 [ 987.141080] __x64_sys_openat+0x13f/0x1f0 [ 987.141418] ? __ia32_sys_open+0x1c0/0x1c0 [ 987.141760] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 987.142186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 987.142594] do_syscall_64+0x33/0x40 [ 987.142894] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.143304] RIP: 0033:0x7fc547446a04 [ 987.143608] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 987.145072] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 987.145679] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 987.146250] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 987.146824] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 987.147395] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 987.147969] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 987.157277] FAULT_INJECTION: forcing a failure. [ 987.157277] name failslab, interval 1, probability 0, space 0, times 0 [ 987.158855] CPU: 0 PID: 8665 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 987.159837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.161037] Call Trace: [ 987.161427] dump_stack+0x107/0x167 [ 987.161960] should_fail.cold+0x5/0xa [ 987.162514] ? ebitmap_cpy+0xc7/0x330 [ 987.163069] should_failslab+0x5/0x20 [ 987.163626] kmem_cache_alloc+0x5b/0x310 [ 987.164224] ebitmap_cpy+0xc7/0x330 [ 987.164764] mls_compute_sid+0x64b/0x1060 [ 987.165353] ? mark_lock+0xf5/0x2df0 [ 987.165895] ? mls_convert_context+0x6c0/0x6c0 [ 987.166549] security_compute_sid.part.0+0x8e8/0x16e0 [ 987.167321] ? security_compute_validatetrans.part.0+0x960/0x960 [ 987.168173] ? mark_lock+0xf5/0x2df0 [ 987.168726] ? lock_chain_count+0x20/0x20 [ 987.169324] ? lock_acquire+0x197/0x470 [ 987.169906] ? find_held_lock+0x2c/0x110 [ 987.170515] security_transition_sid+0xc0/0x190 [ 987.171184] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 987.171926] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 987.172648] ? selinux_inode_getsecctx+0x90/0x90 [ 987.173353] ? sched_exec+0x1ae/0x1e0 [ 987.173894] ? do_raw_spin_lock+0x121/0x260 [ 987.174531] ? nr_iowait+0x130/0x130 [ 987.175058] ? rwlock_bug.part.0+0x90/0x90 [ 987.175687] security_bprm_creds_for_exec+0x46/0xa0 [ 987.176396] bprm_execve+0x6c1/0x1a60 [ 987.176975] ? open_exec+0x70/0x70 [ 987.177487] ? memcpy+0x39/0x60 [ 987.177976] ? copy_string_kernel+0x3b6/0x450 22:11:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) [ 987.178621] do_execveat_common+0x772/0x8d0 [ 987.179369] ? bprm_execve+0x1a60/0x1a60 [ 987.179962] __x64_sys_execveat+0xed/0x140 [ 987.180582] do_syscall_64+0x33/0x40 [ 987.181131] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.181872] RIP: 0033:0x7f1c8836fb19 [ 987.182393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.185034] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.186092] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 987.187114] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.188139] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.189168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.190190] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 987.193714] FAULT_INJECTION: forcing a failure. [ 987.193714] name failslab, interval 1, probability 0, space 0, times 0 [ 987.195364] CPU: 0 PID: 8671 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 987.196462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.197659] Call Trace: [ 987.198046] dump_stack+0x107/0x167 [ 987.198575] should_fail.cold+0x5/0xa [ 987.199136] ? bprm_execve+0xbe6/0x1a60 [ 987.199717] should_failslab+0x5/0x20 [ 987.200277] __kmalloc_track_caller+0x79/0x370 22:11:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 987.200919] ? __request_module+0x2fe/0x920 [ 987.201625] ? bprm_execve+0xbe6/0x1a60 [ 987.202188] kstrdup+0x36/0x70 [ 987.202652] __request_module+0x2fe/0x920 [ 987.203240] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.203975] ? free_modprobe_argv+0x90/0x90 [ 987.204580] ? find_held_lock+0x2c/0x110 [ 987.205165] ? find_held_lock+0x2c/0x110 [ 987.205743] ? bprm_execve+0xa13/0x1a60 [ 987.206304] ? lock_downgrade+0x6d0/0x6d0 [ 987.206879] ? elf_core_dump+0x3c50/0x3c50 [ 987.207480] ? do_raw_read_unlock+0x3b/0x70 [ 987.208086] ? _raw_read_unlock+0x1a/0x30 [ 987.208658] ? load_misc_binary+0x605/0xb70 [ 987.209284] bprm_execve+0xbe6/0x1a60 [ 987.209832] ? open_exec+0x70/0x70 [ 987.210342] ? memcpy+0x39/0x60 [ 987.210808] ? copy_string_kernel+0x3b6/0x450 [ 987.211447] do_execveat_common+0x772/0x8d0 [ 987.212054] ? bprm_execve+0x1a60/0x1a60 [ 987.212646] __x64_sys_execveat+0xed/0x140 [ 987.213245] do_syscall_64+0x33/0x40 [ 987.213770] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.214489] RIP: 0033:0x7f6383eb9b19 [ 987.215009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.217565] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.218603] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 987.219598] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.220599] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.221598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.222601] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 987.283927] FAULT_INJECTION: forcing a failure. [ 987.283927] name failslab, interval 1, probability 0, space 0, times 0 [ 987.284895] CPU: 1 PID: 8689 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 987.285447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.286103] Call Trace: [ 987.286321] dump_stack+0x107/0x167 [ 987.286624] should_fail.cold+0x5/0xa [ 987.286934] ? create_object.isra.0+0x3a/0xa20 [ 987.287304] should_failslab+0x5/0x20 [ 987.287612] kmem_cache_alloc+0x5b/0x310 [ 987.287942] create_object.isra.0+0x3a/0xa20 [ 987.288296] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.288715] kmem_cache_alloc_trace+0x151/0x320 [ 987.289108] call_usermodehelper_setup+0xa2/0x2f0 [ 987.289506] ? copy_regset_to_user+0x170/0x170 [ 987.289876] ? bprm_execve+0xbe6/0x1a60 [ 987.290202] __request_module+0x3f9/0x920 [ 987.290546] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.290976] ? free_modprobe_argv+0x90/0x90 [ 987.291322] ? find_held_lock+0x2c/0x110 [ 987.291658] ? find_held_lock+0x2c/0x110 [ 987.291988] ? bprm_execve+0xa13/0x1a60 [ 987.292314] ? lock_downgrade+0x6d0/0x6d0 [ 987.292646] ? elf_core_dump+0x3c50/0x3c50 [ 987.293005] ? do_raw_read_unlock+0x3b/0x70 [ 987.293353] ? _raw_read_unlock+0x1a/0x30 [ 987.293692] ? load_misc_binary+0x605/0xb70 [ 987.294047] bprm_execve+0xbe6/0x1a60 [ 987.294374] ? open_exec+0x70/0x70 [ 987.294664] ? memcpy+0x39/0x60 [ 987.294933] ? copy_string_kernel+0x3b6/0x450 [ 987.295301] do_execveat_common+0x772/0x8d0 [ 987.295657] ? bprm_execve+0x1a60/0x1a60 [ 987.295992] __x64_sys_execveat+0xed/0x140 [ 987.296343] do_syscall_64+0x33/0x40 [ 987.296645] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.297066] RIP: 0033:0x7f70da682b19 [ 987.297369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.298847] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.299460] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 987.300025] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.300593] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.301163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.301726] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 987.315494] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:11:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 22:11:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 22:11:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) [ 987.327756] FAULT_INJECTION: forcing a failure. [ 987.327756] name failslab, interval 1, probability 0, space 0, times 0 [ 987.329430] CPU: 0 PID: 8690 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 987.330433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.331640] Call Trace: [ 987.332034] dump_stack+0x107/0x167 [ 987.332574] should_fail.cold+0x5/0xa 22:11:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) setresuid(0x0, 0x0, 0x0) [ 987.333244] ? create_object.isra.0+0x3a/0xa20 [ 987.334017] should_failslab+0x5/0x20 [ 987.334577] kmem_cache_alloc+0x5b/0x310 [ 987.335173] ? mark_held_locks+0x9e/0xe0 [ 987.335768] create_object.isra.0+0x3a/0xa20 [ 987.336397] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.337150] kmem_cache_alloc+0x159/0x310 [ 987.337744] ebitmap_cpy+0xc7/0x330 [ 987.338288] mls_compute_sid+0x64b/0x1060 [ 987.338873] ? mls_convert_context+0x6c0/0x6c0 [ 987.339551] security_compute_sid.part.0+0x8e8/0x16e0 [ 987.340302] ? security_compute_validatetrans.part.0+0x960/0x960 [ 987.341197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 987.341929] ? _raw_spin_unlock_irq+0x1f/0x30 [ 987.342583] ? trace_hardirqs_on+0x5b/0x180 [ 987.343191] ? _raw_spin_unlock_irq+0x1f/0x30 [ 987.343846] ? wait_for_completion+0x1d5/0x270 [ 987.344499] ? bit_wait_io_timeout+0x160/0x160 [ 987.345177] ? io_schedule_timeout+0x140/0x140 [ 987.345825] ? lockdep_init_map_type+0x2c7/0x780 [ 987.346536] ? stop_cpus.constprop.0+0x160/0x160 [ 987.347207] ? lock_acquire+0x197/0x470 [ 987.347787] ? find_held_lock+0x2c/0x110 [ 987.348366] ? set_cpus_allowed_ptr+0x10/0x10 [ 987.349032] security_transition_sid+0xc0/0x190 [ 987.349701] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 987.350442] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 987.351162] ? selinux_inode_getsecctx+0x90/0x90 [ 987.351855] ? sched_exec+0x16e/0x1e0 [ 987.352389] ? nr_iowait+0x130/0x130 [ 987.352935] ? rwlock_bug.part.0+0x90/0x90 [ 987.353551] security_bprm_creds_for_exec+0x46/0xa0 [ 987.354281] bprm_execve+0x6c1/0x1a60 [ 987.354837] ? open_exec+0x70/0x70 [ 987.355360] ? memcpy+0x39/0x60 [ 987.355832] ? copy_string_kernel+0x3b6/0x450 [ 987.356502] do_execveat_common+0x772/0x8d0 [ 987.357130] ? bprm_execve+0x1a60/0x1a60 [ 987.357749] __x64_sys_execveat+0xed/0x140 [ 987.358359] do_syscall_64+0x33/0x40 [ 987.358904] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.359625] RIP: 0033:0x7f2f4d86bb19 [ 987.360173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.362727] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.363831] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 987.364827] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.365820] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.366813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.367806] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:11:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) [ 987.400980] FAULT_INJECTION: forcing a failure. [ 987.400980] name failslab, interval 1, probability 0, space 0, times 0 [ 987.401931] CPU: 1 PID: 8698 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 987.402469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.403141] Call Trace: [ 987.403365] dump_stack+0x107/0x167 [ 987.403662] should_fail.cold+0x5/0xa [ 987.403978] ? security_file_alloc+0x34/0x170 [ 987.404348] should_failslab+0x5/0x20 [ 987.404659] kmem_cache_alloc+0x5b/0x310 [ 987.404994] security_file_alloc+0x34/0x170 [ 987.405348] __alloc_file+0xb7/0x320 [ 987.405649] alloc_empty_file+0x6d/0x170 [ 987.405979] path_openat+0xe3/0x26e0 [ 987.406286] ? lock_chain_count+0x20/0x20 [ 987.406626] ? stack_trace_save+0x8c/0xc0 [ 987.406965] ? stack_trace_consume_entry+0x160/0x160 [ 987.407377] ? path_lookupat+0x860/0x860 [ 987.407706] ? kasan_save_stack+0x32/0x40 [ 987.408043] ? kasan_save_stack+0x1b/0x40 [ 987.408375] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 987.408786] ? security_prepare_creds+0x112/0x190 [ 987.409175] ? prepare_creds+0x452/0x5e0 [ 987.409505] ? prepare_exec_creds+0xd/0x260 [ 987.409851] ? bprm_execve+0x18f/0x1a60 [ 987.410180] do_filp_open+0x190/0x3e0 [ 987.410484] ? may_open_dev+0xf0/0xf0 [ 987.410807] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.411227] ? SOFTIRQ_verbose+0x10/0x10 [ 987.411560] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 987.412003] ? find_held_lock+0x2c/0x110 [ 987.412336] do_open_execat+0x116/0x690 [ 987.412654] ? __do_sys_uselib+0x5e0/0x5e0 [ 987.413003] ? do_raw_spin_lock+0x121/0x260 [ 987.413350] ? rwlock_bug.part.0+0x90/0x90 [ 987.413698] bprm_execve+0x55e/0x1a60 [ 987.414010] ? open_exec+0x70/0x70 [ 987.414300] ? memcpy+0x39/0x60 [ 987.414567] ? copy_string_kernel+0x3b6/0x450 [ 987.414938] do_execveat_common+0x772/0x8d0 [ 987.415285] ? bprm_execve+0x1a60/0x1a60 [ 987.415627] __x64_sys_execveat+0xed/0x140 [ 987.415970] do_syscall_64+0x33/0x40 [ 987.416272] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.416679] RIP: 0033:0x7f2243400b19 [ 987.416994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.418441] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.419054] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 987.419627] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.420210] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.420780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.421356] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 987.426371] FAULT_INJECTION: forcing a failure. [ 987.426371] name failslab, interval 1, probability 0, space 0, times 0 [ 987.427310] CPU: 1 PID: 8699 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 987.427859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.428523] Call Trace: [ 987.428740] dump_stack+0x107/0x167 [ 987.429044] should_fail.cold+0x5/0xa [ 987.429360] ? call_usermodehelper_setup+0xa2/0x2f0 [ 987.429761] should_failslab+0x5/0x20 [ 987.430076] kmem_cache_alloc_trace+0x55/0x320 [ 987.430451] call_usermodehelper_setup+0xa2/0x2f0 [ 987.430839] ? copy_regset_to_user+0x170/0x170 [ 987.431209] ? bprm_execve+0xbe6/0x1a60 [ 987.431527] __request_module+0x3f9/0x920 [ 987.431863] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 987.432287] ? free_modprobe_argv+0x90/0x90 [ 987.432635] ? find_held_lock+0x2c/0x110 [ 987.432970] ? find_held_lock+0x2c/0x110 [ 987.433307] ? bprm_execve+0xa13/0x1a60 [ 987.433628] ? lock_downgrade+0x6d0/0x6d0 [ 987.433983] ? elf_core_dump+0x3c50/0x3c50 [ 987.434334] ? do_raw_read_unlock+0x3b/0x70 [ 987.434684] ? _raw_read_unlock+0x1a/0x30 [ 987.435016] ? load_misc_binary+0x605/0xb70 [ 987.435372] bprm_execve+0xbe6/0x1a60 [ 987.435683] ? open_exec+0x70/0x70 [ 987.435980] ? memcpy+0x39/0x60 [ 987.436251] ? copy_string_kernel+0x3b6/0x450 [ 987.436624] do_execveat_common+0x772/0x8d0 [ 987.436977] ? bprm_execve+0x1a60/0x1a60 [ 987.437316] __x64_sys_execveat+0xed/0x140 [ 987.437659] do_syscall_64+0x33/0x40 [ 987.437961] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.438366] RIP: 0033:0x7f6383eb9b19 [ 987.438670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.440112] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.440727] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 987.441305] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.441883] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.442460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.443034] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 987.450159] FAULT_INJECTION: forcing a failure. [ 987.450159] name failslab, interval 1, probability 0, space 0, times 0 [ 987.451822] CPU: 0 PID: 8697 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 987.452765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 987.453911] Call Trace: [ 987.454282] dump_stack+0x107/0x167 [ 987.454785] should_fail.cold+0x5/0xa [ 987.455317] ? ebitmap_cpy+0xc7/0x330 [ 987.455850] should_failslab+0x5/0x20 [ 987.456377] kmem_cache_alloc+0x5b/0x310 [ 987.456939] ebitmap_cpy+0xc7/0x330 [ 987.457463] mls_compute_sid+0x64b/0x1060 [ 987.458041] ? mls_convert_context+0x6c0/0x6c0 [ 987.458678] security_compute_sid.part.0+0x8e8/0x16e0 [ 987.459404] ? security_compute_validatetrans.part.0+0x960/0x960 [ 987.460234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 987.460948] ? _raw_spin_unlock_irq+0x1f/0x30 [ 987.461565] ? trace_hardirqs_on+0x5b/0x180 [ 987.462162] ? _raw_spin_unlock_irq+0x1f/0x30 [ 987.462780] ? wait_for_completion+0x1d5/0x270 [ 987.463412] ? bit_wait_io_timeout+0x160/0x160 [ 987.464033] ? io_schedule_timeout+0x140/0x140 [ 987.464666] ? lockdep_init_map_type+0x2c7/0x780 [ 987.465340] ? stop_cpus.constprop.0+0x160/0x160 [ 987.465987] ? lock_acquire+0x197/0x470 [ 987.466535] ? find_held_lock+0x2c/0x110 [ 987.467098] ? set_cpus_allowed_ptr+0x10/0x10 [ 987.467717] security_transition_sid+0xc0/0x190 [ 987.468372] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 987.469071] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 987.469766] ? selinux_inode_getsecctx+0x90/0x90 [ 987.470421] ? sched_exec+0x16e/0x1e0 [ 987.470940] ? nr_iowait+0x130/0x130 [ 987.471443] ? rwlock_bug.part.0+0x90/0x90 [ 987.472039] security_bprm_creds_for_exec+0x46/0xa0 [ 987.472727] bprm_execve+0x6c1/0x1a60 [ 987.473265] ? open_exec+0x70/0x70 [ 987.473756] ? memcpy+0x39/0x60 [ 987.474220] ? copy_string_kernel+0x3b6/0x450 [ 987.474851] do_execveat_common+0x772/0x8d0 [ 987.475453] ? bprm_execve+0x1a60/0x1a60 [ 987.476028] __x64_sys_execveat+0xed/0x140 [ 987.476615] do_syscall_64+0x33/0x40 [ 987.477134] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 987.477838] RIP: 0033:0x7f1c8836fb19 [ 987.478356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.480824] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 987.481864] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 987.482830] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 987.483793] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.484764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.485733] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 999.775265] FAULT_INJECTION: forcing a failure. [ 999.775265] name failslab, interval 1, probability 0, space 0, times 0 [ 999.776424] CPU: 0 PID: 8716 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 999.777043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.777804] Call Trace: [ 999.778052] dump_stack+0x107/0x167 [ 999.778389] should_fail.cold+0x5/0xa [ 999.778743] ? call_usermodehelper_setup+0xa2/0x2f0 [ 999.779207] should_failslab+0x5/0x20 [ 999.779558] kmem_cache_alloc_trace+0x55/0x320 [ 999.779984] call_usermodehelper_setup+0xa2/0x2f0 [ 999.780423] ? copy_regset_to_user+0x170/0x170 [ 999.780816] ? bprm_execve+0xbe6/0x1a60 [ 999.781185] __request_module+0x3f9/0x920 [ 999.781564] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 999.782046] ? free_modprobe_argv+0x90/0x90 [ 999.782441] ? find_held_lock+0x2c/0x110 [ 999.782790] ? find_held_lock+0x2c/0x110 [ 999.783169] ? bprm_execve+0xa13/0x1a60 [ 999.783510] ? lock_downgrade+0x6d0/0x6d0 [ 999.783889] ? elf_core_dump+0x3c50/0x3c50 [ 999.784255] ? do_raw_read_unlock+0x3b/0x70 [ 999.784282] FAULT_INJECTION: forcing a failure. [ 999.784282] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 999.784647] ? _raw_read_unlock+0x1a/0x30 [ 999.784666] ? load_misc_binary+0x605/0xb70 [ 999.787034] bprm_execve+0xbe6/0x1a60 [ 999.787365] ? open_exec+0x70/0x70 [ 999.787663] ? memcpy+0x39/0x60 [ 999.787942] ? copy_string_kernel+0x3b6/0x450 [ 999.788324] do_execveat_common+0x772/0x8d0 [ 999.788686] ? bprm_execve+0x1a60/0x1a60 [ 999.789036] __x64_sys_execveat+0xed/0x140 [ 999.789403] do_syscall_64+0x33/0x40 [ 999.789717] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.790152] RIP: 0033:0x7f70da682b19 [ 999.790462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.792000] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.792630] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 999.793221] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.793804] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.794387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.794975] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 999.795585] CPU: 1 PID: 8722 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 999.796565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.797742] Call Trace: [ 999.798125] dump_stack+0x107/0x167 [ 999.798650] should_fail.cold+0x5/0xa [ 999.799204] strncpy_from_user+0x34/0x470 [ 999.799814] getname_flags.part.0+0x95/0x4f0 [ 999.800447] getname+0x8e/0xd0 [ 999.800917] do_sys_openat2+0xf9/0x420 [ 999.801491] ? build_open_flags+0x6f0/0x6f0 [ 999.802118] ? rcu_read_lock_any_held+0x75/0xa0 [ 999.802795] __x64_sys_openat+0x13f/0x1f0 [ 999.803388] ? __ia32_sys_open+0x1c0/0x1c0 [ 999.804003] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 999.804747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 999.805495] do_syscall_64+0x33/0x40 [ 999.806030] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.806761] RIP: 0033:0x7fc547446a04 [ 999.807300] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 999.809887] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 999.810968] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 999.811978] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 999.812996] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 999.814016] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 999.815022] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 999.820075] FAULT_INJECTION: forcing a failure. [ 999.820075] name failslab, interval 1, probability 0, space 0, times 0 [ 999.821045] CPU: 0 PID: 8723 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 999.821613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.822291] Call Trace: [ 999.822516] dump_stack+0x107/0x167 [ 999.822822] should_fail.cold+0x5/0xa [ 999.823173] ? call_usermodehelper_setup+0xa2/0x2f0 [ 999.823604] should_failslab+0x5/0x20 [ 999.823927] kmem_cache_alloc_trace+0x55/0x320 [ 999.824349] call_usermodehelper_setup+0xa2/0x2f0 [ 999.824749] ? copy_regset_to_user+0x170/0x170 [ 999.825175] ? bprm_execve+0xbe6/0x1a60 [ 999.825508] __request_module+0x3f9/0x920 [ 999.825886] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 999.826323] ? free_modprobe_argv+0x90/0x90 [ 999.826718] ? find_held_lock+0x2c/0x110 [ 999.827067] ? find_held_lock+0x2c/0x110 [ 999.827409] ? bprm_execve+0xa13/0x1a60 [ 999.827775] ? lock_downgrade+0x6d0/0x6d0 [ 999.828124] ? elf_core_dump+0x3c50/0x3c50 [ 999.828511] ? do_raw_read_unlock+0x3b/0x70 [ 999.828871] ? _raw_read_unlock+0x1a/0x30 [ 999.829253] ? load_misc_binary+0x605/0xb70 [ 999.829645] bprm_execve+0xbe6/0x1a60 [ 999.829991] ? open_exec+0x70/0x70 [ 999.830314] ? memcpy+0x39/0x60 [ 999.830616] ? copy_string_kernel+0x3b6/0x450 [ 999.831025] do_execveat_common+0x772/0x8d0 [ 999.831426] ? bprm_execve+0x1a60/0x1a60 [ 999.831805] __x64_sys_execveat+0xed/0x140 [ 999.832189] do_syscall_64+0x33/0x40 [ 999.832527] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.832948] RIP: 0033:0x7f6383eb9b19 [ 999.833290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.834916] RSP: 002b:00007f638142f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.835145] FAULT_INJECTION: forcing a failure. [ 999.835145] name failslab, interval 1, probability 0, space 0, times 0 [ 999.835584] RAX: ffffffffffffffda RBX: 00007f6383fccf60 RCX: 00007f6383eb9b19 [ 999.835592] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.835598] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.835615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.839677] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 999.840335] CPU: 1 PID: 8728 Comm: syz-executor.7 Not tainted 5.10.216 #1 22:11:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 23) 22:11:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) setresuid(0x0, 0x0, 0x0) 22:11:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 22:11:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 22:11:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 22:11:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 22:11:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 22:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) [ 999.841342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.842839] Call Trace: [ 999.843226] dump_stack+0x107/0x167 [ 999.843761] should_fail.cold+0x5/0xa [ 999.844334] ? create_object.isra.0+0x3a/0xa20 [ 999.844999] should_failslab+0x5/0x20 [ 999.845564] kmem_cache_alloc+0x5b/0x310 [ 999.846167] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 999.846975] create_object.isra.0+0x3a/0xa20 [ 999.847624] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 999.848377] kmem_cache_alloc+0x159/0x310 [ 999.848993] security_file_alloc+0x34/0x170 [ 999.849632] __alloc_file+0xb7/0x320 [ 999.850171] alloc_empty_file+0x6d/0x170 [ 999.850765] path_openat+0xe3/0x26e0 [ 999.851310] ? lock_chain_count+0x20/0x20 [ 999.851912] ? stack_trace_save+0x8c/0xc0 [ 999.852519] ? stack_trace_consume_entry+0x160/0x160 [ 999.853320] ? path_lookupat+0x860/0x860 [ 999.853918] ? kasan_save_stack+0x32/0x40 [ 999.854524] ? kasan_save_stack+0x1b/0x40 [ 999.855139] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 999.855881] ? security_prepare_creds+0x112/0x190 [ 999.856585] ? prepare_creds+0x452/0x5e0 [ 999.857186] ? prepare_exec_creds+0xd/0x260 [ 999.857814] ? bprm_execve+0x18f/0x1a60 [ 999.858400] do_filp_open+0x190/0x3e0 [ 999.858949] ? may_open_dev+0xf0/0xf0 [ 999.859531] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 999.860293] ? SOFTIRQ_verbose+0x10/0x10 [ 999.860883] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 999.861707] ? find_held_lock+0x2c/0x110 [ 999.862309] do_open_execat+0x116/0x690 [ 999.862897] ? __do_sys_uselib+0x5e0/0x5e0 [ 999.863511] ? do_raw_spin_lock+0x121/0x260 [ 999.864142] ? rwlock_bug.part.0+0x90/0x90 [ 999.864774] bprm_execve+0x55e/0x1a60 [ 999.865349] ? open_exec+0x70/0x70 [ 999.865874] ? memcpy+0x39/0x60 [ 999.866363] ? copy_string_kernel+0x3b6/0x450 [ 999.867033] do_execveat_common+0x772/0x8d0 [ 999.867666] ? bprm_execve+0x1a60/0x1a60 [ 999.868279] __x64_sys_execveat+0xed/0x140 [ 999.868903] do_syscall_64+0x33/0x40 [ 999.869451] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.870188] RIP: 0033:0x7f2243400b19 [ 999.870725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.873391] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.874513] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 999.875525] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.876551] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.877584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.878608] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:11:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) [ 999.907799] FAULT_INJECTION: forcing a failure. [ 999.907799] name failslab, interval 1, probability 0, space 0, times 0 [ 999.908891] CPU: 0 PID: 8734 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 999.909489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.910297] Call Trace: [ 999.910533] dump_stack+0x107/0x167 [ 999.910851] should_fail.cold+0x5/0xa [ 999.911185] ? call_usermodehelper_setup+0xa2/0x2f0 [ 999.911614] should_failslab+0x5/0x20 [ 999.911943] kmem_cache_alloc_trace+0x55/0x320 [ 999.912342] call_usermodehelper_setup+0xa2/0x2f0 [ 999.912757] ? copy_regset_to_user+0x170/0x170 [ 999.913161] ? bprm_execve+0xbe6/0x1a60 [ 999.913500] __request_module+0x3f9/0x920 [ 999.913858] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 999.914309] ? free_modprobe_argv+0x90/0x90 [ 999.914681] ? find_held_lock+0x2c/0x110 [ 999.915042] ? find_held_lock+0x2c/0x110 [ 999.915394] ? bprm_execve+0xa13/0x1a60 [ 999.915737] ? lock_downgrade+0x6d0/0x6d0 [ 999.916093] ? elf_core_dump+0x3c50/0x3c50 [ 999.916454] ? do_raw_read_unlock+0x3b/0x70 [ 999.916822] ? _raw_read_unlock+0x1a/0x30 [ 999.917176] ? load_misc_binary+0x605/0xb70 [ 999.917555] bprm_execve+0xbe6/0x1a60 [ 999.917888] ? open_exec+0x70/0x70 [ 999.918197] ? memcpy+0x39/0x60 [ 999.918488] ? copy_string_kernel+0x3b6/0x450 [ 999.918875] do_execveat_common+0x772/0x8d0 [ 999.919250] ? bprm_execve+0x1a60/0x1a60 [ 999.919612] __x64_sys_execveat+0xed/0x140 [ 999.919976] do_syscall_64+0x33/0x40 [ 999.920296] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.920732] RIP: 0033:0x7f70da682b19 [ 999.921051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.922614] RSP: 002b:00007f70d7bf8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.923261] RAX: ffffffffffffffda RBX: 00007f70da795f60 RCX: 00007f70da682b19 [ 999.923862] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.924474] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.925073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.925688] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 999.929358] FAULT_INJECTION: forcing a failure. [ 999.929358] name failslab, interval 1, probability 0, space 0, times 0 [ 999.930334] CPU: 0 PID: 8727 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 999.930922] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.931633] Call Trace: [ 999.931864] dump_stack+0x107/0x167 [ 999.932174] should_fail.cold+0x5/0xa [ 999.932501] ? create_object.isra.0+0x3a/0xa20 [ 999.932899] should_failslab+0x5/0x20 [ 999.933231] kmem_cache_alloc+0x5b/0x310 [ 999.933578] ? mark_held_locks+0x9e/0xe0 [ 999.933926] create_object.isra.0+0x3a/0xa20 [ 999.934306] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 999.934757] kmem_cache_alloc+0x159/0x310 [ 999.935123] ebitmap_cpy+0xc7/0x330 [ 999.935441] mls_compute_sid+0x64b/0x1060 [ 999.935798] ? mls_convert_context+0x6c0/0x6c0 [ 999.936199] security_compute_sid.part.0+0x8e8/0x16e0 [ 999.936658] ? security_compute_validatetrans.part.0+0x960/0x960 [ 999.937185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 999.937632] ? _raw_spin_unlock_irq+0x1f/0x30 [ 999.938014] ? trace_hardirqs_on+0x5b/0x180 [ 999.938383] ? _raw_spin_unlock_irq+0x1f/0x30 [ 999.938772] ? wait_for_completion+0x1d5/0x270 [ 999.939165] ? bit_wait_io_timeout+0x160/0x160 [ 999.939568] ? io_schedule_timeout+0x140/0x140 [ 999.939961] ? lockdep_init_map_type+0x2c7/0x780 [ 999.940378] ? stop_cpus.constprop.0+0x160/0x160 [ 999.940787] ? lock_acquire+0x197/0x470 [ 999.941135] ? find_held_lock+0x2c/0x110 [ 999.941486] ? set_cpus_allowed_ptr+0x10/0x10 [ 999.941872] security_transition_sid+0xc0/0x190 [ 999.942272] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 999.942700] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 999.943130] ? selinux_inode_getsecctx+0x90/0x90 [ 999.943534] ? sched_exec+0x16e/0x1e0 [ 999.943856] ? nr_iowait+0x130/0x130 [ 999.944176] ? rwlock_bug.part.0+0x90/0x90 [ 999.944544] security_bprm_creds_for_exec+0x46/0xa0 [ 999.944983] bprm_execve+0x6c1/0x1a60 [ 999.945330] ? open_exec+0x70/0x70 [ 999.945641] ? memcpy+0x39/0x60 [ 999.945930] ? copy_string_kernel+0x3b6/0x450 [ 999.946318] do_execveat_common+0x772/0x8d0 [ 999.946690] ? bprm_execve+0x1a60/0x1a60 [ 999.947060] __x64_sys_execveat+0xed/0x140 [ 999.947432] do_syscall_64+0x33/0x40 [ 999.947751] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.948187] RIP: 0033:0x7f1c8836fb19 [ 999.948506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.950083] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.950739] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 999.951350] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.951950] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.952563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.953174] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 999.955282] FAULT_INJECTION: forcing a failure. [ 999.955282] name failslab, interval 1, probability 0, space 0, times 0 [ 999.957230] CPU: 1 PID: 8726 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 999.958229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.959424] Call Trace: [ 999.959816] dump_stack+0x107/0x167 [ 999.960353] should_fail.cold+0x5/0xa [ 999.960910] ? create_object.isra.0+0x3a/0xa20 [ 999.961591] should_failslab+0x5/0x20 [ 999.962153] kmem_cache_alloc+0x5b/0x310 [ 999.962748] ? mark_held_locks+0x9e/0xe0 [ 999.963348] create_object.isra.0+0x3a/0xa20 [ 999.963992] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 999.964739] kmem_cache_alloc+0x159/0x310 [ 999.965362] ebitmap_cpy+0xc7/0x330 [ 999.965904] mls_compute_sid+0x64b/0x1060 [ 999.966518] ? mls_convert_context+0x6c0/0x6c0 [ 999.967203] security_compute_sid.part.0+0x8e8/0x16e0 [ 999.967979] ? security_compute_validatetrans.part.0+0x960/0x960 [ 999.968865] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 999.969636] ? _raw_spin_unlock_irq+0x1f/0x30 [ 999.970289] ? trace_hardirqs_on+0x5b/0x180 [ 999.970920] ? _raw_spin_unlock_irq+0x1f/0x30 [ 999.971576] ? wait_for_completion+0x1d5/0x270 [ 999.972247] ? bit_wait_io_timeout+0x160/0x160 [ 999.972910] ? io_schedule_timeout+0x140/0x140 [ 999.973590] ? lockdep_init_map_type+0x2c7/0x780 [ 999.974302] ? stop_cpus.constprop.0+0x160/0x160 [ 999.974991] ? lock_acquire+0x197/0x470 [ 999.975573] ? find_held_lock+0x2c/0x110 [ 999.976166] ? set_cpus_allowed_ptr+0x10/0x10 [ 999.976829] security_transition_sid+0xc0/0x190 [ 999.977533] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 999.978276] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 999.979010] ? selinux_inode_getsecctx+0x90/0x90 [ 999.979704] ? sched_exec+0x16e/0x1e0 [ 999.980260] ? nr_iowait+0x130/0x130 [ 999.980811] ? rwlock_bug.part.0+0x90/0x90 [ 999.981449] security_bprm_creds_for_exec+0x46/0xa0 [ 999.982182] bprm_execve+0x6c1/0x1a60 [ 999.982747] ? open_exec+0x70/0x70 [ 999.983271] ? memcpy+0x39/0x60 [ 999.983755] ? copy_string_kernel+0x3b6/0x450 [ 999.984424] do_execveat_common+0x772/0x8d0 [ 999.985059] ? bprm_execve+0x1a60/0x1a60 [ 999.985687] __x64_sys_execveat+0xed/0x140 [ 999.986311] do_syscall_64+0x33/0x40 [ 999.986858] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 999.987602] RIP: 0033:0x7f2f4d86bb19 [ 999.988154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.990801] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 999.991915] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 999.992941] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 999.993975] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 999.995003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 999.996028] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:11:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 22:11:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) 22:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 22:11:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 24) [ 1000.040403] FAULT_INJECTION: forcing a failure. [ 1000.040403] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.041429] CPU: 0 PID: 8741 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1000.041980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1000.042659] Call Trace: [ 1000.042884] dump_stack+0x107/0x167 [ 1000.043183] should_fail.cold+0x5/0xa [ 1000.043498] ? __alloc_file+0x21/0x320 [ 1000.043820] should_failslab+0x5/0x20 [ 1000.044133] kmem_cache_alloc+0x5b/0x310 [ 1000.044468] ? __lock_acquire+0xbb1/0x5b00 [ 1000.044813] __alloc_file+0x21/0x320 [ 1000.045124] alloc_empty_file+0x6d/0x170 [ 1000.045460] path_openat+0xe3/0x26e0 [ 1000.045771] ? path_lookupat+0x860/0x860 [ 1000.046105] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1000.046534] ? SOFTIRQ_verbose+0x10/0x10 [ 1000.046869] ? find_held_lock+0x2c/0x110 [ 1000.047212] do_filp_open+0x190/0x3e0 [ 1000.047521] ? may_open_dev+0xf0/0xf0 [ 1000.047833] ? __alloc_fd+0x2b8/0x630 [ 1000.048147] ? lock_downgrade+0x6d0/0x6d0 [ 1000.048496] ? do_raw_spin_lock+0x121/0x260 [ 1000.048853] ? rwlock_bug.part.0+0x90/0x90 [ 1000.049214] ? _raw_spin_unlock+0x1a/0x30 [ 1000.049551] ? __alloc_fd+0x2b8/0x630 [ 1000.049868] do_sys_openat2+0x171/0x420 [ 1000.050194] ? build_open_flags+0x6f0/0x6f0 [ 1000.050553] ? rcu_read_lock_any_held+0x75/0xa0 [ 1000.050934] __x64_sys_openat+0x13f/0x1f0 [ 1000.051273] ? __ia32_sys_open+0x1c0/0x1c0 [ 1000.051626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1000.052055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1000.052476] do_syscall_64+0x33/0x40 [ 1000.052784] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1000.053204] RIP: 0033:0x7fc547446a04 [ 1000.053511] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1000.054991] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1000.055611] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 1000.056186] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 1000.056765] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 1000.057343] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1000.057918] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1000.114941] FAULT_INJECTION: forcing a failure. [ 1000.114941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1000.115910] CPU: 0 PID: 8744 Comm: syz-executor.4 Not tainted 5.10.216 #1 [ 1000.116412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1000.117082] Call Trace: [ 1000.117307] dump_stack+0x107/0x167 [ 1000.117604] should_fail.cold+0x5/0xa [ 1000.117930] _copy_to_user+0x2e/0x180 [ 1000.118222] simple_read_from_buffer+0xcc/0x160 [ 1000.118603] proc_fail_nth_read+0x198/0x230 [ 1000.118927] ? proc_sessionid_read+0x230/0x230 [ 1000.119302] ? security_file_permission+0x24e/0x570 [ 1000.119674] ? perf_trace_initcall_start+0xf1/0x380 [ 1000.120053] ? proc_sessionid_read+0x230/0x230 [ 1000.120392] vfs_read+0x228/0x580 [ 1000.120654] ksys_read+0x12d/0x260 [ 1000.120918] ? vfs_write+0xa70/0xa70 [ 1000.121237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1000.121629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1000.122048] do_syscall_64+0x33/0x40 [ 1000.122328] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1000.122704] RIP: 0033:0x7f6383e6c69c [ 1000.122978] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1000.124315] RSP: 002b:00007f638142f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1000.124871] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6383e6c69c [ 1000.125399] RDX: 000000000000000f RSI: 00007f638142f1e0 RDI: 0000000000000003 [ 1000.125919] RBP: 00007f638142f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.126442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1000.126961] R13: 00007ffd74eb3a3f R14: 00007f638142f300 R15: 0000000000022000 [ 1000.139900] FAULT_INJECTION: forcing a failure. [ 1000.139900] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.141767] CPU: 1 PID: 8749 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1000.142735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1000.143894] Call Trace: [ 1000.144281] dump_stack+0x107/0x167 [ 1000.144811] should_fail.cold+0x5/0xa [ 1000.145365] ? ebitmap_cpy+0xc7/0x330 [ 1000.145914] should_failslab+0x5/0x20 [ 1000.146460] kmem_cache_alloc+0x5b/0x310 [ 1000.147045] ebitmap_cpy+0xc7/0x330 [ 1000.147572] mls_compute_sid+0x64b/0x1060 [ 1000.148173] ? mls_convert_context+0x6c0/0x6c0 [ 1000.148840] security_compute_sid.part.0+0x8e8/0x16e0 [ 1000.149603] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1000.150466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1000.151207] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1000.151844] ? trace_hardirqs_on+0x5b/0x180 [ 1000.152462] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1000.153126] ? wait_for_completion+0x1d5/0x270 [ 1000.153788] ? bit_wait_io_timeout+0x160/0x160 [ 1000.154441] ? io_schedule_timeout+0x140/0x140 [ 1000.155097] ? lockdep_init_map_type+0x2c7/0x780 [ 1000.155798] ? stop_cpus.constprop.0+0x160/0x160 [ 1000.156472] ? lock_acquire+0x197/0x470 [ 1000.157036] ? find_held_lock+0x2c/0x110 [ 1000.157625] ? set_cpus_allowed_ptr+0x10/0x10 [ 1000.158274] security_transition_sid+0xc0/0x190 [ 1000.158940] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1000.159675] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1000.160399] ? selinux_inode_getsecctx+0x90/0x90 [ 1000.161073] ? sched_exec+0x16e/0x1e0 [ 1000.161624] ? nr_iowait+0x130/0x130 [ 1000.162164] ? rwlock_bug.part.0+0x90/0x90 [ 1000.162772] security_bprm_creds_for_exec+0x46/0xa0 [ 1000.163482] bprm_execve+0x6c1/0x1a60 [ 1000.164034] ? open_exec+0x70/0x70 [ 1000.164539] ? memcpy+0x39/0x60 [ 1000.165010] ? copy_string_kernel+0x3b6/0x450 [ 1000.165690] do_execveat_common+0x772/0x8d0 [ 1000.166311] ? bprm_execve+0x1a60/0x1a60 [ 1000.166908] __x64_sys_execveat+0xed/0x140 [ 1000.167520] do_syscall_64+0x33/0x40 [ 1000.168051] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1000.168774] RIP: 0033:0x7f1c8836fb19 [ 1000.169321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1000.171909] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1000.172990] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1000.174004] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1000.175009] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.176013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1000.177016] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:11:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 56) 22:11:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 22:11:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:11:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 25) 22:11:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) setresuid(0x0, 0x0, 0x0) 22:11:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 22:11:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:11:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) [ 1012.138022] FAULT_INJECTION: forcing a failure. [ 1012.138022] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.139760] CPU: 1 PID: 8759 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1012.140737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.141930] Call Trace: [ 1012.142317] dump_stack+0x107/0x167 [ 1012.142845] should_fail.cold+0x5/0xa [ 1012.143392] ? ebitmap_cpy+0xc7/0x330 [ 1012.143941] should_failslab+0x5/0x20 [ 1012.144484] kmem_cache_alloc+0x5b/0x310 [ 1012.145071] ebitmap_cpy+0xc7/0x330 [ 1012.145606] mls_compute_sid+0x64b/0x1060 [ 1012.146220] ? mark_lock+0xf5/0x2df0 [ 1012.146756] ? mls_convert_context+0x6c0/0x6c0 [ 1012.147428] security_compute_sid.part.0+0x8e8/0x16e0 [ 1012.148179] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1012.149045] ? mark_lock+0xf5/0x2df0 [ 1012.149338] FAULT_INJECTION: forcing a failure. [ 1012.149338] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.149592] ? lock_chain_count+0x20/0x20 [ 1012.152198] ? lock_acquire+0x197/0x470 [ 1012.152758] ? find_held_lock+0x2c/0x110 [ 1012.153351] security_transition_sid+0xc0/0x190 [ 1012.154017] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1012.154738] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1012.155453] ? selinux_inode_getsecctx+0x90/0x90 [ 1012.156115] ? sched_exec+0x1ae/0x1e0 [ 1012.156650] ? do_raw_spin_lock+0x121/0x260 [ 1012.157267] ? nr_iowait+0x130/0x130 [ 1012.157823] ? rwlock_bug.part.0+0x90/0x90 [ 1012.158427] security_bprm_creds_for_exec+0x46/0xa0 [ 1012.159126] bprm_execve+0x6c1/0x1a60 [ 1012.159682] ? open_exec+0x70/0x70 [ 1012.160181] ? memcpy+0x39/0x60 [ 1012.160654] ? copy_string_kernel+0x3b6/0x450 [ 1012.161300] do_execveat_common+0x772/0x8d0 [ 1012.161928] ? bprm_execve+0x1a60/0x1a60 [ 1012.162515] __x64_sys_execveat+0xed/0x140 [ 1012.163109] do_syscall_64+0x33/0x40 [ 1012.163631] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.164338] RIP: 0033:0x7f2243400b19 [ 1012.164859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.167378] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.168432] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1012.169424] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.170406] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.171390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.172373] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1012.173393] CPU: 0 PID: 8770 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1012.174802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.176418] Call Trace: [ 1012.176844] dump_stack+0x107/0x167 [ 1012.177433] should_fail.cold+0x5/0xa [ 1012.178036] ? create_object.isra.0+0x3a/0xa20 [ 1012.178749] should_failslab+0x5/0x20 [ 1012.179345] kmem_cache_alloc+0x5b/0x310 [ 1012.179987] create_object.isra.0+0x3a/0xa20 [ 1012.180674] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1012.181468] kmem_cache_alloc+0x159/0x310 [ 1012.182122] __alloc_file+0x21/0x320 [ 1012.182699] alloc_empty_file+0x6d/0x170 [ 1012.183325] path_openat+0xe3/0x26e0 [ 1012.183911] ? path_lookupat+0x860/0x860 [ 1012.184541] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1012.185348] ? SOFTIRQ_verbose+0x10/0x10 [ 1012.185970] ? find_held_lock+0x2c/0x110 [ 1012.186607] do_filp_open+0x190/0x3e0 [ 1012.187192] ? may_open_dev+0xf0/0xf0 [ 1012.187784] ? __alloc_fd+0x2b8/0x630 [ 1012.188372] ? lock_downgrade+0x6d0/0x6d0 [ 1012.189011] ? do_raw_spin_lock+0x121/0x260 [ 1012.189682] ? rwlock_bug.part.0+0x90/0x90 [ 1012.190340] ? _raw_spin_unlock+0x1a/0x30 [ 1012.190975] ? __alloc_fd+0x2b8/0x630 [ 1012.191574] do_sys_openat2+0x171/0x420 [ 1012.192202] ? build_open_flags+0x6f0/0x6f0 [ 1012.192875] ? rcu_read_lock_any_held+0x75/0xa0 [ 1012.193598] __x64_sys_openat+0x13f/0x1f0 [ 1012.194234] ? __ia32_sys_open+0x1c0/0x1c0 [ 1012.194892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.195693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1012.196482] do_syscall_64+0x33/0x40 [ 1012.197053] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.197841] RIP: 0033:0x7fc547446a04 [ 1012.198413] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1012.201181] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1012.202345] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 1012.203435] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 1012.204537] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 1012.205634] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1012.206715] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1012.217794] FAULT_INJECTION: forcing a failure. [ 1012.217794] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.219822] CPU: 0 PID: 8775 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1012.221059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.222324] Call Trace: [ 1012.222736] dump_stack+0x107/0x167 [ 1012.223302] should_fail.cold+0x5/0xa [ 1012.223917] ? create_object.isra.0+0x3a/0xa20 [ 1012.224663] should_failslab+0x5/0x20 [ 1012.225289] kmem_cache_alloc+0x5b/0x310 [ 1012.225959] create_object.isra.0+0x3a/0xa20 [ 1012.226675] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1012.227504] kmem_cache_alloc+0x159/0x310 [ 1012.228188] jbd2__journal_start+0x190/0x7e0 [ 1012.228923] __ext4_journal_start_sb+0x214/0x390 [ 1012.229720] ext4_dirty_inode+0xbc/0x130 [ 1012.230387] ? ext4_setattr+0x2160/0x2160 [ 1012.231065] __mark_inode_dirty+0x492/0xd40 [ 1012.231768] touch_atime+0x5ea/0x6e0 [ 1012.232385] ? atime_needs_update+0x600/0x600 [ 1012.233110] ? add_to_page_cache_locked+0x40/0x40 [ 1012.233920] generic_file_buffered_read+0x191a/0x2920 [ 1012.234789] ? pagecache_get_page+0xc80/0xc80 [ 1012.235525] ? __lock_acquire+0xbb1/0x5b00 [ 1012.236229] generic_file_read_iter+0x33f/0x490 [ 1012.236999] ext4_file_read_iter+0x184/0x4c0 [ 1012.237731] __kernel_read+0x593/0xaa0 [ 1012.238374] ? do_sendfile+0x1090/0x1090 [ 1012.239039] ? _cond_resched+0x12/0x80 [ 1012.239686] ? avc_policy_seqno+0x9/0x70 [ 1012.240350] ? selinux_file_permission+0x92/0x520 [ 1012.241142] ? lock_downgrade+0x6d0/0x6d0 [ 1012.241849] kernel_read+0x52/0x70 [ 1012.242443] bprm_execve+0x882/0x1a60 [ 1012.243076] ? open_exec+0x70/0x70 [ 1012.243662] ? memcpy+0x39/0x60 22:11:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) [ 1012.244213] ? copy_string_kernel+0x3b6/0x450 [ 1012.245099] do_execveat_common+0x772/0x8d0 [ 1012.245827] ? bprm_execve+0x1a60/0x1a60 [ 1012.246520] __x64_sys_execveat+0xed/0x140 [ 1012.247223] do_syscall_64+0x33/0x40 [ 1012.247835] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.248679] RIP: 0033:0x7f2f4d86bb19 [ 1012.249306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.252298] RSP: 002b:00007f2f4adc0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.253536] RAX: ffffffffffffffda RBX: 00007f2f4d97f020 RCX: 00007f2f4d86bb19 [ 1012.254718] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.255905] RBP: 00007f2f4adc01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.257080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.258215] R13: 00007ffd479c47cf R14: 00007f2f4adc0300 R15: 0000000000022000 [ 1012.262182] FAULT_INJECTION: forcing a failure. [ 1012.262182] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.264082] CPU: 0 PID: 8767 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1012.265218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.266439] Call Trace: [ 1012.266834] dump_stack+0x107/0x167 [ 1012.267373] should_fail.cold+0x5/0xa [ 1012.267937] ? ebitmap_cpy+0xc7/0x330 [ 1012.268493] should_failslab+0x5/0x20 [ 1012.269054] kmem_cache_alloc+0x5b/0x310 [ 1012.269661] ebitmap_cpy+0xc7/0x330 [ 1012.270205] mls_compute_sid+0x64b/0x1060 [ 1012.270814] ? mls_convert_context+0x6c0/0x6c0 [ 1012.271500] security_compute_sid.part.0+0x8e8/0x16e0 [ 1012.272274] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1012.273166] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.273920] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1012.274577] ? trace_hardirqs_on+0x5b/0x180 [ 1012.275212] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1012.275870] ? wait_for_completion+0x1d5/0x270 [ 1012.276542] ? bit_wait_io_timeout+0x160/0x160 [ 1012.277215] ? io_schedule_timeout+0x140/0x140 [ 1012.277888] ? lockdep_init_map_type+0x2c7/0x780 [ 1012.278609] ? stop_cpus.constprop.0+0x160/0x160 [ 1012.279296] ? lock_acquire+0x197/0x470 [ 1012.279886] ? find_held_lock+0x2c/0x110 [ 1012.280481] ? set_cpus_allowed_ptr+0x10/0x10 [ 1012.281150] security_transition_sid+0xc0/0x190 [ 1012.281848] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1012.282594] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1012.283330] ? selinux_inode_getsecctx+0x90/0x90 [ 1012.284032] ? sched_exec+0x16e/0x1e0 [ 1012.284589] ? nr_iowait+0x130/0x130 [ 1012.285153] ? rwlock_bug.part.0+0x90/0x90 [ 1012.285794] security_bprm_creds_for_exec+0x46/0xa0 [ 1012.286537] bprm_execve+0x6c1/0x1a60 [ 1012.287110] ? open_exec+0x70/0x70 [ 1012.287640] ? memcpy+0x39/0x60 [ 1012.288131] ? copy_string_kernel+0x3b6/0x450 [ 1012.288807] do_execveat_common+0x772/0x8d0 [ 1012.289451] ? bprm_execve+0x1a60/0x1a60 [ 1012.290075] __x64_sys_execveat+0xed/0x140 [ 1012.290704] do_syscall_64+0x33/0x40 [ 1012.291260] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.292010] RIP: 0033:0x7f1c8836fb19 [ 1012.292567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.295234] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.296373] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1012.297427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.298486] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.299533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.300597] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1012.304217] FAULT_INJECTION: forcing a failure. [ 1012.304217] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1012.307690] CPU: 1 PID: 8764 Comm: syz-executor.2 Not tainted 5.10.216 #1 [ 1012.308854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.310050] Call Trace: [ 1012.310444] dump_stack+0x107/0x167 [ 1012.310978] should_fail.cold+0x5/0xa [ 1012.311542] _copy_from_user+0x2e/0x1b0 [ 1012.312126] kstrtouint_from_user+0xbd/0x220 [ 1012.312767] ? kstrtou8_from_user+0x210/0x210 [ 1012.313441] ? lock_acquire+0x197/0x470 [ 1012.314029] ? ksys_write+0x12d/0x260 [ 1012.314597] proc_fail_nth_write+0x78/0x220 [ 1012.315225] ? proc_task_getattr+0x1f0/0x1f0 [ 1012.315864] ? __fget_files+0x296/0x4c0 [ 1012.316455] ? proc_task_getattr+0x1f0/0x1f0 [ 1012.317091] vfs_write+0x29a/0xa70 [ 1012.317635] ksys_write+0x12d/0x260 [ 1012.318166] ? __ia32_sys_read+0xb0/0xb0 [ 1012.318761] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.319522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1012.320268] do_syscall_64+0x33/0x40 [ 1012.320812] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.321555] RIP: 0033:0x7f70da6355ff [ 1012.322095] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1012.323470] FAULT_INJECTION: forcing a failure. [ 1012.323470] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.324718] RSP: 002b:00007f70d7bf8170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1012.324758] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70da6355ff [ 1012.324779] RDX: 0000000000000001 RSI: 00007f70d7bf81e0 RDI: 0000000000000003 [ 1012.329566] RBP: 00007f70d7bf81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.330638] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1012.331712] R13: 00007fff41a733cf R14: 00007f70d7bf8300 R15: 0000000000022000 [ 1012.333014] CPU: 0 PID: 8779 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1012.334045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.335250] Call Trace: [ 1012.335652] dump_stack+0x107/0x167 [ 1012.336202] should_fail.cold+0x5/0xa [ 1012.336771] ? create_object.isra.0+0x3a/0xa20 [ 1012.337456] should_failslab+0x5/0x20 [ 1012.338021] kmem_cache_alloc+0x5b/0x310 [ 1012.338628] create_object.isra.0+0x3a/0xa20 [ 1012.339281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1012.340034] kmem_cache_alloc+0x159/0x310 [ 1012.340657] ebitmap_cpy+0xc7/0x330 [ 1012.341205] mls_compute_sid+0x64b/0x1060 [ 1012.341826] ? mark_lock+0xf5/0x2df0 [ 1012.342379] ? mls_convert_context+0x6c0/0x6c0 [ 1012.343066] security_compute_sid.part.0+0x8e8/0x16e0 [ 1012.343850] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1012.344744] ? mark_lock+0xf5/0x2df0 [ 1012.345304] ? lock_chain_count+0x20/0x20 [ 1012.345926] ? lock_acquire+0x197/0x470 [ 1012.346506] ? find_held_lock+0x2c/0x110 [ 1012.347113] security_transition_sid+0xc0/0x190 [ 1012.347800] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1012.348544] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1012.349295] ? selinux_inode_getsecctx+0x90/0x90 [ 1012.349992] ? sched_exec+0x1ae/0x1e0 [ 1012.350555] ? do_raw_spin_lock+0x121/0x260 [ 1012.351183] ? nr_iowait+0x130/0x130 [ 1012.351725] ? rwlock_bug.part.0+0x90/0x90 [ 1012.352396] security_bprm_creds_for_exec+0x46/0xa0 [ 1012.353187] bprm_execve+0x6c1/0x1a60 [ 1012.353759] ? open_exec+0x70/0x70 [ 1012.354279] ? memcpy+0x39/0x60 [ 1012.354766] ? copy_string_kernel+0x3b6/0x450 [ 1012.355429] do_execveat_common+0x772/0x8d0 [ 1012.356057] ? bprm_execve+0x1a60/0x1a60 [ 1012.356667] __x64_sys_execveat+0xed/0x140 [ 1012.357295] do_syscall_64+0x33/0x40 [ 1012.357836] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.358575] RIP: 0033:0x7f2243400b19 [ 1012.359117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.361737] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.362829] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1012.363849] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.364867] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.365898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.366918] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:11:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:11:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) setresuid(0x0, 0x0, 0x0) 22:11:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 22:11:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 22:11:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) setresuid(0x0, 0x0, 0x0) 22:11:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) 22:11:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 22:11:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) [ 1012.598454] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:11:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 22:11:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 26) 22:11:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) [ 1012.709043] FAULT_INJECTION: forcing a failure. [ 1012.709043] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.710743] CPU: 1 PID: 8804 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1012.711738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.712924] Call Trace: [ 1012.713332] dump_stack+0x107/0x167 [ 1012.713870] should_fail.cold+0x5/0xa [ 1012.714433] ? create_object.isra.0+0x3a/0xa20 [ 1012.715110] should_failslab+0x5/0x20 [ 1012.715673] kmem_cache_alloc+0x5b/0x310 [ 1012.716272] ? mark_held_locks+0x9e/0xe0 [ 1012.716872] create_object.isra.0+0x3a/0xa20 [ 1012.717520] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1012.718264] kmem_cache_alloc+0x159/0x310 [ 1012.718881] ebitmap_cpy+0xc7/0x330 [ 1012.719425] mls_compute_sid+0x64b/0x1060 [ 1012.720034] ? mls_convert_context+0x6c0/0x6c0 [ 1012.720711] security_compute_sid.part.0+0x8e8/0x16e0 [ 1012.721497] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1012.722379] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.723143] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1012.723795] ? trace_hardirqs_on+0x5b/0x180 [ 1012.724428] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1012.725081] ? wait_for_completion+0x1d5/0x270 [ 1012.725112] FAULT_INJECTION: forcing a failure. [ 1012.725112] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.725762] ? bit_wait_io_timeout+0x160/0x160 [ 1012.728158] ? io_schedule_timeout+0x140/0x140 [ 1012.728830] ? lockdep_init_map_type+0x2c7/0x780 [ 1012.729549] ? stop_cpus.constprop.0+0x160/0x160 [ 1012.730240] ? lock_acquire+0x197/0x470 [ 1012.730822] ? find_held_lock+0x2c/0x110 [ 1012.731419] ? set_cpus_allowed_ptr+0x10/0x10 [ 1012.732081] security_transition_sid+0xc0/0x190 [ 1012.732772] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1012.733516] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1012.734248] ? selinux_inode_getsecctx+0x90/0x90 [ 1012.734939] ? sched_exec+0x16e/0x1e0 [ 1012.735497] ? nr_iowait+0x130/0x130 [ 1012.736028] ? rwlock_bug.part.0+0x90/0x90 [ 1012.736640] security_bprm_creds_for_exec+0x46/0xa0 [ 1012.737361] bprm_execve+0x6c1/0x1a60 [ 1012.737920] ? open_exec+0x70/0x70 [ 1012.738429] ? memcpy+0x39/0x60 [ 1012.738907] ? copy_string_kernel+0x3b6/0x450 [ 1012.739562] do_execveat_common+0x772/0x8d0 [ 1012.740183] ? bprm_execve+0x1a60/0x1a60 [ 1012.740781] __x64_sys_execveat+0xed/0x140 [ 1012.741401] do_syscall_64+0x33/0x40 [ 1012.741933] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.742662] RIP: 0033:0x7f1c8836fb19 [ 1012.743196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.745781] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.746918] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1012.747920] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.749004] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.750101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.751137] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1012.752182] CPU: 0 PID: 8808 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1012.753263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.754541] Call Trace: [ 1012.754968] dump_stack+0x107/0x167 [ 1012.755539] should_fail.cold+0x5/0xa [ 1012.756145] ? security_file_alloc+0x34/0x170 [ 1012.756842] should_failslab+0x5/0x20 [ 1012.757446] kmem_cache_alloc+0x5b/0x310 [ 1012.758096] security_file_alloc+0x34/0x170 [ 1012.758783] __alloc_file+0xb7/0x320 [ 1012.759366] alloc_empty_file+0x6d/0x170 [ 1012.759999] path_openat+0xe3/0x26e0 [ 1012.760589] ? path_lookupat+0x860/0x860 [ 1012.761232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1012.762043] ? SOFTIRQ_verbose+0x10/0x10 [ 1012.762668] ? find_held_lock+0x2c/0x110 [ 1012.763308] do_filp_open+0x190/0x3e0 [ 1012.763913] ? may_open_dev+0xf0/0xf0 [ 1012.764515] ? __alloc_fd+0x2b8/0x630 [ 1012.765104] ? lock_downgrade+0x6d0/0x6d0 [ 1012.765778] ? do_raw_spin_lock+0x121/0x260 [ 1012.766453] ? rwlock_bug.part.0+0x90/0x90 [ 1012.767135] ? _raw_spin_unlock+0x1a/0x30 [ 1012.767781] ? __alloc_fd+0x2b8/0x630 [ 1012.768383] do_sys_openat2+0x171/0x420 [ 1012.769003] ? build_open_flags+0x6f0/0x6f0 [ 1012.769712] ? rcu_read_lock_any_held+0x75/0xa0 [ 1012.770438] __x64_sys_openat+0x13f/0x1f0 [ 1012.771100] ? __ia32_sys_open+0x1c0/0x1c0 [ 1012.771767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1012.772605] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1012.773414] do_syscall_64+0x33/0x40 [ 1012.774010] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.774803] RIP: 0033:0x7fc547446a04 [ 1012.775402] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1012.778206] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1012.779412] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 1012.780507] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 1012.781611] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 1012.782694] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1012.783778] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1012.798663] FAULT_INJECTION: forcing a failure. [ 1012.798663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.800574] CPU: 0 PID: 8812 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1012.801669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.802979] Call Trace: [ 1012.803408] dump_stack+0x107/0x167 [ 1012.803995] should_fail.cold+0x5/0xa [ 1012.804607] __alloc_pages_nodemask+0x182/0x600 [ 1012.805353] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1012.806313] ? SOFTIRQ_verbose+0x10/0x10 [ 1012.806960] alloc_pages_current+0x187/0x280 [ 1012.807669] __page_cache_alloc+0x2d2/0x360 [ 1012.808353] generic_file_buffered_read+0xcd7/0x2920 [ 1012.809159] ? lock_chain_count+0x20/0x20 [ 1012.809839] ? pagecache_get_page+0xc80/0xc80 [ 1012.810562] ? __lock_acquire+0xbb1/0x5b00 [ 1012.811232] generic_file_read_iter+0x33f/0x490 [ 1012.811985] ext4_file_read_iter+0x184/0x4c0 [ 1012.812680] __kernel_read+0x593/0xaa0 [ 1012.813315] ? do_sendfile+0x1090/0x1090 [ 1012.813957] ? _cond_resched+0x12/0x80 [ 1012.814590] ? avc_policy_seqno+0x9/0x70 [ 1012.815230] ? selinux_file_permission+0x92/0x520 [ 1012.816006] ? lock_downgrade+0x6d0/0x6d0 [ 1012.816669] kernel_read+0x52/0x70 [ 1012.817256] bprm_execve+0x882/0x1a60 [ 1012.817865] ? open_exec+0x70/0x70 [ 1012.818439] ? memcpy+0x39/0x60 [ 1012.818963] ? copy_string_kernel+0x3b6/0x450 [ 1012.819695] do_execveat_common+0x772/0x8d0 [ 1012.820376] ? bprm_execve+0x1a60/0x1a60 [ 1012.821048] __x64_sys_execveat+0xed/0x140 [ 1012.821723] do_syscall_64+0x33/0x40 [ 1012.822319] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.823120] RIP: 0033:0x7f2f4d86bb19 [ 1012.823719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.826551] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.827762] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1012.828873] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.829995] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.831096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.832194] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:11:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) [ 1012.885685] FAULT_INJECTION: forcing a failure. [ 1012.885685] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.887525] CPU: 0 PID: 8816 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1012.888608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1012.889929] Call Trace: [ 1012.890360] dump_stack+0x107/0x167 [ 1012.890947] should_fail.cold+0x5/0xa [ 1012.891558] ? ebitmap_cpy+0xc7/0x330 [ 1012.892172] should_failslab+0x5/0x20 [ 1012.892783] kmem_cache_alloc+0x5b/0x310 [ 1012.893444] ebitmap_cpy+0xc7/0x330 [ 1012.894035] mls_compute_sid+0x64b/0x1060 [ 1012.894707] ? mark_lock+0xf5/0x2df0 [ 1012.895291] ? mls_convert_context+0x6c0/0x6c0 [ 1012.896038] security_compute_sid.part.0+0x8e8/0x16e0 [ 1012.896888] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1012.897877] ? mark_lock+0xf5/0x2df0 [ 1012.898481] ? lock_chain_count+0x20/0x20 [ 1012.899156] ? lock_acquire+0x197/0x470 [ 1012.899792] ? find_held_lock+0x2c/0x110 [ 1012.900449] security_transition_sid+0xc0/0x190 [ 1012.901206] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1012.902003] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1012.902814] ? selinux_inode_getsecctx+0x90/0x90 [ 1012.903566] ? sched_exec+0x1ae/0x1e0 [ 1012.904178] ? do_raw_spin_lock+0x121/0x260 [ 1012.904868] ? nr_iowait+0x130/0x130 [ 1012.905465] ? rwlock_bug.part.0+0x90/0x90 [ 1012.906159] security_bprm_creds_for_exec+0x46/0xa0 [ 1012.906956] bprm_execve+0x6c1/0x1a60 [ 1012.907579] ? open_exec+0x70/0x70 [ 1012.908154] ? memcpy+0x39/0x60 [ 1012.908687] ? copy_string_kernel+0x3b6/0x450 [ 1012.909418] do_execveat_common+0x772/0x8d0 [ 1012.910111] ? bprm_execve+0x1a60/0x1a60 [ 1012.910780] __x64_sys_execveat+0xed/0x140 [ 1012.911459] do_syscall_64+0x33/0x40 [ 1012.912055] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1012.912867] RIP: 0033:0x7f2243400b19 [ 1012.913469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1012.916354] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1012.917570] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1012.918706] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1012.919837] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1012.920967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1012.922106] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 22:12:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 22:12:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 27) 22:12:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) setresuid(0x0, 0x0, 0x0) 22:12:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 22:12:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 22:12:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 22:12:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) [ 1027.123734] FAULT_INJECTION: forcing a failure. [ 1027.123734] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.124684] CPU: 1 PID: 8834 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1027.125233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1027.125935] Call Trace: [ 1027.126164] dump_stack+0x107/0x167 [ 1027.126473] should_fail.cold+0x5/0xa [ 1027.126796] ? ebitmap_cpy+0xc7/0x330 [ 1027.127120] should_failslab+0x5/0x20 [ 1027.127445] kmem_cache_alloc+0x5b/0x310 [ 1027.127785] ebitmap_cpy+0xc7/0x330 [ 1027.128097] mls_compute_sid+0x64b/0x1060 [ 1027.128457] ? mark_lock+0xf5/0x2df0 [ 1027.128769] ? mls_convert_context+0x6c0/0x6c0 [ 1027.129166] security_compute_sid.part.0+0x8e8/0x16e0 [ 1027.129619] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1027.130143] ? mark_lock+0xf5/0x2df0 [ 1027.130464] ? lock_chain_count+0x20/0x20 [ 1027.130820] ? lock_acquire+0x197/0x470 [ 1027.131152] ? find_held_lock+0x2c/0x110 [ 1027.131501] security_transition_sid+0xc0/0x190 [ 1027.131901] selinux_bprm_creds_for_exec+0x4de/0xb60 [ 1027.132330] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 1027.132761] ? selinux_inode_getsecctx+0x90/0x90 [ 1027.133166] ? sched_exec+0x1ae/0x1e0 [ 1027.133496] ? do_raw_spin_lock+0x121/0x260 [ 1027.133862] ? nr_iowait+0x130/0x130 [ 1027.134172] ? rwlock_bug.part.0+0x90/0x90 [ 1027.134531] security_bprm_creds_for_exec+0x46/0xa0 [ 1027.134950] bprm_execve+0x6c1/0x1a60 [ 1027.135275] ? open_exec+0x70/0x70 [ 1027.135575] ? memcpy+0x39/0x60 [ 1027.135855] ? copy_string_kernel+0x3b6/0x450 [ 1027.136238] do_execveat_common+0x772/0x8d0 [ 1027.136604] ? bprm_execve+0x1a60/0x1a60 [ 1027.136959] __x64_sys_execveat+0xed/0x140 [ 1027.137316] do_syscall_64+0x33/0x40 [ 1027.137635] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1027.138063] RIP: 0033:0x7f2243400b19 [ 1027.138379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1027.139927] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1027.140565] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1027.141160] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1027.141760] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1027.142364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1027.142960] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1027.144286] FAULT_INJECTION: forcing a failure. [ 1027.144286] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.145246] CPU: 1 PID: 8836 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1027.145819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1027.146499] Call Trace: [ 1027.146716] dump_stack+0x107/0x167 [ 1027.147021] should_fail.cold+0x5/0xa [ 1027.147336] ? create_object.isra.0+0x3a/0xa20 [ 1027.147710] should_failslab+0x5/0x20 [ 1027.148022] kmem_cache_alloc+0x5b/0x310 [ 1027.148356] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1027.148804] create_object.isra.0+0x3a/0xa20 [ 1027.149160] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1027.149583] kmem_cache_alloc+0x159/0x310 [ 1027.149925] security_file_alloc+0x34/0x170 [ 1027.150276] __alloc_file+0xb7/0x320 [ 1027.150580] alloc_empty_file+0x6d/0x170 [ 1027.150913] path_openat+0xe3/0x26e0 [ 1027.151223] ? path_lookupat+0x860/0x860 [ 1027.151560] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1027.151982] ? SOFTIRQ_verbose+0x10/0x10 [ 1027.152312] ? find_held_lock+0x2c/0x110 [ 1027.152652] do_filp_open+0x190/0x3e0 [ 1027.152962] ? may_open_dev+0xf0/0xf0 [ 1027.153285] ? __alloc_fd+0x2b8/0x630 [ 1027.153602] ? lock_downgrade+0x6d0/0x6d0 [ 1027.153945] ? do_raw_spin_lock+0x121/0x260 [ 1027.154298] ? rwlock_bug.part.0+0x90/0x90 [ 1027.154649] ? _raw_spin_unlock+0x1a/0x30 [ 1027.154987] ? __alloc_fd+0x2b8/0x630 [ 1027.155306] do_sys_openat2+0x171/0x420 [ 1027.155633] ? build_open_flags+0x6f0/0x6f0 [ 1027.155994] ? rcu_read_lock_any_held+0x75/0xa0 [ 1027.156377] __x64_sys_openat+0x13f/0x1f0 [ 1027.156725] ? __ia32_sys_open+0x1c0/0x1c0 [ 1027.157077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1027.157515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1027.157935] do_syscall_64+0x33/0x40 [ 1027.158242] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1027.158656] RIP: 0033:0x7fc547446a04 [ 1027.158963] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1027.160437] RSP: 002b:00007fc544a08ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1027.161051] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc547446a04 [ 1027.161642] RDX: 0000000000000002 RSI: 00007fc544a09000 RDI: 00000000ffffff9c [ 1027.162217] RBP: 00007fc544a09000 R08: 0000000000000000 R09: ffffffffffffffff [ 1027.162791] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1027.163368] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1027.172277] FAULT_INJECTION: forcing a failure. [ 1027.172277] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.174043] CPU: 0 PID: 8839 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1027.175017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1027.176227] Call Trace: [ 1027.176619] dump_stack+0x107/0x167 [ 1027.177175] should_fail.cold+0x5/0xa [ 1027.177805] ? jbd2__journal_start+0x190/0x7e0 [ 1027.178480] should_failslab+0x5/0x20 [ 1027.179054] kmem_cache_alloc+0x5b/0x310 [ 1027.179665] jbd2__journal_start+0x190/0x7e0 [ 1027.180329] __ext4_journal_start_sb+0x214/0x390 [ 1027.181048] ext4_dirty_inode+0xbc/0x130 [ 1027.181731] ? ext4_setattr+0x2160/0x2160 [ 1027.182383] __mark_inode_dirty+0x492/0xd40 [ 1027.183035] touch_atime+0x5ea/0x6e0 [ 1027.183590] ? atime_needs_update+0x600/0x600 [ 1027.184261] ? add_to_page_cache_locked+0x40/0x40 [ 1027.184989] generic_file_buffered_read+0x191a/0x2920 [ 1027.185810] ? pagecache_get_page+0xc80/0xc80 [ 1027.186535] ? __lock_acquire+0xbb1/0x5b00 [ 1027.187178] generic_file_read_iter+0x33f/0x490 [ 1027.187873] ext4_file_read_iter+0x184/0x4c0 [ 1027.188520] __kernel_read+0x593/0xaa0 [ 1027.189101] ? do_sendfile+0x1090/0x1090 [ 1027.189718] ? _cond_resched+0x12/0x80 [ 1027.190339] ? avc_policy_seqno+0x9/0x70 [ 1027.190933] ? selinux_file_permission+0x92/0x520 [ 1027.191641] ? lock_downgrade+0x6d0/0x6d0 [ 1027.192254] kernel_read+0x52/0x70 [ 1027.192784] bprm_execve+0x882/0x1a60 [ 1027.193350] ? open_exec+0x70/0x70 [ 1027.193904] ? memcpy+0x39/0x60 [ 1027.194427] ? copy_string_kernel+0x3b6/0x450 [ 1027.195090] do_execveat_common+0x772/0x8d0 [ 1027.195716] ? bprm_execve+0x1a60/0x1a60 [ 1027.196329] __x64_sys_execveat+0xed/0x140 [ 1027.196947] do_syscall_64+0x33/0x40 [ 1027.197518] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1027.198293] RIP: 0033:0x7f1c8836fb19 [ 1027.198847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1027.201522] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1027.202624] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1027.203703] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1027.204722] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1027.205778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1027.206804] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:12:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 1027.232429] FAULT_INJECTION: forcing a failure. [ 1027.232429] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.234088] CPU: 0 PID: 8831 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1027.235100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1027.236336] Call Trace: [ 1027.236726] dump_stack+0x107/0x167 [ 1027.237260] should_fail.cold+0x5/0xa [ 1027.237842] ? create_object.isra.0+0x3a/0xa20 [ 1027.238513] should_failslab+0x5/0x20 [ 1027.239070] kmem_cache_alloc+0x5b/0x310 [ 1027.239669] create_object.isra.0+0x3a/0xa20 [ 1027.240353] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1027.241101] kmem_cache_alloc_trace+0x151/0x320 [ 1027.241812] ? bprm_execve+0xbe6/0x1a60 [ 1027.242395] __request_module+0x2e0/0x920 [ 1027.243002] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1027.243767] ? free_modprobe_argv+0x90/0x90 [ 1027.244440] ? find_held_lock+0x2c/0x110 [ 1027.245041] ? find_held_lock+0x2c/0x110 [ 1027.245659] ? bprm_execve+0xa13/0x1a60 [ 1027.246238] ? lock_downgrade+0x6d0/0x6d0 [ 1027.246845] ? elf_core_dump+0x3c50/0x3c50 [ 1027.247467] ? do_raw_read_unlock+0x3b/0x70 [ 1027.248101] ? _raw_read_unlock+0x1a/0x30 [ 1027.248747] ? load_misc_binary+0x605/0xb70 [ 1027.249390] bprm_execve+0xbe6/0x1a60 [ 1027.249979] ? open_exec+0x70/0x70 [ 1027.250535] ? memcpy+0x39/0x60 [ 1027.251024] ? copy_string_kernel+0x3b6/0x450 [ 1027.251691] do_execveat_common+0x772/0x8d0 [ 1027.252320] ? bprm_execve+0x1a60/0x1a60 [ 1027.252932] __x64_sys_execveat+0xed/0x140 [ 1027.253578] do_syscall_64+0x33/0x40 [ 1027.254128] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1027.254913] RIP: 0033:0x7f2f4d86bb19 [ 1027.255458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1027.258107] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1027.259254] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1027.260304] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1027.261332] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1027.262388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1027.263458] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 1027.291659] FAULT_INJECTION: forcing a failure. [ 1027.291659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1027.293592] CPU: 0 PID: 8854 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1027.294645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1027.295892] Call Trace: [ 1027.296305] dump_stack+0x107/0x167 [ 1027.296866] should_fail.cold+0x5/0xa [ 1027.297495] __alloc_pages_nodemask+0x182/0x600 [ 1027.298217] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1027.299138] ? SOFTIRQ_verbose+0x10/0x10 [ 1027.299828] alloc_pages_current+0x187/0x280 [ 1027.300504] __page_cache_alloc+0x2d2/0x360 [ 1027.301181] generic_file_buffered_read+0xcd7/0x2920 [ 1027.301983] ? lock_chain_count+0x20/0x20 [ 1027.302640] ? pagecache_get_page+0xc80/0xc80 [ 1027.303372] ? __lock_acquire+0xbb1/0x5b00 [ 1027.304016] generic_file_read_iter+0x33f/0x490 [ 1027.304734] ext4_file_read_iter+0x184/0x4c0 [ 1027.305421] __kernel_read+0x593/0xaa0 [ 1027.306011] ? do_sendfile+0x1090/0x1090 [ 1027.306639] ? _cond_resched+0x12/0x80 [ 1027.307269] ? avc_policy_seqno+0x9/0x70 [ 1027.307914] ? selinux_file_permission+0x92/0x520 [ 1027.308657] ? lock_downgrade+0x6d0/0x6d0 [ 1027.309300] kernel_read+0x52/0x70 [ 1027.309875] bprm_execve+0x882/0x1a60 [ 1027.310473] ? open_exec+0x70/0x70 [ 1027.311017] ? memcpy+0x39/0x60 [ 1027.311548] ? copy_string_kernel+0x3b6/0x450 [ 1027.312243] do_execveat_common+0x772/0x8d0 [ 1027.312881] ? bprm_execve+0x1a60/0x1a60 [ 1027.313544] __x64_sys_execveat+0xed/0x140 [ 1027.314171] do_syscall_64+0x33/0x40 [ 1027.314747] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1027.315567] RIP: 0033:0x7f2243400b19 [ 1027.316132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1027.318924] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1027.320052] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1027.321120] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1027.322248] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1027.322849] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1027.323309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1027.323321] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 22:12:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 22:12:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 22:12:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 22:12:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:12:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 28) 22:12:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 22:12:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) setresuid(0x0, 0x0, 0x0) 22:12:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) [ 1039.829334] FAULT_INJECTION: forcing a failure. [ 1039.829334] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.831401] CPU: 0 PID: 8869 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1039.832405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.833651] Call Trace: [ 1039.834058] dump_stack+0x107/0x167 [ 1039.834607] should_fail.cold+0x5/0xa [ 1039.835190] ? __kthread_create_on_node+0xd1/0x400 [ 1039.835951] should_failslab+0x5/0x20 [ 1039.836527] kmem_cache_alloc_trace+0x55/0x320 [ 1039.837224] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1039.837968] __kthread_create_on_node+0xd1/0x400 [ 1039.838689] ? __kthread_parkme+0x1d0/0x1d0 [ 1039.839352] ? __mutex_lock+0x4fe/0x10b0 [ 1039.839964] ? loop_configure+0xcb5/0x1480 [ 1039.840627] ? do_raw_spin_unlock+0x4f/0x220 [ 1039.841303] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1039.842035] kthread_create_on_node+0xbb/0x100 [ 1039.842730] ? __kthread_create_on_node+0x400/0x400 [ 1039.843506] ? lockdep_init_map_type+0x2c7/0x780 [ 1039.844241] ? lockdep_init_map_type+0x2c7/0x780 [ 1039.844976] loop_configure+0x3e3/0x1480 [ 1039.845275] FAULT_INJECTION: forcing a failure. [ 1039.845275] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.845610] lo_ioctl+0xa72/0x1760 [ 1039.847653] ? avc_has_extended_perms+0x7f1/0xf40 [ 1039.848550] ? loop_set_status_old+0x250/0x250 [ 1039.849203] ? avc_ss_reset+0x180/0x180 [ 1039.849936] ? lock_acquire+0x197/0x470 [ 1039.850550] ? find_held_lock+0x2c/0x110 [ 1039.851306] ? __lock_acquire+0xbb1/0x5b00 [ 1039.851954] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1039.852683] ? generic_block_fiemap+0x60/0x60 [ 1039.853531] ? loop_set_status_old+0x250/0x250 [ 1039.854197] blkdev_ioctl+0x291/0x710 [ 1039.854906] ? blkdev_common_ioctl+0x1930/0x1930 [ 1039.855578] ? selinux_file_ioctl+0xb6/0x270 [ 1039.856395] block_ioctl+0xf9/0x140 [ 1039.856955] ? blkdev_read_iter+0x1c0/0x1c0 [ 1039.857765] __x64_sys_ioctl+0x19a/0x210 [ 1039.858392] do_syscall_64+0x33/0x40 [ 1039.859072] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1039.859802] RIP: 0033:0x7fc5474938d7 [ 1039.860333] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.863682] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1039.864751] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1039.865771] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1039.866764] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1039.867750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1039.868762] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1039.869806] CPU: 1 PID: 8868 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1039.870758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.871893] Call Trace: [ 1039.872258] dump_stack+0x107/0x167 [ 1039.872761] should_fail.cold+0x5/0xa [ 1039.873292] ? jbd2__journal_start+0x190/0x7e0 [ 1039.873971] should_failslab+0x5/0x20 [ 1039.874492] kmem_cache_alloc+0x5b/0x310 [ 1039.875053] jbd2__journal_start+0x190/0x7e0 [ 1039.875663] __ext4_journal_start_sb+0x214/0x390 [ 1039.876313] ext4_dirty_inode+0xbc/0x130 [ 1039.876873] ? ext4_setattr+0x2160/0x2160 [ 1039.877449] __mark_inode_dirty+0x492/0xd40 [ 1039.878062] touch_atime+0x5ea/0x6e0 [ 1039.878571] ? atime_needs_update+0x600/0x600 [ 1039.879187] ? add_to_page_cache_locked+0x40/0x40 [ 1039.879857] generic_file_buffered_read+0x191a/0x2920 [ 1039.880579] ? pagecache_get_page+0xc80/0xc80 [ 1039.881203] ? __lock_acquire+0xbb1/0x5b00 [ 1039.881807] generic_file_read_iter+0x33f/0x490 [ 1039.882455] ext4_file_read_iter+0x184/0x4c0 [ 1039.883062] __kernel_read+0x593/0xaa0 [ 1039.883607] ? do_sendfile+0x1090/0x1090 [ 1039.884165] ? _cond_resched+0x12/0x80 [ 1039.884704] ? avc_policy_seqno+0x9/0x70 [ 1039.885257] ? selinux_file_permission+0x92/0x520 [ 1039.885941] ? lock_downgrade+0x6d0/0x6d0 [ 1039.886519] kernel_read+0x52/0x70 [ 1039.887010] bprm_execve+0x882/0x1a60 [ 1039.887547] ? open_exec+0x70/0x70 [ 1039.888044] ? memcpy+0x39/0x60 [ 1039.888506] ? copy_string_kernel+0x3b6/0x450 [ 1039.889122] do_execveat_common+0x772/0x8d0 [ 1039.889722] ? bprm_execve+0x1a60/0x1a60 [ 1039.890293] __x64_sys_execveat+0xed/0x140 [ 1039.890879] do_syscall_64+0x33/0x40 [ 1039.891389] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1039.892082] RIP: 0033:0x7f2243400b19 [ 1039.892592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.895076] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1039.896111] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1039.897085] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1039.898059] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1039.899027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1039.899996] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1039.920339] FAULT_INJECTION: forcing a failure. [ 1039.920339] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.922160] CPU: 1 PID: 8875 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1039.923104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.924233] Call Trace: [ 1039.924605] dump_stack+0x107/0x167 [ 1039.925126] should_fail.cold+0x5/0xa [ 1039.925674] ? __request_module+0x2e0/0x920 [ 1039.926280] ? bprm_execve+0xbe6/0x1a60 [ 1039.926829] should_failslab+0x5/0x20 [ 1039.927363] kmem_cache_alloc_trace+0x55/0x320 [ 1039.927994] ? bprm_execve+0xbe6/0x1a60 [ 1039.928544] __request_module+0x2e0/0x920 [ 1039.929124] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1039.929859] ? free_modprobe_argv+0x90/0x90 [ 1039.930451] ? find_held_lock+0x2c/0x110 [ 1039.931024] ? find_held_lock+0x2c/0x110 [ 1039.931590] ? bprm_execve+0xa13/0x1a60 [ 1039.932136] ? lock_downgrade+0x6d0/0x6d0 [ 1039.932704] ? elf_core_dump+0x3c50/0x3c50 [ 1039.933293] ? do_raw_read_unlock+0x3b/0x70 [ 1039.933900] ? _raw_read_unlock+0x1a/0x30 [ 1039.934467] ? load_misc_binary+0x605/0xb70 [ 1039.935079] bprm_execve+0xbe6/0x1a60 [ 1039.935616] ? open_exec+0x70/0x70 [ 1039.936109] ? memcpy+0x39/0x60 [ 1039.936573] ? copy_string_kernel+0x3b6/0x450 [ 1039.937203] do_execveat_common+0x772/0x8d0 [ 1039.937823] ? bprm_execve+0x1a60/0x1a60 [ 1039.938404] __x64_sys_execveat+0xed/0x140 [ 1039.938993] do_syscall_64+0x33/0x40 [ 1039.939508] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1039.940218] RIP: 0033:0x7f2f4d86bb19 [ 1039.940731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.943265] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1039.944317] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1039.945296] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1039.946276] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1039.947245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1039.948217] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 1039.959949] FAULT_INJECTION: forcing a failure. [ 1039.959949] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.961596] CPU: 0 PID: 8874 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1039.962557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.963713] Call Trace: [ 1039.964105] dump_stack+0x107/0x167 [ 1039.964627] should_fail.cold+0x5/0xa [ 1039.965174] ? create_object.isra.0+0x3a/0xa20 [ 1039.965837] should_failslab+0x5/0x20 [ 1039.966382] kmem_cache_alloc+0x5b/0x310 [ 1039.967139] create_object.isra.0+0x3a/0xa20 [ 1039.967772] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1039.968721] kmem_cache_alloc+0x159/0x310 [ 1039.969371] jbd2__journal_start+0x190/0x7e0 [ 1039.970205] __ext4_journal_start_sb+0x214/0x390 [ 1039.970892] ext4_dirty_inode+0xbc/0x130 [ 1039.971654] ? ext4_setattr+0x2160/0x2160 [ 1039.972235] __mark_inode_dirty+0x492/0xd40 [ 1039.973051] touch_atime+0x5ea/0x6e0 [ 1039.973601] ? atime_needs_update+0x600/0x600 [ 1039.974444] ? add_to_page_cache_locked+0x40/0x40 [ 1039.975150] generic_file_buffered_read+0x191a/0x2920 [ 1039.976128] ? pagecache_get_page+0xc80/0xc80 [ 1039.976772] ? __lock_acquire+0xbb1/0x5b00 [ 1039.977587] generic_file_read_iter+0x33f/0x490 [ 1039.978257] ext4_file_read_iter+0x184/0x4c0 [ 1039.979061] __kernel_read+0x593/0xaa0 [ 1039.979670] ? do_sendfile+0x1090/0x1090 [ 1039.980423] ? _cond_resched+0x12/0x80 [ 1039.980996] ? avc_policy_seqno+0x9/0x70 [ 1039.981762] ? selinux_file_permission+0x92/0x520 [ 1039.982461] ? lock_downgrade+0x6d0/0x6d0 [ 1039.983250] kernel_read+0x52/0x70 [ 1039.983792] bprm_execve+0x882/0x1a60 [ 1039.984352] ? open_exec+0x70/0x70 [ 1039.985010] ? memcpy+0x39/0x60 [ 1039.985487] ? copy_string_kernel+0x3b6/0x450 [ 1039.986349] do_execveat_common+0x772/0x8d0 [ 1039.987020] ? bprm_execve+0x1a60/0x1a60 [ 1039.987791] __x64_sys_execveat+0xed/0x140 [ 1039.988398] do_syscall_64+0x33/0x40 [ 1039.989088] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1039.989818] RIP: 0033:0x7f1c8836fb19 [ 1039.990519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.993042] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1039.994446] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1039.995781] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1039.997099] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1039.998425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1039.999752] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:12:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) setresuid(0x0, 0x0, 0x0) 22:12:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 22:12:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 22:12:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 29) 22:12:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 22:12:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 22:12:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 22:12:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) [ 1040.184411] FAULT_INJECTION: forcing a failure. [ 1040.184411] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.186120] CPU: 1 PID: 8902 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1040.187084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.188250] Call Trace: [ 1040.188637] dump_stack+0x107/0x167 [ 1040.189164] should_fail.cold+0x5/0xa [ 1040.189726] ? create_object.isra.0+0x3a/0xa20 [ 1040.190379] should_failslab+0x5/0x20 [ 1040.190922] kmem_cache_alloc+0x5b/0x310 [ 1040.191561] create_object.isra.0+0x3a/0xa20 [ 1040.192207] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1040.192953] kmem_cache_alloc_trace+0x151/0x320 [ 1040.193655] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1040.194394] __kthread_create_on_node+0xd1/0x400 [ 1040.195154] ? __kthread_parkme+0x1d0/0x1d0 [ 1040.195802] ? __mutex_lock+0x4fe/0x10b0 [ 1040.196403] ? loop_configure+0xcb5/0x1480 [ 1040.197025] ? do_raw_spin_unlock+0x4f/0x220 [ 1040.197685] ? loop_info64_to_compat+0x5f0/0x5f0 [ 1040.198372] kthread_create_on_node+0xbb/0x100 [ 1040.199042] ? __kthread_create_on_node+0x400/0x400 [ 1040.199841] ? lockdep_init_map_type+0x2c7/0x780 [ 1040.200589] ? lockdep_init_map_type+0x2c7/0x780 [ 1040.201432] loop_configure+0x3e3/0x1480 [ 1040.202112] lo_ioctl+0xa72/0x1760 [ 1040.202656] ? avc_has_extended_perms+0x7f1/0xf40 [ 1040.203411] ? loop_set_status_old+0x250/0x250 [ 1040.204208] ? avc_ss_reset+0x180/0x180 [ 1040.204912] ? lock_acquire+0x197/0x470 [ 1040.205596] ? find_held_lock+0x2c/0x110 [ 1040.206224] ? __lock_acquire+0xbb1/0x5b00 [ 1040.206959] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1040.207821] ? generic_block_fiemap+0x60/0x60 [ 1040.208537] ? loop_set_status_old+0x250/0x250 [ 1040.209220] blkdev_ioctl+0x291/0x710 [ 1040.209804] ? blkdev_common_ioctl+0x1930/0x1930 [ 1040.210515] ? selinux_file_ioctl+0xb6/0x270 [ 1040.211170] block_ioctl+0xf9/0x140 [ 1040.211698] ? blkdev_read_iter+0x1c0/0x1c0 [ 1040.212327] __x64_sys_ioctl+0x19a/0x210 [ 1040.212917] do_syscall_64+0x33/0x40 [ 1040.213465] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.214225] RIP: 0033:0x7fc5474938d7 [ 1040.214783] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.217397] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.218505] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1040.219549] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1040.220586] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1040.221644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1040.222805] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:12:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) [ 1040.245235] FAULT_INJECTION: forcing a failure. [ 1040.245235] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.247200] CPU: 0 PID: 8903 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1040.248252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.249525] Call Trace: [ 1040.249957] dump_stack+0x107/0x167 [ 1040.250533] should_fail.cold+0x5/0xa [ 1040.251134] ? create_object.isra.0+0x3a/0xa20 [ 1040.251850] should_failslab+0x5/0x20 [ 1040.252453] kmem_cache_alloc+0x5b/0x310 [ 1040.253071] create_object.isra.0+0x3a/0xa20 [ 1040.253753] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1040.254528] __kmalloc_track_caller+0x177/0x370 [ 1040.255215] ? __request_module+0x2fe/0x920 [ 1040.255899] ? bprm_execve+0xbe6/0x1a60 [ 1040.256503] kstrdup+0x36/0x70 [ 1040.257012] __request_module+0x2fe/0x920 [ 1040.257659] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1040.258479] ? free_modprobe_argv+0x90/0x90 [ 1040.259122] ? find_held_lock+0x2c/0x110 [ 1040.259765] ? find_held_lock+0x2c/0x110 [ 1040.260415] ? bprm_execve+0xa13/0x1a60 [ 1040.261039] ? lock_downgrade+0x6d0/0x6d0 [ 1040.261669] ? elf_core_dump+0x3c50/0x3c50 [ 1040.262332] ? do_raw_read_unlock+0x3b/0x70 [ 1040.262996] ? _raw_read_unlock+0x1a/0x30 [ 1040.263640] ? load_misc_binary+0x605/0xb70 [ 1040.264309] bprm_execve+0xbe6/0x1a60 [ 1040.264916] ? open_exec+0x70/0x70 [ 1040.265456] ? memcpy+0x39/0x60 [ 1040.265988] ? copy_string_kernel+0x3b6/0x450 [ 1040.266687] do_execveat_common+0x772/0x8d0 [ 1040.267364] ? bprm_execve+0x1a60/0x1a60 [ 1040.267994] __x64_sys_execveat+0xed/0x140 [ 1040.268656] do_syscall_64+0x33/0x40 [ 1040.269214] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.270011] RIP: 0033:0x7f2f4d86bb19 [ 1040.270560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.273371] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1040.274515] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1040.275607] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1040.276693] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.277797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.278892] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 1040.297651] FAULT_INJECTION: forcing a failure. [ 1040.297651] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.299598] CPU: 0 PID: 8907 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1040.300699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.301918] Call Trace: [ 1040.302324] dump_stack+0x107/0x167 [ 1040.302876] should_fail.cold+0x5/0xa [ 1040.303452] ? __request_module+0x2e0/0x920 [ 1040.304100] ? bprm_execve+0xbe6/0x1a60 [ 1040.304697] should_failslab+0x5/0x20 [ 1040.305271] kmem_cache_alloc_trace+0x55/0x320 [ 1040.305971] ? bprm_execve+0xbe6/0x1a60 [ 1040.306564] __request_module+0x2e0/0x920 [ 1040.307188] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1040.307969] ? free_modprobe_argv+0x90/0x90 [ 1040.308615] ? find_held_lock+0x2c/0x110 [ 1040.309236] ? find_held_lock+0x2c/0x110 [ 1040.309860] ? bprm_execve+0xa13/0x1a60 [ 1040.310460] ? lock_downgrade+0x6d0/0x6d0 [ 1040.311078] ? elf_core_dump+0x3c50/0x3c50 [ 1040.311713] ? do_raw_read_unlock+0x3b/0x70 [ 1040.312354] ? _raw_read_unlock+0x1a/0x30 [ 1040.312974] ? load_misc_binary+0x605/0xb70 [ 1040.313648] bprm_execve+0xbe6/0x1a60 [ 1040.314230] ? open_exec+0x70/0x70 [ 1040.314761] ? memcpy+0x39/0x60 [ 1040.315258] ? copy_string_kernel+0x3b6/0x450 [ 1040.315942] do_execveat_common+0x772/0x8d0 [ 1040.316592] ? bprm_execve+0x1a60/0x1a60 [ 1040.317224] __x64_sys_execveat+0xed/0x140 [ 1040.317867] do_syscall_64+0x33/0x40 [ 1040.318426] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.319180] RIP: 0033:0x7f1c8836fb19 [ 1040.319740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.322416] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1040.323537] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1040.324583] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1040.325641] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.326687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.327729] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:12:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 22:12:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) setresuid(0x0, 0x0, 0x0) [ 1040.375276] FAULT_INJECTION: forcing a failure. [ 1040.375276] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.375544] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1040.376963] CPU: 0 PID: 8918 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1040.379127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.380340] Call Trace: [ 1040.380750] dump_stack+0x107/0x167 [ 1040.381304] should_fail.cold+0x5/0xa [ 1040.381888] ? create_object.isra.0+0x3a/0xa20 [ 1040.382566] should_failslab+0x5/0x20 [ 1040.383135] kmem_cache_alloc+0x5b/0x310 [ 1040.383759] create_object.isra.0+0x3a/0xa20 [ 1040.384415] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1040.385167] kmem_cache_alloc+0x159/0x310 [ 1040.385799] jbd2__journal_start+0x190/0x7e0 [ 1040.386451] __ext4_journal_start_sb+0x214/0x390 [ 1040.387151] ext4_dirty_inode+0xbc/0x130 [ 1040.387751] ? ext4_setattr+0x2160/0x2160 [ 1040.388360] __mark_inode_dirty+0x492/0xd40 [ 1040.388999] touch_atime+0x5ea/0x6e0 [ 1040.389544] ? atime_needs_update+0x600/0x600 [ 1040.390211] ? add_to_page_cache_locked+0x40/0x40 [ 1040.390931] generic_file_buffered_read+0x191a/0x2920 [ 1040.391706] ? pagecache_get_page+0xc80/0xc80 [ 1040.392369] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1040.393135] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1040.393792] ? finish_task_switch+0x126/0x5d0 [ 1040.394447] ? finish_task_switch+0xef/0x5d0 [ 1040.395086] ? __switch_to+0x572/0xf70 [ 1040.395665] generic_file_read_iter+0x33f/0x490 [ 1040.396355] ext4_file_read_iter+0x184/0x4c0 [ 1040.397006] __kernel_read+0x593/0xaa0 [ 1040.397591] ? do_sendfile+0x1090/0x1090 [ 1040.398194] ? _cond_resched+0x5d/0x80 [ 1040.398770] ? avc_policy_seqno+0x9/0x70 [ 1040.399366] ? selinux_file_permission+0x92/0x520 [ 1040.400078] ? lock_downgrade+0x6d0/0x6d0 [ 1040.400700] kernel_read+0x52/0x70 [ 1040.401230] bprm_execve+0x882/0x1a60 [ 1040.401827] ? open_exec+0x70/0x70 [ 1040.402347] ? memcpy+0x39/0x60 [ 1040.402831] ? copy_string_kernel+0x3b6/0x450 [ 1040.403499] do_execveat_common+0x772/0x8d0 [ 1040.404134] ? bprm_execve+0x1a60/0x1a60 [ 1040.404748] __x64_sys_execveat+0xed/0x140 [ 1040.405369] do_syscall_64+0x33/0x40 [ 1040.405921] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.406666] RIP: 0033:0x7f2243400b19 [ 1040.407210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.409855] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1040.410962] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1040.411990] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1040.413029] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.414070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.415107] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 30) 22:12:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x23210000) setresuid(0x0, 0x0, 0x0) 22:12:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 22:12:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 22:12:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) [ 1040.553878] FAULT_INJECTION: forcing a failure. [ 1040.553878] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.555697] CPU: 0 PID: 8933 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1040.556707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.557931] Call Trace: [ 1040.558336] dump_stack+0x107/0x167 [ 1040.558884] should_fail.cold+0x5/0xa [ 1040.559461] ? __kernfs_new_node+0xd4/0x860 [ 1040.560102] should_failslab+0x5/0x20 [ 1040.560673] kmem_cache_alloc+0x5b/0x310 [ 1040.561288] __kernfs_new_node+0xd4/0x860 [ 1040.561929] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1040.562632] ? lock_acquire+0x197/0x470 [ 1040.563228] ? lock_chain_count+0x20/0x20 [ 1040.563847] ? lock_acquire+0x197/0x470 [ 1040.564444] ? task_rq_lock+0xab/0x270 [ 1040.565033] ? lock_release+0x680/0x680 [ 1040.565638] ? find_held_lock+0x2c/0x110 [ 1040.566254] kernfs_new_node+0x18d/0x250 [ 1040.566872] kernfs_create_dir_ns+0x49/0x160 [ 1040.567537] internal_create_group+0x793/0xb30 [ 1040.568217] ? set_user_nice.part.0+0x2fd/0x760 [ 1040.568903] ? sysfs_remove_group+0x170/0x170 [ 1040.569582] ? lockdep_init_map_type+0x2c7/0x780 [ 1040.570314] ? blk_queue_flag_set+0x22/0x30 [ 1040.570957] ? __loop_update_dio+0x2d2/0x690 [ 1040.571777] loop_configure+0x954/0x1480 [ 1040.572463] lo_ioctl+0xa72/0x1760 [ 1040.573117] ? avc_has_extended_perms+0x7f1/0xf40 [ 1040.573861] ? loop_set_status_old+0x250/0x250 [ 1040.574711] ? avc_ss_reset+0x180/0x180 [ 1040.575366] ? lock_acquire+0x197/0x470 [ 1040.576097] ? find_held_lock+0x2c/0x110 [ 1040.576774] ? __lock_acquire+0xbb1/0x5b00 [ 1040.577460] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1040.578247] ? generic_block_fiemap+0x60/0x60 [ 1040.578928] ? loop_set_status_old+0x250/0x250 [ 1040.579609] blkdev_ioctl+0x291/0x710 [ 1040.580179] ? blkdev_common_ioctl+0x1930/0x1930 [ 1040.580889] ? selinux_file_ioctl+0xb6/0x270 [ 1040.581550] block_ioctl+0xf9/0x140 [ 1040.582102] ? blkdev_read_iter+0x1c0/0x1c0 [ 1040.582744] __x64_sys_ioctl+0x19a/0x210 [ 1040.583351] do_syscall_64+0x33/0x40 [ 1040.583908] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.584665] RIP: 0033:0x7fc5474938d7 [ 1040.585225] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.587908] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.589035] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1040.590089] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1040.591136] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1040.592177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1040.593225] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 22:12:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 22:12:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) setresuid(0x0, 0x0, 0x0) 22:12:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 22:12:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) [ 1040.756896] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1040.769549] FAULT_INJECTION: forcing a failure. [ 1040.769549] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.771696] CPU: 0 PID: 8952 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1040.772937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.774486] Call Trace: [ 1040.774973] dump_stack+0x107/0x167 [ 1040.775655] should_fail.cold+0x5/0xa [ 1040.776370] ? create_object.isra.0+0x3a/0xa20 [ 1040.777224] should_failslab+0x5/0x20 [ 1040.777950] kmem_cache_alloc+0x5b/0x310 [ 1040.778716] create_object.isra.0+0x3a/0xa20 [ 1040.779522] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1040.780459] kmem_cache_alloc_trace+0x151/0x320 [ 1040.781327] ? bprm_execve+0xbe6/0x1a60 [ 1040.781991] __request_module+0x2e0/0x920 [ 1040.782753] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1040.783723] ? free_modprobe_argv+0x90/0x90 [ 1040.784525] ? find_held_lock+0x2c/0x110 [ 1040.785287] ? find_held_lock+0x2c/0x110 [ 1040.786054] ? bprm_execve+0xa13/0x1a60 [ 1040.786782] ? lock_downgrade+0x6d0/0x6d0 [ 1040.787550] ? elf_core_dump+0x3c50/0x3c50 [ 1040.788332] ? do_raw_read_unlock+0x3b/0x70 [ 1040.789038] ? _raw_read_unlock+0x1a/0x30 [ 1040.789804] ? load_misc_binary+0x605/0xb70 [ 1040.790613] bprm_execve+0xbe6/0x1a60 [ 1040.791333] ? open_exec+0x70/0x70 [ 1040.791994] ? memcpy+0x39/0x60 [ 1040.792601] ? copy_string_kernel+0x3b6/0x450 [ 1040.793435] do_execveat_common+0x772/0x8d0 [ 1040.794240] ? bprm_execve+0x1a60/0x1a60 [ 1040.795005] __x64_sys_execveat+0xed/0x140 [ 1040.795782] do_syscall_64+0x33/0x40 [ 1040.796338] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.797272] RIP: 0033:0x7f1c8836fb19 [ 1040.797966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.801063] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1040.802235] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1040.803268] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1040.804307] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.805342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.806380] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1040.815662] FAULT_INJECTION: forcing a failure. [ 1040.815662] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.817539] CPU: 0 PID: 8954 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1040.818649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1040.819994] Call Trace: [ 1040.820411] dump_stack+0x107/0x167 [ 1040.820986] should_fail.cold+0x5/0xa [ 1040.821608] ? __request_module+0x2e0/0x920 [ 1040.822343] ? bprm_execve+0xbe6/0x1a60 [ 1040.823002] should_failslab+0x5/0x20 [ 1040.823612] kmem_cache_alloc_trace+0x55/0x320 [ 1040.824340] ? bprm_execve+0xbe6/0x1a60 [ 1040.824998] __request_module+0x2e0/0x920 [ 1040.825658] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1040.826468] ? free_modprobe_argv+0x90/0x90 [ 1040.827103] ? find_held_lock+0x2c/0x110 [ 1040.827710] ? find_held_lock+0x2c/0x110 [ 1040.828417] ? bprm_execve+0xa13/0x1a60 [ 1040.829113] ? lock_downgrade+0x6d0/0x6d0 [ 1040.829751] ? elf_core_dump+0x3c50/0x3c50 [ 1040.830378] ? do_raw_read_unlock+0x3b/0x70 [ 1040.831012] ? _raw_read_unlock+0x1a/0x30 [ 1040.831626] ? load_misc_binary+0x605/0xb70 [ 1040.832267] bprm_execve+0xbe6/0x1a60 [ 1040.832841] ? open_exec+0x70/0x70 [ 1040.833366] ? memcpy+0x39/0x60 [ 1040.833868] ? copy_string_kernel+0x3b6/0x450 [ 1040.834539] do_execveat_common+0x772/0x8d0 [ 1040.835183] ? bprm_execve+0x1a60/0x1a60 [ 1040.835800] __x64_sys_execveat+0xed/0x140 [ 1040.836432] do_syscall_64+0x33/0x40 [ 1040.836980] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1040.837737] RIP: 0033:0x7f2243400b19 [ 1040.838281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1040.840947] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1040.842067] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1040.843106] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1040.844140] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1040.845176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.846226] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 22:12:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 22:12:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 22:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48000000) setresuid(0x0, 0x0, 0x0) 22:12:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 22:12:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 22:12:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 31) 22:12:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) [ 1054.320153] FAULT_INJECTION: forcing a failure. [ 1054.320153] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.322215] CPU: 0 PID: 8973 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1054.323447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.324924] Call Trace: [ 1054.325407] dump_stack+0x107/0x167 [ 1054.326075] should_fail.cold+0x5/0xa [ 1054.326765] ? create_object.isra.0+0x3a/0xa20 [ 1054.327658] should_failslab+0x5/0x20 [ 1054.328342] kmem_cache_alloc+0x5b/0x310 [ 1054.329078] create_object.isra.0+0x3a/0xa20 [ 1054.329875] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1054.330781] kmem_cache_alloc+0x159/0x310 [ 1054.331519] __kernfs_new_node+0xd4/0x860 [ 1054.332273] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1054.333099] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1054.334027] ? lock_chain_count+0x20/0x20 [ 1054.334765] ? cpumask_next+0x1f/0x30 [ 1054.335452] ? find_held_lock+0x2c/0x110 [ 1054.336189] kernfs_new_node+0x18d/0x250 [ 1054.336925] kernfs_create_dir_ns+0x49/0x160 [ 1054.337716] internal_create_group+0x793/0xb30 [ 1054.338546] ? set_user_nice.part.0+0x2fd/0x760 [ 1054.339370] ? sysfs_remove_group+0x170/0x170 [ 1054.340171] ? lockdep_init_map_type+0x2c7/0x780 [ 1054.340238] FAULT_INJECTION: forcing a failure. [ 1054.340238] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.341023] ? blk_queue_flag_set+0x22/0x30 [ 1054.341044] ? __loop_update_dio+0x2d2/0x690 [ 1054.341074] loop_configure+0x954/0x1480 [ 1054.344248] lo_ioctl+0xa72/0x1760 [ 1054.344893] ? avc_has_extended_perms+0x7f1/0xf40 [ 1054.345765] ? loop_set_status_old+0x250/0x250 [ 1054.346578] ? avc_ss_reset+0x180/0x180 [ 1054.347288] ? lock_acquire+0x197/0x470 [ 1054.348005] ? find_held_lock+0x2c/0x110 [ 1054.348739] ? __lock_acquire+0xbb1/0x5b00 [ 1054.349575] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1054.350528] ? generic_block_fiemap+0x60/0x60 [ 1054.351346] ? loop_set_status_old+0x250/0x250 [ 1054.352151] blkdev_ioctl+0x291/0x710 [ 1054.352846] ? blkdev_common_ioctl+0x1930/0x1930 [ 1054.353692] ? selinux_file_ioctl+0xb6/0x270 [ 1054.354502] block_ioctl+0xf9/0x140 [ 1054.355141] ? blkdev_read_iter+0x1c0/0x1c0 [ 1054.355927] __x64_sys_ioctl+0x19a/0x210 [ 1054.356649] do_syscall_64+0x33/0x40 [ 1054.357329] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.358238] RIP: 0033:0x7fc5474938d7 [ 1054.358912] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.362228] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1054.363613] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1054.364906] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1054.366184] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1054.367320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1054.368446] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1054.369594] CPU: 1 PID: 8971 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1054.370457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.371374] Call Trace: [ 1054.371613] dump_stack+0x107/0x167 [ 1054.371939] should_fail.cold+0x5/0xa [ 1054.372281] ? create_object.isra.0+0x3a/0xa20 [ 1054.372692] should_failslab+0x5/0x20 [ 1054.373033] kmem_cache_alloc+0x5b/0x310 [ 1054.373398] create_object.isra.0+0x3a/0xa20 [ 1054.373808] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1054.374258] kmem_cache_alloc_trace+0x151/0x320 [ 1054.374678] ? bprm_execve+0xbe6/0x1a60 [ 1054.375029] __request_module+0x2e0/0x920 [ 1054.375395] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1054.375862] ? free_modprobe_argv+0x90/0x90 [ 1054.376241] ? find_held_lock+0x2c/0x110 [ 1054.376609] ? find_held_lock+0x2c/0x110 [ 1054.376972] ? bprm_execve+0xa13/0x1a60 [ 1054.377326] ? lock_downgrade+0x6d0/0x6d0 [ 1054.377692] ? elf_core_dump+0x3c50/0x3c50 [ 1054.378074] ? do_raw_read_unlock+0x3b/0x70 [ 1054.378454] ? _raw_read_unlock+0x1a/0x30 [ 1054.378821] ? load_misc_binary+0x605/0xb70 [ 1054.379211] bprm_execve+0xbe6/0x1a60 [ 1054.379573] ? open_exec+0x70/0x70 [ 1054.379889] ? memcpy+0x39/0x60 [ 1054.380200] ? copy_string_kernel+0x3b6/0x450 [ 1054.380608] do_execveat_common+0x772/0x8d0 [ 1054.380995] ? bprm_execve+0x1a60/0x1a60 [ 1054.381373] __x64_sys_execveat+0xed/0x140 [ 1054.381768] do_syscall_64+0x33/0x40 [ 1054.382106] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.382549] RIP: 0033:0x7f2243400b19 [ 1054.382879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.384482] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1054.385153] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1054.385785] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1054.386411] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.387043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1054.387664] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) [ 1054.410289] FAULT_INJECTION: forcing a failure. [ 1054.410289] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.412186] CPU: 0 PID: 8977 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1054.413253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.414559] Call Trace: [ 1054.414983] dump_stack+0x107/0x167 [ 1054.415561] should_fail.cold+0x5/0xa [ 1054.416170] ? bprm_execve+0xbe6/0x1a60 [ 1054.416798] should_failslab+0x5/0x20 [ 1054.417403] __kmalloc_track_caller+0x79/0x370 [ 1054.418141] ? __request_module+0x2fe/0x920 [ 1054.418830] ? bprm_execve+0xbe6/0x1a60 [ 1054.419466] kstrdup+0x36/0x70 [ 1054.419979] __request_module+0x2fe/0x920 [ 1054.420632] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1054.421464] ? free_modprobe_argv+0x90/0x90 [ 1054.422157] ? find_held_lock+0x2c/0x110 [ 1054.422804] ? find_held_lock+0x2c/0x110 [ 1054.423453] ? bprm_execve+0xa13/0x1a60 [ 1054.424084] ? lock_downgrade+0x6d0/0x6d0 [ 1054.424740] ? elf_core_dump+0x3c50/0x3c50 [ 1054.425410] ? do_raw_read_unlock+0x3b/0x70 [ 1054.426091] ? _raw_read_unlock+0x1a/0x30 [ 1054.426744] ? load_misc_binary+0x605/0xb70 [ 1054.427426] bprm_execve+0xbe6/0x1a60 [ 1054.428033] ? open_exec+0x70/0x70 [ 1054.428591] ? memcpy+0x39/0x60 [ 1054.429114] ? copy_string_kernel+0x3b6/0x450 [ 1054.429831] do_execveat_common+0x772/0x8d0 [ 1054.430506] ? bprm_execve+0x1a60/0x1a60 [ 1054.431162] __x64_sys_execveat+0xed/0x140 [ 1054.431824] do_syscall_64+0x33/0x40 [ 1054.432405] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.433198] RIP: 0033:0x7f1c8836fb19 [ 1054.433790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.436618] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1054.437805] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1054.438917] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1054.440024] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.441130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1054.442245] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1054.446013] FAULT_INJECTION: forcing a failure. [ 1054.446013] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.447834] CPU: 1 PID: 8984 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1054.448432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.449133] Call Trace: [ 1054.449361] dump_stack+0x107/0x167 [ 1054.449679] should_fail.cold+0x5/0xa [ 1054.450019] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1054.450451] should_failslab+0x5/0x20 [ 1054.450782] kmem_cache_alloc_trace+0x55/0x320 [ 1054.451177] call_usermodehelper_setup+0xa2/0x2f0 [ 1054.451593] ? copy_regset_to_user+0x170/0x170 [ 1054.451986] ? bprm_execve+0xbe6/0x1a60 [ 1054.452337] __request_module+0x3f9/0x920 [ 1054.452700] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1054.453155] ? free_modprobe_argv+0x90/0x90 [ 1054.453525] ? find_held_lock+0x2c/0x110 [ 1054.453890] ? find_held_lock+0x2c/0x110 [ 1054.454250] ? bprm_execve+0xa13/0x1a60 [ 1054.454593] ? lock_downgrade+0x6d0/0x6d0 [ 1054.454949] ? elf_core_dump+0x3c50/0x3c50 [ 1054.455313] ? do_raw_read_unlock+0x3b/0x70 [ 1054.455685] ? _raw_read_unlock+0x1a/0x30 [ 1054.456043] ? load_misc_binary+0x605/0xb70 [ 1054.456421] bprm_execve+0xbe6/0x1a60 [ 1054.456759] ? open_exec+0x70/0x70 [ 1054.457071] ? memcpy+0x39/0x60 [ 1054.457367] ? copy_string_kernel+0x3b6/0x450 [ 1054.457769] do_execveat_common+0x772/0x8d0 [ 1054.458146] ? bprm_execve+0x1a60/0x1a60 [ 1054.458508] __x64_sys_execveat+0xed/0x140 [ 1054.458873] do_syscall_64+0x33/0x40 [ 1054.459193] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.459630] RIP: 0033:0x7f2f4d86bb19 [ 1054.459950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.461546] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1054.462210] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1054.462823] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1054.463425] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.464040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1054.464660] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 1054.476597] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:12:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c000000) setresuid(0x0, 0x0, 0x0) 22:12:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 22:12:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 22:12:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 22:12:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 32) [ 1054.610806] FAULT_INJECTION: forcing a failure. [ 1054.610806] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.612063] CPU: 1 PID: 9003 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1054.612615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.613286] Call Trace: [ 1054.613511] dump_stack+0x107/0x167 [ 1054.613819] should_fail.cold+0x5/0xa [ 1054.614142] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1054.614609] should_failslab+0x5/0x20 [ 1054.614923] kmem_cache_alloc+0x5b/0x310 [ 1054.615265] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1054.615729] idr_get_free+0x4b5/0x8f0 [ 1054.616048] idr_alloc_u32+0x170/0x2d0 [ 1054.616370] ? __fprop_inc_percpu_max+0x130/0x130 [ 1054.616761] ? lock_acquire+0x197/0x470 [ 1054.617088] ? __kernfs_new_node+0xff/0x860 [ 1054.617450] idr_alloc_cyclic+0x102/0x230 [ 1054.617801] ? idr_alloc+0x130/0x130 [ 1054.618106] ? rwlock_bug.part.0+0x90/0x90 [ 1054.618459] __kernfs_new_node+0x117/0x860 [ 1054.618804] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1054.619194] ? lock_chain_count+0x20/0x20 [ 1054.619535] ? update_load_avg+0x162/0x1870 [ 1054.619883] ? find_held_lock+0x2c/0x110 [ 1054.620212] kernfs_new_node+0x18d/0x250 [ 1054.620550] kernfs_create_dir_ns+0x49/0x160 [ 1054.620911] internal_create_group+0x793/0xb30 [ 1054.621291] ? set_user_nice.part.0+0x2fd/0x760 [ 1054.621672] ? sysfs_remove_group+0x170/0x170 [ 1054.622048] ? lockdep_init_map_type+0x2c7/0x780 [ 1054.622442] ? blk_queue_flag_set+0x22/0x30 [ 1054.622797] ? __loop_update_dio+0x2d2/0x690 [ 1054.623151] loop_configure+0x954/0x1480 [ 1054.623493] lo_ioctl+0xa72/0x1760 [ 1054.623787] ? avc_has_extended_perms+0x7f1/0xf40 [ 1054.624080] FAULT_INJECTION: forcing a failure. [ 1054.624080] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.624188] ? loop_set_status_old+0x250/0x250 [ 1054.626277] ? avc_ss_reset+0x180/0x180 [ 1054.626602] ? lock_acquire+0x197/0x470 [ 1054.626925] ? find_held_lock+0x2c/0x110 [ 1054.627260] ? __lock_acquire+0xbb1/0x5b00 [ 1054.627635] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1054.628062] ? generic_block_fiemap+0x60/0x60 [ 1054.628425] ? loop_set_status_old+0x250/0x250 [ 1054.628801] blkdev_ioctl+0x291/0x710 [ 1054.629107] ? blkdev_common_ioctl+0x1930/0x1930 [ 1054.629493] ? selinux_file_ioctl+0xb6/0x270 [ 1054.629856] block_ioctl+0xf9/0x140 [ 1054.630150] ? blkdev_read_iter+0x1c0/0x1c0 [ 1054.630495] __x64_sys_ioctl+0x19a/0x210 [ 1054.630825] do_syscall_64+0x33/0x40 [ 1054.631127] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.631544] RIP: 0033:0x7fc5474938d7 [ 1054.631843] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.633314] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1054.633935] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1054.634506] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1054.635083] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1054.635657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1054.636231] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1054.636827] CPU: 0 PID: 9008 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1054.637908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1054.639204] Call Trace: [ 1054.639627] dump_stack+0x107/0x167 [ 1054.640210] should_fail.cold+0x5/0xa [ 1054.640820] ? bprm_execve+0xbe6/0x1a60 [ 1054.641452] should_failslab+0x5/0x20 [ 1054.642073] __kmalloc_track_caller+0x79/0x370 [ 1054.642796] ? __request_module+0x2fe/0x920 [ 1054.643489] ? bprm_execve+0xbe6/0x1a60 [ 1054.644119] kstrdup+0x36/0x70 [ 1054.644633] __request_module+0x2fe/0x920 [ 1054.645289] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1054.646131] ? free_modprobe_argv+0x90/0x90 [ 1054.646814] ? find_held_lock+0x2c/0x110 [ 1054.647467] ? find_held_lock+0x2c/0x110 [ 1054.648115] ? bprm_execve+0xa13/0x1a60 [ 1054.648748] ? lock_downgrade+0x6d0/0x6d0 [ 1054.649401] ? elf_core_dump+0x3c50/0x3c50 [ 1054.650074] ? do_raw_read_unlock+0x3b/0x70 [ 1054.650757] ? _raw_read_unlock+0x1a/0x30 [ 1054.651408] ? load_misc_binary+0x605/0xb70 [ 1054.652102] bprm_execve+0xbe6/0x1a60 [ 1054.652718] ? open_exec+0x70/0x70 [ 1054.653286] ? memcpy+0x39/0x60 [ 1054.653823] ? copy_string_kernel+0x3b6/0x450 [ 1054.654547] do_execveat_common+0x772/0x8d0 [ 1054.655236] ? bprm_execve+0x1a60/0x1a60 [ 1054.655903] __x64_sys_execveat+0xed/0x140 [ 1054.656577] do_syscall_64+0x33/0x40 [ 1054.657169] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1054.657977] RIP: 0033:0x7f2243400b19 [ 1054.658570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1054.661433] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1054.662636] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1054.663749] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1054.664863] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1054.665983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1054.667099] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1054.676951] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:12:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 22:12:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 22:12:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) 22:12:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x50050000) setresuid(0x0, 0x0, 0x0) 22:12:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 22:12:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 33) 22:12:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 22:12:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) [ 1069.443704] FAULT_INJECTION: forcing a failure. [ 1069.443704] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.446425] CPU: 0 PID: 9022 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1069.447439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.448631] Call Trace: [ 1069.449020] dump_stack+0x107/0x167 [ 1069.449552] should_fail.cold+0x5/0xa [ 1069.450117] ? create_object.isra.0+0x3a/0xa20 [ 1069.450780] should_failslab+0x5/0x20 [ 1069.451336] kmem_cache_alloc+0x5b/0x310 [ 1069.451933] create_object.isra.0+0x3a/0xa20 [ 1069.452574] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1069.453324] kmem_cache_alloc_trace+0x151/0x320 [ 1069.454037] call_usermodehelper_setup+0xa2/0x2f0 [ 1069.454747] ? copy_regset_to_user+0x170/0x170 [ 1069.455417] ? bprm_execve+0xbe6/0x1a60 [ 1069.455992] __request_module+0x3f9/0x920 [ 1069.456600] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1069.457369] ? free_modprobe_argv+0x90/0x90 [ 1069.458001] ? find_held_lock+0x2c/0x110 [ 1069.458605] ? find_held_lock+0x2c/0x110 [ 1069.459203] ? bprm_execve+0xa13/0x1a60 [ 1069.459790] ? lock_downgrade+0x6d0/0x6d0 [ 1069.460391] ? elf_core_dump+0x3c50/0x3c50 [ 1069.461014] ? do_raw_read_unlock+0x3b/0x70 [ 1069.461638] ? _raw_read_unlock+0x1a/0x30 [ 1069.462260] ? load_misc_binary+0x605/0xb70 [ 1069.462896] bprm_execve+0xbe6/0x1a60 [ 1069.463467] ? open_exec+0x70/0x70 [ 1069.463987] ? memcpy+0x39/0x60 [ 1069.464090] FAULT_INJECTION: forcing a failure. [ 1069.464090] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.464479] ? copy_string_kernel+0x3b6/0x450 [ 1069.466756] do_execveat_common+0x772/0x8d0 [ 1069.467391] ? bprm_execve+0x1a60/0x1a60 [ 1069.468010] __x64_sys_execveat+0xed/0x140 [ 1069.468628] do_syscall_64+0x33/0x40 [ 1069.469177] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.469931] RIP: 0033:0x7f2f4d86bb19 [ 1069.470478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.473119] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1069.474234] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1069.475272] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1069.476304] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.477331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1069.478370] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 [ 1069.479435] CPU: 1 PID: 9031 Comm: syz-executor.1 Not tainted 5.10.216 #1 [ 1069.480444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.481657] Call Trace: [ 1069.482064] dump_stack+0x107/0x167 [ 1069.482606] should_fail.cold+0x5/0xa [ 1069.483172] ? create_object.isra.0+0x3a/0xa20 [ 1069.483848] should_failslab+0x5/0x20 [ 1069.484408] kmem_cache_alloc+0x5b/0x310 [ 1069.485012] create_object.isra.0+0x3a/0xa20 [ 1069.485796] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1069.486721] kmem_cache_alloc+0x159/0x310 [ 1069.487342] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1069.488153] idr_get_free+0x4b5/0x8f0 [ 1069.488901] idr_alloc_u32+0x170/0x2d0 [ 1069.489699] ? __fprop_inc_percpu_max+0x130/0x130 [ 1069.490419] ? lock_acquire+0x197/0x470 [ 1069.491001] ? __kernfs_new_node+0xff/0x860 [ 1069.491629] idr_alloc_cyclic+0x102/0x230 [ 1069.492236] ? idr_alloc+0x130/0x130 [ 1069.492784] ? rwlock_bug.part.0+0x90/0x90 [ 1069.493411] __kernfs_new_node+0x117/0x860 [ 1069.494046] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1069.494737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1069.495499] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1069.496287] ? trace_hardirqs_on+0x5b/0x180 [ 1069.496924] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1069.497729] kernfs_new_node+0x18d/0x250 [ 1069.498343] kernfs_create_dir_ns+0x49/0x160 [ 1069.498986] internal_create_group+0x793/0xb30 [ 1069.499665] ? set_user_nice.part.0+0x2fd/0x760 [ 1069.500341] ? sysfs_remove_group+0x170/0x170 [ 1069.500999] ? lockdep_init_map_type+0x2c7/0x780 [ 1069.501693] ? blk_queue_flag_set+0x22/0x30 [ 1069.502328] ? __loop_update_dio+0x2d2/0x690 [ 1069.502993] loop_configure+0x954/0x1480 [ 1069.503604] lo_ioctl+0xa72/0x1760 [ 1069.504130] ? avc_has_extended_perms+0x7f1/0xf40 [ 1069.504837] ? loop_set_status_old+0x250/0x250 [ 1069.505507] ? avc_ss_reset+0x180/0x180 [ 1069.506135] ? lock_acquire+0x197/0x470 [ 1069.506714] ? find_held_lock+0x2c/0x110 [ 1069.507320] ? __lock_acquire+0xbb1/0x5b00 [ 1069.507985] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1069.508749] ? generic_block_fiemap+0x60/0x60 [ 1069.509415] ? loop_set_status_old+0x250/0x250 [ 1069.510090] blkdev_ioctl+0x291/0x710 [ 1069.510649] ? blkdev_common_ioctl+0x1930/0x1930 [ 1069.511341] ? selinux_file_ioctl+0xb6/0x270 [ 1069.511988] block_ioctl+0xf9/0x140 [ 1069.512517] ? blkdev_read_iter+0x1c0/0x1c0 [ 1069.513149] __x64_sys_ioctl+0x19a/0x210 [ 1069.513745] do_syscall_64+0x33/0x40 [ 1069.514293] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.515037] RIP: 0033:0x7fc5474938d7 [ 1069.515580] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.518217] RSP: 002b:00007fc544a08f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.519310] RAX: ffffffffffffffda RBX: 00007fc5474dd970 RCX: 00007fc5474938d7 [ 1069.520338] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1069.521369] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1069.522404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1069.523431] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 1069.527274] FAULT_INJECTION: forcing a failure. [ 1069.527274] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.529196] CPU: 0 PID: 9039 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1069.530354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.531752] Call Trace: [ 1069.532209] dump_stack+0x107/0x167 [ 1069.532831] should_fail.cold+0x5/0xa [ 1069.533483] ? create_object.isra.0+0x3a/0xa20 [ 1069.534268] should_failslab+0x5/0x20 [ 1069.534920] kmem_cache_alloc+0x5b/0x310 [ 1069.535618] create_object.isra.0+0x3a/0xa20 [ 1069.536366] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1069.537234] __kmalloc_track_caller+0x177/0x370 [ 1069.538033] ? __request_module+0x2fe/0x920 [ 1069.538782] ? bprm_execve+0xbe6/0x1a60 [ 1069.539463] kstrdup+0x36/0x70 [ 1069.540018] __request_module+0x2fe/0x920 [ 1069.540729] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1069.541623] ? free_modprobe_argv+0x90/0x90 [ 1069.542365] ? find_held_lock+0x2c/0x110 [ 1069.543070] ? find_held_lock+0x2c/0x110 [ 1069.543773] ? bprm_execve+0xa13/0x1a60 [ 1069.544448] ? lock_downgrade+0x6d0/0x6d0 [ 1069.545155] ? elf_core_dump+0x3c50/0x3c50 [ 1069.545880] ? do_raw_read_unlock+0x3b/0x70 [ 1069.546625] ? _raw_read_unlock+0x1a/0x30 [ 1069.547326] ? load_misc_binary+0x605/0xb70 [ 1069.548073] bprm_execve+0xbe6/0x1a60 [ 1069.548739] ? open_exec+0x70/0x70 [ 1069.549346] ? memcpy+0x39/0x60 [ 1069.549921] ? copy_string_kernel+0x3b6/0x450 [ 1069.550705] do_execveat_common+0x772/0x8d0 [ 1069.551445] ? bprm_execve+0x1a60/0x1a60 [ 1069.552164] __x64_sys_execveat+0xed/0x140 [ 1069.552891] do_syscall_64+0x33/0x40 [ 1069.553528] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.554414] RIP: 0033:0x7f1c8836fb19 [ 1069.555057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.558184] RSP: 002b:00007f1c858c4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1069.559486] RAX: ffffffffffffffda RBX: 00007f1c88483020 RCX: 00007f1c8836fb19 [ 1069.560701] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1069.561923] RBP: 00007f1c858c41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.563139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1069.564358] R13: 00007ffec80ec7af R14: 00007f1c858c4300 R15: 0000000000022000 [ 1069.569470] FAULT_INJECTION: forcing a failure. [ 1069.569470] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.571419] CPU: 0 PID: 9033 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1069.572590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.574019] Call Trace: [ 1069.574484] dump_stack+0x107/0x167 [ 1069.575118] should_fail.cold+0x5/0xa [ 1069.575784] ? create_object.isra.0+0x3a/0xa20 [ 1069.576577] should_failslab+0x5/0x20 [ 1069.577238] kmem_cache_alloc+0x5b/0x310 [ 1069.577952] create_object.isra.0+0x3a/0xa20 [ 1069.578715] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1069.579594] __kmalloc_track_caller+0x177/0x370 [ 1069.580398] ? __request_module+0x2fe/0x920 [ 1069.581155] ? bprm_execve+0xbe6/0x1a60 [ 1069.581855] kstrdup+0x36/0x70 [ 1069.582433] __request_module+0x2fe/0x920 [ 1069.583174] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1069.584085] ? free_modprobe_argv+0x90/0x90 [ 1069.584849] ? find_held_lock+0x2c/0x110 [ 1069.585577] ? find_held_lock+0x2c/0x110 [ 1069.586306] ? bprm_execve+0xa13/0x1a60 [ 1069.587009] ? lock_downgrade+0x6d0/0x6d0 [ 1069.587740] ? elf_core_dump+0x3c50/0x3c50 [ 1069.588486] ? do_raw_read_unlock+0x3b/0x70 [ 1069.589247] ? _raw_read_unlock+0x1a/0x30 [ 1069.589986] ? load_misc_binary+0x605/0xb70 [ 1069.590759] bprm_execve+0xbe6/0x1a60 [ 1069.591439] ? open_exec+0x70/0x70 [ 1069.592076] ? memcpy+0x39/0x60 [ 1069.592662] ? copy_string_kernel+0x3b6/0x450 [ 1069.593465] do_execveat_common+0x772/0x8d0 [ 1069.594230] ? bprm_execve+0x1a60/0x1a60 [ 1069.594967] __x64_sys_execveat+0xed/0x140 [ 1069.595717] do_syscall_64+0x33/0x40 [ 1069.596374] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.597275] RIP: 0033:0x7f2243400b19 [ 1069.597940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.601130] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1069.602472] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1069.603716] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1069.604966] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.606223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1069.607470] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:12:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 22:12:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) [ 1069.661173] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:12:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) (fail_nth: 34) 22:12:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68000000) setresuid(0x0, 0x0, 0x0) 22:12:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 22:12:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 22:12:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 22:12:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) [ 1069.918537] FAULT_INJECTION: forcing a failure. [ 1069.918537] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.920279] CPU: 1 PID: 9067 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1069.921293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.922538] Call Trace: [ 1069.922945] dump_stack+0x107/0x167 [ 1069.923496] should_fail.cold+0x5/0xa [ 1069.924080] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1069.924835] should_failslab+0x5/0x20 [ 1069.925415] kmem_cache_alloc_trace+0x55/0x320 [ 1069.926119] call_usermodehelper_setup+0xa2/0x2f0 [ 1069.926853] ? copy_regset_to_user+0x170/0x170 [ 1069.927546] ? bprm_execve+0xbe6/0x1a60 [ 1069.928148] __request_module+0x3f9/0x920 [ 1069.928780] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1069.929550] ? free_modprobe_argv+0x90/0x90 [ 1069.930212] ? find_held_lock+0x2c/0x110 [ 1069.930832] ? find_held_lock+0x2c/0x110 [ 1069.931452] ? bprm_execve+0xa13/0x1a60 [ 1069.932057] ? lock_downgrade+0x6d0/0x6d0 [ 1069.932686] ? elf_core_dump+0x3c50/0x3c50 [ 1069.933332] ? do_raw_read_unlock+0x3b/0x70 [ 1069.933992] ? _raw_read_unlock+0x1a/0x30 [ 1069.934620] ? load_misc_binary+0x605/0xb70 [ 1069.935285] bprm_execve+0xbe6/0x1a60 [ 1069.935871] ? open_exec+0x70/0x70 [ 1069.936401] ? memcpy+0x39/0x60 [ 1069.936905] ? copy_string_kernel+0x3b6/0x450 [ 1069.937590] do_execveat_common+0x772/0x8d0 [ 1069.938257] ? bprm_execve+0x1a60/0x1a60 [ 1069.938896] __x64_sys_execveat+0xed/0x140 [ 1069.939545] do_syscall_64+0x33/0x40 [ 1069.940105] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.940885] RIP: 0033:0x7f2243400b19 [ 1069.941451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.944191] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1069.945340] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1069.946439] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1069.947518] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.948608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1069.949687] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1069.971757] FAULT_INJECTION: forcing a failure. [ 1069.971757] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.973488] CPU: 1 PID: 9069 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1069.974535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.975791] Call Trace: [ 1069.976198] dump_stack+0x107/0x167 [ 1069.976760] should_fail.cold+0x5/0xa [ 1069.977349] ? create_object.isra.0+0x3a/0xa20 [ 1069.978064] should_failslab+0x5/0x20 [ 1069.978648] kmem_cache_alloc+0x5b/0x310 [ 1069.979277] create_object.isra.0+0x3a/0xa20 [ 1069.979960] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1069.980756] __kmalloc_track_caller+0x177/0x370 [ 1069.981467] ? __request_module+0x2fe/0x920 [ 1069.982140] ? bprm_execve+0xbe6/0x1a60 [ 1069.982759] kstrdup+0x36/0x70 [ 1069.983258] __request_module+0x2fe/0x920 [ 1069.983902] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1069.984706] ? free_modprobe_argv+0x90/0x90 [ 1069.985367] ? find_held_lock+0x2c/0x110 [ 1069.986016] ? find_held_lock+0x2c/0x110 [ 1069.986651] ? bprm_execve+0xa13/0x1a60 [ 1069.987260] ? lock_downgrade+0x6d0/0x6d0 [ 1069.987893] ? elf_core_dump+0x3c50/0x3c50 [ 1069.988541] ? do_raw_read_unlock+0x3b/0x70 [ 1069.989199] ? _raw_read_unlock+0x1a/0x30 [ 1069.989833] ? load_misc_binary+0x605/0xb70 [ 1069.990528] bprm_execve+0xbe6/0x1a60 [ 1069.991124] ? open_exec+0x70/0x70 [ 1069.991670] ? memcpy+0x39/0x60 [ 1069.992180] ? copy_string_kernel+0x3b6/0x450 [ 1069.992883] do_execveat_common+0x772/0x8d0 [ 1069.993558] ? bprm_execve+0x1a60/0x1a60 [ 1069.994213] __x64_sys_execveat+0xed/0x140 [ 1069.994870] do_syscall_64+0x33/0x40 [ 1069.995447] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1069.996228] RIP: 0033:0x7f1c8836fb19 [ 1069.996806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.999605] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1070.000765] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1070.001849] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1070.002941] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1070.004031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1070.005117] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1070.006590] FAULT_INJECTION: forcing a failure. [ 1070.006590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1070.008420] CPU: 1 PID: 9064 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1070.009457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1070.010729] Call Trace: [ 1070.011148] dump_stack+0x107/0x167 [ 1070.011708] should_fail.cold+0x5/0xa [ 1070.012299] __alloc_pages_nodemask+0x182/0x600 [ 1070.013019] ? mark_held_locks+0x9e/0xe0 [ 1070.013643] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1070.014580] ? kmem_cache_free+0xa7/0x2d0 [ 1070.015222] alloc_pages_current+0x187/0x280 [ 1070.015910] __get_free_pages+0xc/0xa0 [ 1070.016507] ? kmem_cache_free+0x249/0x2d0 [ 1070.017149] tlb_remove_table+0x3ca/0xcb0 [ 1070.017793] ___pte_free_tlb+0x86/0xb0 [ 1070.018399] free_pgd_range+0x747/0x1380 [ 1070.019050] free_pgtables+0x230/0x2f0 [ 1070.019650] exit_mmap+0x28e/0x4f0 [ 1070.020203] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1070.021037] mmput+0xca/0x340 [ 1070.021521] free_bprm+0x65/0x2e0 [ 1070.022061] do_execveat_common+0x2e1/0x8d0 [ 1070.022732] ? bprm_execve+0x1a60/0x1a60 [ 1070.023375] __x64_sys_execveat+0xed/0x140 [ 1070.024030] do_syscall_64+0x33/0x40 [ 1070.024609] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1070.025395] RIP: 0033:0x7f2f4d86bb19 [ 1070.025975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1070.028760] RSP: 002b:00007f2f4ade1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1070.029923] RAX: ffffffffffffffda RBX: 00007f2f4d97ef60 RCX: 00007f2f4d86bb19 [ 1070.031011] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1070.032097] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1070.033194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1070.034283] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:13:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) 22:13:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 22:13:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) 22:13:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 22:13:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 22:13:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c000000) setresuid(0x0, 0x0, 0x0) 22:13:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) [ 1085.223387] FAULT_INJECTION: forcing a failure. [ 1085.223387] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.225247] CPU: 1 PID: 9078 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1085.226358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1085.227700] Call Trace: [ 1085.228140] dump_stack+0x107/0x167 [ 1085.228737] should_fail.cold+0x5/0xa [ 1085.229363] ? create_object.isra.0+0x3a/0xa20 [ 1085.230119] should_failslab+0x5/0x20 [ 1085.230745] kmem_cache_alloc+0x5b/0x310 [ 1085.231415] create_object.isra.0+0x3a/0xa20 [ 1085.232135] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1085.232955] kmem_cache_alloc_trace+0x151/0x320 [ 1085.233730] call_usermodehelper_setup+0xa2/0x2f0 [ 1085.234526] ? copy_regset_to_user+0x170/0x170 [ 1085.235275] ? bprm_execve+0xbe6/0x1a60 [ 1085.235914] __request_module+0x3f9/0x920 [ 1085.236587] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1085.237435] ? free_modprobe_argv+0x90/0x90 [ 1085.238136] ? find_held_lock+0x2c/0x110 [ 1085.238807] ? find_held_lock+0x2c/0x110 [ 1085.239472] ? bprm_execve+0xa13/0x1a60 [ 1085.240115] ? lock_downgrade+0x6d0/0x6d0 [ 1085.240784] ? elf_core_dump+0x3c50/0x3c50 [ 1085.241458] ? do_raw_read_unlock+0x3b/0x70 22:13:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) [ 1085.242158] ? _raw_read_unlock+0x1a/0x30 [ 1085.242927] ? load_misc_binary+0x605/0xb70 [ 1085.243629] bprm_execve+0xbe6/0x1a60 [ 1085.244249] ? open_exec+0x70/0x70 [ 1085.244819] ? memcpy+0x39/0x60 [ 1085.245351] ? copy_string_kernel+0x3b6/0x450 [ 1085.246077] do_execveat_common+0x772/0x8d0 [ 1085.246775] ? bprm_execve+0x1a60/0x1a60 [ 1085.247437] __x64_sys_execveat+0xed/0x140 [ 1085.248117] do_syscall_64+0x33/0x40 [ 1085.248714] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1085.249527] RIP: 0033:0x7f1c8836fb19 [ 1085.250119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.253007] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1085.254225] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1085.255353] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1085.256477] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.257589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.258709] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 [ 1085.283437] FAULT_INJECTION: forcing a failure. [ 1085.283437] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.284940] CPU: 0 PID: 9093 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1085.285799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1085.286833] Call Trace: [ 1085.287179] dump_stack+0x107/0x167 [ 1085.287634] should_fail.cold+0x5/0xa [ 1085.288118] ? create_object.isra.0+0x3a/0xa20 [ 1085.288679] should_failslab+0x5/0x20 [ 1085.289176] kmem_cache_alloc+0x5b/0x310 [ 1085.289682] create_object.isra.0+0x3a/0xa20 [ 1085.290244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1085.290890] __kmalloc_track_caller+0x177/0x370 [ 1085.291480] ? __request_module+0x2fe/0x920 [ 1085.292028] ? bprm_execve+0xbe6/0x1a60 [ 1085.292527] kstrdup+0x36/0x70 [ 1085.292927] __request_module+0x2fe/0x920 [ 1085.293459] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1085.294129] ? free_modprobe_argv+0x90/0x90 [ 1085.294673] ? find_held_lock+0x2c/0x110 [ 1085.295201] ? find_held_lock+0x2c/0x110 [ 1085.295709] ? bprm_execve+0xa13/0x1a60 [ 1085.296205] ? lock_downgrade+0x6d0/0x6d0 [ 1085.296704] ? elf_core_dump+0x3c50/0x3c50 [ 1085.297248] ? do_raw_read_unlock+0x3b/0x70 [ 1085.297768] ? _raw_read_unlock+0x1a/0x30 [ 1085.298294] ? load_misc_binary+0x605/0xb70 [ 1085.298829] bprm_execve+0xbe6/0x1a60 [ 1085.299315] ? open_exec+0x70/0x70 [ 1085.299747] ? memcpy+0x39/0x60 [ 1085.300165] ? copy_string_kernel+0x3b6/0x450 [ 1085.300717] do_execveat_common+0x772/0x8d0 [ 1085.301270] ? bprm_execve+0x1a60/0x1a60 [ 1085.301783] __x64_sys_execveat+0xed/0x140 [ 1085.302317] do_syscall_64+0x33/0x40 [ 1085.302774] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1085.303410] RIP: 0033:0x7f2243400b19 [ 1085.303865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.306126] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1085.307059] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1085.307912] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1085.308783] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.309656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.310531] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1085.351601] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1085.353093] FAULT_INJECTION: forcing a failure. [ 1085.353093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1085.354508] CPU: 0 PID: 9085 Comm: syz-executor.6 Not tainted 5.10.216 #1 [ 1085.355335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1085.356306] Call Trace: [ 1085.356625] dump_stack+0x107/0x167 [ 1085.357066] should_fail.cold+0x5/0xa [ 1085.357526] _copy_to_user+0x2e/0x180 [ 1085.357992] simple_read_from_buffer+0xcc/0x160 [ 1085.358566] proc_fail_nth_read+0x198/0x230 [ 1085.359097] ? proc_sessionid_read+0x230/0x230 [ 1085.359633] ? security_file_permission+0x24e/0x570 [ 1085.360226] ? perf_trace_initcall_start+0xf1/0x380 [ 1085.360819] ? proc_sessionid_read+0x230/0x230 [ 1085.361377] vfs_read+0x228/0x580 [ 1085.361792] ksys_read+0x12d/0x260 [ 1085.362241] ? vfs_write+0xa70/0xa70 [ 1085.362688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1085.363325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1085.363928] do_syscall_64+0x33/0x40 [ 1085.364394] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1085.365006] RIP: 0033:0x7f2f4d81e69c [ 1085.365449] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1085.367605] RSP: 002b:00007f2f4ade1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1085.368499] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f2f4d81e69c [ 1085.369350] RDX: 000000000000000f RSI: 00007f2f4ade11e0 RDI: 0000000000000003 [ 1085.370201] RBP: 00007f2f4ade11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.371031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.371856] R13: 00007ffd479c47cf R14: 00007f2f4ade1300 R15: 0000000000022000 22:13:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74000000) setresuid(0x0, 0x0, 0x0) 22:13:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:13:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 22:13:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 22:13:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) [ 1085.598716] FAULT_INJECTION: forcing a failure. [ 1085.598716] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.600506] CPU: 0 PID: 9121 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1085.601502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1085.602720] Call Trace: [ 1085.603117] dump_stack+0x107/0x167 [ 1085.603661] should_fail.cold+0x5/0xa [ 1085.604237] ? call_usermodehelper_setup+0xa2/0x2f0 [ 1085.604972] should_failslab+0x5/0x20 [ 1085.605542] kmem_cache_alloc_trace+0x55/0x320 [ 1085.606238] call_usermodehelper_setup+0xa2/0x2f0 [ 1085.606948] ? copy_regset_to_user+0x170/0x170 [ 1085.607627] ? bprm_execve+0xbe6/0x1a60 [ 1085.608220] __request_module+0x3f9/0x920 [ 1085.608840] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1085.609621] ? free_modprobe_argv+0x90/0x90 [ 1085.610273] ? find_held_lock+0x2c/0x110 [ 1085.610896] ? find_held_lock+0x2c/0x110 [ 1085.611514] ? bprm_execve+0xa13/0x1a60 [ 1085.612109] ? lock_downgrade+0x6d0/0x6d0 [ 1085.612727] ? elf_core_dump+0x3c50/0x3c50 [ 1085.613360] ? do_raw_read_unlock+0x3b/0x70 [ 1085.614014] ? _raw_read_unlock+0x1a/0x30 [ 1085.614643] ? load_misc_binary+0x605/0xb70 [ 1085.615294] bprm_execve+0xbe6/0x1a60 [ 1085.615874] ? open_exec+0x70/0x70 [ 1085.616414] ? memcpy+0x39/0x60 [ 1085.616915] ? copy_string_kernel+0x3b6/0x450 [ 1085.617600] do_execveat_common+0x772/0x8d0 [ 1085.618249] ? bprm_execve+0x1a60/0x1a60 [ 1085.618882] __x64_sys_execveat+0xed/0x140 [ 1085.619527] do_syscall_64+0x33/0x40 [ 1085.620093] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1085.620861] RIP: 0033:0x7f1c8836fb19 [ 1085.621427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.624157] RSP: 002b:00007f1c858e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1085.625319] RAX: ffffffffffffffda RBX: 00007f1c88482f60 RCX: 00007f1c8836fb19 [ 1085.626414] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1085.627500] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.628578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.629668] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:13:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) 22:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a000000) setresuid(0x0, 0x0, 0x0) 22:13:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 22:13:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 22:13:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 22:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 22:13:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 22:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 22:13:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) [ 1100.695665] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1100.721265] FAULT_INJECTION: forcing a failure. [ 1100.721265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1100.722636] CPU: 0 PID: 9134 Comm: syz-executor.5 Not tainted 5.10.216 #1 [ 1100.723269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.723971] Call Trace: [ 1100.724234] dump_stack+0x107/0x167 [ 1100.724582] should_fail.cold+0x5/0xa [ 1100.724949] _copy_to_user+0x2e/0x180 [ 1100.725324] simple_read_from_buffer+0xcc/0x160 [ 1100.725768] proc_fail_nth_read+0x198/0x230 [ 1100.726175] ? proc_sessionid_read+0x230/0x230 [ 1100.726611] ? security_file_permission+0x24e/0x570 [ 1100.727074] ? perf_trace_initcall_start+0xf1/0x380 [ 1100.727507] ? proc_sessionid_read+0x230/0x230 [ 1100.727935] vfs_read+0x228/0x580 [ 1100.728266] ksys_read+0x12d/0x260 [ 1100.728599] ? vfs_write+0xa70/0xa70 [ 1100.728955] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1100.729446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1100.729888] do_syscall_64+0x33/0x40 [ 1100.730242] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1100.730728] RIP: 0033:0x7f1c8832269c [ 1100.731076] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1100.732618] RSP: 002b:00007f1c858e5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1100.733329] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1c8832269c [ 1100.733989] RDX: 000000000000000f RSI: 00007f1c858e51e0 RDI: 0000000000000003 [ 1100.734611] RBP: 00007f1c858e51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.735209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1100.735808] R13: 00007ffec80ec7af R14: 00007f1c858e5300 R15: 0000000000022000 22:13:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) 22:13:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) setresuid(0x0, 0x0, 0x0) [ 1100.773538] FAULT_INJECTION: forcing a failure. [ 1100.773538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.775027] CPU: 0 PID: 9146 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1100.775649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1100.776420] Call Trace: [ 1100.776668] dump_stack+0x107/0x167 [ 1100.777006] should_fail.cold+0x5/0xa [ 1100.777358] __alloc_pages_nodemask+0x182/0x600 [ 1100.777788] ? mark_held_locks+0x9e/0xe0 [ 1100.778164] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1100.778733] ? kmem_cache_free+0xa7/0x2d0 [ 1100.779120] alloc_pages_current+0x187/0x280 [ 1100.779523] __get_free_pages+0xc/0xa0 [ 1100.779878] ? kmem_cache_free+0x249/0x2d0 [ 1100.780268] tlb_remove_table+0x3ca/0xcb0 [ 1100.780650] ___pte_free_tlb+0x86/0xb0 [ 1100.781008] free_pgd_range+0x747/0x1380 [ 1100.781391] free_pgtables+0x230/0x2f0 [ 1100.781750] exit_mmap+0x28e/0x4f0 [ 1100.782083] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1100.782588] mmput+0xca/0x340 [ 1100.782880] free_bprm+0x65/0x2e0 [ 1100.783201] do_execveat_common+0x2e1/0x8d0 [ 1100.783599] ? bprm_execve+0x1a60/0x1a60 [ 1100.783978] __x64_sys_execveat+0xed/0x140 [ 1100.784373] do_syscall_64+0x33/0x40 [ 1100.784714] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1100.785181] RIP: 0033:0x7f2243400b19 [ 1100.785525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.787193] RSP: 002b:00007f2240976188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1100.787891] RAX: ffffffffffffffda RBX: 00007f2243513f60 RCX: 00007f2243400b19 [ 1100.788547] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1100.789202] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.789847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1100.790498] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 22:13:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:13:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 22:13:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040005, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 22:13:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 22:13:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 22:13:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) setresuid(0x0, 0x0, 0x0) 22:13:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 22:13:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) setresuid(0x0, 0x0, 0x0) 22:13:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 22:13:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 22:13:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) 22:13:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040008, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:13:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 22:13:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) setresuid(0x0, 0x0, 0x0) [ 1116.332727] FAULT_INJECTION: forcing a failure. [ 1116.332727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1116.334772] CPU: 0 PID: 9217 Comm: syz-executor.7 Not tainted 5.10.216 #1 [ 1116.335916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1116.337296] Call Trace: [ 1116.337747] dump_stack+0x107/0x167 [ 1116.338364] should_fail.cold+0x5/0xa [ 1116.339019] _copy_to_user+0x2e/0x180 [ 1116.339669] simple_read_from_buffer+0xcc/0x160 [ 1116.340460] proc_fail_nth_read+0x198/0x230 [ 1116.341187] ? proc_sessionid_read+0x230/0x230 [ 1116.341955] ? security_file_permission+0x24e/0x570 [ 1116.342799] ? perf_trace_initcall_start+0xf1/0x380 [ 1116.343650] ? proc_sessionid_read+0x230/0x230 [ 1116.344415] vfs_read+0x228/0x580 [ 1116.345008] ksys_read+0x12d/0x260 [ 1116.345612] ? vfs_write+0xa70/0xa70 [ 1116.346248] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1116.347141] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1116.348011] do_syscall_64+0x33/0x40 [ 1116.348640] entry_SYSCALL_64_after_hwframe+0x67/0xcc [ 1116.349499] RIP: 0033:0x7f22433b369c [ 1116.350126] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1116.353177] RSP: 002b:00007f2240976170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1116.354457] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f22433b369c [ 1116.355639] RDX: 000000000000000f RSI: 00007f22409761e0 RDI: 0000000000000003 [ 1116.356824] RBP: 00007f22409761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1116.358010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1116.359200] R13: 00007fff58d91a7f R14: 00007f2240976300 R15: 0000000000022000 [ 1116.387016] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:13:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 22:13:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(0xffffffffffffffff) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x40) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:13:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff) setresuid(0x0, 0x0, 0x0) 22:13:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040010, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:13:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) 22:13:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 22:13:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:13:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 22:13:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file1\x00', 0x2, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000240)="6089c1bc76e3237f03c6095b305893bec22513d8ca6c898a9e853e5a9cb8c0fbe5fc1453e1d1f8200be25593d4a5312fa84827c10d8950ccf069281561c64c78c027c0400797a13d6b2ccf431ce3da76fb8c5d6f0fd746c6cbad0f27fca928fa4ab75ba580b5553b67deda24a04c46a72626cf4555c113e4de84d5a013d37867", 0x80, 0x9}, {&(0x7f00000002c0)="7ce140aba97f2a9638068e6544bacc80c0d29a2b0e2963a81e41d38deb7b361af75e815185c1e851bfa7d1406c443507d10ae0b3cb8778d2ffbd04dcf2d2a2e59508fb9542c3a3b144fd3fa62baa89172ce3de842c3bf604acb213537b7cd01eaedeb27dfb5c7063ee930fbb961c83c060f3ffc105e11c88633a122959411458bbb810490aa8453c289c347ff5b42691d80b6849a0acb5ff77342783a2e2d77f94e939276ae23caf7e65af48d2b9cd21497ad66c4842092ba8883e97a89a39628c5c334140ebd5898f495fd29aecc1bce5ddcbc4d56160e5ffd9", 0xda, 0x1}, {&(0x7f00000003c0)="e14a6c2e265007529648ed91418a44ff77a5737ade6347ed2db8380b76e48f4f6fe233aa94b7b54f3d2c3b2ff3b2c3d94354898f4ead2cc5d97bdca991a212718f70584a70dfdbdaf3579aa538903608377e83dc0793718274247fd3f96eb51dc34597539b0cb41d32e4c5d0b992d391260965ea3d301a4a36f8364b54fdf77fb14e2b109e668cb661a20ccf724a2872", 0x90, 0x81}, {&(0x7f0000000480)="74fa0754d14f95a673efd3ff9bb4324c399a41d304693686a6fe80f04729975c94da5c1b618c07c2d97acdc56db90c99409bf63d675aab524e58a24f90f7ef681c41397d92d6", 0x46, 0x7}, {&(0x7f0000000500)="a3cf2579d3da13350a55748c58db0ff456e9190a1c497e0f40bface726f52df41fa824eccc2efc0850a71620a409e7e74bed4eab9bce6239ab50e1cc3847201092f03554794594c6b180b897f89570e12f7677fe6c42c794f02e051397a6732923275137ebec81d769dd1e9f9755f498d925914ffd1b5a8dcc9de712a323284d3b97a8436ad5950c5293a299e6aa2614747c6261caaf85930f", 0x99, 0xffffffffffffffe1}, {&(0x7f00000005c0)="9b3cf018d4beca19dc5d54734785cd8aee8e88058d4186f323735290dd47d2e387e13f3d5ba35976593e764bd29a7237292b6de3b89971321ce8c123a28b27d602c084e5338d70e54605b5c3c9196c20edbc17c65c15395ed04ab413b37e8bff24b35dbd3ef2c9c96b35a74d1efcdee24ed214ef6bf1c265be9600214b1df31d9900d07010e84c28f588d2aa2d6c53d0a88fae067b9c3ae13d8b87469665b19d977d559c848225264e157b514cb81a2fcdfd147ff7530db3f9d7e36af97178d549995904837acefacae9f9065928fd1bb5c76ab28a684a278b", 0xd9, 0x3}], 0x1022002, &(0x7f0000000780)=ANY=[@ANYBLOB="6c617a7974696d652c6e6f626c6f636b5f76616c69646974792c66736d616769633d34f8303030303030303030303030303030332c646566636f6e746578743d73797361646d5f752c7365636c6162656c2c667363a8777a4363e09a49746166665f752c7065726d69745f646972656374696f2c726f6f74636d2c66736e6d69745f646972656374696f2c000000000000000000"]) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000840)=""/4096) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={r1, 0x3, 0x2, 0x2}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4402, 0xbf) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x8) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1131.005207] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:13:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff) setresuid(0x0, 0x0, 0x0) 22:13:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 22:13:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 22:13:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 22:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) 22:14:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040014, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 22:14:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 22:14:00 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, 0x0, 0x0) r1 = request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffffb, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$revoke(0x3, r3) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 22:14:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f0000) setresuid(0x0, 0x0, 0x0) 22:14:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 22:14:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x400800, 0x20) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 22:14:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f) setresuid(0x0, 0x0, 0x0) [ 1145.363767] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:14:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 22:14:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) 22:14:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 22:14:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404002e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040104, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) setresuid(0x0, 0x0, 0x0) 22:14:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 22:14:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) bind$unix(r1, &(0x7f0000000080)=@file={0x0, './file1/file0\x00'}, 0x6e) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x202, 0x63) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 22:14:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 22:14:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 22:14:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) [ 1160.615562] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) 22:14:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 22:14:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) setresuid(0x0, 0x0, 0x0) 22:14:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 22:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 22:14:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 22:14:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4044001, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) sendfile(r0, r2, &(0x7f0000000040)=0x14a, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 22:14:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) [ 1161.000716] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5005) 22:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffb) setresuid(0x0, 0x0, 0x0) 22:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4044002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 22:14:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) 22:14:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 22:14:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 22:14:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={'U+'}, 0x16, 0x3) 22:14:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) [ 1177.015508] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 22:14:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 22:14:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 22:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffffe) setresuid(0x0, 0x0, 0x0) 22:14:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4044003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 22:14:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 22:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 22:14:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 22:14:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 22:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) setresuid(0x0, 0x0, 0x0) 22:14:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4048002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='./file1\x00', 0x40000, 0x88) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 22:14:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x48) 22:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) setresuid(0x0, 0x0, 0x0) [ 1191.035445] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 22:14:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 22:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x64) 22:14:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 22:14:46 executing program 3: ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$CDROMVOLCTRL(r2, 0x530a, &(0x7f0000000080)={0x9, 0x4, 0x4}) 22:14:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5005) 22:14:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4048003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1191.228137] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4048700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:14:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) setresuid(0x0, 0x0, 0x0) 22:14:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 22:14:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:14:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 22:14:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c) 22:14:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 22:14:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800) 22:14:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x68) 22:14:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 22:14:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) [ 1204.406554] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:14:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 22:14:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00) 22:14:59 executing program 3: r0 = epoll_create1(0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000004c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)={0x20000000}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000200)=0x8) ppoll(&(0x7f0000000080)=[{r0, 0x1030}], 0x1, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={[0x2]}, 0x8) close(r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1204.520413] audit: type=1400 audit(1715465699.951:27): avc: denied { block_suspend } for pid=9581 comm="syz-executor.3" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 22:15:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c) 22:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:15:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f) 22:15:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 22:15:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 22:15:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) setresuid(0x0, 0x0, 0x0) 22:15:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400) 22:15:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4048800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1218.755851] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 22:15:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4048900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) setresuid(0x0, 0x0, 0x0) 22:15:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 22:15:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000) 22:15:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404c000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 22:15:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00) 22:15:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a) 22:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) openat(r0, &(0x7f0000000040)='./file1\x00', 0x1c9002, 0x100) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:15:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 22:15:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) setresuid(0x0, 0x0, 0x0) 22:15:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 22:15:28 executing program 3: prctl$PR_SET_IO_FLUSHER(0x39, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:15:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) 22:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 22:15:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 22:15:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404c001, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:28 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 22:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xff0f) [ 1233.343851] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 22:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 22:15:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) setresuid(0x0, 0x0, 0x0) 22:15:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404c002, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) [ 1233.503843] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404c003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x321) 22:15:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) setresuid(0x0, 0x0, 0x0) 22:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 22:15:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 22:15:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) [ 1248.381410] 9pnet: Could not find request transport: xen 22:15:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 22:15:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140), 0x800048, &(0x7f00000001c0)={'trans=xen,', {[{@uname={'uname', 0x3d, '/${'}}, {@nodevmap}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@dont_measure}]}}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x400) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1248.428131] 9pnet: Could not find request transport: xen 22:15:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 22:15:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200442, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r3 = socket$netlink(0x10, 0x3, 0xa) sendfile(r2, r3, &(0x7f0000000540)=0xbb55, 0xff) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) syz_open_procfs(r4, &(0x7f0000001700)='net/ipv6_route\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) syz_open_procfs(r5, &(0x7f0000001700)='net/ipv6_route\x00') r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000000c0)) r7 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r6, 0x40049409, r7) sendmsg$unix(r2, &(0x7f00000001c0)={&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000002c0)="88b5b5222a967059e17532bf81a2817d5e8b27b2ef1ea643108e8cf86ad998c4a5ee715263fe5c75b4082441b7c0adcb8c824cf90b61eee8e32efa0d23b263658c25794f3174e7521cbec0119853486a2c882b17063c78934baeedc0afb00fc84745b8e5a2121300576cfd5a00a116c359dcae23ef00f73d3e3a3dbbac193e04d811f9c010e17d7ef657", 0x8a}, {&(0x7f00000000c0)="11fdb7927a5059b0b1000c", 0xb}, {&(0x7f0000000380)="028e13ce7576f97c20a768b4dd070d49d2b5b4a72091ee7f679aab46719b72410243cfcb4f65713a56a0eefa8fb4f6f7cc64acbea99220da1ed7458c77ea1fee138287d50091878f1143f79ae8f730e915f9fb921929647e7a710e9e8dd609c9fc8e50b897", 0x65}, {&(0x7f0000000400)="7bdc42a302489abb685699a5975df7bc00c235f55af9f464356da4f3c55be2b772ddc2d77638723964357fa395ac354e7b61c00e148f1f7e99231db54e394cc6e2367e7f55d98f1f0ba85d0b52bfab22bfc38df189e4ea48ebcc1b7d69595f58318830", 0x63}], 0x4, &(0x7f0000000480)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x88, 0x4004040}, 0x2404c844) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1248.481565] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 22:15:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 22:15:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404ff03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 22:15:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 22:15:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) setresuid(0x0, 0x0, 0x0) 22:15:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) 22:15:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) [ 1248.701775] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 22:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:15:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) setresuid(0x0, 0x0, 0x0) 22:15:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x404ff0f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) 22:15:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x550) 22:15:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 22:15:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="4c4da88c17edb2691d8adff2aa", 0xd}, {&(0x7f0000000240)="c10e94e90d5c163dce899a60b145c8156fca7d18ee9923b0cd499179208dd0d7df1508ccd86a7f3e4d7723af28f268315590223f5af4ec5136a4a6537cfd804c78c1be404ab8ff94a752ceb36b95ec696c06df2281994de64fabf8e227fed412fc10cee86fea06829765af6c36b8cff965781d22a75316e527102062ce30e5011abbe9", 0x83}, {&(0x7f0000000300)="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", 0x1000}], 0x3, 0x80000001, 0x81) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1263.391533] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:15:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 22:15:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 22:15:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 22:15:58 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 22:15:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 22:15:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) setresuid(0x0, 0x0, 0x0) 22:15:58 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r1 = syz_open_procfs(r0, &(0x7f0000001700)='net/ipv6_route\x00') readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) r3 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r2, 0x40049409, r3) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/12, 0xc}], 0x1, &(0x7f0000001640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}, 0x10000) r5 = syz_open_procfs(r4, &(0x7f0000001700)='net/ipv6_route\x00') readv(r5, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r6 = accept(0xffffffffffffffff, &(0x7f0000000040)=@vsock, &(0x7f00000000c0)=0x80) ppoll(&(0x7f0000000240)=[{r1, 0x40}, {0xffffffffffffffff, 0x5001}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x2010}, {0xffffffffffffffff, 0x100}, {r3, 0x1040}, {r5, 0x80}, {0xffffffffffffffff, 0x6}, {r6, 0x8408}], 0x9, &(0x7f0000000140), &(0x7f00000001c0)={[0xfffffffffffff82d]}, 0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x8201, 0x24) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000200)=0x8) close(r7) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:15:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 22:15:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) [ 1263.590196] EXT4-fs error (device loop1): ext4_fill_super:4962: inode #2: comm syz-executor.1: iget: special inode unallocated [ 1263.592503] EXT4-fs (loop1): get root inode failed [ 1263.593408] EXT4-fs (loop1): mount failed 22:16:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 22:16:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) setresuid(0x0, 0x0, 0x0) 22:16:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:16:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:16:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 22:16:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 22:16:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)) r2 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000400)="f2314552c962d2a80b08c9fde063ad2b22e73f353c6ff20ef8c7824584de73fd4cf97835e6ae922782bee15446fc19bcb3f91a5b2ef3a063badcf7c5a95206f3f04498c4d6d08c98c1519af26a7c93e0a26ccb49b50f700a6cb5587ab22445f2477c44fa3419432d6838f6eb338418afc7a301c686bcc1c61ab6cba4a18e86d4fa09998eaee9417c9215161e6ae75e14d5daf54087903e2efa27ffc9a178bbbe48a4bd14ddb1c07ff5685c07d36b9b279097", 0xb2, 0xbef}], 0x40000, &(0x7f0000001500)={[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}) ioctl$FICLONE(r1, 0x40049409, r2) fallocate(r1, 0x9, 0xfffffffffffffffb, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x8) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1cbb43, 0x0) ioctl$CDROMVOLCTRL(r4, 0x1261, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000140)=0x1) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000007, 0x2010, r3, 0x10000000) syz_io_uring_submit(0x0, r5, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x5}, 0x2) openat(r2, &(0x7f0000000080)='./file0/../file0\x00', 0x741800, 0x30) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:16:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) 22:16:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 22:16:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 22:16:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 22:16:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 22:16:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) setresuid(0x0, 0x0, 0x0) 22:16:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) 22:16:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103) [ 1276.252193] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:16:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:16:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) 22:16:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 22:16:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) setresuid(0x0, 0x0, 0x0) 22:16:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 22:16:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) 22:16:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:16:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 22:16:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x230503, 0x16f) r1 = openat(r0, &(0x7f0000000180)='./file1\x00', 0x0, 0x2) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) signalfd(r1, &(0x7f0000000040)={[0x10001]}, 0x8) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x1cbb43, 0x0) ioctl$CDROMVOLCTRL(r2, 0x1261, 0x0) execveat(r2, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100) 22:16:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 22:16:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00) 22:16:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) setresuid(0x0, 0x0, 0x0) 22:16:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) 22:16:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2123) 22:16:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 22:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 22:16:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2321) 22:16:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) setresuid(0x0, 0x0, 0x0) [ 1289.806947] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:16:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) setresuid(0x0, 0x0, 0x0) 22:16:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000) 22:16:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800) 22:16:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) 22:16:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5005) 22:16:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x808000, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@nodevmap}, {@version_L}, {@version_L}, {@cachetag}], [{@hash}, {@permit_directio}, {@measure}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@obj_type}]}}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x8) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 22:16:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4040004, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000000)="ed412000e992b200dfd7655fe0f4655fe4f48a5f000008000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) 22:16:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 22:16:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x21030000) [ 1302.749777] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 22:16:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x23210000) VM DIAGNOSIS: 22:21:42 Registers: info registers vcpu 0 RAX=ffffffff83e69e90 RBX=0000000000000000 RCX=ffffffff83e51c8c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6a498 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff856740c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e69e9e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffee4d4ae08 CR3=0000000019e0c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=b767ebe31fcff2bc7699ffee9212227f XMM02=f2323a2f97699feaf59f4d33fdccff6e XMM03=699febbaeb7699fdb767ebe31fcff2bc XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e69e90 RBX=0000000000000001 RCX=ffffffff83e51c8c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e6a498 RBP=ffffed1001130000 RSP=ffff88800898fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff856740c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e69e9e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1a8640b010 CR3=000000001b96c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000040ead40000000000 XMM03=39d296fca22f9ccafc167fdd96fc45d7 XMM04=fc45d7da96fcb6cdd733fcfc79c796fc XMM05=26fc3e39d296fca22f9ccafc167fdd96 XMM06=040f0141d1d396fcd5052f96fc6df9db XMM07=00000606040600040006040206040606 XMM08=65657320636578650a0073746e696820 XMM09=650d007a7a7566206365786509007364 XMM10=78650a00657a696d696e696d20636578 XMM11=6320636578650e006873616d73206365 XMM12=7420636578650b006574616469646e61 XMM13=61746f7420636578650a006567616972 XMM14=7473657220726f74756365786511006c XMM15=00006e65672063657865080073747261