E(r0, 0x5415, &(0x7f0000000000)) 23:59:53 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2266498, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x64, 0x32, 0x61, 0x65, 0x63, 0x7, 0x65], 0x2d, [0x62, 0x36, 0x36, 0x65], 0x2d, [0x63, 0x35, 0x65, 0x30], 0x2d, [0x61, 0x32, 0x39, 0x35], 0x2d, [0x31, 0x38, 0x32, 0x37, 0x61, 0x31, 0x30, 0x35]}}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x63, 0x38, 0x65, 0x38, 0x37, 0xf9, 0x62], 0x2d, [0x2fa2dc47d4e42c7a, 0x39, 0x31, 0x34], 0x2d, [0x32, 0x37, 0x35, 0x62], 0x2d, [0xb6f89dade00ce6b5, 0x34, 0x38, 0x30], 0x2d, [0x37, 0x39, 0x37, 0x39, 0x65, 0x38, 0x64, 0x32]}}}]}}) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) 23:59:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 23:59:53 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 23:59:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5416, &(0x7f0000000000)) [ 1321.929939] FAT-fs (loop4): Directory bread(block 5) failed 23:59:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x4c000000, 0x0) 23:59:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) r2 = openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() getpgid(0x0) r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, r3, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) 23:59:53 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 23:59:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe6a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x7, 0xaa, 0x4, 0x1, 0x0, 0x5, 0x8, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x40400, 0x5, 0x4, 0x9, 0x100, 0x5, 0x2, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ftruncate(r0, 0xec8) 23:59:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 23:59:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5418, &(0x7f0000000000)) 23:59:53 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="141fcde49e0000d900"/19, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\'\x00\x00\x00'], 0x14}}, 0x40000) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x101, 0x0, 0x5}) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1d4, 0x31, 0x4, 0x70bd25, 0x25dfdbfd, {0x2}, [@nested={0x130, 0x2b, 0x0, 0x1, [@typed={0x8, 0x64, 0x0, 0x0, @uid=r2}, @generic="ef07a37bb7691b94ce9825523415dc6a8678b274859e905f6ef51de1b82519f45ac64afc659924479417837c1c52cbbaf3189b21d09f0c04fa208eee637a767f461dba82dc9311ebef", @typed={0x4, 0x59}, @typed={0x14, 0x21, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @generic="f02f2515f7606c33d1f54a27433dbf00d3048dd777454651f12c5aa21faa4e24c10b2dfbe2590d34d515b61db7ac82e131945c3fc85b950d3e66be3e194dbdbca121dc3ac99106a98ff4708b535fbbbc63852bd6bf4dd59b8aa07f735ba849897ce5321be2cef9694b89bea19a94a06fb70b20450a96abffcca8179325d4169c2150ed324b98e1b8cc00b8f9f3c6bb33df32d8214acbe86e227de250b4d6a554da5c6408593c9b9fdf5cdd03142b0f672fc59e100aac0e0cbdbe64", @typed={0x8, 0x27, 0x0, 0x0, @u32=0x9}]}, @nested={0x76, 0x58, 0x0, 0x1, [@generic="7c33432172071f4c779e4ded83955fb1f9f2d404c4974a86438ba06e1a585ffdea81c1ec0ba225c2ddbdc1cc18bdb188a2012ba5dfbd49fabece16a750e0a4ecbec0667a51341991fb317790cfad43a81f08ed85d8350a606b6fcde895620d679d2f385201861cafec41", @typed={0x8, 0x19, 0x0, 0x0, @uid=r3}]}, @typed={0xc, 0x38, 0x0, 0x0, @u64=0x10001}, @typed={0xc, 0x89, 0x0, 0x0, @u64=0x2}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x24008000}, 0x4080) 23:59:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 1322.205233] FAT-fs (loop4): Directory bread(block 5) failed [ 1334.539639] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:00:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:00:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() getpgid(0x0) r2 = gettid() r3 = getpgid(0x0) rt_tgsigqueueinfo(r3, r2, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) 00:00:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x68000000, 0x0) 00:00:14 executing program 5: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:00:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541b, &(0x7f0000000000)) 00:00:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) pwrite64(r0, &(0x7f0000000680)="93", 0x1, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x1, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x2080, 0x40) 00:00:14 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x2, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:00:14 executing program 4: mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x1ff) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f0000000140)) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000080), 0x1) [ 1343.122573] FAT-fs (loop4): Directory bread(block 5) failed 00:00:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541c, &(0x7f0000000000)) 00:00:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x6c000000, 0x0) 00:00:14 executing program 5: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:00:14 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:00:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0xa5c33, 0x0) 00:00:14 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1343.452853] FAT-fs (loop4): Directory bread(block 5) failed [ 1354.261526] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:00:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0xa, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:00:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541d, &(0x7f0000000000)) 00:00:39 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) getdents64(r0, &(0x7f00000005c0)=""/80, 0x50) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x6, &(0x7f0000000400)=[{&(0x7f0000000140)="873f6f5babec93944b38f06b11ee0a7dc621006b9407fd3633ba40b3285c1547891546ac9c06c49a618ecfeb929ca9d1ca7f860b27ca9a6a33715f4ffffdc882fa6f387166eed4e9a952936e319c82c13c88b5269d1829be1074efd8f2b07ff3fc68ed230a", 0x65, 0x2}, {&(0x7f0000000240)="4425a92de2170780cd78a230b988d907784bcf873f894a23cf97e2cb1a35f201c6d594dba7bee724a5d20a4d921fbc137cc0d5f7d5230fd2386773e24a5d0c71934cbe7e3f4248d292757e84", 0x4c, 0x8000}, {&(0x7f00000000c0)="ca364b11", 0x4, 0x9}, {&(0x7f00000001c0)="bae9124aa9919cef8940036c6beb3f7f68eb3136e4d23b528b48ea1b8d7e5bd052f39f5803d7693142237b79f7acd5a8b5350f", 0x33, 0x800}, {&(0x7f00000002c0)="bf589bd5f7a4432a0a418f062a41ccd4c51a50215aaff5fa0a8a08d86929de", 0x1f, 0x1ff}, {&(0x7f0000000300)="73a90fdbc9d5de126945ba18889f652392230ce4fd0cde437ef806f91ab3174f5b0c90a4d80ea84cefda99c9ab649d056a7fc72a8cb27ea1ffc061cd565444956275a18ebc65d15df511101bc48450996dcf5c517df12d8198823c1295dc7d0e80188701c9bba6a9a7c6fdd72be1e0dfc2c10a2ff85ae23da6582065f57515b8be0599d8517bbcb5932fb5ccb8c4d851e9ad81b039de5690346cfc1e011eb8c38b31f9458dd08e24eecca90a30bccd46506f5c43ab40c4d40baa599f59c203f5205e708a301e3ff4e6cf662c97e5d2674c", 0xd1, 0x8459}], 0x2001, &(0x7f0000000640)=ANY=[@ANYBLOB='sb=0x0000000000000009,inode_readahead_blks=0x0000000008000000,data_err=abort,context=staff_u,hash,fowner<', @ANYRESDEC=0xee01, @ANYBLOB="2c6d6561737572652c004271dee1e80eccec414eb9ce43df2f23d8ce7aaa199f8eca673b906ba3f484df45aab7b5e164266bea5c3189e9b25c407488296b9bceaa"]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000580)={@id={0x2, 0x0, @d}}) 00:00:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 00:00:39 executing program 5: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:00:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x74000000, 0x0) 00:00:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:00:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() getpgid(0x0) gettid() getpgid(0x0) [ 1368.423725] FAT-fs (loop4): Directory bread(block 5) failed [ 1368.433217] FAT-fs (loop4): Directory bread(block 5) failed 00:00:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x1889d314, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="10ee8dc80409cdac213c0f77ba85eb1373926878a5dd84421e91e83e26d8d890f95bda59f9f1ebee27acbb840e5c61fc98e994299504e09311b20d9c30a2745ac7c318b3136387675a0acb88c239e509c5ba6f52e353407e42fb5f8ac442ab3f555da792551f0852e7df2610d4d61e848319447057b9f952c0a55a360f678d5bf8f334af142d", 0x86, 0x800}, {&(0x7f0000000340)="24ae5993b807bef9be51a74ebf2b454a6dd97eebd9b09951fd43cdd56e1abcbfa51b45a25f51e57255eadb986b98075084ec0edb1d2bcda64d718d722622701991eecb05d5fc413e63c9f27439b893b13453ecc55875547388df442c250a3a6afc577a4b1116fe7accc468fcda9a0508f584432d36315768ba3d8b5a83d5953058ff", 0x82}], 0x2020, &(0x7f0000000440)={[{@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffe37}}, {@dots}, {@fat=@quiet}, {@fat=@flush}, {@nodots}], [{@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@smackfsfloor}, {@euid_eq}, {@subj_role={'subj_role', 0x3d, '@'}}, {@pcr={'pcr', 0x3d, 0xf}}]}) mknodat(r0, &(0x7f0000000500)='./file0\x00', 0xc000, 0x20) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) mount$9p_tcp(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800000, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030103030303030303030346532312c63616368653d6c6f6f73652c6673757569643d38383235305732652d663518392d61304536f87350e04657fb256434323c62332c736d61636b6673726f6f743d766695b24ce5736d61636b66737472616e736d757d653d2c00"]) 00:00:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) 00:00:39 executing program 6: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000100)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) mq_open(&(0x7f0000000000)='-@\x00\xb7!\xf9Z\xbb,;\x7f\xc0\xa9J\xb3\v\xfb\x84\xaa\xb5\x9a\xa4O\xa8\xb5\xd2\x13/z\v\xae\xfc\xfek*D\xeb{\t\xba>\xe8\xe2\xba\x00\x00\x00\x00\x00\x00\xd0zd\xccD\xf4a\xd8/\x90x\xb5\xd8\x04\x19u\xf9D\xb7Eq\xc1\xcee\xd9\b0\xec\v\xe3\x96\x1f\x80\xe4Nk\xa6\xe1\b\x97,\x8b/\x96\x9b\xdb&\xd1\xe3J\xd5\xaf\xe3\xfc\xde\xbe\xa0\x8b\xeb\xea%\x10eW\xf6\xa0J\xe51\xa4\xfesm\x96\x89\x0f\xea\xa6\xc02\xd4\xb8y\x83L\xc4\x93U\x15\x9b\f\x9b\xc3Z\xff\\\x9d\x83\xe6\xc7fc\xa9n\x8e\aV\xe8\xf9\xf9\xe4\xfb+~\xabu\xf9K\x1d9[\xcd\x9b;=6Q\x80', 0x3, 0x0, 0x0) 00:00:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:00:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x7a000000, 0x0) 00:00:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) [ 1368.672598] FAT-fs (loop4): Directory bread(block 5) failed 00:00:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:00:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x399, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1368.721156] 9pnet: p9_fd_create_tcp (9128): problem connecting socket to 127.0.0.1 [ 1368.746878] 9pnet: p9_fd_create_tcp (9137): problem connecting socket to 127.0.0.1 [ 1380.854575] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:01:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xfeffffff, 0x0) 00:01:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:01:00 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0xa00, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:01:00 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5421, &(0x7f0000000000)) 00:01:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x1889d314, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="10ee8dc80409cdac213c0f77ba85eb1373926878a5dd84421e91e83e26d8d890f95bda59f9f1ebee27acbb840e5c61fc98e994299504e09311b20d9c30a2745ac7c318b3136387675a0acb88c239e509c5ba6f52e353407e42fb5f8ac442ab3f555da792551f0852e7df2610d4d61e848319447057b9f952c0a55a360f678d5bf8f334af142d", 0x86, 0x800}, {&(0x7f0000000340)="24ae5993b807bef9be51a74ebf2b454a6dd97eebd9b09951fd43cdd56e1abcbfa51b45a25f51e57255eadb986b98075084ec0edb1d2bcda64d718d722622701991eecb05d5fc413e63c9f27439b893b13453ecc55875547388df442c250a3a6afc577a4b1116fe7accc468fcda9a0508f584432d36315768ba3d8b5a83d5953058ff", 0x82}], 0x2020, &(0x7f0000000440)={[{@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffe37}}, {@dots}, {@fat=@quiet}, {@fat=@flush}, {@nodots}], [{@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@smackfsfloor}, {@euid_eq}, {@subj_role={'subj_role', 0x3d, '@'}}, {@pcr={'pcr', 0x3d, 0xf}}]}) mknodat(r0, &(0x7f0000000500)='./file0\x00', 0xc000, 0x20) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) mount$9p_tcp(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800000, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030103030303030303030346532312c63616368653d6c6f6f73652c6673757569643d38383235305732652d663518392d61304536f87350e04657fb256434323c62332c736d61636b6673726f6f743d766695b24ce5736d61636b66737472616e736d757d653d2c00"]) 00:01:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_WRITE={0x17, 0x5, 0x4007, @fd_index=0x3, 0x100000000, &(0x7f0000000040)="376aca14a8f0189ac1aee8c1f803b274f3a87b8c0d52e24fd56a94ce4de562ae4bdc7b180b4d4f3adbe586a422110153e55b801a873dfe17b9fefcb4772f29a7c5b4ccc37fec5cb317a4bfb340341540ba592466bd0b4dbb65a672fe9eb2ed3dd757f3", 0x63, 0x14, 0x1}, 0x1000) syz_io_uring_setup(0x64a9, &(0x7f0000000240)={0x0, 0xeacf, 0x0, 0x2, 0x3de, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r5, &(0x7f00000002c0)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x1, 0x7, 0x0, 0x2, 0x5, 0x0, {0x0, r6}}, 0x80000001) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:01:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() getpgid(0x0) gettid() 00:01:00 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1389.630543] FAT-fs (loop4): Directory bread(block 5) failed [ 1389.640986] FAT-fs (loop6): Directory bread(block 5) failed 00:01:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xfffffffe, 0x0) 00:01:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5422, &(0x7f0000000000)) [ 1389.674265] 9pnet: p9_fd_create_tcp (9163): problem connecting socket to 127.0.0.1 00:01:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:01:01 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) 00:01:01 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) 00:01:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() getpgid(0x0) 00:01:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5423, &(0x7f0000000000)) 00:01:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:01:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4000, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:01:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 1389.917626] FAT-fs (loop4): Directory bread(block 5) failed [ 1389.921563] FAT-fs (loop4): Directory bread(block 5) failed [ 1401.886273] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:01:21 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2fd1, 0x0, 0x0, 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0xa400, 0x0) r6 = dup2(r3, r5) r7 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r8, 0x0, r7, 0x0, 0x200f5ef, 0x0) sendto$unix(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 00:01:21 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:01:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:01:21 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x9903, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:01:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5424, &(0x7f0000000000)) 00:01:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x2) 00:01:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() gettid() 00:01:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x109442, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'dummy0\x00', &(0x7f0000000080)=@ethtool_modinfo={0x42, 0x5, 0x7}}) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1410.018084] FAT-fs (loop4): Directory bread(block 5) failed 00:01:21 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:01:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5425, &(0x7f0000000000)) 00:01:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x7}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x810010, 0x0) chdir(&(0x7f0000000140)='./file0\x00') 00:01:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x3) 00:01:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:01:21 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:01:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5427, &(0x7f0000000000)) 00:01:21 executing program 6: prctl$PR_SET_TSC(0x1a, 0x3) r0 = syz_io_uring_setup(0x7d31, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/102400, 0xfffffc7b) openat(r3, &(0x7f0000000080)='./file0\x00', 0x1080, 0x54) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f00000190c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r4, 0x0}, 0x0) io_uring_enter(r0, 0x45, 0x0, 0x0, 0x0, 0x0) [ 1410.211841] FAT-fs (loop4): bogus number of reserved sectors [ 1410.213380] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1410.252384] FAT-fs (loop4): bogus number of reserved sectors [ 1410.254085] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1422.737895] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:01:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4) 00:01:42 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:01:42 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) clone3(&(0x7f0000000140)={0x50000300, 0x0, 0x0, 0x0, {0x80003f}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f00000005c0)={{r0}, 0x0, 0x8467619b0d8488e2, @inherit={0x78, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000600000000000000000000000400000000000000ff0f0000000000002c07000000000000f70d0000000000000101000000000000bf0d00000000000001000000000000000800000000000100b6b00000000200000000000001ffffffffffffff1d00"/120]}, @devid}) 00:01:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:01:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000005c0)=0x0) r3 = openat(r0, &(0x7f0000000600)='./file0\x00', 0x4800, 0xbd) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x60, 0x0, 0x73, 0x0, 0x0, 0x0, 0x8020, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x1, 0x7}, 0x10841, 0x723d, 0x3, 0x3, 0x4, 0x100, 0x4, 0x0, 0x8, 0x0, 0x9a0c}, r2, 0x1, r3, 0x9) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000240)=""/235) 00:01:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5428, &(0x7f0000000000)) 00:01:42 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x2}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:01:42 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x2, 0x40) fork() [ 1430.839450] FAT-fs (loop4): Directory bread(block 5) failed 00:01:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5429, &(0x7f0000000000)) [ 1430.864279] FAT-fs (loop4): Directory bread(block 5) failed 00:01:42 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:01:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17, 0x9}, {0x0, 0x0, 0x800}], 0x1840809, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1, @ANYBLOB="d062cbc21367e1b9041d454adc2f9791a6d29e8526aeb7d88ffa25d003758241a9ebc9ac0ba9d97da2eeea703e830897c4e1f9103b95f34100", @ANYRESHEX=r2]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:01:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x5) 00:01:42 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 1442.947283] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:02:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5437, &(0x7f0000000000)) 00:02:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x202000, 0x48) fork() 00:02:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x805}], 0x900404, &(0x7f0000000100)=ANY=[@ANYRES64=0x0]) chdir(&(0x7f0000000080)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:02:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6) 00:02:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:01 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x3d}, {0x6}]}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c2000000080045000030000000000001907800000000ffffffff0c0090780000000045e6ffffffffffffff000000ac141400ac1414aab9fb62138e4b1cb6e73d2a0f88bceb301d7fb84311cfcdf180fc95ed"], 0x0) 00:02:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:02:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x4}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed41000000080000dff4655fe0f4655fe0f4655f0000000000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x109000, 0xb6) syz_mount_image$nfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x2, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000280)="a2b3a406f7d6259878e5389b330b529a2150755c7426f05619b769744594d5877868366bbacf47fa002330127b0d8c6e84079deff477a0da34ca4f532abbec8f247d001b601567f3708f1e50c504a77b1511d7d895dc3bd8c3aa152e05c420e0794b1a514479187c62b4afffe7f6f04b3c434c9d50e5d30c93e0cb9e69eb06018a14df2041138682f2", 0x89, 0x2}, {&(0x7f0000000340)="24d9d01d1a0c5c4d4cc078242d363fa22d56d9e7012fec4856b0840de320e3acefd3295d3fab0025b2fc3a20c941ccca6a1ba754901ceaa7906d43f71c2197a6be0096f879a0e2e78597c512b8e6b53240a056a7", 0x54, 0x400}], 0x2000000, &(0x7f0000000400)={[{'[^/'}, {'%#[-,#,\\#'}, {'ext4\x00'}, {'ext4\x00'}, {'ext4\x00'}, {'&,+'}, {','}, {'ext4\x00'}], [{@subj_type={'subj_type', 0x3d, '-\\\xbf'}}]}) creat(&(0x7f0000000140)='./file0\x00', 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x5) 00:02:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5441, &(0x7f0000000000)) 00:02:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:02:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 00:02:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7) [ 1450.254451] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 00:02:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0xa}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5450, &(0x7f0000000000)) 00:02:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) fork() 00:02:01 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)={[{@uni_xlate}]}) openat(r0, &(0x7f0000000000)='./file0\x00', 0x80140, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x23) [ 1450.411267] FAT-fs (loop4): Directory bread(block 5) failed [ 1450.426542] FAT-fs (loop4): Directory bread(block 5) failed 00:02:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x8) 00:02:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5451, &(0x7f0000000000)) 00:02:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8400, 0x80) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:02:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x399}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1450.597418] FAT-fs (loop4): Directory bread(block 5) failed [ 1460.912187] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:02:20 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0xa00}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:02:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x2, 0xa01c5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200eadb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 00:02:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5452, &(0x7f0000000000)) 00:02:20 executing program 6: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x14402, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x1ef7, &(0x7f0000000180)={0x0, 0xdfeb, 0x0, 0x1, 0x1b8, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000280)=0x0) syz_io_uring_submit(r3, r5, &(0x7f00000002c0)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, r1, 0x0, r0}, 0x7) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000b, 0x13, r2, 0x0) syz_io_uring_submit(r6, r4, &(0x7f0000000040)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r1, 0x0, 0x0, 0x0, 0x80000}, 0x8006) clone3(&(0x7f00000015c0)={0x82000, &(0x7f0000000400)=0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480), {0x17}, &(0x7f00000005c0)=""/4096, 0x1000, &(0x7f00000004c0)=""/15, &(0x7f0000000500)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x4, {r0}}, 0x58) pread64(r7, &(0x7f0000001640)=""/141, 0x8d, 0x1) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r8, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fstatfs(r8, &(0x7f0000000300)=""/206) 00:02:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0xa) 00:02:20 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:20 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', r1, 0xee00, 0x100) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x1000, 0x2, 0x400, 0xf2}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x0) [ 1469.486454] FAT-fs (loop4): Directory bread(block 5) failed [ 1469.527447] FAT-fs (loop4): Directory bread(block 5) failed [ 1480.726785] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:02:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x4000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x545d, &(0x7f0000000000)) 00:02:39 executing program 3: fork() 00:02:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) ioctl(r1, 0x7, &(0x7f0000000180)="a5aa9774b21cc8d06fa047a982ea6dfd8c3b3e50eec76f3cf54fbcc9dd215c191023b15921c391e0f347868dad9c54c872fb867aec8cd5ead1f62da7ed036160cb9647b2fc45f002b9f1da6cf67ba2b098cd27c6db784ae93b131747b0e853dc4bc19a03178bf71fe4cc4d19000a01f3e4153ed0a7b16eb984a537cd0155ed0f7864302775") 00:02:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x10) 00:02:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:02:39 executing program 6: unlink(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00') [ 1488.534718] FAT-fs (loop4): bogus number of reserved sectors 00:02:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5460, &(0x7f0000000000)) [ 1488.536301] FAT-fs (loop4): Can't find a valid FAT filesystem 00:02:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:40 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) copy_file_range(r1, &(0x7f0000000080)=0x5, r0, 0x0, 0x0, 0x0) 00:02:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x48) 00:02:40 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000007c0)="5ea8706c7a83599ba01fe910ebfe58eb3e99911119e56cb27f2d33d9799fc3f46adf4d7d3275456e4b63081e04999e58119d4efe431aa4b7eb8d6d04e76d030dc7f58d864fb6fb064fdae74c775999303cda9fdb65a32399e87632b80eb089b1bf229863f6630e911017046c64dfe5247b04888695f1d600073ccf51d5df1fc1c0f7dc70db172dacd72c73ab9aaf183f6a89e81cb7c8ad6c9557953f008073bfe6873e2d92a309c04df4438b3b8dbd2c71fdf8b15a14337dca2fcab1070a6281104c6cb300e0f3c389bcee8e5adfabd74fe4a8162da8db7e85c98b641a4690b02e89410a89747f2b2e4427589511bb0c2ed4f570548e8eefa63a7b1121ab7d38238181b4229a9e23ad709b40037ea0dd478a55bb577aae8a90e5032abfbd696f86f68c3ea42a1432f7bc1b6bc34bc31bcaced7deec977ae1e7164410ab7fe2fd4450d11605d15a4ec4fe35668284a6abfee53e4bc9c53306b94f4572d79d2feee9acc48b55fdfb0ede6a5127dadf47d7031572873933f8ad7067821290ede5f8bb23d94c81c7b22c0da634c6a44b770ca30f87c3a66a3b495e1bde7c647b824fb480fd6fbaf0215eed13399f4ca91bf8ede9b50a06d320d90d89ed069d25c0d51604a8daea31fe0c4d50d574497cbd7e4ae1bc0cfaa962dd30864829cdaacd73478bd9f8d3f686fdda9fdaae15736854410e7d889116211c80f7b722df10fd47e218a5eb9dfb7c925106061159d4a8c229263a728f8e901ac55e086868ca5a192731c669d29e2b96dd6d30c4c5c3d4f566a5da598bbd2b1f33eaa130aa94f2748a84527c15b998d0cff68fa841d3f5031b995bddcfc548a2db55d25b168f2d04536f52b9ce2360d426a35f30712f886d887bbede71c1b07a3c1144cac79ed3b2b65193a5fd7ea24311798587ab2f45f79609211c66257f9eb97bab1b33a7593f013196d779a2708b24456756d6fdacbf2a535c6212dd890ad520cb4850d55adb1a864cab6d156530f111f652e6824a3cd99e8b3ecbc03205491ca1ab54693e7e762651972427553a09a432e3d9e6ea37fd30a890c180631b5570deda2f89334edb7f3c0f2c9bd76e10c382f2b09c3d6f44dacaffffd17847c11bb80e1cbb56b80f95d93a53825219d6b4ed634813a2a9fdd047f411ad1db15f69d14b0b5573037fa7af63cd0be959645a43374265a020487ff4a60aa4a93e0b4a08b054bf0b18849d4e7e786ee8f6127695d6d9b76c758fa92aa9337dadf0b929cd1feeda9e0e6314b9630985f4a737577d07158aba9e808d2f7f3c7860895a558a31078e2c8947682027eec174439ceee12da0da535825407d5f9dada92ada69b73ef305ec966cefdfb2600dec68742648a62898ac5ef08c0d86df66c2d6977323863fcb7b055fb3eb0d057eed3fac7de346f7cb75e18dfee9f8025f71b355e820965f5c369fb8fa9f6281e2df512e8e102b844a812138908943e24c75e5f8fec91f1870715374edb5b530feddc6979790028ada3aa099cca2d3e3b55f83a01fdebb0d1587e934d6c81aeb97abf7503a18e7bf73aab412fc30417aef2769501b7d234740ac8339ee6a92a28736fa45115c6184fc82343ebe10de0c0889ae541bdefda034d093a65612fc485f138b5deaee92e3c2d004b33e6d452034a52892d888279b07ff4422d30a4539d5482f80e9fdcc04fc914823a346efec36634f996f49f8bccddfa7c777f94b83fd81cfcd399a286e7c7274122ace50731088287ab8f00f45fb4a63b083320b0481a9d3501dfacfb684c2120e80cf5133851ca6bb579917ed500b771223d5629b73ea96f8bd3ff6940c1b60f3155db2400becb472fad76000df269ba8853cf758477d66f6ee50afa162ac4bf2002b8075630327e23942e46bc959b0c6eb63c6fb39f06927d202b7a1f84d8419dc67899a4eb300672f144770f2c285344e0c5cdc525e382cd30e2dc085aff15e03ed6a631bcff815fe1f791cdbb491c917f963605e215f62427e261142ddcd64ee4a24aa651073f42f36f9e857c550ac63a23b50098e0983d60fca8c3c2848c4177a15e9e214537a889a518b0f1415e67121be5ed42c76c52e4523af29426e50f2212dc830ee3bf89a5988030c8bd689cc8ed7d668b8bf7ff7c00699ff9acbf1df036f83650b0429da4e015de30e0a7a2ea7bd13a7c9b9949d8539f141a931b88f837210449dc500b0fc33fb80a2874fd2c7bdc02c7361dabaa1fff9ad3d1628b50b1c5d1a1e14da1a75907b1d680cffdd0d31fe63a2b0a4c67f39b0e1aae6aeb0e466266ded455248696113d797067eb83fe86c79a0e28f775a9891f114fb16be91eea952375636f5f2269d32d824df13b81d6841e1678fa601a953567b4e5d6ceadd19c0e2c27f40fd8c3c982b12a32c0835bb565d61ad0c16f56c920cd84ddca51c2a7872de2400f9570a39c062362fa91d9c20dd5965d7e91f4d0d4452d4f6502dc6e7828192a42ce65780bde8c562ef6a8ddcbc4c26e62d3c4bd4113f14f711af0b7c904b98081f5c0d9843bd9ffb253c44cb958ced26a752feee2c32adc01e93f477f66228de954206d0e870a8b2db067091146afe9ad96aaf6ef5b5b21d233bce4855ee1acbc9e6fb4311ee9a5bc1109e07ee6e31d5ea2c143d2f778cce2f40b61b095d083edd6d8abb59bd0a83137fd91103e503913ffd6d2f378a1bdc6a7ff4592e12dc66d85b77b78dbc8052b5e93626b82d4586a594894a7dcb240a942e816c68c4a1d18a6d73ac06423ac132e616092a099582f89e858a1c45ef0bb6a3846f56c590c15386e82f1840265939826f89b09fb2322db9ddba2b1f6623990d386c18f358845006fa029f0e69ce5ab08ce847e5c311cb3e28354d21d6108699d09d4fb17b5ce015931124bda3b63262b999851322a8d2ac9936e008d419100f1f591f101488783262120412a4ce7e7d6820edbb916e02456c483f3863cadfa4375fcd0d055723dd763a447e8140f4faa38608d5e6dbd162e5950f02ce9dca4476a90b174880d7470f2347a9a6348c42e780d49efa8d77cfae33ec114d8ef623c477d60396ffc43b7d10b6875de3992aac68bb09cc7d65d209b5ceb5728c6e1303543b9248bb1620b2f1567da8323c9391231c0d8a200b3b4e1d93b5f21e285953044f7c51fee30b751c909bfe2ff3231d2551e63dea5ae578fc2a2efeb848e2d4a6e0e794a559cbecb5de0a331e41024e19d3a799592ea45c7551fd7a54ab74716eabc625c09d08d65448f14edf4642ef2dfefcbe92514da89fe9729a48d35dda2b78aa141c00dde6599916377e36ad2ffcb284e7fea7c640a664d809f4fc4564eba28060bd555ac52931059b52346d80f3acf3f333946fb2887a597593ef007634d2a1dd0537dffb2952aefef3da0f100c35f93defd2d5363b55f56ac4c880b9dee2fd7c90d07ea097a495c3289467b5d9e2d59e706973a972c668a4811e67730156d5d5966461161aa36910339d0d1af2c26d6732e72b5ee168e34bd773f3ae9b81244b688e96f7a8db9e38059e016a56ea520d90fb513bada7ac7868aee77c4c372d4c1546d29d05b8aa81b4a17f098cd4256d3a39e21669810215c84dc26eb7de747924c6a15163b78bbfac3ac27e9b7840481d5f2292f39937fc0583cab146f28fbe11183a7cc0e010cbd3cb42e78bcb2adc42d6dd971179ff39d08b6e1947ef0b083804a1c8e0b4cea664a5892eacd065912bfc7d8f124b071522ec040ad0a42850d4492780d7451d10a8f5a89afb47f449afb2d016db3126c70f02f9682f1c4a81b62234e73a4dfac3e94130a1a79a736c7fd53cc7e0cf0860a3cdccc682e6e82cc24de0aeeef148a9997bc2ee7cd63cb0a6f949f6251d7106db7713b726090bed3f7af64fa58b0e17d81a5b7383397cb2c3383dcae4ba282c2f29637941598052d1cc7962f134059011935b50375504abb2e74f886cbb2b37f0c7a5d3451f1ce0845aebd46ce62935515bdfe68bc56895855f15bfe518aaaae7068dc6ce18ca3e2c29d53f238f9766f028a0f0032c2f7a19f79036a6efdec813b69fe9c77260cf360ec293751bac1d7bd2da88ecef896537dd61171ade2e2352d816f8d973f5262e33d2d2d70499e75c64db3209cd62baa221f1c76a49e066e306d0d412a65c104a8d982aaff268a4febc31f61bb40448297c63da4c1357eec02fa61c4327fa31c1d99a65f8e66b5a94104ebf7376da1bc131ff68284867db9999f2f6c01db342e886f47349d31c65e1ea881fed2047fbc014b031a59bf6d3e059d4395680b60d8341d9d46f797d51c196de3c5b16f8f0bb4575ec285ad986af79075ca60c2a9b0f14fe692bd5cc5ed4fde29796b2874fc7b0b8cd3d4f3201a8450a7a68af10d1231b56be9a8351af49e970e4b020255b3a7e6482e7d0070015d8a4ed27317945c0eb9596ef5170936992c02cbdece09a0919242c147830746b3d4192676169ad2cd82fc5cfa69eda5d1456b27019bb138551c6c66c0f019e6a27162225988c74d3dc9db2a77a14b43126ed5b9f3d839ee62724a9a4ae2c39306dd679e627bd3d4dca45448f1ababb93495d52eca9b8262d3f69adb100fb8d46991b1f649bc7ae64e8b2d6ae46580fd14133ee3eb56763f5b99dcfa5709b2b67db53b73c37a1fd1ef5fbeb7f9f5fdf1511fb7bd3caec35e2bf09b9a477d9211e8d5d61234343ba3e9bf464dd7003720271688333e3bdd194590b23879ddca7d6e8b409a1a2a0c6c9beff5e594b670b1c03b98db3e462d40a61e63b78c2b080d8ac62b13e3172f727b3e156b7ec6019947028dc422cdc2c2d0f7401511a88605b0f66054cdacd64f5f5ed90123ead82d04a23cc57d0f6ef0d429714dd795085e1ebda24ca3b58e83d5b91e9560376f2c60b17194f5513a56c641343a28643286ad10fb4cd000db9aca8bb9ac450cca70c0af6c2696f8cf41aaee25f22bd3d0c93aa4236c5e2cfe759001141b24ae758f122cb24ecc75569d056b01c1f8eac3c16a11646949ac6b1f18de34cc20e1599e899d16e6c4180cb7981cf47fed68d1f0ebb2d3fa2cefbae0e7d25019f0fd16e326d4dd0d7fd5e04eb3e041cac444c9c0cf46829a1e626a55888cd54f6a303be925e08a129e89e60da7aefa5fa4f1e4764f03c0f0e69f2e516e33655b5f6137117b7e9bdc836222e3c9d9f0ab0907210929bcdcfe96dc7ec402b79a0d71d795c5e3da7fdb7d4299515adc32ae0453f56c7dac58b7c68a11a0b640031982f299a6f51d08b45f0979267a2de78b95e048bca6bf83f4bc99ad39101fa02941219adbb2bfdcda1ae9a17d2d0d4cf13f5c537e44d9d5d24d31db8cd4a73b105c0989b21ea5cb34f81f655381fc77d50b3e9517f0845f1bd783c28466d0857973443dd6303fcb6841739acd9153787fbee474507be13b795297ecd96bec55e62b99121696b0e19e85af429ed772ad6029b9d18084d8cb26b9facc3ed9d14b26304541dde3fe2a6de084a1b5ef55872c592ce6b99e61644d9cbe5bc55d6656f44592e34585f6b10d9fb9fd4a51f9ddacc8e1832ff75180d010bf160ca30017d7ab4037482fb1f00b2a63f5b464b4f013db3c54f45124648a0579af353140c1c7648505c5980687870df3cac7bf19f78f448b00247d1030ebcb8e7be4648f895651a7799fcf3473b6b27f6c8e305034b1c1d7374bc22304aa76e128f0dc061e70dc1779582081af42d1ac22afb655e512a56467987fc0f27eea86a33b0ca091d81c6a5af5c96229546d01da98c59b1abddda5caeae73b8cab692d0e55594b0fcd8c795", 0x1000}], 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x210000) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000180)={0x2, 0x45, "62ed065f1923cf3781c50078207b46f57a293b4abe46f3af5340bd32b6f68db554eb8eb92a295ea553466f2da1d112481496d7ac9c8a3947a6b6d932f21522e45404343b27"}) stat(&(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000340)=[0xee00]) r3 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x5}, [{0x2, 0x1}, {0x2, 0x1, r1}], {0x4, 0x7}, [{0x8, 0x2, r2}, {0x8, 0x0, r3}], {0x10, 0x1}, {0x20, 0x3}}, 0x44, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) 00:02:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x9903}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:02:40 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:40 executing program 6: ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, &(0x7f0000000000)={0x4, 0x4, 0x7, 0x1, @msf={0x1, 0x8, 0xf8}, 0x3}) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "5aea395f62ad26bc", "44302d79fba224f75ee54e6720d55e47", "81ac18b8", "41c9d0ce7d743c1c"}, 0x28) ioctl$DVD_WRITE_STRUCT(0xffffffffffffffff, 0x5390, &(0x7f0000000080)=@physical={0x0, 0x1, [{0x9, 0x6, 0x4, 0x2, 0x8, 0x0, 0x1, 0x0, 0x8, 0x0, 0x80000001, 0xffffffff, 0x5}, {0xf, 0x6, 0x7, 0x4, 0x9, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0xdac, 0xffffffe4}, {0x1, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x4, 0x7ff}, {0x3, 0x6, 0x8, 0xc, 0x8, 0x1, 0x1, 0x6, 0x5, 0x1, 0x5c6, 0x6, 0x1000}]}) [ 1488.782260] FAT-fs (loop4): Unrecognized mount option "." or missing value 00:02:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, 0x0, 0x0, 0xe720, 0x0) [ 1501.233218] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:02:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4c) 00:02:59 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYRESOCT=r0, @ANYRESOCT=r1, @ANYRES16=r0, @ANYRESHEX, @ANYRES64=r0, @ANYRES64=r1, @ANYRES64]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x100}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:02:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, 0x0, 0x0, 0xe720, 0x0) 00:02:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0x0, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5601, &(0x7f0000000000)) 00:02:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:02:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x1000000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:59 executing program 3: fork() (fail_nth: 1) [ 1508.136505] FAT-fs (loop4): bogus number of reserved sectors [ 1508.137815] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1508.157321] FAT-fs (loop4): bogus number of reserved sectors [ 1508.158622] FAT-fs (loop4): Can't find a valid FAT filesystem 00:02:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:02:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0x0, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:02:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5602, &(0x7f0000000000)) [ 1508.225402] FAULT_INJECTION: forcing a failure. [ 1508.225402] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.228171] CPU: 1 PID: 9501 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1508.229695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1508.232282] Call Trace: [ 1508.232855] dump_stack+0x107/0x163 [ 1508.233707] should_fail.cold+0x5/0xa [ 1508.234625] ? copy_process+0x4382/0x66f0 [ 1508.235548] should_failslab+0x5/0x10 [ 1508.236425] kmem_cache_alloc_node+0x55/0x370 [ 1508.237536] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1508.238713] copy_process+0x4382/0x66f0 [ 1508.239698] ? lock_downgrade+0x6d0/0x6d0 [ 1508.240594] ? perf_trace_lock+0xac/0x490 [ 1508.241597] ? __cleanup_sighand+0xb0/0xb0 [ 1508.242518] ? __lockdep_reset_lock+0x180/0x180 [ 1508.243623] ? find_held_lock+0x2c/0x110 [ 1508.244590] kernel_clone+0xe7/0xa20 [ 1508.245397] ? lock_downgrade+0x6d0/0x6d0 [ 1508.246385] ? find_held_lock+0x2c/0x110 [ 1508.247336] ? copy_init_mm+0x20/0x20 [ 1508.248159] ? ksys_write+0x12d/0x250 [ 1508.249047] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1508.250250] __do_sys_fork+0x8a/0xc0 [ 1508.251028] ? kernel_clone+0xa20/0xa20 [ 1508.251899] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1508.252999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1508.254230] ? trace_hardirqs_on+0x5b/0x180 [ 1508.255281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1508.256388] do_syscall_64+0x33/0x40 [ 1508.257184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1508.258294] RIP: 0033:0x7f89b6ef5b19 [ 1508.259089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1508.263072] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1508.264715] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1508.266268] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1508.267818] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1508.269372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1508.270920] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:02:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x68) 00:02:59 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x2) syz_io_uring_setup(0x758e, &(0x7f0000000240)={0x0, 0x38f, 0x1, 0x1, 0x13b, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000001c0)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_submit(r1, r3, &(0x7f0000000300)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0xc96) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000180)={'veth0\x00'}) prctl$PR_GET_IO_FLUSHER(0x3a) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'ip6_vti0\x00', 0x0, 0x4, 0x20, 0x13, 0x80000001, 0x30, @private2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x10, 0x8000, 0x7, 0x9}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000005a40)={'wg0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000005b00)={'ip6_vti0\x00', &(0x7f0000005a80)={'sit0\x00', 0x0, 0x2f, 0x81, 0xa0, 0x7f, 0x2e5f747cf058fec3, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10, 0x1, 0x2}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r5, &(0x7f0000005c80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000005c40)={&(0x7f0000005b40)={0xcc, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:02:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, 0x0, 0x0, 0xe720, 0x0) 00:02:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x2000000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:02:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:02:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5605, &(0x7f0000000000)) [ 1508.484769] FAT-fs (loop4): Unrecognized mount option "@" or missing value 00:03:11 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0x0, 0x0, 0x99}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:03:11 executing program 3: fork() (fail_nth: 2) 00:03:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) 00:03:11 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x4000000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:03:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5606, &(0x7f0000000000)) 00:03:12 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r2 = getegid() setgid(r2) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1, r2}}, './file0\x00'}) lchown(&(0x7f0000000080)='./file0/file0\x00', 0xee01, r2) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x99) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:03:12 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 00:03:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6c) [ 1520.628372] FAT-fs (loop4): Directory bread(block 5) failed 00:03:12 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) [ 1520.641723] FAT-fs (loop4): Directory bread(block 5) failed [ 1520.657569] FAT-fs (loop4): Directory bread(block 5) failed 00:03:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5607, &(0x7f0000000000)) 00:03:12 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:03:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x74) 00:03:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b000440000004f801", 0x17, 0xfffffffffffffffe}, {0x0, 0xffffffffffffff3d, 0x800}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES32]) r0 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="9fb56a918c4e19f8d4408bc50b5208c753eeab23c76d308c269b668b722127cfc3744a04e25219dca546374052b3545a64dd70f71064d8fb7fbfe6276574fc7826a870c7e54868a39758bbee4ad5636341091e6b1b94c4b1d12e61a226524f6982d9c66a9ebbfba01aa68730533ad438274f5e550e6cad2a13a044650ca87564a7ed82a924d68c5ccae5919a032bdb4728a2b192a689", 0x96, 0x5d3}], 0x10000, &(0x7f0000000280)={[{@block={'block', 0x3d, 0xc00}}, {@hide}, {@uid}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@block={'block', 0x3d, 0x400}}, {@iocharset={'iocharset', 0x3d, 'iso8859-5'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-3'}}, {@nocompress}, {@gid={'gid', 0x3d, 0xee01}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type}, {@dont_hash}]}) openat(r0, &(0x7f0000000380)='./file1\x00', 0x244480, 0x100) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1520.717773] FAULT_INJECTION: forcing a failure. [ 1520.717773] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.720446] CPU: 1 PID: 9566 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1520.721937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1520.724389] Call Trace: [ 1520.724959] dump_stack+0x107/0x163 [ 1520.725752] should_fail.cold+0x5/0xa [ 1520.726571] ? create_object.isra.0+0x3a/0xa20 [ 1520.727557] should_failslab+0x5/0x10 [ 1520.728376] kmem_cache_alloc+0x5b/0x350 [ 1520.729259] create_object.isra.0+0x3a/0xa20 [ 1520.730226] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1520.731325] kmem_cache_alloc_node+0x169/0x370 [ 1520.732316] copy_process+0x4382/0x66f0 [ 1520.733175] ? lock_downgrade+0x6d0/0x6d0 [ 1520.734065] ? perf_trace_lock+0xac/0x490 [ 1520.734956] ? __cleanup_sighand+0xb0/0xb0 [ 1520.735869] ? __lockdep_reset_lock+0x180/0x180 [ 1520.736858] ? find_held_lock+0x2c/0x110 [ 1520.737730] kernel_clone+0xe7/0xa20 [ 1520.738513] ? lock_downgrade+0x6d0/0x6d0 [ 1520.739379] ? find_held_lock+0x2c/0x110 [ 1520.740230] ? copy_init_mm+0x20/0x20 [ 1520.741031] ? ksys_write+0x12d/0x250 [ 1520.741863] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1520.742884] __do_sys_fork+0x8a/0xc0 [ 1520.743669] ? kernel_clone+0xa20/0xa20 [ 1520.744525] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1520.745663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1520.746779] ? trace_hardirqs_on+0x5b/0x180 [ 1520.747713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1520.748826] do_syscall_64+0x33/0x40 [ 1520.749625] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1520.750736] RIP: 0033:0x7f89b6ef5b19 [ 1520.751540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1520.755481] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1520.757129] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1520.758677] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1520.760222] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.761773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1520.763277] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1520.929489] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿ" or missing value [ 1520.985224] FAT-fs (loop4): Unrecognized mount option "ÿÿÿÿ" or missing value [ 1534.287515] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:03:33 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 00:03:33 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 00:03:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0x8, 0x0) msgget(0x0, 0x40) msgsnd(0x0, &(0x7f0000001e00), 0x8, 0x0) msgrcv(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/38) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(0x0, 0x0, 0x3f, 0x0) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0xfffffffffffffffe, 0x0, 0x0, 0x3000) msgctl$IPC_RMID(r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:03:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5608, &(0x7f0000000000)) 00:03:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) 00:03:33 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0xa000000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:03:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7a) 00:03:33 executing program 3: fork() (fail_nth: 3) [ 1542.216580] FAULT_INJECTION: forcing a failure. [ 1542.216580] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1542.219226] CPU: 1 PID: 9603 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1542.220946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1542.223382] Call Trace: [ 1542.223946] dump_stack+0x107/0x163 [ 1542.224721] should_fail.cold+0x5/0xa [ 1542.225539] __alloc_pages_nodemask+0x182/0x680 [ 1542.226538] ? lock_downgrade+0x6d0/0x6d0 [ 1542.227422] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 1542.228698] ? memcg_slab_post_alloc_hook+0x183/0x3f0 [ 1542.229808] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1542.230829] ? kmem_cache_alloc_node+0x2c3/0x370 [ 1542.231832] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1542.232948] copy_process+0x606/0x66f0 [ 1542.233794] ? lock_downgrade+0x6d0/0x6d0 [ 1542.234675] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1542.235798] ? __cleanup_sighand+0xb0/0xb0 [ 1542.236705] ? find_held_lock+0x2c/0x110 [ 1542.237569] kernel_clone+0xe7/0xa20 [ 1542.238366] ? lock_downgrade+0x6d0/0x6d0 [ 1542.239242] ? find_held_lock+0x2c/0x110 [ 1542.240099] ? copy_init_mm+0x20/0x20 [ 1542.240912] ? ksys_write+0x12d/0x250 [ 1542.241745] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1542.242770] __do_sys_fork+0x8a/0xc0 [ 1542.243563] ? kernel_clone+0xa20/0xa20 [ 1542.244419] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1542.245547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1542.246649] ? trace_hardirqs_on+0x5b/0x180 [ 1542.247562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1542.248651] do_syscall_64+0x33/0x40 [ 1542.249440] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1542.250531] RIP: 0033:0x7f89b6ef5b19 [ 1542.251322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1542.255297] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1542.256934] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1542.258475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1542.259978] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.261483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1542.263010] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1542.362175] FAT-fs (loop4): Directory bread(block 5) failed 00:03:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x300) 00:03:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5609, &(0x7f0000000000)) 00:03:33 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 00:03:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) 00:03:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:03:33 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 00:03:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560a, &(0x7f0000000000)) 00:03:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x500) 00:03:34 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x40000000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1542.708333] FAT-fs (loop4): Directory bread(block 5) failed [ 1555.390880] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:03:53 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 00:03:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0x99030000}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:03:53 executing program 3: fork() (fail_nth: 4) 00:03:53 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) 00:03:53 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560b, &(0x7f0000000000)) 00:03:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x600) 00:03:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x3, 0x2d, 0x1}) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:03:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{0x0}], 0x1, 0xe720, 0x0) 00:03:54 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, 0x0) 00:03:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560c, &(0x7f0000000000)) [ 1562.603751] blktrace: Concurrent blktraces are not allowed on loop10 [ 1562.615320] FAT-fs (loop4): Directory bread(block 5) failed 00:03:54 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 00:03:54 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfff, 0xa, &(0x7f0000001880)=[{&(0x7f0000000140)="75b5ee0cbeb85bf88919807d226ccd625fb7ad3f4e4e0d84fb73913c7913b555a645f2ab18bd3d768f91195cb7e796c89b112f2d7b4c05413825ef7b06350650028501ffd7bc8f76fe487dab9f25fb4e37", 0x51, 0x3}, {&(0x7f00000000c0)="6aa088d86e2e8a58c2e563b1eed2fc5d643462f9052e04daf10521d8b07a88", 0x1f, 0x200}, {&(0x7f0000000480)="290f2ecc2ac669396663114f1ab5cac8983e1079ff0f3877e579d60cae2b99aef65295c1fee3dd0ca7b3874ad792aa4e0de82e843f48716a9a53f092f4817dc5d5fe1a554800dfbd370aad98d33cf40d3dee31e2a8fdecd9ddb2bdeb976cd80277d8762ea60520e2a6bb72520ff3b40d2a45f86cb13b38530d781f01392e455a8723", 0x82, 0x1ff}, {&(0x7f00000001c0)="7c3852e11e168107f6d311a7061c5186b10a490833eed2d9d40e11c25889dec5", 0x20, 0x1f}, {&(0x7f0000000540)="057c9aad6e9ff6f15836a67cef00852ca5a1f575091e6d571e9e8dc23f4d5b656218c6ade21adc415c70545df15d7824a6bce3fe89085c837989d41288152037e915225ab272", 0x46, 0x7f8afd08}, {&(0x7f00000007c0)="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", 0x1000, 0x10000}, {&(0x7f00000005c0)="5e2179b5598052eb48f88a8a0e20a05e113c110f119a89b2d8ca40b6f1fd324658ae6fb4a506d8b2f46d457fc9ea1bdb0b526257056cdd0950b2041faa0cdc139e0957040dac726458b319f7024eaec5d56e82b01c200741053cf8b44d902d4f9117224853dece8db89cefdc24e7213edbc758b2eb3531ac762bf66c0a529bfe01c93ec719412293dae6c61abfb11662ff5cf6b5f1997d140e32131815edb6955a688a7e389b318f9b12d6ada7dd928d0597b21742bc80f0a61a74532bb83e4c4cb60aa7c6fb75773bd29725247291ba826e2452f2a0b41990dd42a28bc0548a5b7653a7bfb8a4251e18e0bed3b175", 0xef, 0x7f}, {&(0x7f00000006c0)="7b2891c5dead98057184a668a84c03357fa0f4288ca7b83793faf80913d399d44a862714d56cc151f0190b9d49744eecc98cb4664fbac0e32bf6531d75db8198d062ee228c128bf209b4e0de7b9f4e783191338b88fa427dfe372d15e5d0f899a28c123b36681c539e22d8f14093e1b06f1997df8eee2313d27d8e66618a449fc7f89f3b458b393e01f1b48b03707aab0199f1ea231ea15a9b6ebb39e76f81bc1c68ee0f5a2eee85eee13226041ced9e2ebc5cca9149dd07", 0xb8, 0x80000000}, {&(0x7f00000017c0)="beedcab297bfcd4f5694e550313b99c1ad3cb2561c3da45d5a897813cbd75bb3f1ec1842cc3bd5eabb36dbc98a676b7234564eaee46d6c25751317f6f86bdb3760f6176ac01b748509b868eccc52a7fbeef4bf250bcbabbc9cd3305075f482fd4265562a87b2ea7a25b9dab5dd8702ef099e", 0x72, 0x7}, {&(0x7f0000001840)="24dbd08ae58ca0d16be5838afa2ea2f8c309478beb075cb27a3a7954404c8f50b6251fb5bc1aea07c6616ba0e9a19f78ed879638bb4192", 0x37, 0x9}], 0x0, &(0x7f0000001980)={[{@fat=@dos1xfloppy}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}]}) 00:03:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x700) [ 1562.704486] FAULT_INJECTION: forcing a failure. [ 1562.704486] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.707127] CPU: 0 PID: 9662 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1562.708619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1562.711109] Call Trace: [ 1562.711681] dump_stack+0x107/0x163 [ 1562.712470] should_fail.cold+0x5/0xa [ 1562.713294] ? prepare_creds+0x25/0x5e0 [ 1562.714171] should_failslab+0x5/0x10 [ 1562.714994] kmem_cache_alloc+0x5b/0x350 [ 1562.715872] ? lock_downgrade+0x6d0/0x6d0 [ 1562.716773] prepare_creds+0x25/0x5e0 [ 1562.717596] copy_creds+0x72/0x580 [ 1562.718380] copy_process+0xee4/0x66f0 [ 1562.719225] ? lock_downgrade+0x6d0/0x6d0 [ 1562.720125] ? perf_trace_lock+0xac/0x490 [ 1562.721033] ? __cleanup_sighand+0xb0/0xb0 [ 1562.721961] ? __lockdep_reset_lock+0x180/0x180 [ 1562.722973] ? find_held_lock+0x2c/0x110 [ 1562.723854] kernel_clone+0xe7/0xa20 [ 1562.724659] ? lock_downgrade+0x6d0/0x6d0 [ 1562.725557] ? find_held_lock+0x2c/0x110 [ 1562.726438] ? copy_init_mm+0x20/0x20 [ 1562.727268] ? ksys_write+0x12d/0x250 [ 1562.728096] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1562.729154] __do_sys_fork+0x8a/0xc0 [ 1562.729974] ? kernel_clone+0xa20/0xa20 [ 1562.730851] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1562.731991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.733115] ? trace_hardirqs_on+0x5b/0x180 [ 1562.734067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1562.735185] do_syscall_64+0x33/0x40 [ 1562.735990] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1562.737101] RIP: 0033:0x7f89b6ef5b19 [ 1562.737924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1562.741930] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1562.743576] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1562.745122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1562.746675] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.748225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1562.749773] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:03:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0xfdffffff}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:03:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{0x0}], 0x1, 0xe720, 0x0) 00:03:54 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, 0x0) 00:03:54 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560d, &(0x7f0000000000)) [ 1562.899807] blktrace: Concurrent blktraces are not allowed on loop10 [ 1562.910724] FAT-fs (loop4): Directory bread(block 5) failed 00:03:54 executing program 3: fork() (fail_nth: 5) 00:03:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@ng={0x4, 0x12, "e079"}, 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1563.123439] FAT-fs (loop4): Directory bread(block 5) failed [ 1563.134651] FAULT_INJECTION: forcing a failure. [ 1563.134651] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.137340] CPU: 0 PID: 9687 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1563.138939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1563.141368] Call Trace: [ 1563.141944] dump_stack+0x107/0x163 [ 1563.142726] should_fail.cold+0x5/0xa [ 1563.143554] ? create_object.isra.0+0x3a/0xa20 [ 1563.144554] should_failslab+0x5/0x10 [ 1563.145373] kmem_cache_alloc+0x5b/0x350 [ 1563.146257] create_object.isra.0+0x3a/0xa20 [ 1563.147198] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1563.148300] kmem_cache_alloc+0x159/0x350 [ 1563.149193] prepare_creds+0x25/0x5e0 [ 1563.150031] copy_creds+0x72/0x580 [ 1563.150792] copy_process+0xee4/0x66f0 [ 1563.151629] ? lock_downgrade+0x6d0/0x6d0 [ 1563.152520] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1563.153651] ? __cleanup_sighand+0xb0/0xb0 [ 1563.154578] ? find_held_lock+0x2c/0x110 [ 1563.155456] kernel_clone+0xe7/0xa20 [ 1563.156251] ? lock_downgrade+0x6d0/0x6d0 [ 1563.157146] ? find_held_lock+0x2c/0x110 [ 1563.158031] ? copy_init_mm+0x20/0x20 [ 1563.158847] ? ksys_write+0x12d/0x250 [ 1563.159667] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1563.160699] __do_sys_fork+0x8a/0xc0 [ 1563.161498] ? kernel_clone+0xa20/0xa20 [ 1563.162370] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1563.163493] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1563.164592] ? trace_hardirqs_on+0x5b/0x180 [ 1563.165531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1563.166653] do_syscall_64+0x33/0x40 [ 1563.167452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1563.168567] RIP: 0033:0x7f89b6ef5b19 [ 1563.169369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1563.173395] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1563.175049] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1563.176583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1563.178140] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1563.179703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1563.181234] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:04:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, 0x0) 00:04:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b64c873663a186000088001000440000004f801", 0x17, 0x5}, {0x0, 0x0, 0x800}], 0x100000, &(0x7f0000000180)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:04:07 executing program 3: fork() (fail_nth: 6) 00:04:07 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560e, &(0x7f0000000000)) 00:04:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{0x0}], 0x1, 0xe720, 0x0) 00:04:07 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty=0xfffffffd}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:04:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0xa00) 00:04:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560a, &(0x7f0000000000)) 00:04:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) (fail_nth: 1) 00:04:07 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) dup2(r0, r0) [ 1576.305443] FAULT_INJECTION: forcing a failure. [ 1576.305443] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.308191] CPU: 1 PID: 9715 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1576.309650] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1576.312225] Call Trace: [ 1576.312893] dump_stack+0x107/0x163 [ 1576.313677] should_fail.cold+0x5/0xa [ 1576.314517] ? security_prepare_creds+0x10a/0x180 [ 1576.315563] should_failslab+0x5/0x10 [ 1576.316521] __kmalloc+0x72/0x3e0 [ 1576.317343] security_prepare_creds+0x10a/0x180 [ 1576.318523] prepare_creds+0x458/0x5e0 [ 1576.319423] copy_creds+0x72/0x580 [ 1576.320204] copy_process+0xee4/0x66f0 [ 1576.321057] ? lock_downgrade+0x6d0/0x6d0 [ 1576.321976] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1576.323305] ? __cleanup_sighand+0xb0/0xb0 [ 1576.324270] ? find_held_lock+0x2c/0x110 [ 1576.325152] kernel_clone+0xe7/0xa20 [ 1576.325965] ? lock_downgrade+0x6d0/0x6d0 [ 1576.326889] ? find_held_lock+0x2c/0x110 [ 1576.327861] ? copy_init_mm+0x20/0x20 [ 1576.328825] ? ksys_write+0x12d/0x250 [ 1576.329670] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1576.330766] __do_sys_fork+0x8a/0xc0 [ 1576.331579] ? kernel_clone+0xa20/0xa20 [ 1576.332555] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1576.333862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1576.335020] ? trace_hardirqs_on+0x5b/0x180 [ 1576.335963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1576.337101] do_syscall_64+0x33/0x40 [ 1576.338001] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1576.339299] RIP: 0033:0x7f89b6ef5b19 [ 1576.340121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1576.344298] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1576.346138] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1576.347724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1576.349310] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.351035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1576.352145] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:04:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4800) [ 1576.388728] FAULT_INJECTION: forcing a failure. [ 1576.388728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1576.390304] CPU: 1 PID: 9719 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 1576.391202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1576.392699] Call Trace: [ 1576.393052] dump_stack+0x107/0x163 [ 1576.393535] should_fail.cold+0x5/0xa [ 1576.394046] _copy_to_user+0x2e/0x180 [ 1576.394556] simple_read_from_buffer+0xcc/0x160 [ 1576.395173] proc_fail_nth_read+0x194/0x220 [ 1576.395736] ? proc_sessionid_read+0x220/0x220 [ 1576.396331] ? security_file_permission+0x24e/0x570 [ 1576.396986] ? perf_trace_initcall_start+0x111/0x370 [ 1576.397665] ? proc_sessionid_read+0x220/0x220 [ 1576.398262] vfs_read+0x228/0x580 [ 1576.398719] ksys_read+0x12d/0x250 [ 1576.399188] ? __ia32_sys_pwrite64+0x230/0x230 [ 1576.399791] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1576.400488] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1576.401167] do_syscall_64+0x33/0x40 [ 1576.401651] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1576.402335] RIP: 0033:0x7f54c800a69c [ 1576.402828] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1576.405268] RSP: 002b:00007f54c55cd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1576.406289] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f54c800a69c [ 1576.407235] RDX: 000000000000000f RSI: 00007f54c55cd1e0 RDI: 0000000000000004 [ 1576.408181] RBP: 00007f54c55cd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.409128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1576.410065] R13: 00007fff8b03124f R14: 00007f54c55cd300 R15: 0000000000022000 [ 1576.442120] FAT-fs (loop4): Directory bread(block 5) failed 00:04:21 executing program 3: fork() (fail_nth: 7) 00:04:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560f, &(0x7f0000000000)) 00:04:21 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) (fail_nth: 1) 00:04:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4c00) 00:04:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:04:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:04:21 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) openat(r0, &(0x7f0000000040)='./file0\x00', 0x10900, 0x10) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x22024, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x608000, 0x100) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '$-\xba#'}, {}, {0x20, 'vfat\x00'}, {0x20, '&'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}], 0xa, "a1234da3bc5596ef4bd36564bf32b8b52d614705dba6a01cdfa9e397992e1e21c173"}, 0x4d) 00:04:21 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x14, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1590.598718] blktrace: Concurrent blktraces are not allowed on loop10 [ 1590.618166] FAT-fs (loop4): Directory bread(block 5) failed [ 1590.633263] FAULT_INJECTION: forcing a failure. [ 1590.633263] name failslab, interval 1, probability 0, space 0, times 0 [ 1590.636023] CPU: 0 PID: 9748 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1590.637644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1590.640260] Call Trace: [ 1590.640834] dump_stack+0x107/0x163 [ 1590.641678] should_fail.cold+0x5/0xa [ 1590.642542] ? create_object.isra.0+0x3a/0xa20 [ 1590.643537] should_failslab+0x5/0x10 [ 1590.644369] kmem_cache_alloc+0x5b/0x350 [ 1590.645271] create_object.isra.0+0x3a/0xa20 [ 1590.646222] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1590.647310] __kmalloc+0x16e/0x3e0 [ 1590.648069] security_prepare_creds+0x10a/0x180 [ 1590.649059] prepare_creds+0x458/0x5e0 [ 1590.649884] copy_creds+0x72/0x580 [ 1590.650649] copy_process+0xee4/0x66f0 [ 1590.651483] ? lock_downgrade+0x6d0/0x6d0 [ 1590.652356] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1590.653461] ? __cleanup_sighand+0xb0/0xb0 [ 1590.654394] ? find_held_lock+0x2c/0x110 [ 1590.655284] kernel_clone+0xe7/0xa20 [ 1590.656086] ? lock_downgrade+0x6d0/0x6d0 [ 1590.656976] ? find_held_lock+0x2c/0x110 [ 1590.657849] ? copy_init_mm+0x20/0x20 [ 1590.658680] ? ksys_write+0x12d/0x250 [ 1590.659507] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1590.660559] __do_sys_fork+0x8a/0xc0 [ 1590.661344] ? kernel_clone+0xa20/0xa20 [ 1590.662210] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1590.663360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1590.664486] ? trace_hardirqs_on+0x5b/0x180 [ 1590.665423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1590.666553] do_syscall_64+0x33/0x40 [ 1590.667362] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1590.668316] FAT-fs (loop4): Directory bread(block 5) failed [ 1590.668479] RIP: 0033:0x7f89b6ef5b19 [ 1590.668508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 00:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40049409, &(0x7f0000000000)) [ 1590.674602] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1590.676427] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1590.677957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1590.679520] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1590.681066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 00:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x2, &(0x7f0000000000)) 00:04:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6800) [ 1590.682626] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1590.687151] FAT-fs (loop4): Directory bread(block 5) failed 00:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40086602, &(0x7f0000000000)) 00:04:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x6, 0x424400) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup2(r0, r1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1590.867465] FAULT_INJECTION: forcing a failure. [ 1590.867465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1590.870133] CPU: 1 PID: 9743 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 1590.871597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1590.874447] Call Trace: [ 1590.875008] dump_stack+0x107/0x163 [ 1590.875785] should_fail.cold+0x5/0xa [ 1590.876596] _copy_to_user+0x2e/0x180 [ 1590.877407] simple_read_from_buffer+0xcc/0x160 [ 1590.878538] proc_fail_nth_read+0x194/0x220 [ 1590.879681] ? proc_sessionid_read+0x220/0x220 [ 1590.880751] ? security_file_permission+0x24e/0x570 [ 1590.882035] ? perf_trace_initcall_start+0x111/0x370 [ 1590.883132] ? proc_sessionid_read+0x220/0x220 [ 1590.884271] vfs_read+0x228/0x580 [ 1590.885124] ksys_read+0x12d/0x250 [ 1590.886023] ? __ia32_sys_pwrite64+0x230/0x230 [ 1590.887014] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1590.888132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1590.889227] do_syscall_64+0x33/0x40 [ 1590.890014] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1590.891115] RIP: 0033:0x7ff57556b69c [ 1590.891903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1590.895811] RSP: 002b:00007ff572b2e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1590.897429] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff57556b69c [ 1590.898953] RDX: 000000000000000f RSI: 00007ff572b2e1e0 RDI: 0000000000000004 [ 1590.900471] RBP: 00007ff572b2e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1590.901984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1590.903512] R13: 00007ffdaacbdc3f R14: 00007ff572b2e300 R15: 0000000000022000 00:04:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b2f, &(0x7f0000000000)) 00:04:22 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1590.990190] FAT-fs (loop4): Directory bread(block 5) failed 00:04:22 executing program 3: fork() (fail_nth: 8) 00:04:22 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40087602, &(0x7f0000000000)) 00:04:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6c00) [ 1591.255840] FAULT_INJECTION: forcing a failure. [ 1591.255840] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.258344] CPU: 0 PID: 9780 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1591.259885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1591.262382] Call Trace: [ 1591.262947] dump_stack+0x107/0x163 [ 1591.263748] should_fail.cold+0x5/0xa [ 1591.264568] ? __delayacct_tsk_init+0x1b/0x80 [ 1591.265547] should_failslab+0x5/0x10 [ 1591.266400] kmem_cache_alloc+0x5b/0x350 [ 1591.267288] ? prepare_creds+0x46c/0x5e0 [ 1591.268180] __delayacct_tsk_init+0x1b/0x80 [ 1591.269126] copy_process+0x4416/0x66f0 [ 1591.270004] ? lock_downgrade+0x6d0/0x6d0 [ 1591.270923] ? perf_trace_lock+0xac/0x490 [ 1591.271839] ? __cleanup_sighand+0xb0/0xb0 [ 1591.272758] ? __lockdep_reset_lock+0x180/0x180 [ 1591.273784] ? find_held_lock+0x2c/0x110 [ 1591.274681] kernel_clone+0xe7/0xa20 [ 1591.275494] ? lock_downgrade+0x6d0/0x6d0 [ 1591.276391] ? find_held_lock+0x2c/0x110 [ 1591.277273] ? copy_init_mm+0x20/0x20 [ 1591.278106] ? ksys_write+0x12d/0x250 [ 1591.278963] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1591.280028] __do_sys_fork+0x8a/0xc0 [ 1591.280838] ? kernel_clone+0xa20/0xa20 [ 1591.281724] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1591.282888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1591.284019] ? trace_hardirqs_on+0x5b/0x180 [ 1591.284965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1591.286089] do_syscall_64+0x33/0x40 [ 1591.286919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1591.288040] RIP: 0033:0x7f89b6ef5b19 [ 1591.288852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1591.292928] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1591.294609] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1591.296171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1591.297736] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1591.299317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1591.300895] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1603.340852] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:04:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4020940d, &(0x7f0000000000)) 00:04:41 executing program 4: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:04:41 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x2, 0x0) 00:04:41 executing program 3: fork() (fail_nth: 9) 00:04:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7400) 00:04:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x2, @private}, {0x2, 0x0, @broadcast}}) 00:04:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:04:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b30, &(0x7f0000000000)) [ 1610.483265] FAT-fs (loop4): Directory bread(block 5) failed 00:04:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b31, &(0x7f0000000000)) [ 1610.518354] FAULT_INJECTION: forcing a failure. 00:04:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045432, &(0x7f0000000000)) 00:04:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7a00) [ 1610.518354] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.521411] CPU: 1 PID: 9805 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1610.523178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1610.525989] Call Trace: [ 1610.526637] dump_stack+0x107/0x163 [ 1610.527596] should_fail.cold+0x5/0xa [ 1610.528666] ? create_object.isra.0+0x3a/0xa20 [ 1610.529767] should_failslab+0x5/0x10 [ 1610.530684] kmem_cache_alloc+0x5b/0x350 [ 1610.531762] create_object.isra.0+0x3a/0xa20 [ 1610.532937] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1610.534146] kmem_cache_alloc+0x159/0x350 [ 1610.535136] ? prepare_creds+0x46c/0x5e0 [ 1610.536269] __delayacct_tsk_init+0x1b/0x80 [ 1610.537392] copy_process+0x4416/0x66f0 [ 1610.538337] ? lock_downgrade+0x6d0/0x6d0 [ 1610.539348] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1610.540797] ? __cleanup_sighand+0xb0/0xb0 [ 1610.541809] ? find_held_lock+0x2c/0x110 [ 1610.542779] kernel_clone+0xe7/0xa20 [ 1610.543745] ? lock_downgrade+0x6d0/0x6d0 [ 1610.544890] ? find_held_lock+0x2c/0x110 [ 1610.545850] ? copy_init_mm+0x20/0x20 [ 1610.546763] ? ksys_write+0x12d/0x250 [ 1610.547802] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1610.549262] __do_sys_fork+0x8a/0xc0 [ 1610.550258] ? kernel_clone+0xa20/0xa20 [ 1610.551446] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1610.553028] ? syscall_enter_from_user_mode+0x1d/0x50 00:04:41 executing program 4: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffdffe00) [ 1610.554409] ? trace_hardirqs_on+0x5b/0x180 [ 1610.555772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1610.557288] do_syscall_64+0x33/0x40 [ 1610.558188] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1610.559416] RIP: 0033:0x7f89b6ef5b19 [ 1610.560309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1610.564939] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1610.566758] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1610.568425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1610.570110] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1610.572034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1610.573804] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1610.910027] blktrace: Concurrent blktraces are not allowed on loop10 00:04:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b32, &(0x7f0000000000)) 00:04:56 executing program 3: fork() (fail_nth: 10) 00:04:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x301, 0x0) 00:04:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x80000) 00:04:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045440, &(0x7f0000000000)) 00:04:56 executing program 4: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000280), 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup2(r0, r2) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:04:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x4, @private}, {0x2, 0x0, @broadcast}}) 00:04:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) (fail_nth: 1) [ 1624.939800] blktrace: Concurrent blktraces are not allowed on loop10 [ 1624.947670] FAULT_INJECTION: forcing a failure. [ 1624.947670] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.950056] CPU: 1 PID: 9839 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1624.951642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1624.954224] Call Trace: [ 1624.954809] dump_stack+0x107/0x163 [ 1624.955576] should_fail.cold+0x5/0xa [ 1624.956383] ? dup_fd+0x89/0xca0 [ 1624.957112] should_failslab+0x5/0x10 [ 1624.957928] kmem_cache_alloc+0x5b/0x350 [ 1624.958972] dup_fd+0x89/0xca0 [ 1624.959798] ? audit_filter_inodes+0x40/0x40 [ 1624.960732] ? security_task_alloc+0xe6/0x260 [ 1624.961689] copy_process+0x1871/0x66f0 [ 1624.962722] ? lock_downgrade+0x6d0/0x6d0 [ 1624.963732] ? __cleanup_sighand+0xb0/0xb0 [ 1624.964642] ? find_held_lock+0x2c/0x110 [ 1624.965606] kernel_clone+0xe7/0xa20 [ 1624.966518] ? lock_downgrade+0x6d0/0x6d0 [ 1624.967502] ? find_held_lock+0x2c/0x110 [ 1624.968372] ? copy_init_mm+0x20/0x20 [ 1624.969190] ? ksys_write+0x12d/0x250 [ 1624.970001] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1624.971062] __do_sys_fork+0x8a/0xc0 [ 1624.971859] ? kernel_clone+0xa20/0xa20 [ 1624.972709] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1624.973823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.974939] ? trace_hardirqs_on+0x5b/0x180 [ 1624.975860] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1624.976970] do_syscall_64+0x33/0x40 [ 1624.977759] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1624.978896] RIP: 0033:0x7f89b6ef5b19 [ 1624.979687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1624.983771] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1624.985387] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1624.987101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1624.988780] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1624.990428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1624.992130] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1624.997234] blktrace: Concurrent blktraces are not allowed on loop10 00:04:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0xa, @private}, {0x2, 0x0, @broadcast}}) 00:04:56 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x10) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:04:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80086601, &(0x7f0000000000)) 00:04:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x1000000) 00:04:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b33, &(0x7f0000000000)) 00:04:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) [ 1625.057814] FAULT_INJECTION: forcing a failure. [ 1625.057814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1625.060352] CPU: 1 PID: 9840 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 1625.061821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1625.064291] Call Trace: [ 1625.064920] dump_stack+0x107/0x163 [ 1625.065745] should_fail.cold+0x5/0xa [ 1625.066561] _copy_from_user+0x2e/0x1b0 [ 1625.067419] iovec_from_user+0x139/0x3f0 [ 1625.068288] __import_iovec+0x67/0x590 [ 1625.069118] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1625.070337] import_iovec+0x83/0xb0 [ 1625.071205] vfs_readv+0xbb/0x150 [ 1625.071937] ? vfs_iter_read+0xa0/0xa0 [ 1625.072761] ? __fget_files+0x26d/0x480 [ 1625.073597] ? lock_downgrade+0x6d0/0x6d0 [ 1625.074477] ? ksys_write+0x12d/0x250 [ 1625.075370] ? __fget_files+0x296/0x480 [ 1625.076301] __x64_sys_preadv+0x231/0x310 [ 1625.077214] ? __x64_sys_preadv2+0x150/0x150 [ 1625.078152] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1625.079262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.080360] do_syscall_64+0x33/0x40 [ 1625.081208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1625.082416] RIP: 0033:0x7f5378642b19 [ 1625.083229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.087145] RSP: 002b:00007f5375bb8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1625.088915] RAX: ffffffffffffffda RBX: 00007f5378755f60 RCX: 00007f5378642b19 [ 1625.090425] RDX: 0000000000000001 RSI: 0000000020000580 RDI: 0000000000000003 [ 1625.091960] RBP: 00007f5375bb81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.093483] R10: 000000000000e720 R11: 0000000000000246 R12: 0000000000000001 [ 1625.095229] R13: 00007ffc860c755f R14: 00007f5375bb8300 R15: 0000000000022000 [ 1625.169647] FAT-fs (loop4): bogus number of reserved sectors [ 1625.171205] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1625.201242] blktrace: Concurrent blktraces are not allowed on loop10 [ 1625.204762] blktrace: Concurrent blktraces are not allowed on loop10 00:04:56 executing program 3: fork() (fail_nth: 11) [ 1625.223004] FAT-fs (loop4): bogus number of reserved sectors [ 1625.224313] FAT-fs (loop4): Can't find a valid FAT filesystem 00:04:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80087601, &(0x7f0000000000)) [ 1625.383935] FAULT_INJECTION: forcing a failure. [ 1625.383935] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.386464] CPU: 0 PID: 9866 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1625.387966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1625.390413] Call Trace: [ 1625.390995] dump_stack+0x107/0x163 [ 1625.391782] should_fail.cold+0x5/0xa [ 1625.392601] ? create_object.isra.0+0x3a/0xa20 [ 1625.393589] should_failslab+0x5/0x10 [ 1625.394505] kmem_cache_alloc+0x5b/0x350 [ 1625.395411] create_object.isra.0+0x3a/0xa20 [ 1625.396371] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1625.397469] kmem_cache_alloc+0x159/0x350 [ 1625.398374] dup_fd+0x89/0xca0 [ 1625.399086] ? audit_filter_inodes+0x40/0x40 [ 1625.400039] ? security_task_alloc+0xe6/0x260 [ 1625.401016] copy_process+0x1871/0x66f0 [ 1625.401884] ? lock_downgrade+0x6d0/0x6d0 [ 1625.402800] ? __cleanup_sighand+0xb0/0xb0 [ 1625.403729] ? find_held_lock+0x2c/0x110 [ 1625.404613] kernel_clone+0xe7/0xa20 [ 1625.405416] ? lock_downgrade+0x6d0/0x6d0 [ 1625.406309] ? find_held_lock+0x2c/0x110 [ 1625.407203] ? copy_init_mm+0x20/0x20 [ 1625.408028] ? ksys_write+0x12d/0x250 [ 1625.408861] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1625.409913] __do_sys_fork+0x8a/0xc0 [ 1625.410724] ? kernel_clone+0xa20/0xa20 [ 1625.411608] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1625.412741] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.413858] ? trace_hardirqs_on+0x5b/0x180 [ 1625.414794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.415922] do_syscall_64+0x33/0x40 [ 1625.416725] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1625.417833] RIP: 0033:0x7f89b6ef5b19 [ 1625.418651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.422670] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1625.424335] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1625.425890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1625.427452] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.429002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.430560] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:05:10 executing program 3: fork() (fail_nth: 12) 00:05:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x399, @private}, {0x2, 0x0, @broadcast}}) 00:05:10 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b34, &(0x7f0000000000)) 00:05:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x68, 0x0, &(0x7f0000000140)=[@acquire_done={0x40106309, 0x3}, @decrefs={0x40046307, 0x2}, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000040)={@fd, @fda={0x66646185, 0x8, 0x0, 0x33}, @ptr={0x70742a85, 0x1, &(0x7f00000007c0)=""/4096, 0x1000, 0x0, 0x36}}, &(0x7f00000000c0)={0x0, 0x18, 0x38}}, 0x40}], 0xc6, 0x0, &(0x7f0000000240)="f2ac7f5240211d0f1ae9b895e1df7076bba27ef027bbad2eeb33d09e8c0a185a4ee2c4d42238cecf4adb0130b0c8c2361576a9efc8ca57514e1f0b27c50ac72818f5d8511c05ac9db0b3f4cf5593c4ea89b4f9e6a4a3c4d979685d38e8c892fc11b8c6d157c57ef8b441d10f2147ab8d7ddb2a302db799361ea4ed72a73d2003a3dbb77592757d01d6ebfb35112b34a8785ca6a38ce16c31e7730bbe6f373fb9695323dc9847ec3c27a861d7bf143c3cf456f1c3d49a9ba011109b7c60d7612920226ebef9a5"}) open_by_handle_at(r0, &(0x7f0000000340)=@FILEID_BTRFS_WITH_PARENT_ROOT={0x28, 0x4e, {0x100000001, 0x1, 0xfff, 0x145, 0xffff0000, 0x22b}}, 0x20a002) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:05:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x2000000) 00:05:10 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125e, 0x0) 00:05:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) (fail_nth: 2) 00:05:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) [ 1639.182313] blktrace: Concurrent blktraces are not allowed on loop10 [ 1639.200316] blktrace: Concurrent blktraces are not allowed on loop10 [ 1639.216869] FAT-fs (loop4): Unrecognized mount option "õØQ¬°³ôÏU“Äꉴù椣ÄÙyh]8èÈ’ü¸ÆÑWÅ~ø´AÑ!G«}Û*0-·™6¤ír§= £Û·u’u}Öëû5+4¨x\¦£Œál1çs ¾o7?¹iS#ܘGì<'¨a׿<<ôVñÃÔš› ›|`×a) "n¾ù¥" or missing value [ 1639.250341] FAULT_INJECTION: forcing a failure. [ 1639.250341] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.252967] CPU: 0 PID: 9892 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1639.254538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.257024] Call Trace: [ 1639.257605] dump_stack+0x107/0x163 [ 1639.258403] should_fail.cold+0x5/0xa [ 1639.259247] ? alloc_fdtable+0x84/0x280 [ 1639.260107] should_failslab+0x5/0x10 [ 1639.260924] kmem_cache_alloc_trace+0x55/0x360 [ 1639.261911] ? rwlock_bug.part.0+0x90/0x90 [ 1639.262828] alloc_fdtable+0x84/0x280 [ 1639.263663] dup_fd+0x71e/0xca0 [ 1639.264383] copy_process+0x1871/0x66f0 [ 1639.265237] ? lock_downgrade+0x6d0/0x6d0 [ 1639.266137] ? __cleanup_sighand+0xb0/0xb0 [ 1639.267073] ? find_held_lock+0x2c/0x110 [ 1639.267946] kernel_clone+0xe7/0xa20 [ 1639.268749] ? lock_downgrade+0x6d0/0x6d0 [ 1639.269651] ? find_held_lock+0x2c/0x110 [ 1639.270515] ? copy_init_mm+0x20/0x20 [ 1639.271351] ? ksys_write+0x12d/0x250 [ 1639.272187] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.273243] __do_sys_fork+0x8a/0xc0 [ 1639.274054] ? kernel_clone+0xa20/0xa20 [ 1639.274956] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1639.276099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.277222] ? trace_hardirqs_on+0x5b/0x180 [ 1639.278163] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.279298] do_syscall_64+0x33/0x40 [ 1639.280112] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1639.281235] RIP: 0033:0x7f89b6ef5b19 [ 1639.282051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.286112] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1639.287770] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1639.289322] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1639.290875] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.292446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.294010] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:05:10 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b35, &(0x7f0000000000)) 00:05:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x3000000) 00:05:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) [ 1639.321881] FAT-fs (loop4): Unrecognized mount option "õØQ¬°³ôÏU“Äꉴù椣ÄÙyh]8èÈ’ü¸ÆÑWÅ~ø´AÑ!G«}Û*0-·™6¤ír§= £Û·u’u}Öëû5+4¨x\¦£Œál1çs ¾o7?¹iS#ܘGì<'¨a׿<<ôVñÃÔš› ›|`×a) "n¾ù¥" or missing value 00:05:10 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x125f, 0x0) 00:05:10 executing program 3: fork() (fail_nth: 13) [ 1639.349661] FAULT_INJECTION: forcing a failure. [ 1639.349661] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.352401] CPU: 1 PID: 9890 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 1639.353862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.356276] Call Trace: [ 1639.356845] dump_stack+0x107/0x163 [ 1639.357614] should_fail.cold+0x5/0xa [ 1639.358424] ? kvmalloc_node+0x115/0x170 [ 1639.359298] should_failslab+0x5/0x10 [ 1639.360109] __kmalloc_node+0x76/0x4a0 [ 1639.360934] kvmalloc_node+0x115/0x170 [ 1639.361766] seq_read_iter+0x9d2/0x12b0 [ 1639.362622] seq_read+0x3dd/0x5b0 [ 1639.363366] ? seq_read_iter+0x12b0/0x12b0 [ 1639.364264] ? fsnotify+0xf30/0xf30 [ 1639.365045] ? _cond_resched+0x12/0x80 [ 1639.365884] ? seq_read_iter+0x12b0/0x12b0 [ 1639.366779] proc_reg_read+0x226/0x300 [ 1639.367629] do_iter_read+0x484/0x6d0 [ 1639.368443] ? import_iovec+0x83/0xb0 [ 1639.369251] vfs_readv+0xe5/0x150 [ 1639.369984] ? vfs_iter_read+0xa0/0xa0 [ 1639.370807] ? __fget_files+0x26d/0x480 [ 1639.371661] ? ksys_write+0x12d/0x250 [ 1639.372471] ? __fget_files+0x296/0x480 [ 1639.373324] __x64_sys_preadv+0x231/0x310 [ 1639.374198] ? __x64_sys_preadv2+0x150/0x150 [ 1639.375139] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1639.376246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.377338] do_syscall_64+0x33/0x40 [ 1639.378127] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1639.379224] RIP: 0033:0x7f5378642b19 [ 1639.380013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.383928] RSP: 002b:00007f5375bb8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1639.385543] RAX: ffffffffffffffda RBX: 00007f5378755f60 RCX: 00007f5378642b19 [ 1639.387068] RDX: 0000000000000001 RSI: 0000000020000580 RDI: 0000000000000004 [ 1639.388580] RBP: 00007f5375bb81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.390090] R10: 000000000000e720 R11: 0000000000000246 R12: 0000000000000001 [ 1639.391612] R13: 00007ffc860c755f R14: 00007f5375bb8300 R15: 0000000000022000 00:05:10 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x800) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:05:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) (fail_nth: 3) 00:05:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0xa00, @private}, {0x2, 0x0, @broadcast}}) [ 1639.568060] blktrace: Concurrent blktraces are not allowed on loop10 00:05:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0189436, &(0x7f0000000000)) [ 1639.612451] FAT-fs (loop4): Directory bread(block 5) failed 00:05:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b36, &(0x7f0000000000)) 00:05:11 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1260, 0x0) [ 1639.646773] FAULT_INJECTION: forcing a failure. [ 1639.646773] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.649206] CPU: 1 PID: 9913 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1639.650646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.653129] Call Trace: [ 1639.653730] dump_stack+0x107/0x163 [ 1639.654566] should_fail.cold+0x5/0xa [ 1639.655448] ? create_object.isra.0+0x3a/0xa20 [ 1639.656462] should_failslab+0x5/0x10 [ 1639.657263] kmem_cache_alloc+0x5b/0x350 [ 1639.658120] create_object.isra.0+0x3a/0xa20 [ 1639.659051] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1639.660120] kmem_cache_alloc_trace+0x151/0x360 [ 1639.661126] ? rwlock_bug.part.0+0x90/0x90 [ 1639.662134] alloc_fdtable+0x84/0x280 [ 1639.663043] dup_fd+0x71e/0xca0 [ 1639.663749] copy_process+0x1871/0x66f0 [ 1639.664584] ? lock_downgrade+0x6d0/0x6d0 [ 1639.665464] ? __cleanup_sighand+0xb0/0xb0 [ 1639.666372] ? find_held_lock+0x2c/0x110 [ 1639.667317] kernel_clone+0xe7/0xa20 [ 1639.668193] ? lock_downgrade+0x6d0/0x6d0 [ 1639.669094] ? find_held_lock+0x2c/0x110 [ 1639.669945] ? copy_init_mm+0x20/0x20 [ 1639.670748] ? ksys_write+0x12d/0x250 [ 1639.671568] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1639.672624] __do_sys_fork+0x8a/0xc0 [ 1639.673464] ? kernel_clone+0xa20/0xa20 [ 1639.674401] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1639.675512] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.676597] ? trace_hardirqs_on+0x5b/0x180 [ 1639.677507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.678688] do_syscall_64+0x33/0x40 [ 1639.679632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1639.680710] RIP: 0033:0x7f89b6ef5b19 [ 1639.681495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.685596] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1639.687220] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1639.688724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1639.690299] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.691958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.693459] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:05:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4000000) [ 1639.767475] FAULT_INJECTION: forcing a failure. [ 1639.767475] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.769960] CPU: 1 PID: 9916 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 1639.771405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.773801] Call Trace: [ 1639.774374] dump_stack+0x107/0x163 [ 1639.775181] should_fail.cold+0x5/0xa [ 1639.776000] ? create_object.isra.0+0x3a/0xa20 [ 1639.776987] should_failslab+0x5/0x10 [ 1639.777802] kmem_cache_alloc+0x5b/0x350 [ 1639.778693] create_object.isra.0+0x3a/0xa20 [ 1639.779643] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1639.780747] __kmalloc_node+0x1ae/0x4a0 [ 1639.781624] kvmalloc_node+0x115/0x170 [ 1639.782466] seq_read_iter+0x9d2/0x12b0 [ 1639.783371] seq_read+0x3dd/0x5b0 [ 1639.784125] ? seq_read_iter+0x12b0/0x12b0 [ 1639.785029] ? fsnotify+0xf30/0xf30 [ 1639.785826] ? _cond_resched+0x12/0x80 [ 1639.786692] ? seq_read_iter+0x12b0/0x12b0 [ 1639.787617] proc_reg_read+0x226/0x300 [ 1639.788464] do_iter_read+0x484/0x6d0 [ 1639.789296] ? import_iovec+0x83/0xb0 [ 1639.790129] vfs_readv+0xe5/0x150 [ 1639.790875] ? vfs_iter_read+0xa0/0xa0 [ 1639.791722] ? __fget_files+0x26d/0x480 [ 1639.792592] ? ksys_write+0x12d/0x250 [ 1639.793434] ? __fget_files+0x296/0x480 [ 1639.794327] __x64_sys_preadv+0x231/0x310 [ 1639.795229] ? __x64_sys_preadv2+0x150/0x150 [ 1639.796185] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1639.797300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.798411] do_syscall_64+0x33/0x40 [ 1639.799229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1639.800329] RIP: 0033:0x7f5378642b19 [ 1639.801131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.805076] RSP: 002b:00007f5375bb8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1639.806709] RAX: ffffffffffffffda RBX: 00007f5378755f60 RCX: 00007f5378642b19 [ 1639.808219] RDX: 0000000000000001 RSI: 0000000020000580 RDI: 0000000000000005 [ 1639.809702] RBP: 00007f5375bb81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.811206] R10: 000000000000e720 R11: 0000000000000246 R12: 0000000000000001 [ 1639.812688] R13: 00007ffc860c755f R14: 00007f5375bb8300 R15: 0000000000022000 00:05:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b37, &(0x7f0000000000)) 00:05:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc020660b, &(0x7f0000000000)) [ 1639.899555] blktrace: Concurrent blktraces are not allowed on loop10 [ 1639.907140] blktrace: Concurrent blktraces are not allowed on loop10 00:05:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x5000000) 00:05:11 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1261, 0x0) 00:05:11 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x4000, @private}, {0x2, 0x0, @broadcast}}) 00:05:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3a, &(0x7f0000000000)) 00:05:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1640.105878] blktrace: Concurrent blktraces are not allowed on loop10 [ 1640.111356] blktrace: Concurrent blktraces are not allowed on loop10 00:05:23 executing program 3: fork() (fail_nth: 14) 00:05:23 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x9903, @private}, {0x2, 0x0, @broadcast}}) 00:05:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) (fail_nth: 4) 00:05:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6000000) 00:05:23 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1262, 0x0) 00:05:23 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3b, &(0x7f0000000000)) 00:05:23 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x681}) 00:05:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x8, 0x801, 0x0, 0x0, {0x7, 0x0, 0x6}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x4048000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') readv(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/181, 0xb5}, {&(0x7f0000000680)=""/36, 0x24}, {&(0x7f00000006c0)=""/70, 0x46}, {&(0x7f0000000740)=""/16, 0x10}, {&(0x7f00000007c0)=""/219, 0xdb}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/137, 0x89}, {&(0x7f0000000980)=""/118, 0x76}], 0x8) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000500)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ac0)={0x134, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x20044080) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @local}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x20, 0x5, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, 0x0, 0x1, 0x1800000, 0x7}}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000000)={r7, 0x1, 0x6, @local}, 0x10) getsockname$packet(r2, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c40)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0x14, 0x0, 0x20, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1652.160401] blktrace: Concurrent blktraces are not allowed on loop10 [ 1652.163829] blktrace: Concurrent blktraces are not allowed on loop10 [ 1652.225259] FAT-fs (loop4): Directory bread(block 5) failed 00:05:23 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3c, &(0x7f0000000000)) 00:05:23 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x8106}) [ 1652.257089] device lo entered promiscuous mode 00:05:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7000000) 00:05:23 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1263, 0x0) [ 1652.297404] device lo left promiscuous mode [ 1652.303199] FAULT_INJECTION: forcing a failure. [ 1652.303199] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.305805] CPU: 1 PID: 9970 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1652.307338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1652.310078] Call Trace: [ 1652.310720] dump_stack+0x107/0x163 [ 1652.311619] should_fail.cold+0x5/0xa [ 1652.312558] ? kvmalloc_node+0x115/0x170 [ 1652.313556] should_failslab+0x5/0x10 [ 1652.314401] FAULT_INJECTION: forcing a failure. [ 1652.314401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1652.314488] __kmalloc_node+0x76/0x4a0 [ 1652.314517] kvmalloc_node+0x115/0x170 [ 1652.318650] alloc_fdtable+0xd3/0x280 [ 1652.319472] dup_fd+0x71e/0xca0 [ 1652.320189] copy_process+0x1871/0x66f0 [ 1652.321046] ? lock_downgrade+0x6d0/0x6d0 [ 1652.321943] ? __cleanup_sighand+0xb0/0xb0 [ 1652.322845] ? __lockdep_reset_lock+0x180/0x180 [ 1652.323861] ? find_held_lock+0x2c/0x110 [ 1652.324732] kernel_clone+0xe7/0xa20 [ 1652.325525] ? lock_downgrade+0x6d0/0x6d0 [ 1652.326407] ? find_held_lock+0x2c/0x110 [ 1652.327281] ? copy_init_mm+0x20/0x20 [ 1652.328094] ? ksys_write+0x12d/0x250 [ 1652.328911] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1652.329942] __do_sys_fork+0x8a/0xc0 [ 1652.330732] ? kernel_clone+0xa20/0xa20 [ 1652.331600] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1652.332740] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.333834] ? trace_hardirqs_on+0x5b/0x180 [ 1652.334758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.335875] do_syscall_64+0x33/0x40 [ 1652.336671] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1652.337767] RIP: 0033:0x7f89b6ef5b19 [ 1652.338559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.342526] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1652.344154] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1652.345672] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1652.347395] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.349214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.351021] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1652.352895] CPU: 0 PID: 9967 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 1652.354427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1652.357094] Call Trace: [ 1652.357684] dump_stack+0x107/0x163 [ 1652.358504] should_fail.cold+0x5/0xa [ 1652.359371] _copy_to_user+0x2e/0x180 [ 1652.360226] simple_read_from_buffer+0xcc/0x160 [ 1652.361278] proc_fail_nth_read+0x194/0x220 [ 1652.362233] ? proc_sessionid_read+0x220/0x220 [ 1652.363245] ? security_file_permission+0x24e/0x570 [ 1652.364349] ? perf_trace_initcall_start+0x111/0x370 [ 1652.365475] ? proc_sessionid_read+0x220/0x220 [ 1652.366502] vfs_read+0x228/0x580 [ 1652.367290] ksys_read+0x12d/0x250 [ 1652.368075] ? __ia32_sys_pwrite64+0x230/0x230 [ 1652.369091] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1652.370234] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.371379] do_syscall_64+0x33/0x40 [ 1652.372189] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1652.373310] RIP: 0033:0x7f53785f569c 00:05:23 executing program 3: fork() (fail_nth: 15) [ 1652.374122] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1652.378230] RSP: 002b:00007f5375bb8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1652.379903] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53785f569c [ 1652.381464] RDX: 000000000000000f RSI: 00007f5375bb81e0 RDI: 0000000000000006 [ 1652.383017] RBP: 00007f5375bb81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.384578] R10: 000000000000e720 R11: 0000000000000246 R12: 0000000000000001 [ 1652.386127] R13: 00007ffc860c755f R14: 00007f5375bb8300 R15: 0000000000022000 [ 1652.401244] device lo entered promiscuous mode [ 1652.410705] device lo left promiscuous mode 00:05:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x24) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) 00:05:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 1652.599883] blktrace: Concurrent blktraces are not allowed on loop10 [ 1652.653115] FAULT_INJECTION: forcing a failure. [ 1652.653115] name failslab, interval 1, probability 0, space 0, times 0 [ 1652.655651] CPU: 0 PID: 9985 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1652.657143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1652.659738] Call Trace: [ 1652.660318] dump_stack+0x107/0x163 [ 1652.661160] should_fail.cold+0x5/0xa [ 1652.661984] ? create_object.isra.0+0x3a/0xa20 [ 1652.663009] should_failslab+0x5/0x10 [ 1652.663849] kmem_cache_alloc+0x5b/0x350 [ 1652.664746] create_object.isra.0+0x3a/0xa20 [ 1652.665778] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1652.666957] __kmalloc_node+0x1ae/0x4a0 [ 1652.667856] kvmalloc_node+0x115/0x170 [ 1652.668714] alloc_fdtable+0xd3/0x280 [ 1652.669556] dup_fd+0x71e/0xca0 [ 1652.670281] copy_process+0x1871/0x66f0 [ 1652.671210] ? __cleanup_sighand+0xb0/0xb0 [ 1652.672130] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1652.673260] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1652.674425] ? trace_hardirqs_on+0x5b/0x180 [ 1652.675423] kernel_clone+0xe7/0xa20 [ 1652.676232] ? copy_init_mm+0x20/0x20 [ 1652.677049] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1652.678010] ? _raw_spin_unlock_irq+0x27/0x30 [ 1652.678976] ? finish_task_switch+0x126/0x5d0 [ 1652.679969] ? finish_task_switch+0xef/0x5d0 [ 1652.680912] ? __switch_to+0x572/0xff0 [ 1652.681749] ? __switch_to_asm+0x42/0x70 [ 1652.682620] ? __switch_to_asm+0x36/0x70 [ 1652.683506] ? __schedule+0x850/0x1e80 [ 1652.684349] __do_sys_fork+0x8a/0xc0 [ 1652.685152] ? kernel_clone+0xa20/0xa20 [ 1652.686008] ? io_schedule_timeout+0x140/0x140 [ 1652.686994] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1652.688071] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1652.689201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.690309] ? trace_hardirqs_on+0x5b/0x180 [ 1652.691268] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1652.692377] do_syscall_64+0x33/0x40 [ 1652.693179] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1652.694287] RIP: 0033:0x7f89b6ef5b19 [ 1652.695096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1652.699088] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1652.700754] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1652.702297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1652.703851] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1652.705393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1652.706940] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1652.738631] FAT-fs (loop4): Directory bread(block 5) failed [ 1666.198170] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:05:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:05:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0x200000f4}], 0x1, 0xe720, 0x0) 00:05:46 executing program 4: r0 = io_uring_setup(0x4b72, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x2, 0xfffffffe}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x5, 0x0, r1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:05:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0xa000000) 00:05:46 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1264, 0x0) 00:05:46 executing program 3: fork() (fail_nth: 16) 00:05:46 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3d, &(0x7f0000000000)) 00:05:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 1674.884909] blktrace: Concurrent blktraces are not allowed on loop10 [ 1674.888560] FAT-fs (loop4): Directory bread(block 5) failed [ 1674.888633] blktrace: Concurrent blktraces are not allowed on loop10 [ 1674.978300] FAULT_INJECTION: forcing a failure. [ 1674.978300] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.981195] CPU: 0 PID: 10014 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1674.982745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1674.985243] Call Trace: [ 1674.985826] dump_stack+0x107/0x163 [ 1674.986632] should_fail.cold+0x5/0xa [ 1674.987499] ? kvmalloc_node+0x115/0x170 [ 1674.988387] should_failslab+0x5/0x10 [ 1674.989217] __kmalloc_node+0x76/0x4a0 [ 1674.990073] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1674.991176] kvmalloc_node+0x115/0x170 [ 1674.992034] alloc_fdtable+0x13f/0x280 [ 1674.992886] dup_fd+0x71e/0xca0 [ 1674.993618] copy_process+0x1871/0x66f0 [ 1674.994487] ? lock_downgrade+0x6d0/0x6d0 [ 1674.995425] ? __cleanup_sighand+0xb0/0xb0 [ 1674.996360] ? find_held_lock+0x2c/0x110 [ 1674.997254] kernel_clone+0xe7/0xa20 [ 1674.998065] ? lock_downgrade+0x6d0/0x6d0 [ 1674.998961] ? find_held_lock+0x2c/0x110 [ 1674.999854] ? copy_init_mm+0x20/0x20 [ 1675.000686] ? ksys_write+0x12d/0x250 [ 1675.001522] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1675.002575] __do_sys_fork+0x8a/0xc0 [ 1675.003390] ? kernel_clone+0xa20/0xa20 [ 1675.004276] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1675.005417] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.006541] ? trace_hardirqs_on+0x5b/0x180 [ 1675.007503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.008626] do_syscall_64+0x33/0x40 [ 1675.009438] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1675.010558] RIP: 0033:0x7f89b6ef5b19 [ 1675.011371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.015383] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1675.017061] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1675.018617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1675.020177] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.021725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1675.023273] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:05:58 executing program 3: fork() (fail_nth: 17) 00:05:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x2}, {0x2, 0x0, @broadcast}}) 00:05:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x10000000) 00:05:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b40, &(0x7f0000000000)) 00:05:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x681}) 00:05:58 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) 00:05:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0x7ffff000}], 0x1, 0xe720, 0x0) [ 1687.517610] blktrace: Concurrent blktraces are not allowed on loop10 [ 1687.521036] blktrace: Concurrent blktraces are not allowed on loop10 [ 1687.552889] FAULT_INJECTION: forcing a failure. [ 1687.552889] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.555668] CPU: 1 PID: 10040 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1687.557240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1687.559800] Call Trace: [ 1687.560400] dump_stack+0x107/0x163 [ 1687.561224] should_fail.cold+0x5/0xa [ 1687.562083] ? create_object.isra.0+0x3a/0xa20 [ 1687.563114] should_failslab+0x5/0x10 [ 1687.563979] kmem_cache_alloc+0x5b/0x350 [ 1687.564898] create_object.isra.0+0x3a/0xa20 [ 1687.565886] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1687.567032] __kmalloc_node+0x1ae/0x4a0 [ 1687.567957] kvmalloc_node+0x115/0x170 [ 1687.568832] alloc_fdtable+0xd3/0x280 [ 1687.569691] dup_fd+0x71e/0xca0 [ 1687.570451] copy_process+0x1871/0x66f0 [ 1687.571350] ? lock_downgrade+0x6d0/0x6d0 [ 1687.572309] ? __cleanup_sighand+0xb0/0xb0 [ 1687.573260] ? __lockdep_reset_lock+0x180/0x180 [ 1687.574314] ? find_held_lock+0x2c/0x110 [ 1687.575233] kernel_clone+0xe7/0xa20 [ 1687.576087] ? lock_downgrade+0x6d0/0x6d0 [ 1687.577019] ? find_held_lock+0x2c/0x110 [ 1687.577931] ? copy_init_mm+0x20/0x20 [ 1687.578798] ? ksys_write+0x12d/0x250 [ 1687.579673] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1687.580768] __do_sys_fork+0x8a/0xc0 [ 1687.581607] ? kernel_clone+0xa20/0xa20 [ 1687.582520] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1687.583719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1687.584880] ? trace_hardirqs_on+0x5b/0x180 [ 1687.585853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1687.587010] do_syscall_64+0x33/0x40 [ 1687.587859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1687.589023] RIP: 0033:0x7f89b6ef5b19 [ 1687.589864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1687.594044] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1687.595771] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1687.597400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1687.599023] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.600651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1687.602258] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:05:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1267, 0x0) 00:05:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x8106}) 00:05:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b41, &(0x7f0000000000)) 00:05:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x48000000) 00:05:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x8, 0xe720, 0x0) 00:05:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x4}, {0x2, 0x0, @broadcast}}) [ 1687.791533] blktrace: Concurrent blktraces are not allowed on loop10 00:05:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1687.796642] blktrace: Concurrent blktraces are not allowed on loop10 00:05:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b44, &(0x7f0000000000)) 00:05:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1268, 0x0) [ 1687.989808] blktrace: Concurrent blktraces are not allowed on loop10 [ 1701.622866] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:06:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x500, 0xe720, 0x0) 00:06:20 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0xa}, {0x2, 0x0, @broadcast}}) 00:06:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x4c000000) 00:06:20 executing program 3: fork() (fail_nth: 18) 00:06:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b45, &(0x7f0000000000)) 00:06:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x681}) 00:06:20 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1269, 0x0) 00:06:20 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/51, 0x33}, {&(0x7f00000000c0)=""/26, 0x1a}, {&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f0000000140)=""/144, 0x90}, {&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/182, 0xb6}], 0x8, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x148}, 0x2020) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = clone3(&(0x7f0000001980)={0x40000, &(0x7f0000000740), &(0x7f00000017c0), &(0x7f0000001800), {0x33}, &(0x7f0000001840)=""/19, 0x13, &(0x7f0000001880)=""/181, &(0x7f0000001940)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x8}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001a00)=0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xf8cb60a98935dae4}, 0xc, &(0x7f0000001b80)={&(0x7f0000001a40)={0x140, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}]}, 0x140}, 0x1, 0x0, 0x0, 0x40}, 0x4004080) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1709.409618] blktrace: Concurrent blktraces are not allowed on loop10 00:06:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x8106}) [ 1709.467348] FAULT_INJECTION: forcing a failure. [ 1709.467348] name failslab, interval 1, probability 0, space 0, times 0 00:06:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x68000000) [ 1709.470207] CPU: 0 PID: 10088 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1709.471895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1709.474472] Call Trace: [ 1709.475049] dump_stack+0x107/0x163 [ 1709.475886] should_fail.cold+0x5/0xa [ 1709.476726] ? kvmalloc_node+0x115/0x170 [ 1709.477617] should_failslab+0x5/0x10 [ 1709.478440] __kmalloc_node+0x76/0x4a0 [ 1709.479292] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1709.480412] kvmalloc_node+0x115/0x170 [ 1709.481267] alloc_fdtable+0x13f/0x280 [ 1709.482117] dup_fd+0x71e/0xca0 [ 1709.482863] copy_process+0x1871/0x66f0 [ 1709.483735] ? lock_downgrade+0x6d0/0x6d0 [ 1709.484669] ? __cleanup_sighand+0xb0/0xb0 [ 1709.485596] ? __lockdep_reset_lock+0x180/0x180 [ 1709.486627] ? find_held_lock+0x2c/0x110 [ 1709.487516] kernel_clone+0xe7/0xa20 [ 1709.488345] ? lock_downgrade+0x6d0/0x6d0 [ 1709.489255] ? find_held_lock+0x2c/0x110 [ 1709.490138] ? copy_init_mm+0x20/0x20 [ 1709.490976] ? ksys_write+0x12d/0x250 [ 1709.491809] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1709.492870] __do_sys_fork+0x8a/0xc0 [ 1709.493682] ? kernel_clone+0xa20/0xa20 [ 1709.494561] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1709.495699] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1709.496835] ? trace_hardirqs_on+0x5b/0x180 [ 1709.497772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1709.498895] do_syscall_64+0x33/0x40 [ 1709.499703] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1709.500834] RIP: 0033:0x7f89b6ef5b19 [ 1709.501641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1709.505664] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1709.507321] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1709.508888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1709.510439] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.512003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1709.513548] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:06:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b46, &(0x7f0000000000)) 00:06:20 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:06:20 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x399}, {0x2, 0x0, @broadcast}}) [ 1709.547468] FAT-fs (loop4): Directory bread(block 5) failed 00:06:21 executing program 3: fork() (fail_nth: 19) 00:06:21 executing program 1: syncfs(0xffffffffffffffff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x1f, 0x1, 0x4) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') dup3(r1, r2, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:06:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17, 0x1}, {0x0, 0x0, 0x7}], 0x0, &(0x7f0000000280)=ANY=[]) 00:06:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0xf000, 0xe720, 0x0) [ 1709.742416] blktrace: Concurrent blktraces are not allowed on loop10 [ 1709.751134] blktrace: Concurrent blktraces are not allowed on loop10 [ 1709.853439] FAT-fs (loop4): bogus number of reserved sectors [ 1709.855063] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1709.885078] FAT-fs (loop4): bogus number of reserved sectors [ 1709.886474] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1709.949554] FAULT_INJECTION: forcing a failure. [ 1709.949554] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.952390] CPU: 0 PID: 10117 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1709.953990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1709.956554] Call Trace: [ 1709.957133] dump_stack+0x107/0x163 [ 1709.957936] should_fail.cold+0x5/0xa [ 1709.958769] ? create_object.isra.0+0x3a/0xa20 [ 1709.959759] should_failslab+0x5/0x10 [ 1709.960589] kmem_cache_alloc+0x5b/0x350 [ 1709.961469] create_object.isra.0+0x3a/0xa20 [ 1709.962416] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1709.963513] kmem_cache_alloc+0x159/0x350 [ 1709.964465] copy_fs_struct+0x45/0x340 [ 1709.965312] copy_process+0x4532/0x66f0 [ 1709.966177] ? lock_downgrade+0x6d0/0x6d0 [ 1709.967084] ? __cleanup_sighand+0xb0/0xb0 [ 1709.968014] ? find_held_lock+0x2c/0x110 [ 1709.968897] kernel_clone+0xe7/0xa20 [ 1709.969698] ? lock_downgrade+0x6d0/0x6d0 [ 1709.970595] ? find_held_lock+0x2c/0x110 [ 1709.971467] ? copy_init_mm+0x20/0x20 [ 1709.972299] ? ksys_write+0x12d/0x250 [ 1709.973130] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1709.974177] __do_sys_fork+0x8a/0xc0 [ 1709.974980] ? kernel_clone+0xa20/0xa20 [ 1709.975850] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1709.977011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1709.978130] ? trace_hardirqs_on+0x5b/0x180 [ 1709.979062] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1709.980184] do_syscall_64+0x33/0x40 [ 1709.980989] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1709.982092] RIP: 0033:0x7f89b6ef5b19 [ 1709.982899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1709.986902] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1709.988559] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1709.990109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1709.991653] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.993205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1709.994739] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1723.305223] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:06:41 executing program 3: fork() (fail_nth: 20) 00:06:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b47, &(0x7f0000000000)) 00:06:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0xfffff000, 0xe720, 0x0) 00:06:41 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1275, 0x0) 00:06:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x6c000000) 00:06:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000000c0)={0xc1, 0x20, 0x2}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x6, 0x1f, 0xfe, 0x9, 0x0, 0x5, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000040), 0x7}, 0x1000, 0xcea5, 0x2, 0x3, 0xb4, 0x9, 0x8, 0x0, 0x7fffffff, 0x0, 0x3}) 00:06:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x2) 00:06:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0xa00}, {0x2, 0x0, @broadcast}}) [ 1729.926235] blktrace: Concurrent blktraces are not allowed on loop10 00:06:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b48, &(0x7f0000000000)) 00:06:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="258b741cd0016bdbd8713a7f3adfb97334cedcaadbe679125aadbc1c3d8f769e12ddd0f5696eba59332ebf7b48af580d3a547a6e4280b8563d82831594d9055a31f4b8c09a40aee66afd2624023ebe45f2acdab610594a4da0267ced4bf9cdac7d80336288b21d36940504afd6adb3c052e08f8b595c6b536bc908e171043bab3e70304fee3773fb4031a64b400b831b0c89e1871d704cc2b424efea2af00e3a98f3fc71ddddeed1e18a8a461d43934d32c305b00114f97db8238b29660dfd7d6a42314acf1f5d41f858526c28317abd3ea4997b9e5c11", 0xd7}, {&(0x7f00000001c0)="b8301d7260d2572e2d930208a7cbd7a5e2eea37486d5d9074cdd1e861a7fb45cc1a9a1880da3be00b3a29389f079af71fcd0fddf454f5f8568ca331065e815cf162ff9a93f6d7e21fc853d8971931d1a02bd80566c7bf41de8830ccb612deeadb675940203021dc56e37d4bb", 0x6c}], 0x2, 0x0, 0x0, 0x41}, 0x20000080) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000002c0)={0x24, 0x20, 0x3d21, 0x1, 0x3}) 00:06:41 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1277, 0x0) [ 1729.979479] FAULT_INJECTION: forcing a failure. [ 1729.979479] name failslab, interval 1, probability 0, space 0, times 0 [ 1729.981071] CPU: 1 PID: 10144 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1729.981846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1729.983097] Call Trace: [ 1729.983400] dump_stack+0x107/0x163 [ 1729.983802] should_fail.cold+0x5/0xa [ 1729.984246] ? copy_process+0x19dc/0x66f0 [ 1729.984706] should_failslab+0x5/0x10 [ 1729.985127] kmem_cache_alloc+0x5b/0x350 [ 1729.985574] ? _raw_spin_unlock+0x1a/0x30 [ 1729.986034] copy_process+0x19dc/0x66f0 [ 1729.986476] ? lock_downgrade+0x6d0/0x6d0 [ 1729.986945] ? __cleanup_sighand+0xb0/0xb0 [ 1729.987416] ? find_held_lock+0x2c/0x110 [ 1729.987870] kernel_clone+0xe7/0xa20 [ 1729.988269] ? lock_downgrade+0x6d0/0x6d0 [ 1729.988706] ? find_held_lock+0x2c/0x110 [ 1729.989153] ? copy_init_mm+0x20/0x20 [ 1729.989597] ? ksys_write+0x12d/0x250 [ 1729.990031] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1729.990586] __do_sys_fork+0x8a/0xc0 [ 1729.991016] ? kernel_clone+0xa20/0xa20 [ 1729.991474] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1729.992081] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1729.992692] ? trace_hardirqs_on+0x5b/0x180 [ 1729.993189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1729.993778] do_syscall_64+0x33/0x40 [ 1729.994204] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1729.994793] RIP: 0033:0x7f89b6ef5b19 [ 1729.995219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1729.997340] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1729.998213] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1729.999030] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1729.999848] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1730.000674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1730.001490] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1730.006585] FAT-fs (loop4): Directory bread(block 5) failed 00:06:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x74000000) 00:06:41 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000040)={0x5, 0xfffffffffffffffd, 0x3b, 0x7fff, 0x5}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:06:41 executing program 3: fork() (fail_nth: 21) 00:06:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0xfffffffffffff000, 0xe720, 0x0) [ 1730.160098] blktrace: Concurrent blktraces are not allowed on loop10 [ 1730.161363] blktrace: Concurrent blktraces are not allowed on loop10 [ 1730.235281] FAT-fs (loop4): Directory bread(block 5) failed [ 1730.323585] FAULT_INJECTION: forcing a failure. [ 1730.323585] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.325174] CPU: 1 PID: 10168 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1730.326008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1730.327279] Call Trace: [ 1730.327578] dump_stack+0x107/0x163 [ 1730.327993] should_fail.cold+0x5/0xa [ 1730.328436] ? create_object.isra.0+0x3a/0xa20 [ 1730.328950] should_failslab+0x5/0x10 [ 1730.329382] kmem_cache_alloc+0x5b/0x350 [ 1730.329847] create_object.isra.0+0x3a/0xa20 [ 1730.330348] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1730.330913] kmem_cache_alloc+0x159/0x350 [ 1730.331385] ? _raw_spin_unlock+0x1a/0x30 [ 1730.331857] copy_process+0x19dc/0x66f0 [ 1730.332313] ? lock_downgrade+0x6d0/0x6d0 [ 1730.332790] ? __cleanup_sighand+0xb0/0xb0 [ 1730.333273] ? __lockdep_reset_lock+0x180/0x180 [ 1730.333817] ? find_held_lock+0x2c/0x110 [ 1730.334290] kernel_clone+0xe7/0xa20 [ 1730.334723] ? lock_downgrade+0x6d0/0x6d0 [ 1730.335205] ? find_held_lock+0x2c/0x110 [ 1730.335676] ? copy_init_mm+0x20/0x20 [ 1730.336121] ? ksys_write+0x12d/0x250 [ 1730.336560] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1730.337128] __do_sys_fork+0x8a/0xc0 [ 1730.337561] ? kernel_clone+0xa20/0xa20 [ 1730.338035] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1730.338642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1730.339238] ? trace_hardirqs_on+0x5b/0x180 [ 1730.339739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1730.340356] do_syscall_64+0x33/0x40 [ 1730.340790] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1730.341388] RIP: 0033:0x7f89b6ef5b19 [ 1730.341824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.343968] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1730.344868] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1730.345699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1730.346533] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1730.347360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1730.348190] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:06:55 executing program 3: fork() (fail_nth: 22) 00:06:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x38, 0x0) 00:06:55 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1278, 0x0) 00:06:55 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400200, 0x180) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x100, 0x1c8) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x2, 0x1, 0x1f}) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x9, 0x5, 0x6, 0x6, 0x7, "818337f2921a06d7b5405be64a92c61e13acaf", 0x6, 0x6}) r4 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x10001) fcntl$getflags(r4, 0x40a) 00:06:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b49, &(0x7f0000000000)) 00:06:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x4000}, {0x2, 0x0, @broadcast}}) 00:06:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x7a000000) 00:06:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x204400, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@fscache}, {@cache_loose}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@context={'context', 0x3d, 'user_u'}}]}}) [ 1743.694798] blktrace: Concurrent blktraces are not allowed on loop10 [ 1743.698922] blktrace: Concurrent blktraces are not allowed on loop10 [ 1743.725660] FAT-fs (loop4): Directory bread(block 5) failed [ 1743.739666] FAULT_INJECTION: forcing a failure. [ 1743.739666] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.741962] CPU: 0 PID: 10190 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1743.743182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1743.745273] Call Trace: [ 1743.745747] dump_stack+0x107/0x163 [ 1743.746402] should_fail.cold+0x5/0xa [ 1743.747072] ? copy_process+0x1b5a/0x66f0 [ 1743.747815] should_failslab+0x5/0x10 [ 1743.748521] kmem_cache_alloc+0x5b/0x350 [ 1743.749254] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1743.750194] copy_process+0x1b5a/0x66f0 [ 1743.750910] ? lock_downgrade+0x6d0/0x6d0 [ 1743.751686] ? __cleanup_sighand+0xb0/0xb0 [ 1743.752464] ? __lockdep_reset_lock+0x180/0x180 [ 1743.753363] ? find_held_lock+0x2c/0x110 [ 1743.754115] kernel_clone+0xe7/0xa20 [ 1743.754817] ? lock_downgrade+0x6d0/0x6d0 [ 1743.755534] ? find_held_lock+0x2c/0x110 [ 1743.756186] ? copy_init_mm+0x20/0x20 [ 1743.756921] ? ksys_write+0x12d/0x250 [ 1743.757639] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1743.758625] __do_sys_fork+0x8a/0xc0 [ 1743.759449] ? kernel_clone+0xa20/0xa20 [ 1743.760349] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1743.761356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.762309] ? trace_hardirqs_on+0x5b/0x180 [ 1743.763118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.764083] do_syscall_64+0x33/0x40 [ 1743.764786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1743.765751] RIP: 0033:0x7f89b6ef5b19 [ 1743.766450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.769919] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1743.771363] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1743.772720] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1743.774074] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1743.775423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1743.776793] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:06:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4a, &(0x7f0000000000)) 00:06:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x400, 0x1, 0x3583, 0x200}) 00:06:55 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1279, 0x0) 00:06:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:06:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0xfeffffff) 00:06:55 executing program 3: fork() (fail_nth: 23) 00:06:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x9903}, {0x2, 0x0, @broadcast}}) 00:06:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:06:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4b, &(0x7f0000000000)) [ 1743.978514] blktrace: Concurrent blktraces are not allowed on loop10 [ 1743.981271] blktrace: Concurrent blktraces are not allowed on loop10 [ 1743.981618] FAT-fs (loop4): Directory bread(block 5) failed 00:06:55 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) fspick(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x2, 0x180) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:06:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0xfffffffe) [ 1744.202668] FAT-fs (loop4): Directory bread(block 5) failed [ 1744.208595] FAT-fs (loop4): Directory bread(block 5) failed [ 1744.236333] FAULT_INJECTION: forcing a failure. [ 1744.236333] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.239106] CPU: 1 PID: 10226 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1744.240755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1744.243423] Call Trace: [ 1744.244043] dump_stack+0x107/0x163 [ 1744.244910] should_fail.cold+0x5/0xa [ 1744.245806] ? create_object.isra.0+0x3a/0xa20 [ 1744.246883] should_failslab+0x5/0x10 [ 1744.247775] kmem_cache_alloc+0x5b/0x350 [ 1744.248741] create_object.isra.0+0x3a/0xa20 [ 1744.249771] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1744.250964] kmem_cache_alloc+0x159/0x350 [ 1744.251945] copy_process+0x1b5a/0x66f0 [ 1744.252903] ? lock_downgrade+0x6d0/0x6d0 [ 1744.253889] ? __cleanup_sighand+0xb0/0xb0 [ 1744.254813] ? find_held_lock+0x2c/0x110 [ 1744.255671] kernel_clone+0xe7/0xa20 [ 1744.256467] ? lock_downgrade+0x6d0/0x6d0 [ 1744.257334] ? find_held_lock+0x2c/0x110 [ 1744.258184] ? copy_init_mm+0x20/0x20 [ 1744.258992] ? ksys_write+0x12d/0x250 [ 1744.259799] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1744.260846] __do_sys_fork+0x8a/0xc0 [ 1744.261632] ? kernel_clone+0xa20/0xa20 [ 1744.262489] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1744.263607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.264699] ? trace_hardirqs_on+0x5b/0x180 [ 1744.265667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.266877] do_syscall_64+0x33/0x40 [ 1744.267756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1744.268980] RIP: 0033:0x7f89b6ef5b19 [ 1744.269856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.274232] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1744.276034] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1744.277744] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1744.279449] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1744.281172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1744.282875] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1756.269795] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:07:14 executing program 3: fork() (fail_nth: 24) 00:07:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xf4) 00:07:14 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127a, 0x0) 00:07:14 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x1000000}, {0x2, 0x0, @broadcast}}) 00:07:14 executing program 1: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/146) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x31) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x7f) 00:07:14 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4c, &(0x7f0000000000)) 00:07:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000240)=""/235, 0xeb}, {&(0x7f0000000180)=""/81, 0x51}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/79, 0x4f}, {&(0x7f0000000480)=""/41, 0x29}], 0x8, 0xffff26ca, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x109) 00:07:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1, 0x7, 0x16, 0x80, 0x0, 0x0, 0x8000, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xdca8, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x1c060, 0x100, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x7, 0x0, 0xfff}, 0x0, 0x7, r0, 0x0) [ 1763.325601] blktrace: Concurrent blktraces are not allowed on loop10 [ 1763.346459] blktrace: Concurrent blktraces are not allowed on loop10 00:07:14 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4d, &(0x7f0000000000)) [ 1763.371578] FAT-fs (loop4): Directory bread(block 5) failed 00:07:14 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127b, 0x0) 00:07:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x1, 0x80}) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x4, 0x0, 0x7, 0x6, 0x15, "7cf683cb587406a481b68aec2577a300a9735c"}) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x9, 0x62002) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000140)={0x8, 0x8, 0xa80}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) [ 1763.389410] FAULT_INJECTION: forcing a failure. [ 1763.389410] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.392669] CPU: 0 PID: 10249 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1763.394385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1763.397747] Call Trace: [ 1763.398414] dump_stack+0x107/0x163 [ 1763.399416] should_fail.cold+0x5/0xa [ 1763.400342] ? dup_mm+0x88/0x1110 [ 1763.401212] ? dup_mm+0x88/0x1110 [ 1763.402061] should_failslab+0x5/0x10 [ 1763.403004] kmem_cache_alloc+0x5b/0x350 [ 1763.404001] dup_mm+0x88/0x1110 [ 1763.404827] ? copy_process+0x201d/0x66f0 [ 1763.405842] ? vm_area_dup+0x290/0x290 [ 1763.406806] ? __raw_spin_lock_init+0x36/0x110 [ 1763.407933] copy_process+0x23f8/0x66f0 [ 1763.408933] ? lock_downgrade+0x6d0/0x6d0 [ 1763.409964] ? __cleanup_sighand+0xb0/0xb0 [ 1763.411011] ? find_held_lock+0x2c/0x110 [ 1763.412016] kernel_clone+0xe7/0xa20 [ 1763.413145] ? lock_downgrade+0x6d0/0x6d0 [ 1763.414169] ? find_held_lock+0x2c/0x110 [ 1763.415369] ? copy_init_mm+0x20/0x20 [ 1763.416315] ? ksys_write+0x12d/0x250 [ 1763.417462] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1763.418660] __do_sys_fork+0x8a/0xc0 [ 1763.419764] ? kernel_clone+0xa20/0xa20 [ 1763.420789] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1763.422349] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.423621] ? trace_hardirqs_on+0x5b/0x180 [ 1763.424915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1763.426189] do_syscall_64+0x33/0x40 [ 1763.427287] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1763.428542] RIP: 0033:0x7f89b6ef5b19 [ 1763.429654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1763.434164] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1763.436407] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1763.438157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1763.439901] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1763.441648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1763.443398] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1763.586334] blktrace: Concurrent blktraces are not allowed on loop10 [ 1763.587866] blktrace: Concurrent blktraces are not allowed on loop10 [ 1776.080930] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:07:35 executing program 3: fork() (fail_nth: 25) 00:07:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x1940c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x20, 0x81, 0x3f, 0x3f, 0x0, 0x3, 0x900a4, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x42110, 0x5, 0xd, 0x7, 0x5, 0x4, 0x31e8, 0x0, 0xfffffe00, 0x0, 0x40}, 0xffffffffffffffff, 0x9, r0, 0x3) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:07:35 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127c, 0x0) 00:07:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x20e7) 00:07:35 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x2000000}, {0x2, 0x0, @broadcast}}) 00:07:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4e, &(0x7f0000000000)) 00:07:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) 00:07:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x28824, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'veth1\x00'}) 00:07:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b52, &(0x7f0000000000)) [ 1784.441694] FAT-fs (loop4): Directory bread(block 5) failed [ 1784.450926] blktrace: Concurrent blktraces are not allowed on loop10 [ 1784.458771] blktrace: Concurrent blktraces are not allowed on loop10 00:07:35 executing program 2: sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd0, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xbc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63f5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb399}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xd116, @mcast2, 0x80000000}}}}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x48002}, 0x4040) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a40)=0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, r0, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 1784.504385] FAULT_INJECTION: forcing a failure. [ 1784.504385] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.507060] CPU: 1 PID: 10289 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1784.508657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1784.511111] Call Trace: [ 1784.511677] dump_stack+0x107/0x163 [ 1784.512453] should_fail.cold+0x5/0xa [ 1784.513420] ? create_object.isra.0+0x3a/0xa20 [ 1784.514559] should_failslab+0x5/0x10 [ 1784.515367] kmem_cache_alloc+0x5b/0x350 [ 1784.516232] create_object.isra.0+0x3a/0xa20 [ 1784.517207] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1784.518336] kmem_cache_alloc+0x159/0x350 [ 1784.519267] dup_mm+0x88/0x1110 [ 1784.519976] ? copy_process+0x201d/0x66f0 [ 1784.521118] ? vm_area_dup+0x290/0x290 [ 1784.521951] ? __raw_spin_lock_init+0x36/0x110 [ 1784.522929] copy_process+0x23f8/0x66f0 [ 1784.523788] ? lock_downgrade+0x6d0/0x6d0 [ 1784.524684] ? __cleanup_sighand+0xb0/0xb0 [ 1784.525812] ? find_held_lock+0x2c/0x110 [ 1784.526831] kernel_clone+0xe7/0xa20 [ 1784.527641] ? lock_downgrade+0x6d0/0x6d0 [ 1784.528532] ? find_held_lock+0x2c/0x110 [ 1784.529419] ? copy_init_mm+0x20/0x20 [ 1784.530354] ? ksys_write+0x12d/0x250 [ 1784.531209] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1784.532430] __do_sys_fork+0x8a/0xc0 [ 1784.533388] ? kernel_clone+0xa20/0xa20 [ 1784.534241] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1784.535379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.536474] ? trace_hardirqs_on+0x5b/0x180 [ 1784.537501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1784.538793] do_syscall_64+0x33/0x40 [ 1784.539588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1784.540670] RIP: 0033:0x7f89b6ef5b19 [ 1784.541472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1784.545700] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1784.547313] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1784.548918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1784.550494] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1784.552177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1784.553714] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:07:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17, 0xffffffffffffffff}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)={{0x10b, 0x40, 0x81, 0x145, 0x29e, 0x2, 0x258, 0x576f9bda}, "4e08b968f1df3f3b0342667f5ba4e6dac8d4e3e305ddcae3b1bb8c3227f5395ab6339512305d4387a5e7b45dc9c30783fd53cf1bf7d04ad22924c26399d70352770110770adde32439853f98c6a2c4a31064c1c4bcfb124a22688c67015008dc0f24bbedc981d16df44c16048798948571f395892fdae7"}, 0x97) 00:07:36 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127d, 0x0) 00:07:36 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b60, &(0x7f0000000000)) 00:07:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000c840b9c85db5878f696c653000"]) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r1) sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x10) 00:07:36 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x4000000}, {0x2, 0x0, @broadcast}}) [ 1784.716139] blktrace: Concurrent blktraces are not allowed on loop10 [ 1784.748796] FAT-fs (loop4): bogus number of reserved sectors [ 1784.750438] FAT-fs (loop4): Can't find a valid FAT filesystem 00:07:36 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127e, 0x0) [ 1784.771367] FAT-fs (loop4): bogus number of reserved sectors [ 1784.771378] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1784.980067] blktrace: Concurrent blktraces are not allowed on loop10 [ 1784.983805] blktrace: Concurrent blktraces are not allowed on loop10 [ 1796.632695] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:07:55 executing program 3: fork() (fail_nth: 26) 00:07:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0xa000000}, {0x2, 0x0, @broadcast}}) 00:07:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b61, &(0x7f0000000000)) 00:07:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6erspan0\x00'}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:07:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xe720) 00:07:55 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x127f, 0x0) 00:07:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="de297cdb16500000000000000000000000a2a1cbcce967b021c2", @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf25050000003c00028006000b000a00000006000f0009000000080008000700000006000e004e200000080005000200000008000900090000000800030002000000"], 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000801) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = signalfd(r1, &(0x7f0000000000)={[0x8]}, 0x8) ioctl$KDDELIO(r2, 0x4b35, 0x1) 00:07:55 executing program 4: ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x9) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x7, 0x3e4, 0x47, 0x4, 0x2, "c37b1d9d7f47c52f0514ba0fbbfef76a4fea91", 0x4000, 0xfffffffa}) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000180)=0xff) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000007c0)={0x0, "2013253fefda94da32fdddfb30d71753"}) [ 1804.441444] blktrace: Concurrent blktraces are not allowed on loop10 [ 1804.446851] blktrace: Concurrent blktraces are not allowed on loop10 00:07:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b62, &(0x7f0000000000)) [ 1804.491338] FAT-fs (loop4): Directory bread(block 5) failed 00:07:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x6840, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x3, 0x1}) 00:07:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e22, @empty}, 0x10) 00:07:55 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b47, 0x0) [ 1804.539552] FAULT_INJECTION: forcing a failure. [ 1804.539552] name failslab, interval 1, probability 0, space 0, times 0 [ 1804.542101] CPU: 0 PID: 10347 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1804.543609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1804.546067] Call Trace: [ 1804.546649] dump_stack+0x107/0x163 [ 1804.547444] should_fail.cold+0x5/0xa [ 1804.548269] ? dup_mm+0x88/0x1110 [ 1804.549017] should_failslab+0x5/0x10 [ 1804.549842] kmem_cache_alloc+0x5b/0x350 [ 1804.550719] dup_mm+0x88/0x1110 [ 1804.551435] ? copy_process+0x201d/0x66f0 [ 1804.552329] ? vm_area_dup+0x290/0x290 [ 1804.553192] ? __raw_spin_lock_init+0x36/0x110 [ 1804.554180] copy_process+0x23f8/0x66f0 [ 1804.555043] ? lock_downgrade+0x6d0/0x6d0 [ 1804.555949] ? __cleanup_sighand+0xb0/0xb0 [ 1804.556873] ? find_held_lock+0x2c/0x110 [ 1804.557757] kernel_clone+0xe7/0xa20 [ 1804.558568] ? lock_downgrade+0x6d0/0x6d0 [ 1804.559458] ? find_held_lock+0x2c/0x110 [ 1804.560329] ? copy_init_mm+0x20/0x20 [ 1804.561164] ? ksys_write+0x12d/0x250 [ 1804.561991] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1804.563038] __do_sys_fork+0x8a/0xc0 00:07:56 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) r1 = openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)={0x86501, 0x41, 0x6}, 0x18) r2 = epoll_create1(0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/1, 0x1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/241, 0xf1}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000140)=""/92, 0x5c}, {&(0x7f0000000340)=""/206, 0xce}], 0x6) openat(r1, &(0x7f0000001c40)='./file0\x00', 0x8800, 0x1a2) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0xfffffffffffff894) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r4 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r4, &(0x7f0000ffc000/0x2000)=nil, 0x4000) r5 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffa000/0x1000)=nil) shmat(r5, &(0x7f0000ffc000/0x3000)=nil, 0x2000) shmat(r4, &(0x7f0000ffb000/0x2000)=nil, 0x7000) open(&(0x7f0000000080)='./file0\x00', 0x4a0000, 0x1a0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000007740)={0x0, 0x0}) recvmmsg(r6, &(0x7f0000007580)=[{{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000500)=""/162, 0xa2}, {&(0x7f00000005c0)=""/71, 0x47}, {&(0x7f0000000640)=""/255, 0xff}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000000740)=""/2, 0x2}], 0x5, &(0x7f0000001840)=""/14, 0xe}, 0x1f}, {{&(0x7f0000001880)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001900)=""/47, 0x2f}, {&(0x7f0000001940)=""/47, 0x2f}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000001980)=""/92, 0x5c}], 0x4}, 0x6}, {{&(0x7f0000001a40)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000005280)=[{&(0x7f0000001ac0)=""/108, 0x6c}, {&(0x7f0000001b40)=""/245, 0xf5}, {&(0x7f0000001c40)}, {&(0x7f0000001c80)=""/161, 0xa1}, {&(0x7f0000004e00)=""/219, 0xdb}, {&(0x7f0000004f00)=""/225, 0xe1}, {&(0x7f0000005000)=""/213, 0xd5}, {&(0x7f0000005100)=""/230, 0xe6}, {&(0x7f0000005200)=""/112, 0x70}, {&(0x7f0000001d40)=""/21, 0x15}], 0xa, &(0x7f0000005340)=""/155, 0x9b}}, {{&(0x7f0000005400)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @empty}}}, 0x80, &(0x7f0000006640)=[{&(0x7f0000005480)=""/42, 0x2a}, {&(0x7f00000054c0)=""/4096, 0x1000}, {&(0x7f00000064c0)=""/132, 0x84}, {&(0x7f0000006580)=""/163, 0xa3}], 0x4}, 0x2}, {{&(0x7f0000006680)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000006bc0)=[{&(0x7f0000006700)=""/62, 0x3e}, {&(0x7f0000006740)=""/65, 0x41}, {&(0x7f00000067c0)=""/133, 0x85}, {&(0x7f0000006880)=""/50, 0x32}, {&(0x7f00000068c0)=""/243, 0xf3}, {&(0x7f00000069c0)=""/211, 0xd3}, {&(0x7f0000006ac0)=""/172, 0xac}, {&(0x7f0000006b80)=""/56, 0x38}], 0x8, &(0x7f0000006c40)=""/222, 0xde}, 0x129}, {{&(0x7f0000006d40)=@in, 0x80, &(0x7f0000007140)=[{&(0x7f0000006dc0)=""/170, 0xaa}, {&(0x7f0000006e80)=""/39, 0x27}, {&(0x7f0000006ec0)=""/89, 0x59}, {&(0x7f00000077c0)=""/5, 0x5}, {&(0x7f0000006f80)=""/167, 0xa7}, {&(0x7f0000007040)=""/201, 0xc9}], 0x6}, 0x4d}, {{&(0x7f00000071c0)=@isdn, 0x80, &(0x7f0000007500)=[{&(0x7f0000007240)=""/146, 0x92}, {&(0x7f0000007300)=""/197, 0xc5}, {&(0x7f0000007400)=""/213, 0xd5}], 0x3, &(0x7f0000007540)=""/37, 0x25}, 0x6}], 0x7, 0x40000000, &(0x7f0000007780)={r7, r8+60000000}) shmctl$SHM_UNLOCK(r5, 0xc) [ 1804.563936] ? kernel_clone+0xa20/0xa20 [ 1804.564819] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1804.565959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1804.567072] ? trace_hardirqs_on+0x5b/0x180 [ 1804.568007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1804.569125] do_syscall_64+0x33/0x40 [ 1804.569944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1804.571049] RIP: 0033:0x7f89b6ef5b19 [ 1804.571859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1804.575859] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1804.577513] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1804.579057] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1804.580599] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1804.582144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1804.583685] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:07:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b63, &(0x7f0000000000)) [ 1804.730489] blktrace: Concurrent blktraces are not allowed on loop10 00:07:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x9, 0x6a, 0x97, 0x800, 0x0, "26fd80f8b3d988e66661f4a557c092411a98ed", 0x9, 0x9}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1804.737196] blktrace: Concurrent blktraces are not allowed on loop10 00:07:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x40000000}, {0x2, 0x0, @broadcast}}) 00:07:56 executing program 3: fork() (fail_nth: 27) [ 1804.772447] FAT-fs (loop4): Directory bread(block 5) failed 00:07:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4b49, 0x0) 00:07:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xe1, 0x9, 0x1, 0x9, 0x0, 0x2, 0x80c04, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffd9, 0x4, @perf_bp={&(0x7f0000000100), 0x9}, 0x2400, 0x3, 0x6, 0x6, 0x2, 0x3, 0x20, 0x0, 0x9, 0x0, 0x1f}, 0xffffffffffffffff, 0xd, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x3, 0x7, 0x6, 0x0, 0x20}) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:07:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xf400) 00:07:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b64, &(0x7f0000000000)) 00:07:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x80}) [ 1804.943577] blktrace: Concurrent blktraces are not allowed on loop10 [ 1804.946359] blktrace: Concurrent blktraces are not allowed on loop10 [ 1804.976724] FAULT_INJECTION: forcing a failure. [ 1804.976724] name failslab, interval 1, probability 0, space 0, times 0 [ 1804.979447] CPU: 0 PID: 10378 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1804.980872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1804.983230] Call Trace: [ 1804.983776] dump_stack+0x107/0x163 [ 1804.984537] should_fail.cold+0x5/0xa [ 1804.985351] ? vm_area_dup+0x78/0x290 [ 1804.986139] should_failslab+0x5/0x10 [ 1804.986925] kmem_cache_alloc+0x5b/0x350 [ 1804.987766] vm_area_dup+0x78/0x290 [ 1804.988521] ? __lock_acquire+0xbb1/0x5b00 [ 1804.989411] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1804.990486] ? SOFTIRQ_verbose+0x10/0x10 [ 1804.991320] ? lock_acquire+0x197/0x490 [ 1804.992131] ? dup_mm+0x159/0x1110 [ 1804.992860] ? vm_area_alloc+0x110/0x110 [ 1804.993695] ? find_held_lock+0x2c/0x110 [ 1804.994529] ? get_mm_exe_file+0x139/0x2c0 [ 1804.995389] ? lock_downgrade+0x6d0/0x6d0 [ 1804.996244] ? down_write_nested+0xe4/0x160 [ 1804.997145] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 1804.998184] ? get_mm_exe_file+0x162/0x2c0 [ 1804.999043] dup_mm+0x44d/0x1110 [ 1804.999733] ? copy_process+0x201d/0x66f0 [ 1805.000577] ? vm_area_dup+0x290/0x290 [ 1805.001385] ? __raw_spin_lock_init+0x36/0x110 [ 1805.002317] copy_process+0x23f8/0x66f0 [ 1805.003126] ? lock_downgrade+0x6d0/0x6d0 [ 1805.003992] ? __cleanup_sighand+0xb0/0xb0 [ 1805.004859] ? find_held_lock+0x2c/0x110 [ 1805.005698] kernel_clone+0xe7/0xa20 [ 1805.006459] ? lock_downgrade+0x6d0/0x6d0 [ 1805.007292] ? find_held_lock+0x2c/0x110 [ 1805.008118] ? copy_init_mm+0x20/0x20 [ 1805.008893] ? ksys_write+0x12d/0x250 [ 1805.009689] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1805.010676] __do_sys_fork+0x8a/0xc0 [ 1805.011433] ? kernel_clone+0xa20/0xa20 [ 1805.012260] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1805.013335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.014388] ? trace_hardirqs_on+0x5b/0x180 [ 1805.015262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.016312] do_syscall_64+0x33/0x40 [ 1805.017071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1805.018137] RIP: 0033:0x7f89b6ef5b19 [ 1805.018895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.022623] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1805.024155] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1805.025612] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1805.027047] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1805.028488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.029941] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:07:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) 00:07:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="64b4052b816ee8be9300020000000000002e2f18e98fa330003bebee5231a8bc2b711405081cc68b2e"]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0xee) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x20, 0x40, 0x7, 0x8, 0x0, 0x5, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x8002, 0xad, 0x100, 0x1, 0x80000001, 0x7, 0x101, 0x0, 0x401, 0x0, 0x8e}, r2, 0xe, r3, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:07:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b65, &(0x7f0000000000)) 00:07:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0x99030000}, {0x2, 0x0, @broadcast}}) 00:07:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="01001e84b5b4a10efa000100", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0xfffe, 0x0, 0x7}) [ 1805.206960] blktrace: Concurrent blktraces are not allowed on loop10 [ 1805.209812] blktrace: Concurrent blktraces are not allowed on loop10 00:07:56 executing program 3: fork() (fail_nth: 28) [ 1805.380310] FAULT_INJECTION: forcing a failure. [ 1805.380310] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.383241] CPU: 1 PID: 10400 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1805.384904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1805.387641] Call Trace: [ 1805.388277] dump_stack+0x107/0x163 [ 1805.389184] should_fail.cold+0x5/0xa [ 1805.390103] ? create_object.isra.0+0x3a/0xa20 [ 1805.391206] should_failslab+0x5/0x10 [ 1805.392129] kmem_cache_alloc+0x5b/0x350 [ 1805.393114] create_object.isra.0+0x3a/0xa20 [ 1805.394194] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1805.395427] kmem_cache_alloc+0x159/0x350 [ 1805.396446] vm_area_dup+0x78/0x290 [ 1805.397344] ? __lock_acquire+0xbb1/0x5b00 [ 1805.398507] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1805.399932] ? SOFTIRQ_verbose+0x10/0x10 [ 1805.400919] ? lock_acquire+0x197/0x490 [ 1805.401893] ? dup_mm+0x159/0x1110 [ 1805.402781] ? vm_area_alloc+0x110/0x110 [ 1805.403761] ? find_held_lock+0x2c/0x110 [ 1805.404763] ? get_mm_exe_file+0x139/0x2c0 [ 1805.405800] ? lock_downgrade+0x6d0/0x6d0 [ 1805.406878] ? down_write_nested+0xe4/0x160 [ 1805.408040] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 1805.409352] ? get_mm_exe_file+0x162/0x2c0 [ 1805.410568] dup_mm+0x44d/0x1110 [ 1805.411451] ? copy_process+0x201d/0x66f0 [ 1805.412563] ? vm_area_dup+0x290/0x290 [ 1805.413727] ? __raw_spin_lock_init+0x36/0x110 [ 1805.414930] copy_process+0x23f8/0x66f0 [ 1805.416075] ? lock_downgrade+0x6d0/0x6d0 [ 1805.417181] ? __cleanup_sighand+0xb0/0xb0 [ 1805.418374] ? find_held_lock+0x2c/0x110 [ 1805.419496] kernel_clone+0xe7/0xa20 [ 1805.420491] ? lock_downgrade+0x6d0/0x6d0 [ 1805.421506] ? find_held_lock+0x2c/0x110 [ 1805.422388] ? copy_init_mm+0x20/0x20 [ 1805.423268] ? ksys_write+0x12d/0x250 [ 1805.424219] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1805.425155] __do_sys_fork+0x8a/0xc0 [ 1805.425881] ? kernel_clone+0xa20/0xa20 [ 1805.426663] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1805.427632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.428615] ? trace_hardirqs_on+0x5b/0x180 [ 1805.429440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1805.430392] do_syscall_64+0x33/0x40 [ 1805.431112] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1805.432109] RIP: 0033:0x7f89b6ef5b19 [ 1805.432764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1805.436159] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1805.437466] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1805.438679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1805.439893] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1805.441102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1805.442329] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1816.782899] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:08:16 executing program 2: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cpuinfo\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x1, 0x6, 0x1, 0x0, 0xfff, 0x280, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x50e, 0x0, @perf_config_ext={0x47b, 0xfffffffffffffff0}, 0x8204, 0x7, 0x3, 0x3, 0x10000, 0xfffff933, 0x8, 0x0, 0x9, 0x0, 0x7}, 0x0, 0x9, r0, 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:08:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f0000000000000001000000010000000040000000400000", 0x28, 0x400}], 0x100000, &(0x7f0000012c00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x3, 0x121302) openat(r2, &(0x7f0000000140)='./file0\x00', 0x8000, 0x10) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000300)='./file2\x00', 0x8000000000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000340)="cda0dfe5e9273a3ffeae5bd1ff2aad33fe4254015ddda9ec5f39ffe1d9385e6f6fa6bf4beac1bbb6771135bb20541c811b3fc299ce1b02bb659f78f5e68e74aa9a4edaaed8c60562831a9ebc33dd7a91767dfb3cfc670ed56fe5043341a488015948c798a2c564fe3cc81adcf7fabd7d90266f6a5ec1d65db8c11e464e3bfad0f44d14fce418486302d02eb531c2604fb79f08f7f8b1cc29ee9ba0172d739f4e63ea1ed4f8bf48937e61524de8587f8805613631dff8ccf91111e783e83693f06d0b8694425548", 0xc7, 0x15f1}, {&(0x7f0000000440)="0937f65de2bbe04c940e200bcf57898f998049544ff3db84ed24e785bca7127d97899428b779d3566a12da339b16d1d886", 0x31, 0x40000}, {&(0x7f00000007c0)="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", 0x1000, 0x4}], 0x200800, &(0x7f0000000500)={[{@shortname_mixed}], [{@smackfshat={'smackfshat', 0x3d, ':'}}, {@obj_role={'obj_role', 0x3d, 'vfat\x00'}}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r1, 0x0, 0x10001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setxattr$incfs_size(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000240)=0xfffffffffffffc00, 0x8, 0x1) openat(r0, &(0x7f0000000540)='./file0\x00', 0x46002, 0x8) sendfile(r1, r4, 0x0, 0x20d315) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x11800) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r5 = accept$unix(r4, &(0x7f0000000580)=@abs, &(0x7f0000000600)=0x6e) fcntl$setflags(r5, 0x2, 0x1) 00:08:16 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x100, 0x0, 0xfffd}) 00:08:16 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0xfdffffff}, {0x2, 0x0, @broadcast}}) 00:08:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x20e70000) 00:08:16 executing program 3: fork() (fail_nth: 29) 00:08:16 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) 00:08:16 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b66, &(0x7f0000000000)) [ 1825.175221] blktrace: Concurrent blktraces are not allowed on loop10 00:08:16 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:08:16 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b67, &(0x7f0000000000)) 00:08:16 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) [ 1825.275336] FAT-fs (loop4): Unrecognized mount option "smackfshat=:" or missing value [ 1825.275463] FAULT_INJECTION: forcing a failure. [ 1825.275463] name failslab, interval 1, probability 0, space 0, times 0 [ 1825.279615] CPU: 1 PID: 10431 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1825.281095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1825.283566] Call Trace: [ 1825.284131] dump_stack+0x107/0x163 [ 1825.284905] should_fail.cold+0x5/0xa [ 1825.285735] ? vm_area_dup+0x78/0x290 [ 1825.286553] should_failslab+0x5/0x10 [ 1825.287368] kmem_cache_alloc+0x5b/0x350 [ 1825.288250] vm_area_dup+0x78/0x290 [ 1825.289040] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1825.290054] ? lock_downgrade+0x6d0/0x6d0 [ 1825.290945] ? copy_page_range+0x242d/0x3810 [ 1825.291903] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1825.292901] ? avc_has_extended_perms+0xec0/0xec0 [ 1825.293942] ? vm_area_alloc+0x110/0x110 [ 1825.294798] ? find_held_lock+0x2c/0x110 [ 1825.295670] ? selinux_vm_enough_memory+0x10f/0x170 [ 1825.296734] ? selinux_sb_statfs+0x250/0x250 [ 1825.297698] ? percpu_counter_add_batch+0x8b/0x130 [ 1825.298750] ? __vm_enough_memory+0x184/0x360 [ 1825.299703] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1825.300805] dup_mm+0x44d/0x1110 [ 1825.301546] ? vm_area_dup+0x290/0x290 [ 1825.302379] ? __raw_spin_lock_init+0x36/0x110 [ 1825.303357] copy_process+0x23f8/0x66f0 [ 1825.304208] ? lock_downgrade+0x6d0/0x6d0 [ 1825.305110] ? __cleanup_sighand+0xb0/0xb0 [ 1825.306027] ? find_held_lock+0x2c/0x110 [ 1825.306895] kernel_clone+0xe7/0xa20 [ 1825.307688] ? lock_downgrade+0x6d0/0x6d0 [ 1825.308567] ? find_held_lock+0x2c/0x110 [ 1825.309445] ? copy_init_mm+0x20/0x20 [ 1825.310259] ? ksys_write+0x12d/0x250 [ 1825.311081] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1825.312118] __do_sys_fork+0x8a/0xc0 [ 1825.312910] ? kernel_clone+0xa20/0xa20 [ 1825.313773] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1825.314890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1825.315967] ? trace_hardirqs_on+0x5b/0x180 [ 1825.316884] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1825.317951] do_syscall_64+0x33/0x40 [ 1825.318748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1825.319837] RIP: 0033:0x7f89b6ef5b19 [ 1825.320639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1825.324536] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1825.326168] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1825.327647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1825.329169] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1825.330673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1825.332199] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1825.479330] FAT-fs (loop4): Unrecognized mount option "./file0" or missing value [ 1825.503570] blktrace: Concurrent blktraces are not allowed on loop10 [ 1825.508645] blktrace: Concurrent blktraces are not allowed on loop10 [ 1825.733942] FAT-fs (loop4): Unrecognized mount option "smackfshat=:" or missing value [ 1838.239181] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:08:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:08:37 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r0, &(0x7f0000000200)='mounts\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpgid(0x0) rt_tgsigqueueinfo(r3, r2, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x81, 0x3f, 0x4, 0x1, 0x0, 0x8, 0x2, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x14000, 0x5, 0x80000000, 0x5, 0x0, 0x8, 0xff00, 0x0, 0xcbb5, 0x0, 0x8}, r3, 0xc, r1, 0x9) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:08:37 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) 00:08:37 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x20, 0x2000006d, 0x27, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x80, 0x7, 0x5}}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000100)={0xfd, 0x9, 0x3}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="65dd3736", @ANYRES16=0x0, @ANYRES64=r0], 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x14) 00:08:37 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private=0xfffffffd}, {0x2, 0x0, @broadcast}}) 00:08:37 executing program 3: fork() (fail_nth: 30) 00:08:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xf4000000) 00:08:37 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b68, &(0x7f0000000000)) [ 1846.121577] blktrace: Concurrent blktraces are not allowed on loop10 [ 1846.124513] FAT-fs (loop4): Directory bread(block 5) failed [ 1846.128492] blktrace: Concurrent blktraces are not allowed on loop10 00:08:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x8842, &(0x7f0000000040)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) [ 1846.174298] FAULT_INJECTION: forcing a failure. [ 1846.174298] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.177121] CPU: 1 PID: 10473 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1846.178942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1846.181378] Call Trace: [ 1846.181948] dump_stack+0x107/0x163 [ 1846.182739] should_fail.cold+0x5/0xa [ 1846.183550] ? create_object.isra.0+0x3a/0xa20 [ 1846.184522] should_failslab+0x5/0x10 [ 1846.185331] kmem_cache_alloc+0x5b/0x350 [ 1846.186228] create_object.isra.0+0x3a/0xa20 [ 1846.187161] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1846.188245] kmem_cache_alloc+0x159/0x350 [ 1846.189134] vm_area_dup+0x78/0x290 [ 1846.189925] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1846.190925] ? lock_downgrade+0x6d0/0x6d0 [ 1846.191811] ? copy_page_range+0x242d/0x3810 [ 1846.192768] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1846.193777] ? avc_has_extended_perms+0xec0/0xec0 [ 1846.194823] ? vm_area_alloc+0x110/0x110 [ 1846.195685] ? find_held_lock+0x2c/0x110 [ 1846.196558] ? selinux_vm_enough_memory+0x10f/0x170 [ 1846.197632] ? selinux_sb_statfs+0x250/0x250 [ 1846.198593] ? percpu_counter_add_batch+0x8b/0x130 [ 1846.199651] ? __vm_enough_memory+0x184/0x360 [ 1846.200603] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1846.201717] dup_mm+0x44d/0x1110 [ 1846.202453] ? vm_area_dup+0x290/0x290 [ 1846.203290] ? __raw_spin_lock_init+0x36/0x110 [ 1846.204272] copy_process+0x23f8/0x66f0 [ 1846.205124] ? lock_downgrade+0x6d0/0x6d0 [ 1846.206033] ? __cleanup_sighand+0xb0/0xb0 [ 1846.206944] ? find_held_lock+0x2c/0x110 [ 1846.207815] kernel_clone+0xe7/0xa20 [ 1846.208607] ? lock_downgrade+0x6d0/0x6d0 [ 1846.209489] ? find_held_lock+0x2c/0x110 [ 1846.210373] ? copy_init_mm+0x20/0x20 [ 1846.211189] ? ksys_write+0x12d/0x250 [ 1846.212006] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1846.213040] __do_sys_fork+0x8a/0xc0 [ 1846.213860] ? kernel_clone+0xa20/0xa20 [ 1846.214728] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1846.215846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.216946] ? trace_hardirqs_on+0x5b/0x180 [ 1846.217877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.218977] do_syscall_64+0x33/0x40 [ 1846.219773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1846.220867] RIP: 0033:0x7f89b6ef5b19 [ 1846.221681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.225625] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1846.227256] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1846.228774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1846.230304] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1846.231831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1846.233354] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:08:37 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b69, &(0x7f0000000000)) 00:08:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0x4, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:08:37 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x4) 00:08:37 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) 00:08:37 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x14, 0x0, @broadcast}}) [ 1846.409917] blktrace: Concurrent blktraces are not allowed on loop10 00:08:37 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b6a, &(0x7f0000000000)) 00:08:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f73663a186000088001000440000004f801", 0x17, 0xca4}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x1000000, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x104000, 0x0) quotactl(0xff, &(0x7f0000000180)='./file0/file0\x00', 0xee01, &(0x7f0000000240)="85f31ce8323df9d93c6c89bdd399539dc668f7fcae4396e9b3d9fb43f888309d8525b4d1d1ea19902049f25c8dcc86ffba494d04af3bcd24cfc6dcff75f23b296fc73d6b4ce62e2251f7b781d5f75dc12b66ab25e73888a51dca29d69bdbfb863579a0b0262e70bdeffad338b2dc2ea539dc1e5008269fcab5d6bf82bfb15526ef4040d3338bb2bb12486fa6f14da15b310b7b30a40ce358958162ad0861cc613dd89e735b02c29a8e654321620b0cb019756953a01db7c5410909e92ed13d9a65dccafb9c") 00:08:37 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file0\x00'}) 00:08:37 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) 00:08:37 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b6b, &(0x7f0000000000)) 00:08:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0x6, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@loopback, @private=0xa010100}, 0xc) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 1846.646199] blktrace: Concurrent blktraces are not allowed on loop10 [ 1846.648608] blktrace: Concurrent blktraces are not allowed on loop10 [ 1846.659479] FAT-fs (loop4): bogus number of reserved sectors [ 1846.660878] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1846.693847] FAT-fs (loop4): Unrecognized mount option "oÇ=kLæ."Q÷·Õ÷]Á+f«%ç8ˆ¥Ê)Ö›Ûû†5y °&.p½ïúÓ8²Ü.¥9ÜP&ŸÊµÖ¿‚¿±U&ï@@Ó3‹²»Ho¦ñM¡[1 {0¤ ãX•b­aÌa=Øžs[šŽeC!b °uiS ·ÅA é.Ñ=šeÜÊûœ" or missing value [ 1858.310062] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:08:56 executing program 3: fork() (fail_nth: 31) 00:08:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = dup2(r0, r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x5) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:08:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:08:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b6c, &(0x7f0000000000)) 00:08:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) 00:08:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x80) write$binfmt_elf32(r0, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x20, 0xe1, 0x8, 0x2, 0x3, 0x5, 0x2a4, 0x38, 0x2f5, 0x4, 0x2, 0x20, 0x1, 0x2, 0x7fff, 0x8001}, [{0x5, 0x6, 0x2, 0x7, 0x4, 0x4, 0x1, 0x8000}], "51ce8c74403e486a9f8fc9091b955d44e661ea58b075d5a8b3734d1435e86d910c48a90190cb416f6678853ac18303c18fed53e3529afa145cf1067036f0b04efc7fe1116fb1e5137c47267b0a56a8814a8c956feec6f84f37673f3bfc43271f1f8212589afd8ee2dcae63cc2496262097ca14ccda5c8801c13450c1669ecb4bdcd43c5dfbd5ac09889110c6d23e2aa6361e8a3d5e", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6ed) 00:08:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xf5ffffff) 00:08:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000a00)={'filter\x00', 0x7, 0x4, 0x418, 0x0, 0x110, 0x220, 0x330, 0x330, 0x330, 0x4, &(0x7f0000000680), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="c052f97747bf", @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @rand_addr=0x64010102, @empty, 0xf, 0xffffffff}}}, {{@arp={@private=0xa010102, @local, 0x0, 0xffffffff, 0x1, 0x8, {@mac=@remote, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x7f, 0x0, 0x2, 0x2f4, 0x81, 0x7ff, 'veth1\x00', 'geneve0\x00', {}, {0xff}, 0x0, 0x40}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="bd929bd667a7", @empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}}}, {{@arp={@local, @remote, 0xffffff00, 0xff, 0xe, 0x9, {@mac=@broadcast, {[0xff, 0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}}, 0x7, 0x5840, 0x1da, 0x17c, 0x236, 0x83f4, 'vlan1\x00', 'bridge0\x00', {}, {0xff}, 0x0, 0x4}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@remote, @remote, @empty, 0xf, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x110}, 0xc, &(0x7f0000000500)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="5c03003cabc745215b0061dc28e504b20b96e60200fab9c327a7b396c7", @ANYRES16=0x0, @ANYBLOB="000829bd7000fedbdf250a0000001c0009800800020008000000080002002000000008000200020000006800078008000100030000000c00040000feffffffffffff080002000300000008000200a84d00000c00030081ffffffffffffff08000100090000000c00040001000000010000000c000300ffff00000000000008000200070000000c0003001f000000000000001c010680080001000400000001010300ca3f4043b96284f2a919f9d5a0949ebb2b21aff53aa675de2ef38a89ec464d661124a8639e6ab700c33eeec4d2fadae3aaeb9077117f4b4e554a344735d35b7341df91270da142d0768e6bb4cf5f3ae3eb3682ab4ea9106d362a73bb8ee21fd7a74dfe49703b3c8349de8c9870aa38843aa8926953d355839fd14bcc4ebfafcc6df1589ee7d4a73cefa662d3a6fe14a6c30e6dc02a83f051723b5fe1e208194902f9ad0bcbf85c37a4d1a658bec6a30229cffc41ae2c813fba8c6f957b316af9bf27ee92d0a700b5b627575fd00a70e824e333aad0f4d1e698083eaccf615b81144ca377466f83c5166885a3dce2aceaa8c7fb76ecb4a629cdd7f50b3a000000040003000400020004000200380101801c000280080004000001000008000100010000000800035fbc2ed9000600000044000400200001000a004e210dd8a3affe8800000000000000000000000001013f000000200002000a004e2400000009fe80000000000000000000000000001406000000080003000400000008000300010000000d0001007564703a73797a320000000044000400200001000a004e20000000012001000000000000000000000000000201000000200002000a004e2400000009ff010000000000000000000000000001fdffffff1c000280080001000000000008000400250000000800020001000000040002800c0001006574683a6e72300044000400200001000a004e2000000009fc01000000000000000000000000000100000000200002000a004e2100000005fc00000000000000000000000000000005000000680001803400028008000100150000000800020001010000080003000004000008000100120000000800010011000000080002000700000024000280080004000500000008000100110000000800010002000000080004000002000008000300040000000400028008000680"], 0x35c}, 0x1, 0x0, 0x0, 0xe520980b9bcae7a9}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000e80)='uid_map\x00') [ 1865.254152] blktrace: Concurrent blktraces are not allowed on loop10 [ 1865.255707] blktrace: Concurrent blktraces are not allowed on loop10 [ 1865.272278] FAT-fs (loop4): Directory bread(block 5) failed [ 1865.311375] FAULT_INJECTION: forcing a failure. [ 1865.311375] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.313187] CPU: 0 PID: 10551 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1865.314532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1865.316311] Call Trace: [ 1865.316822] dump_stack+0x107/0x163 [ 1865.317520] should_fail.cold+0x5/0xa [ 1865.318260] ? vm_area_dup+0x78/0x290 [ 1865.318994] should_failslab+0x5/0x10 [ 1865.319720] kmem_cache_alloc+0x5b/0x350 [ 1865.320499] vm_area_dup+0x78/0x290 [ 1865.321117] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1865.321836] ? lock_downgrade+0x6d0/0x6d0 [ 1865.322483] ? copy_page_range+0x242d/0x3810 [ 1865.323171] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1865.323895] ? avc_has_extended_perms+0xec0/0xec0 [ 1865.324651] ? vm_area_alloc+0x110/0x110 [ 1865.325270] ? find_held_lock+0x2c/0x110 [ 1865.325897] ? selinux_vm_enough_memory+0x10f/0x170 [ 1865.326692] ? selinux_sb_statfs+0x250/0x250 [ 1865.327384] ? percpu_counter_add_batch+0x8b/0x130 [ 1865.328230] ? __vm_enough_memory+0x184/0x360 [ 1865.328924] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1865.329722] dup_mm+0x44d/0x1110 [ 1865.330268] ? vm_area_dup+0x290/0x290 [ 1865.330877] ? __raw_spin_lock_init+0x36/0x110 [ 1865.331586] copy_process+0x23f8/0x66f0 [ 1865.332208] ? lock_downgrade+0x6d0/0x6d0 [ 1865.332867] ? __cleanup_sighand+0xb0/0xb0 [ 1865.333534] ? find_held_lock+0x2c/0x110 [ 1865.334175] kernel_clone+0xe7/0xa20 [ 1865.334819] ? lock_downgrade+0x6d0/0x6d0 [ 1865.335460] ? find_held_lock+0x2c/0x110 [ 1865.336092] ? copy_init_mm+0x20/0x20 [ 1865.336683] ? ksys_write+0x12d/0x250 [ 1865.337282] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1865.338057] __do_sys_fork+0x8a/0xc0 [ 1865.338689] ? kernel_clone+0xa20/0xa20 [ 1865.339318] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1865.340131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.340930] ? trace_hardirqs_on+0x5b/0x180 [ 1865.341598] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.342402] do_syscall_64+0x33/0x40 [ 1865.342984] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1865.343780] RIP: 0033:0x7f89b6ef5b19 [ 1865.344363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.347234] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1865.348541] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1865.349650] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1865.350768] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.351874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1865.352983] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1877.290547] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:09:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)) 00:09:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xfffffff5) 00:09:17 executing program 3: fork() (fail_nth: 32) 00:09:17 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x88100) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)) 00:09:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b6d, &(0x7f0000000000)) 00:09:17 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40081271, 0x0) 00:09:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/dev_mcast\x00') ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="0100c79dea14000018000000", @ANYRES32=r0, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00./file0\x00']) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x1) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:09:17 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x2, @broadcast}}) [ 1886.054332] blktrace: Concurrent blktraces are not allowed on loop10 [ 1886.056370] FAT-fs (loop4): Directory bread(block 5) failed [ 1886.062300] blktrace: Concurrent blktraces are not allowed on loop10 00:09:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b70, &(0x7f0000000000)) 00:09:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1886.100476] FAULT_INJECTION: forcing a failure. [ 1886.100476] name failslab, interval 1, probability 0, space 0, times 0 [ 1886.103284] CPU: 1 PID: 10570 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1886.104770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1886.107215] Call Trace: [ 1886.107778] dump_stack+0x107/0x163 [ 1886.108560] should_fail.cold+0x5/0xa [ 1886.109377] ? create_object.isra.0+0x3a/0xa20 [ 1886.110382] should_failslab+0x5/0x10 [ 1886.111195] kmem_cache_alloc+0x5b/0x350 [ 1886.112066] create_object.isra.0+0x3a/0xa20 [ 1886.113003] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1886.114093] kmem_cache_alloc+0x159/0x350 [ 1886.115002] vm_area_dup+0x78/0x290 [ 1886.115791] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1886.116792] ? lock_downgrade+0x6d0/0x6d0 [ 1886.117678] ? copy_page_range+0x242d/0x3810 [ 1886.118658] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1886.119662] ? avc_has_extended_perms+0xec0/0xec0 [ 1886.120702] ? vm_area_alloc+0x110/0x110 [ 1886.121575] ? find_held_lock+0x2c/0x110 [ 1886.122457] ? selinux_vm_enough_memory+0x10f/0x170 [ 1886.123522] ? selinux_sb_statfs+0x250/0x250 [ 1886.124477] ? percpu_counter_add_batch+0x8b/0x130 [ 1886.125537] ? __vm_enough_memory+0x184/0x360 [ 1886.126503] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1886.127614] dup_mm+0x44d/0x1110 [ 1886.128354] ? vm_area_dup+0x290/0x290 [ 1886.129195] ? __raw_spin_lock_init+0x36/0x110 [ 1886.130178] copy_process+0x23f8/0x66f0 [ 1886.131053] ? lock_downgrade+0x6d0/0x6d0 [ 1886.131950] ? __cleanup_sighand+0xb0/0xb0 [ 1886.132860] ? find_held_lock+0x2c/0x110 [ 1886.133724] kernel_clone+0xe7/0xa20 [ 1886.134534] ? lock_downgrade+0x6d0/0x6d0 [ 1886.135425] ? find_held_lock+0x2c/0x110 [ 1886.136301] ? copy_init_mm+0x20/0x20 [ 1886.137123] ? ksys_write+0x12d/0x250 [ 1886.137945] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1886.138995] __do_sys_fork+0x8a/0xc0 [ 1886.139791] ? kernel_clone+0xa20/0xa20 [ 1886.140657] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1886.141782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.142896] ? trace_hardirqs_on+0x5b/0x180 [ 1886.143819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.144924] do_syscall_64+0x33/0x40 [ 1886.145712] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1886.146813] RIP: 0033:0x7f89b6ef5b19 [ 1886.147620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1886.151780] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1886.153426] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1886.154979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1886.156513] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.158140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1886.159964] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:09:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/171, 0xab}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000240)=""/241, 0xf1}], 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:09:17 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) 00:09:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="601c6d6b646f73665b184500088001000440003e795d52277a0004f801", 0x1d}, {0x0, 0x0, 0x820}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.swap.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000440)={'vxcan1\x00'}) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000480)={r0}) dup3(r3, r4, 0x0) write(r0, &(0x7f0000000040)="f6a0572cc29ed2dec29f05b9e8a32e74b66c6ba1df666b2c7f0edca5847e002d70151329687390461fb9723e03c30493288ad4464bbba16c0b58f59468cc12a22cfd57ed4e26ac536aef5d63351f0869d98e2acde60c436b35710d59cd391db907e719413ed5d2400ce8d9", 0x6b) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/451], 0x1c3) 00:09:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b71, &(0x7f0000000000)) [ 1886.337837] blktrace: Concurrent blktraces are not allowed on loop10 [ 1886.353669] FAT-fs (loop4): invalid media value (0x5d) [ 1886.354888] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1899.478387] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:09:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:09:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xf078, 0x68400) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x5, 0x4}, {0x3458, 0x20f}, {0x9, 0x101}, {0x7ff, 0x10}, {0x0, 0x3}, {0x8, 0x3}]}) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) 00:09:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) 00:09:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x4, @broadcast}}) 00:09:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x404, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:09:39 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b72, &(0x7f0000000000)) 00:09:39 executing program 3: fork() (fail_nth: 33) 00:09:39 executing program 2: r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x8000000000202, 0x6}, r0, 0x1, 0xffffffffffffffff, 0x1) r2 = socket$inet(0x2, 0xa, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) connect$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/time_for_children\x00') fsetxattr$security_capability(r4, &(0x7f00000001c0), &(0x7f0000000200)=@v1={0x1000000, [{0x7, 0x4}]}, 0xc, 0x0) [ 1907.903009] blktrace: Concurrent blktraces are not allowed on loop10 [ 1907.915632] blktrace: Concurrent blktraces are not allowed on loop10 [ 1907.928815] FAT-fs (loop4): bogus number of reserved sectors [ 1907.930099] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1907.955073] FAT-fs (loop4): bogus number of reserved sectors [ 1907.956878] FAT-fs (loop4): Can't find a valid FAT filesystem 00:09:39 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4bfa, &(0x7f0000000000)) 00:09:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x4000, 0x1, 0xd6}) 00:09:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101283, 0x0) 00:09:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:09:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000002600)={0x0}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000002800)=""/159) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x10000000000000f5, 0xe720, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000240)={{0x9, 0x2}, 0x100, './file0\x00'}) 00:09:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000280)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r1}, 0x14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 1908.052440] FAULT_INJECTION: forcing a failure. [ 1908.052440] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.055454] CPU: 0 PID: 10621 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1908.056950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1908.059525] Call Trace: [ 1908.060212] dump_stack+0x107/0x163 [ 1908.061144] should_fail.cold+0x5/0xa [ 1908.062122] ? vm_area_dup+0x78/0x290 [ 1908.063105] should_failslab+0x5/0x10 [ 1908.064100] kmem_cache_alloc+0x5b/0x350 [ 1908.065141] vm_area_dup+0x78/0x290 [ 1908.066088] ? copy_page_range+0x242d/0x3810 [ 1908.067206] ? vm_area_alloc+0x110/0x110 [ 1908.068080] ? find_held_lock+0x2c/0x110 [ 1908.068961] ? vm_iomap_memory+0x190/0x190 [ 1908.069889] ? __vma_link_rb+0x540/0x700 [ 1908.070779] dup_mm+0x44d/0x1110 [ 1908.071522] ? vm_area_dup+0x290/0x290 [ 1908.072391] ? __raw_spin_lock_init+0x36/0x110 [ 1908.073391] copy_process+0x23f8/0x66f0 [ 1908.074257] ? lock_downgrade+0x6d0/0x6d0 [ 1908.075175] ? __cleanup_sighand+0xb0/0xb0 [ 1908.076103] ? find_held_lock+0x2c/0x110 [ 1908.076992] kernel_clone+0xe7/0xa20 [ 1908.077796] ? lock_downgrade+0x6d0/0x6d0 [ 1908.078706] ? find_held_lock+0x2c/0x110 [ 1908.079581] ? copy_init_mm+0x20/0x20 [ 1908.080413] ? ksys_write+0x12d/0x250 [ 1908.081256] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1908.082312] __do_sys_fork+0x8a/0xc0 [ 1908.083124] ? kernel_clone+0xa20/0xa20 [ 1908.083995] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1908.085131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1908.086242] ? trace_hardirqs_on+0x5b/0x180 [ 1908.087179] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1908.088321] do_syscall_64+0x33/0x40 [ 1908.089130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1908.090241] RIP: 0033:0x7f89b6ef5b19 [ 1908.091062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1908.095068] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1908.096716] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1908.098256] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1908.099803] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1908.101344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1908.102905] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:09:39 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0xa, @broadcast}}) [ 1908.220025] blktrace: Concurrent blktraces are not allowed on loop10 [ 1908.230179] FAT-fs (loop4): Directory bread(block 5) failed 00:09:39 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x5, 0x9bc9, 0x3f, 0x81, 0x27, "9af357b7c43ff6f1ecbf97efbe6f6d123a4cb3", 0x590, 0x1ff}) 00:09:39 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4bfb, &(0x7f0000000000)) 00:09:39 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101286, 0x0) [ 1908.426669] blktrace: Concurrent blktraces are not allowed on loop10 [ 1908.431811] blktrace: Concurrent blktraces are not allowed on loop10 [ 1922.711451] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:10:01 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x820024, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0xf0, 0x6}) 00:10:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:01 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x80, 0xfc, 0x7, 0x24, 0x0, 0x7f, 0x40044, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x10080, 0x6, 0x400, 0x2, 0x3, 0x101, 0x7, 0x0, 0x8, 0x0, 0x200}, r1, 0xc, r0, 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r3 = fork() perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x2, 0x1, 0xe8, 0x9, 0x0, 0x9, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x36f65abc, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x6}, 0x280, 0xd2f5, 0x10, 0x7, 0x1, 0x2, 0x41f, 0x0, 0x7, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) r4 = fsmount(r2, 0x1, 0xf8) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000280)) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:10:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x40101288, 0x0) 00:10:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x399, @broadcast}}) 00:10:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x7f, 0xfb, 0x2, 0x30cb}) 00:10:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5409, &(0x7f0000000000)) 00:10:01 executing program 3: fork() (fail_nth: 34) [ 1929.785415] blktrace: Concurrent blktraces are not allowed on loop10 [ 1929.805067] FAT-fs (loop4): Directory bread(block 5) failed [ 1929.807272] blktrace: Concurrent blktraces are not allowed on loop10 00:10:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540b, &(0x7f0000000000)) 00:10:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) 00:10:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070c9, 0x0) 00:10:01 executing program 4: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:10:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000100), 0x0, 0x800, 0x5) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000), 0x1) io_uring_enter(r0, 0x7e9f, 0xc2ce, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x2, 0xfffd, 0xf06d}) r2 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) readv(r2, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000180)=""/232, 0xe8}, {&(0x7f00000000c0)=""/112, 0x70}, {&(0x7f0000000280)=""/15, 0xf}], 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x3) [ 1929.948173] FAULT_INJECTION: forcing a failure. [ 1929.948173] name failslab, interval 1, probability 0, space 0, times 0 [ 1929.950666] CPU: 1 PID: 10678 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1929.952143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1929.954537] Call Trace: [ 1929.955137] dump_stack+0x107/0x163 [ 1929.956100] should_fail.cold+0x5/0xa [ 1929.957152] ? create_object.isra.0+0x3a/0xa20 [ 1929.958246] should_failslab+0x5/0x10 [ 1929.959095] kmem_cache_alloc+0x5b/0x350 [ 1929.959988] create_object.isra.0+0x3a/0xa20 [ 1929.960973] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1929.962077] kmem_cache_alloc+0x159/0x350 [ 1929.962968] vm_area_dup+0x78/0x290 [ 1929.963747] ? copy_page_range+0x242d/0x3810 [ 1929.964708] ? vm_area_alloc+0x110/0x110 [ 1929.965564] ? find_held_lock+0x2c/0x110 [ 1929.966437] ? vm_iomap_memory+0x190/0x190 [ 1929.967351] ? __vma_link_rb+0x540/0x700 [ 1929.968216] dup_mm+0x44d/0x1110 [ 1929.968943] ? vm_area_dup+0x290/0x290 [ 1929.969767] ? __raw_spin_lock_init+0x36/0x110 [ 1929.970736] copy_process+0x23f8/0x66f0 [ 1929.971602] ? lock_downgrade+0x6d0/0x6d0 [ 1929.972491] ? __cleanup_sighand+0xb0/0xb0 [ 1929.973396] ? find_held_lock+0x2c/0x110 [ 1929.974269] kernel_clone+0xe7/0xa20 [ 1929.975092] ? lock_downgrade+0x6d0/0x6d0 [ 1929.975964] ? find_held_lock+0x2c/0x110 [ 1929.976850] ? copy_init_mm+0x20/0x20 [ 1929.977680] ? ksys_write+0x12d/0x250 [ 1929.978525] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1929.979595] __do_sys_fork+0x8a/0xc0 [ 1929.980415] ? kernel_clone+0xa20/0xa20 [ 1929.981330] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1929.982483] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1929.983612] ? trace_hardirqs_on+0x5b/0x180 [ 1929.984545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1929.985671] do_syscall_64+0x33/0x40 [ 1929.986456] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1929.987554] RIP: 0033:0x7f89b6ef5b19 [ 1929.988338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1929.992240] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1929.993832] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1929.995347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1929.996858] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1929.998370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1929.999906] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0xa00, @broadcast}}) 00:10:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540c, &(0x7f0000000000)) [ 1930.131656] FAT-fs (loop4): Directory bread(block 5) failed [ 1930.135643] blktrace: Concurrent blktraces are not allowed on loop10 [ 1930.138455] blktrace: Concurrent blktraces are not allowed on loop10 00:10:14 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070ca, 0x0) 00:10:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1119, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:14 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x4000, @broadcast}}) 00:10:14 executing program 3: fork() (fail_nth: 35) 00:10:14 executing program 4: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x36, &(0x7f0000000180)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}, {&(0x7f00000000c0)="702e7289a8a2c8aaba546aee1339ebc381ffa02e866aee8fd19c8a1675e342717a", 0x0, 0x5}], 0x2a04050, &(0x7f0000000280)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:10:14 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540d, &(0x7f0000000000)) 00:10:14 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, r1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)) gettid() syz_open_procfs(r1, &(0x7f0000000100)='smaps\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:10:14 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r0, r1/1000+10000}}) truncate(&(0x7f0000000140)='./file0\x00', 0x545) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = signalfd4(r2, &(0x7f0000000040)={[0x6]}, 0x8, 0x80000) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000000)={0x0, 0x1a, 0x2}) [ 1943.476202] blktrace: Concurrent blktraces are not allowed on loop10 [ 1943.483185] blktrace: Concurrent blktraces are not allowed on loop10 00:10:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x8, 0x1, 0x9e, 0x0, 0x5, 0x28000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x110, 0x9, 0x8, 0x0, 0x929e, 0x6, 0x8980, 0x0, 0x5, 0x0, 0xc0}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYBLOB="16be7f3b7e6bc1378b9e83a1e5fc1f8abed837be6583a8d590a43782b7d2348bc02871d773bfd78ce0a39844a9c78c640173442ce1064e7951d64d76", @ANYRESDEC, @ANYRESOCT=r1]) creat(&(0x7f0000000040)='./file0\x00', 0x8) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:10:15 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540e, &(0x7f0000000000)) 00:10:15 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f00000000c0)={0x2, 0x8001, 0xfe11, 0x400, 0x40, "756a30660375f79e41eed2f9fc071d262dd55d", 0xfffffffb, 0x8003}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0x0, 0x0, 0xffff}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x40) r1 = signalfd4(r0, &(0x7f0000000000)={[0xf5c]}, 0x8, 0x80000) fcntl$getflags(r1, 0xb) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x0, @remote, 0x4}}, 0x0, 0x0, 0x1f, 0x0, "f1ac7f2d1201d4d9eb78c162e1e728c354a34f68e1151f1235d51a3971d2715b983bd560aa9435927c869af9a12dcfbbd72a1b21c2791bd0033fe9f8c58b62b44a52915ef53e1b4577ae63e79c120de6"}, 0xd8) 00:10:15 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401070cd, 0x0) [ 1943.581218] FAULT_INJECTION: forcing a failure. [ 1943.581218] name failslab, interval 1, probability 0, space 0, times 0 [ 1943.583723] CPU: 0 PID: 10731 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1943.585219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1943.587682] Call Trace: [ 1943.588255] dump_stack+0x107/0x163 [ 1943.589045] should_fail.cold+0x5/0xa [ 1943.589859] ? vm_area_dup+0x78/0x290 [ 1943.590690] should_failslab+0x5/0x10 [ 1943.591527] kmem_cache_alloc+0x5b/0x350 [ 1943.592554] vm_area_dup+0x78/0x290 [ 1943.593356] ? copy_page_range+0x242d/0x3810 [ 1943.594332] ? vm_area_alloc+0x110/0x110 [ 1943.595211] ? find_held_lock+0x2c/0x110 [ 1943.596088] ? vm_iomap_memory+0x190/0x190 [ 1943.597014] ? __vma_link_rb+0x540/0x700 [ 1943.597894] dup_mm+0x44d/0x1110 [ 1943.598634] ? vm_area_dup+0x290/0x290 [ 1943.599493] ? __raw_spin_lock_init+0x36/0x110 [ 1943.600485] copy_process+0x23f8/0x66f0 [ 1943.601345] ? lock_downgrade+0x6d0/0x6d0 00:10:15 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x9903, @broadcast}}) [ 1943.602260] ? __cleanup_sighand+0xb0/0xb0 [ 1943.603275] ? find_held_lock+0x2c/0x110 [ 1943.604153] kernel_clone+0xe7/0xa20 [ 1943.604957] ? lock_downgrade+0x6d0/0x6d0 [ 1943.605846] ? find_held_lock+0x2c/0x110 [ 1943.606720] ? copy_init_mm+0x20/0x20 [ 1943.607562] ? ksys_write+0x12d/0x250 [ 1943.608389] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1943.609449] __do_sys_fork+0x8a/0xc0 [ 1943.610253] ? kernel_clone+0xa20/0xa20 [ 1943.611137] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1943.612287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.613402] ? trace_hardirqs_on+0x5b/0x180 [ 1943.614333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.615460] do_syscall_64+0x33/0x40 [ 1943.616265] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1943.617374] RIP: 0033:0x7f89b6ef5b19 [ 1943.618177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1943.622181] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1943.623850] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1943.625396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1943.626939] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1943.628495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1943.630040] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:15 executing program 3: fork() (fail_nth: 36) 00:10:15 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = signalfd(r0, &(0x7f0000000100)={[0x2]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)={0x4b0, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x2, @mcast1, 0x6}}}}]}, @TIPC_NLA_NODE={0x16c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xa0, 0x3, "62ff615f573dd4472d3a083d9a258db9b534701113ba205cd6a33c172bd5edde2b62960c26665ef165952a50b779532e24cd92fc87e3b2c1ac3709dc01a961faa557b456ae73c96c8648e7110cd766e1977253d4a857721f8bea10f936052ee7180806e15b9c153da996be236105d257dfe89708ef9fd08030d6c8898d93e7a481521c45fdb5437a7d18c087455ee7a63ac51e7d2e276c5e8584a6bf"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "c0f679f39ebee4bbdebe58ae20a86689c8fc70385d01e83a8474a52a"}}, @TIPC_NLA_NODE_ID={0x6a, 0x3, "21c2a9c2281f4582f457e7548adae8d762eb0dd8ddd1dc92aca651ce42bef60b8caa5ce317441b652fe1d6cb9d03cfa349e01ab69c9cffa5eaa888cdaf37fae033ec51f45b773e00c5ca45722e9a9272e3441e84e59292eb71f812fae746b46a9d982d99aeef"}, @TIPC_NLA_NODE_ID={0x14, 0x3, "6e51fef539ded1af678f2f83739b828e"}]}, @TIPC_NLA_SOCK={0x38, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_SOCK={0x38, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xdbe8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x898a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_LINK={0xd0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7893}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x95}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xac}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xdb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffff9}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xd8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}]}]}, 0x4b0}, 0x1, 0x0, 0x0, 0xc080}, 0x80) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 1943.784895] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 1943.814493] blktrace: Concurrent blktraces are not allowed on loop10 [ 1943.817395] blktrace: Concurrent blktraces are not allowed on loop10 [ 1943.891471] FAULT_INJECTION: forcing a failure. [ 1943.891471] name failslab, interval 1, probability 0, space 0, times 0 [ 1943.894086] CPU: 0 PID: 10757 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1943.895628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1943.898050] Call Trace: [ 1943.898621] dump_stack+0x107/0x163 [ 1943.899412] should_fail.cold+0x5/0xa [ 1943.900229] ? create_object.isra.0+0x3a/0xa20 [ 1943.901208] should_failslab+0x5/0x10 [ 1943.902027] kmem_cache_alloc+0x5b/0x350 [ 1943.902900] create_object.isra.0+0x3a/0xa20 [ 1943.903859] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1943.904953] kmem_cache_alloc+0x159/0x350 [ 1943.905846] vm_area_dup+0x78/0x290 [ 1943.906639] ? copy_page_range+0x242d/0x3810 [ 1943.907623] ? vm_area_alloc+0x110/0x110 [ 1943.908494] ? find_held_lock+0x2c/0x110 [ 1943.909368] ? vm_iomap_memory+0x190/0x190 [ 1943.910293] ? __vma_link_rb+0x540/0x700 [ 1943.911178] dup_mm+0x44d/0x1110 [ 1943.911918] ? vm_area_dup+0x290/0x290 [ 1943.912756] ? __raw_spin_lock_init+0x36/0x110 [ 1943.913741] copy_process+0x23f8/0x66f0 [ 1943.914597] ? lock_downgrade+0x6d0/0x6d0 [ 1943.915519] ? __cleanup_sighand+0xb0/0xb0 [ 1943.916436] ? find_held_lock+0x2c/0x110 [ 1943.917310] kernel_clone+0xe7/0xa20 [ 1943.918108] ? lock_downgrade+0x6d0/0x6d0 [ 1943.918999] ? find_held_lock+0x2c/0x110 [ 1943.919868] ? copy_init_mm+0x20/0x20 [ 1943.920689] ? ksys_write+0x12d/0x250 [ 1943.921511] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1943.922550] __do_sys_fork+0x8a/0xc0 [ 1943.923387] ? kernel_clone+0xa20/0xa20 [ 1943.924255] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1943.925378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.926483] ? trace_hardirqs_on+0x5b/0x180 [ 1943.927415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1943.928522] do_syscall_64+0x33/0x40 [ 1943.929321] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1943.930423] RIP: 0033:0x7f89b6ef5b19 [ 1943.931240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1943.935211] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1943.936852] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1943.938390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1943.939949] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1943.941490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1943.943036] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:27 executing program 3: fork() (fail_nth: 37) 00:10:27 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540f, &(0x7f0000000000)) 00:10:27 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:10:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x4a202, 0xa0}, 0x18) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:10:27 executing program 1: socket$netlink(0x10, 0x3, 0x8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1ff, 0xb6}) 00:10:27 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870c8, 0x0) 00:10:27 executing program 2: bind(0xffffffffffffffff, &(0x7f0000000180)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1}, 0x80) perf_event_open(&(0x7f0000001d80)={0x2, 0x31, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') fallocate(r0, 0x8, 0x200, 0xfffffffffffffffc) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4810b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000a00), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c97e72357f7c246efa5a11326135a8986db27e24bfbce4ac1351bb6f374fd72a6c595fa552a9c2d8148a85c01c7b2331713568fde90804dddd4c3663335205143884a8a3a2ef2b947cc7c87311193aca43d546", @ANYRES16=r2, @ANYBLOB="01000000000000000000030000000800010000000000"], 0x1c}}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fcntl$setstatus(r3, 0x4, 0x400) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 1955.816413] blktrace: Concurrent blktraces are not allowed on loop10 [ 1955.822723] FAULT_INJECTION: forcing a failure. [ 1955.822723] name failslab, interval 1, probability 0, space 0, times 0 [ 1955.824417] CPU: 0 PID: 10776 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1955.825330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1955.826816] Call Trace: [ 1955.827179] dump_stack+0x107/0x163 [ 1955.827657] should_fail.cold+0x5/0xa [ 1955.828163] ? anon_vma_clone+0xdc/0x580 [ 1955.828694] should_failslab+0x5/0x10 [ 1955.829192] kmem_cache_alloc+0x5b/0x350 [ 1955.829727] anon_vma_clone+0xdc/0x580 [ 1955.830243] anon_vma_fork+0x82/0x630 [ 1955.830743] ? __vm_enough_memory+0x184/0x360 [ 1955.831346] dup_mm+0x861/0x1110 [ 1955.831804] ? vm_area_dup+0x290/0x290 [ 1955.832324] ? __raw_spin_lock_init+0x36/0x110 [ 1955.832944] copy_process+0x23f8/0x66f0 [ 1955.833468] ? lock_downgrade+0x6d0/0x6d0 [ 1955.834023] ? __cleanup_sighand+0xb0/0xb0 [ 1955.834592] ? find_held_lock+0x2c/0x110 [ 1955.835145] kernel_clone+0xe7/0xa20 [ 1955.835639] ? lock_downgrade+0x6d0/0x6d0 [ 1955.836180] ? find_held_lock+0x2c/0x110 [ 1955.836708] ? copy_init_mm+0x20/0x20 [ 1955.837218] ? ksys_write+0x12d/0x250 [ 1955.837726] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1955.838373] __do_sys_fork+0x8a/0xc0 [ 1955.838868] ? kernel_clone+0xa20/0xa20 [ 1955.839410] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1955.840099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1955.840770] ? trace_hardirqs_on+0x5b/0x180 [ 1955.841347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1955.842022] do_syscall_64+0x33/0x40 [ 1955.842512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1955.843199] RIP: 0033:0x7f89b6ef5b19 [ 1955.843696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1955.846124] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1955.847138] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1955.848087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1955.849022] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1955.849957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1955.850911] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 1955.852859] blktrace: Concurrent blktraces are not allowed on loop10 [ 1955.859677] FAT-fs (loop4): Directory bread(block 5) failed 00:10:27 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5410, &(0x7f0000000000)) 00:10:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000000, 0x4000010, r0, 0x81) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/154, 0x9a}], 0x1, 0x0, 0x80000000) 00:10:27 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cb, 0x0) 00:10:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000500)=[{&(0x7f0000000080)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}, {&(0x7f00000005c0)="1903a60b21a491d79a597d74270f66413db60a22594c7d385a2c8cfa1dc1ce2332473ae65e4e6a489cb9c121fb1e0d51b7e084abd6660f808b877d68c4b1ef6e004ed1c9e76bda08fee1251b1ebd8b9656a98cab2ccb15f7731e7fc752d860f1383ebed07caecf1485fbdbedab7959bd78174f4b1ea2ee7ef107ccde008000000000000099df79de11d38849f38484fbb8ee569de933c00d8feb2f19cc7b5606f088ebde", 0xa4, 0x300000000000000}, {&(0x7f0000000200)="1611380808c569c187f02c24732b90c7da8362581a0d12a32a20922337841fe4ffcd9fd173204c01f46a505a68ee7a0f08e818f1c170731b6b6b0f3f4aae334856198eabad712af2108d5a923bd577681153d1c79f53b4303eea76365f9a6c98e781aa309888815843ebb783515627ba718d0317872587c52776098620cdce4e8029dacd58d6edf7736685209cf9f1ef39326999b1c1804f90ee03872f71a8e24fae6a3df65f264383d4f880d25e6f1516a0ae70fbde3eebfb8ef152e01852cff8e3e87552bd9401857fbe50f11165", 0xcf, 0x1000}, {&(0x7f0000000300)="2549b6409a6726aa98fbd84f16bc5b24ff6bb1290a894f022c1cf3d641d7847ce32006c587e2e38544d3da979d8a79d698921df33aae6a38a0767b0825ecc54707eac95ddd33b75bf45c8d54e40eea0b57de95d681b940c18d04d7f5037952bdc2999067e31942f29b606d10727a4751e7a999655a329ae77cd66d50b2a49ae9294ddf00bce8f0a75b0a7e15dfd76c50abe2f5c268592c541b4f82ff267803f66f2f1481338faf0443317ee5d3fee7dd703f301082dd230d952da4fe2d46ba3308c0e5191bfde8502f", 0xc9, 0x2b6}, {&(0x7f0000000680)="4dfd7e07d4c9257f6fde1063cd4ea57989576cb8ed8a3db014b13994490d54da6e8a3b5b436f9b80d02a054dd166b10cb86eb2df8902445f438712347466df0bd83bb8747861788084267dcbdbaf87e81aedbc79be037beebdbeacb18d7ac54621e4446d79dced5f86c368a0714ab611e445130f5b70de344c84d4bcd9cc02c5b709568d75d40bac21bd61a7c98536f0685ecaacc44589bdc54ca063857ecf287c97fce6bd49a150f6fb51639d1a0e2d106bc901b1f9b4df76161c6522d95572532c4db0cb2abd629922f17a97713e052d46883e2c21ba20f520737af761bf897c6fad9fb8ed5c234055461a53", 0xed, 0x1}, {&(0x7f00000007c0)="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", 0x1000, 0xffffffffffffffff}, {&(0x7f00000000c0), 0x0, 0x6}], 0x0, &(0x7f0000000280)=ANY=[]) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x1, 0x1) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8900) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400, 0x0) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20024, 0x0) 00:10:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1956.013906] blktrace: Concurrent blktraces are not allowed on loop10 00:10:27 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000400), 0x3, 0x0) syz_open_pts(r1, 0x0) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1e8, 0x41, 0xa01, 0x70bd2a, 0x25dfdbff, {0x1b}, [@nested={0x18f, 0xf, 0x0, 0x1, [@typed={0x5, 0x8, 0x0, 0x0, @str='\x00'}, @generic="2c66ad9632b7f7d519123917486cb639c1d6652286e2e5f3d7bfc79da824303aba957bb996a925c682c0e41a5b7d378c7306b13a0d8ffef17bce6edc0c0915b28bbfc6012958ff1195a13df1a087bb43d51bdd1fe174de819d841e91b2fc796c7825f657a4aa851acc80a152356ca63345968dc50cd6e9e0dc5055cc222dcbcaf59821ba5dfabbf0405d3ab8015eb9bd6ce44443e95341e035e36951fd4df824a8994ca457a13d8b9e6bba2b29ec3de45ac4c42591f8815d2b2a82cb81c2ec98b3d7eeb25c81daf82e80dfb4b0a957fad448b6c8ca3471a4dbd36d0f55da2e8536cffe0aff9875b250ea41", @generic="d6b5273114f9d5a877c73d02dcd26f2ea44e6ea6a16620ce09b2fa762c29eafcce720fd003ce54d554435d228e68d63357a674d59e28364215592cc88db8e4a5c8440db7697aa2a506194ec2ef0e7abb6814bc576216b4e060ac3add6162ca065c106d12ee89e46a3ae6071868df8511714686cb75697df3edfcf0736885050a57a569852740d3c645c695de3a1103de2b867bdfebaa600c"]}, @generic="c3af45276b0cd9700804b2d5db26aa077d41e4dade66ba523e7caba5d87ad1b9d0dd08b419afe618566fa8a5a8d206b60c19d32f44", @nested={0x4, 0x57}, @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@broadcast}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x801}, 0x20000010) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 1956.018756] FAT-fs (loop4): Unrecognized mount option "€)ÚÍXÖí÷sf… œùñï92i™±Á€Oî‡/q¨âO®j=ö_&CƒÔø€Ò^o ®pûÞ>ëûŽñRàRÏøãèuR½”…¾Pñe" or missing value 00:10:27 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5412, &(0x7f0000000000)) [ 1956.024683] blktrace: Concurrent blktraces are not allowed on loop10 00:10:27 executing program 4: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73663a186000088001000440000004f801", 0x17}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000280)=ANY=[]) [ 1956.136848] FAT-fs (loop4): Directory bread(block 5) failed 00:10:38 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x401870cc, 0x0) 00:10:38 executing program 3: fork() (fail_nth: 38) 00:10:38 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f00000005c0)={{r1}, "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"}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:10:38 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:10:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) close_range(r0, r0, 0x0) 00:10:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5413, &(0x7f0000000000)) 00:10:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) [ 1967.243767] blktrace: Concurrent blktraces are not allowed on loop10 [ 1967.246486] blktrace: Concurrent blktraces are not allowed on loop10 00:10:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x9, 0x6a, 0x97, 0x800, 0x0, "26fd80f8b3d988e66661f4a557c092411a98ed", 0x9, 0x9}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1967.268763] FAULT_INJECTION: forcing a failure. [ 1967.268763] name failslab, interval 1, probability 0, space 0, times 0 [ 1967.270379] CPU: 1 PID: 10835 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1967.271216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1967.272608] Call Trace: [ 1967.272937] dump_stack+0x107/0x163 [ 1967.273390] should_fail.cold+0x5/0xa [ 1967.273861] ? create_object.isra.0+0x3a/0xa20 [ 1967.274416] should_failslab+0x5/0x10 [ 1967.274883] kmem_cache_alloc+0x5b/0x350 [ 1967.275383] create_object.isra.0+0x3a/0xa20 [ 1967.275920] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1967.276538] kmem_cache_alloc+0x159/0x350 [ 1967.277048] vm_area_dup+0x78/0x290 [ 1967.277492] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1967.278060] ? lock_downgrade+0x6d0/0x6d0 [ 1967.278567] ? copy_page_range+0x242d/0x3810 [ 1967.279117] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1967.279811] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1967.280398] ? avc_has_extended_perms+0xec0/0xec0 [ 1967.281013] ? dup_mm+0x631/0x1110 [ 1967.281464] ? vm_area_alloc+0x110/0x110 [ 1967.281975] ? find_held_lock+0x2c/0x110 [ 1967.282491] ? selinux_vm_enough_memory+0x10f/0x170 [ 1967.283118] ? selinux_sb_statfs+0x250/0x250 [ 1967.283678] ? up_write+0x191/0x550 [ 1967.284144] ? percpu_counter_add_batch+0x8b/0x130 [ 1967.284772] ? __vm_enough_memory+0x184/0x360 [ 1967.285340] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1967.285990] dup_mm+0x44d/0x1110 [ 1967.286423] ? vm_area_dup+0x290/0x290 [ 1967.286921] ? __raw_spin_lock_init+0x36/0x110 [ 1967.287516] copy_process+0x23f8/0x66f0 [ 1967.288016] ? lock_downgrade+0x6d0/0x6d0 [ 1967.288567] ? __cleanup_sighand+0xb0/0xb0 [ 1967.289103] ? find_held_lock+0x2c/0x110 [ 1967.289621] kernel_clone+0xe7/0xa20 [ 1967.290085] ? lock_downgrade+0x6d0/0x6d0 [ 1967.290600] ? find_held_lock+0x2c/0x110 [ 1967.291108] ? copy_init_mm+0x20/0x20 [ 1967.291592] ? ksys_write+0x12d/0x250 [ 1967.292076] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1967.292691] __do_sys_fork+0x8a/0xc0 [ 1967.293163] ? kernel_clone+0xa20/0xa20 [ 1967.293678] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1967.294323] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.294964] ? trace_hardirqs_on+0x5b/0x180 [ 1967.295511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.296150] do_syscall_64+0x33/0x40 [ 1967.296614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1967.297259] RIP: 0033:0x7f89b6ef5b19 [ 1967.297721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1967.300023] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1967.300970] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1967.301866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1967.302757] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1967.303671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1967.304578] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5414, &(0x7f0000000000)) 00:10:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000001540)={0x0, 0x0, 0xa, 0xc, 0x2c, &(0x7f0000001140)="1c83d7f43ea3f86447345a979225eaf4c74a13770040ac93f97f44ce5eaac6651284871a07281877c9aaa47ef543f54e7ec7b960a2268ce4aefaad650043c0ff91b25bf8b811adb0c82e0608ef588eaf91ffd08b242808232e2417f0733a3d362ffb286c3aa96a219d6eacbd98c1aa6021143007293f822140db200f37a53330f7a66853b821100e9a32b342bd9ebd0d37c81c55d357a67ad11fe29b025ad776a98a31abe67149f6a642f1eaa474b5354ba9790eccb14ebbb52172d70586378b4c6f0ae0068f8f2790b93c17709fb0558124010bcce8df43d384bff5be665a642b2894135ff8baf2972865c104a3240cb55cda658e102bccf85e472571bb8196e8d594091d6c077a09f35bba74c55783859d5ea5c685145a314ef263bcfba2bdd1b51e0ca22c22abf37a41047b7f03fd06dcff6962d1a9dedd24f66eb37b3463504c5c8b430cfb18ca82b66b4130b02c0cb147726ac387641049460dcff49abb331e69f14d34b51e98801191390a1147987dcf6371962bb5bb982955c1e559ebe26f9aa0ba20a62544a639abf3262397e3afca7fbdd5673d822c692309e68dbb6b83afc96bc2aa7d76804ec970e331aa375ff3874305dcd2f45a1062433ca34724beee388761f28fd49e0502987eeda36ba6595b477cc1471170c24d6e36122a7d756ff340bc42c05afce359ef0d39eb09745b281b3fdd04e8a970c19285cfc30102703645021c9a54aa5447dd90467a0afc13bc40d9b177bb89da01302b3c683a09082604f5a923279c8f732552141976f553d684a5e300486cc7af8dc5e9ae5695368d8acb44bb6d32c6e55eddad173db0461bd087083266a1f06f5b416bcdb0e3a586166228cf986be0d832b9e8620546956932f9c7af9edc4e703cff7023cc2097d68b8a0ef45f5f171e98b633d8b39bcf3cc747045420f10c3aefb426b4493fa883906a862f6c8935587b98961fbb3b0ed3f274e5d8a18d71c104ad1a60a560cb2d31ae277a40a118a824ed9dc55c55c518780983336bf4ad3ca8cbafe549d3fa127d588b5c79c5b280eb2c4349f299ca424be73614e03c98e5b4c684e3753a1f429964358446da93153548ba1b6d7b103ce893bdd2bbc6825acd151b93e915dd1a4cd0014231f8a04ba0e180be8c3b14d50ee3397da7e6914dda80b740420a08b2ce3f977b28ae2dcc53b1d29e0a30fbc59db5983d1ab55738a0df7396ecd2b96387d8021226c25c6535b2c4f16a0e896c0c2abc591d8bcf9dd4d476ba182452389655a4bb29dfe1caf03ffc7600cb8af9a73569ec1955ceca9acd1a84240f261248c260cfd7d75d4d6a9fe1326691b2124718cf9779b296044c1553c93d242d5b08a8927e58b31faacc15f5b2dd74c33dc45d63e2126af6d98e7ed97f34f6f580381e2ec8daa49fa163cc6392941452b7e8e4950d88e2e8bc6779e8ae"}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x7) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000140)={0x0, 0xb2}) write(r1, &(0x7f00000000c0)="982f91ef7245bf7995404119e8e490c179676bdf59ea51677532b7e9df091157c5737928f34af235ef5ae116285e9af94fd290a448329308e0e549f612485bd0802c9ff54c135cdf730c6e87b2f6ffb81e8af874143e2737bc", 0x59) 00:10:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0x4, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0xf00, 0x5f}) 00:10:38 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) 00:10:38 executing program 3: fork() (fail_nth: 39) 00:10:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x4}) [ 1967.467018] blktrace: Concurrent blktraces are not allowed on loop10 [ 1967.468642] blktrace: Concurrent blktraces are not allowed on loop10 00:10:38 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r1, &(0x7f0000000100), 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/24, 0x18, 0x4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xfff) 00:10:38 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) [ 1967.530190] FAULT_INJECTION: forcing a failure. [ 1967.530190] name failslab, interval 1, probability 0, space 0, times 0 [ 1967.531975] CPU: 1 PID: 10856 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1967.532744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1967.534066] Call Trace: [ 1967.534367] dump_stack+0x107/0x163 [ 1967.534776] should_fail.cold+0x5/0xa [ 1967.535201] ? down_write+0xe0/0x150 [ 1967.535637] ? anon_vma_clone+0xdc/0x580 [ 1967.536139] should_failslab+0x5/0x10 [ 1967.536750] kmem_cache_alloc+0x5b/0x350 [ 1967.537421] anon_vma_clone+0xdc/0x580 [ 1967.538046] anon_vma_fork+0x82/0x630 [ 1967.538673] ? __vm_enough_memory+0x184/0x360 [ 1967.539388] dup_mm+0x861/0x1110 [ 1967.539934] ? vm_area_dup+0x290/0x290 [ 1967.540578] ? __raw_spin_lock_init+0x36/0x110 [ 1967.541317] copy_process+0x23f8/0x66f0 [ 1967.541978] ? lock_downgrade+0x6d0/0x6d0 [ 1967.542708] ? __cleanup_sighand+0xb0/0xb0 [ 1967.543443] ? find_held_lock+0x2c/0x110 [ 1967.544092] kernel_clone+0xe7/0xa20 [ 1967.544532] ? lock_downgrade+0x6d0/0x6d0 [ 1967.545016] ? find_held_lock+0x2c/0x110 [ 1967.545496] ? copy_init_mm+0x20/0x20 [ 1967.545947] ? ksys_write+0x12d/0x250 [ 1967.546401] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1967.546973] __do_sys_fork+0x8a/0xc0 [ 1967.547424] ? kernel_clone+0xa20/0xa20 [ 1967.547901] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1967.548526] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.549135] ? trace_hardirqs_on+0x5b/0x180 [ 1967.549651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1967.550265] do_syscall_64+0x33/0x40 [ 1967.550703] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1967.551317] RIP: 0033:0x7f89b6ef5b19 [ 1967.551741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1967.553930] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1967.554811] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1967.555655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1967.556495] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1967.557315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1967.558116] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x6, 0xfd, 0x4, 0x2, 0x0, 0x3, 0x82010, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x400, 0x8001}, 0xa100, 0x7ff, 0x719e, 0x6, 0x2, 0x2, 0x1, 0x0, 0x9, 0x0, 0x5}) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:10:58 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:10:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) close_range(0xffffffffffffffff, r1, 0x2) pidfd_getfd(r2, r1, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)) 00:10:58 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041284, 0x0) 00:10:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5415, &(0x7f0000000000)) 00:10:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0xa}) 00:10:58 executing program 3: fork() (fail_nth: 40) 00:10:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x134}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x1a4) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/current\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @private}, &(0x7f0000000180)=0x10, 0x800) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000140)='batadv_slave_1\x00') connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e22, @broadcast}, 0x10) [ 1986.859363] blktrace: Concurrent blktraces are not allowed on loop10 [ 1986.864768] blktrace: Concurrent blktraces are not allowed on loop10 00:10:58 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:10:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5416, &(0x7f0000000000)) [ 1986.907131] FAULT_INJECTION: forcing a failure. [ 1986.907131] name failslab, interval 1, probability 0, space 0, times 0 [ 1986.909792] CPU: 0 PID: 10884 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1986.911296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1986.913796] Call Trace: [ 1986.914372] dump_stack+0x107/0x163 [ 1986.915164] should_fail.cold+0x5/0xa [ 1986.915997] ? create_object.isra.0+0x3a/0xa20 [ 1986.916989] should_failslab+0x5/0x10 [ 1986.917814] kmem_cache_alloc+0x5b/0x350 [ 1986.918718] create_object.isra.0+0x3a/0xa20 [ 1986.919788] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1986.920922] kmem_cache_alloc+0x159/0x350 [ 1986.921841] anon_vma_clone+0xdc/0x580 [ 1986.922711] anon_vma_fork+0x82/0x630 [ 1986.923580] ? __vm_enough_memory+0x184/0x360 [ 1986.924566] dup_mm+0x861/0x1110 [ 1986.925318] ? vm_area_dup+0x290/0x290 [ 1986.926191] ? __raw_spin_lock_init+0x36/0x110 [ 1986.927205] copy_process+0x23f8/0x66f0 [ 1986.928092] ? lock_downgrade+0x6d0/0x6d0 [ 1986.929029] ? __cleanup_sighand+0xb0/0xb0 [ 1986.929984] ? find_held_lock+0x2c/0x110 [ 1986.930891] kernel_clone+0xe7/0xa20 [ 1986.931727] ? lock_downgrade+0x6d0/0x6d0 [ 1986.932635] ? find_held_lock+0x2c/0x110 [ 1986.933515] ? copy_init_mm+0x20/0x20 [ 1986.934330] ? ksys_write+0x12d/0x250 [ 1986.935157] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1986.936251] __do_sys_fork+0x8a/0xc0 [ 1986.937059] ? kernel_clone+0xa20/0xa20 [ 1986.937940] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1986.939074] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1986.940206] ? trace_hardirqs_on+0x5b/0x180 [ 1986.941136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1986.942245] do_syscall_64+0x33/0x40 [ 1986.943039] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1986.944216] RIP: 0033:0x7f89b6ef5b19 [ 1986.945035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1986.949043] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1986.950690] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1986.952250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1986.953803] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1986.955364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1986.956944] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:10:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) 00:10:58 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0x0) 00:10:58 executing program 3: fork() (fail_nth: 41) 00:10:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:10:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x399}) 00:10:58 executing program 4: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) [ 1987.173599] blktrace: Concurrent blktraces are not allowed on loop10 [ 1987.177789] blktrace: Concurrent blktraces are not allowed on loop10 [ 1987.310103] FAULT_INJECTION: forcing a failure. [ 1987.310103] name failslab, interval 1, probability 0, space 0, times 0 [ 1987.312744] CPU: 1 PID: 10911 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1987.314218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1987.316642] Call Trace: [ 1987.317204] dump_stack+0x107/0x163 [ 1987.317976] should_fail.cold+0x5/0xa [ 1987.318790] ? anon_vma_clone+0xdc/0x580 [ 1987.319674] should_failslab+0x5/0x10 [ 1987.320471] kmem_cache_alloc+0x5b/0x350 [ 1987.321332] anon_vma_clone+0xdc/0x580 [ 1987.322161] anon_vma_fork+0x82/0x630 [ 1987.322968] ? __vm_enough_memory+0x184/0x360 [ 1987.323933] dup_mm+0x861/0x1110 [ 1987.324676] ? vm_area_dup+0x290/0x290 [ 1987.325533] ? __raw_spin_lock_init+0x36/0x110 [ 1987.326534] copy_process+0x23f8/0x66f0 [ 1987.327390] ? lock_downgrade+0x6d0/0x6d0 [ 1987.328301] ? __cleanup_sighand+0xb0/0xb0 [ 1987.329211] ? find_held_lock+0x2c/0x110 [ 1987.330073] kernel_clone+0xe7/0xa20 [ 1987.330862] ? lock_downgrade+0x6d0/0x6d0 [ 1987.331758] ? find_held_lock+0x2c/0x110 [ 1987.332627] ? copy_init_mm+0x20/0x20 [ 1987.333457] ? ksys_write+0x12d/0x250 [ 1987.334269] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1987.335307] __do_sys_fork+0x8a/0xc0 [ 1987.336116] ? kernel_clone+0xa20/0xa20 [ 1987.336981] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1987.338105] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1987.339208] ? trace_hardirqs_on+0x5b/0x180 [ 1987.340139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1987.341248] do_syscall_64+0x33/0x40 [ 1987.342060] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1987.343174] RIP: 0033:0x7f89b6ef5b19 [ 1987.343999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1987.347984] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1987.349648] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1987.351197] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1987.352760] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1987.354311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1987.355847] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:11:10 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5418, &(0x7f0000000000)) 00:11:10 executing program 3: fork() (fail_nth: 42) 00:11:10 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081270, 0x0) 00:11:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0xa00}) 00:11:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) fcntl$notify(r1, 0x402, 0x25) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:11:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, r3, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) fcntl$getownex(r2, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000200)='net/ip6_tables_matches\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x90000, 0x0) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000240)={0x46, 0x7fff, 0x5, 0x3, 0xff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r9, 0x1, 0x6, @local}, 0x10) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={r9, @broadcast, @broadcast}, 0xc) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:11:10 executing program 4: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:11:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) [ 1999.572779] blktrace: Concurrent blktraces are not allowed on loop10 [ 1999.580286] blktrace: Concurrent blktraces are not allowed on loop10 [ 1999.614192] device lo entered promiscuous mode 00:11:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541b, &(0x7f0000000000)) [ 1999.631416] device lo left promiscuous mode 00:11:11 executing program 4: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:11:11 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80081272, 0x0) [ 1999.675598] device lo entered promiscuous mode 00:11:11 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x4000}) [ 1999.683412] device lo left promiscuous mode [ 1999.684460] FAULT_INJECTION: forcing a failure. [ 1999.684460] name failslab, interval 1, probability 0, space 0, times 0 [ 1999.684484] CPU: 0 PID: 10931 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 1999.684495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1999.684500] Call Trace: [ 1999.684524] dump_stack+0x107/0x163 [ 1999.684544] should_fail.cold+0x5/0xa [ 1999.684562] ? create_object.isra.0+0x3a/0xa20 [ 1999.684580] should_failslab+0x5/0x10 [ 1999.684596] kmem_cache_alloc+0x5b/0x350 [ 1999.684618] create_object.isra.0+0x3a/0xa20 [ 1999.684633] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1999.684653] kmem_cache_alloc+0x159/0x350 [ 1999.684678] anon_vma_clone+0xdc/0x580 [ 1999.699631] anon_vma_fork+0x82/0x630 [ 1999.700484] ? __vm_enough_memory+0x184/0x360 [ 1999.701452] dup_mm+0x861/0x1110 [ 1999.702211] ? vm_area_dup+0x290/0x290 [ 1999.703064] ? __raw_spin_lock_init+0x36/0x110 [ 1999.704086] copy_process+0x23f8/0x66f0 [ 1999.704971] ? lock_downgrade+0x6d0/0x6d0 [ 1999.705900] ? __cleanup_sighand+0xb0/0xb0 [ 1999.706847] ? find_held_lock+0x2c/0x110 [ 1999.707761] kernel_clone+0xe7/0xa20 [ 1999.708581] ? lock_downgrade+0x6d0/0x6d0 [ 1999.709494] ? find_held_lock+0x2c/0x110 [ 1999.710386] ? copy_init_mm+0x20/0x20 [ 1999.711233] ? ksys_write+0x12d/0x250 [ 1999.712086] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1999.713156] __do_sys_fork+0x8a/0xc0 [ 1999.713974] ? kernel_clone+0xa20/0xa20 [ 1999.714866] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1999.716041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1999.717153] ? trace_hardirqs_on+0x5b/0x180 [ 1999.718093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1999.719215] do_syscall_64+0x33/0x40 [ 1999.720023] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1999.721132] RIP: 0033:0x7f89b6ef5b19 [ 1999.721940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1999.725928] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1999.727560] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 1999.729109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1999.730648] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1999.732203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1999.733737] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:11:11 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fallocate(r1, 0x1c, 0x86, 0x2) 00:11:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x7, 0x4, 0x4, 0x0, 0x7fffffff, 0x40000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x0, 0x7}, 0x808, 0x7fff, 0x7f, 0x8, 0x6, 0x1, 0x9, 0x0, 0x2, 0x0, 0x713}, 0x0, 0x8, 0xffffffffffffffff, 0xa) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:11:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541c, &(0x7f0000000000)) 00:11:11 executing program 3: fork() (fail_nth: 43) [ 1999.916826] blktrace: Concurrent blktraces are not allowed on loop10 [ 1999.923949] blktrace: Concurrent blktraces are not allowed on loop10 [ 2000.068444] FAULT_INJECTION: forcing a failure. [ 2000.068444] name failslab, interval 1, probability 0, space 0, times 0 [ 2000.071102] CPU: 1 PID: 10958 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2000.072690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2000.075292] Call Trace: [ 2000.075916] dump_stack+0x107/0x163 [ 2000.076759] should_fail.cold+0x5/0xa [ 2000.077636] ? anon_vma_fork+0xed/0x630 [ 2000.078540] should_failslab+0x5/0x10 [ 2000.079402] kmem_cache_alloc+0x5b/0x350 [ 2000.080330] anon_vma_fork+0xed/0x630 [ 2000.081193] ? __vm_enough_memory+0x184/0x360 [ 2000.082212] dup_mm+0x861/0x1110 [ 2000.082993] ? vm_area_dup+0x290/0x290 [ 2000.083886] ? __raw_spin_lock_init+0x36/0x110 [ 2000.084928] copy_process+0x23f8/0x66f0 [ 2000.085830] ? lock_downgrade+0x6d0/0x6d0 [ 2000.086788] ? __cleanup_sighand+0xb0/0xb0 [ 2000.087776] ? find_held_lock+0x2c/0x110 [ 2000.088707] kernel_clone+0xe7/0xa20 [ 2000.089555] ? lock_downgrade+0x6d0/0x6d0 [ 2000.090491] ? find_held_lock+0x2c/0x110 [ 2000.091411] ? copy_init_mm+0x20/0x20 [ 2000.092288] ? ksys_write+0x12d/0x250 [ 2000.093160] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2000.094272] __do_sys_fork+0x8a/0xc0 [ 2000.095122] ? kernel_clone+0xa20/0xa20 [ 2000.096065] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2000.097260] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2000.098434] ? trace_hardirqs_on+0x5b/0x180 [ 2000.099421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2000.100596] do_syscall_64+0x33/0x40 [ 2000.101448] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2000.102617] RIP: 0033:0x7f89b6ef5b19 [ 2000.103465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2000.107676] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2000.109429] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2000.111064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2000.112694] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2000.114318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2000.115963] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2013.741754] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:11:33 executing program 3: fork() (fail_nth: 44) 00:11:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file0\x00'}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000080)={0x3, 0xfffd, 0xfffe}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x714, 0x7ff, 0x1, 0x81}) 00:11:33 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:11:33 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x9903}) 00:11:33 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) 00:11:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541d, &(0x7f0000000000)) 00:11:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="cd794704c65a3856de8a9d0fbd973e6cdcb601d96563bbef0950acd801804d0e4002c0dc2c06d6c252237c7f133495f4ab5f4973e6e68c2dffeb68a75067f31bccd1530d26bb93dcc0a3fc562012ec9eff07bb946151089f3702420ac833ef0d6c4fd58902f20eae6520ec432c5473e331b00ed912723932d98328ceec1f707d51fcf3e9f9cddfda7c9db8e11ec322dbf748d92cf3bbf27c9598bd28d5940a1c8098b50eb3a8240c1c9d1108268882df052b2dab6eb086", 0xb7}], 0x1, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001400)={0x38, r4, 0x19, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "2c5c88b4cfafb0a43d68c1f2ee"}]}, 0x38}}, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$HIDIOCSFLAG(r5, 0x4004480f, &(0x7f0000000380)=0x2) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @void}}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xe800) socket$inet(0x2, 0xa, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:11:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000180)) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="980000000a0abc7300000000000000000300000908000c400000000908000f40000000000000000009797a310000000008000f40000000010900020073797a31000000004c0011800b0001007470726f787900003c000280080001400000000108000340000000160800024000000015080003400000000e080002400000000308000340054a95cfde2cc588441954ace34a814900000012080402400000000e0800044000000000"], 0x98}, 0x1, 0x0, 0x0, 0x400d0}, 0x8800) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/253, 0xfd, 0x1, &(0x7f0000000480)=""/192, 0xc0}, &(0x7f0000000200)=0x40) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x70a33ebdb6bf5a12, 0x0) r2 = socket(0x1d, 0x80000, 0x80) r3 = epoll_create(0x4) fcntl$dupfd(r2, 0x406, r3) [ 2022.037693] blktrace: Concurrent blktraces are not allowed on loop10 [ 2022.039847] blktrace: Concurrent blktraces are not allowed on loop10 00:11:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) dup2(r1, r0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)) splice(r2, &(0x7f0000000040)=0xbdb5, r2, &(0x7f0000000080)=0xa45, 0x6, 0x8) 00:11:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) 00:11:33 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:11:33 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) 00:11:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') [ 2022.206131] FAULT_INJECTION: forcing a failure. [ 2022.206131] name failslab, interval 1, probability 0, space 0, times 0 [ 2022.208827] CPU: 0 PID: 10985 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2022.210469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2022.212962] Call Trace: [ 2022.213539] dump_stack+0x107/0x163 [ 2022.214355] should_fail.cold+0x5/0xa [ 2022.215192] ? create_object.isra.0+0x3a/0xa20 [ 2022.216202] should_failslab+0x5/0x10 [ 2022.217038] kmem_cache_alloc+0x5b/0x350 [ 2022.217928] create_object.isra.0+0x3a/0xa20 00:11:33 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 2022.218906] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2022.220117] kmem_cache_alloc+0x159/0x350 [ 2022.221035] anon_vma_fork+0xed/0x630 [ 2022.221869] ? __vm_enough_memory+0x184/0x360 [ 2022.222868] dup_mm+0x861/0x1110 [ 2022.223617] ? vm_area_dup+0x290/0x290 [ 2022.224491] ? __raw_spin_lock_init+0x36/0x110 [ 2022.225493] copy_process+0x23f8/0x66f0 [ 2022.226372] ? lock_downgrade+0x6d0/0x6d0 [ 2022.227311] ? __cleanup_sighand+0xb0/0xb0 [ 2022.228285] ? __lockdep_reset_lock+0x180/0x180 [ 2022.229312] ? find_held_lock+0x2c/0x110 [ 2022.230212] kernel_clone+0xe7/0xa20 [ 2022.231050] ? lock_downgrade+0x6d0/0x6d0 [ 2022.231952] ? find_held_lock+0x2c/0x110 [ 2022.232851] ? copy_init_mm+0x20/0x20 [ 2022.233676] ? ksys_write+0x12d/0x250 [ 2022.234516] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2022.235593] __do_sys_fork+0x8a/0xc0 [ 2022.236462] ? kernel_clone+0xa20/0xa20 [ 2022.237346] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2022.238478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2022.239586] ? trace_hardirqs_on+0x5b/0x180 [ 2022.240536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2022.241651] do_syscall_64+0x33/0x40 [ 2022.242456] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2022.243561] RIP: 0033:0x7f89b6ef5b19 [ 2022.244374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2022.248379] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2022.250033] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2022.251574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2022.253124] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2022.254661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2022.256220] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:11:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2022.427984] blktrace: Concurrent blktraces are not allowed on loop10 [ 2022.435815] blktrace: Concurrent blktraces are not allowed on loop10 [ 2034.194713] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:11:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x2}) 00:11:52 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) 00:11:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='$^[[-$*)\xbb(+\x00') 00:11:52 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)="323f5573fce6fe5dbf75ea8b559f7d58436599c5812ed60f85e1da4dee07ce8cd08ee949ba566b1b84a03e00b3eaed8066d1984eeb331eaaed1977692ff9afc77d767b38ced7346fac55a5bc8976a241e17085465f3c", 0x56, r0}, 0x68) 00:11:52 executing program 3: fork() (fail_nth: 45) 00:11:52 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 00:11:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x63d6}) 00:11:52 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) [ 2041.289783] blktrace: Concurrent blktraces are not allowed on loop10 [ 2041.292502] blktrace: Concurrent blktraces are not allowed on loop10 00:11:52 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5421, &(0x7f0000000000)) [ 2041.336124] FAULT_INJECTION: forcing a failure. [ 2041.336124] name failslab, interval 1, probability 0, space 0, times 0 [ 2041.338714] CPU: 1 PID: 11038 Comm: syz-executor.3 Not tainted 5.10.123 #1 00:11:52 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) [ 2041.340194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2041.342808] Call Trace: [ 2041.343425] dump_stack+0x107/0x163 [ 2041.344228] should_fail.cold+0x5/0xa [ 2041.345044] ? anon_vma_fork+0x1dd/0x630 [ 2041.345920] should_failslab+0x5/0x10 [ 2041.346752] kmem_cache_alloc+0x5b/0x350 [ 2041.347641] anon_vma_fork+0x1dd/0x630 [ 2041.348487] dup_mm+0x861/0x1110 [ 2041.349230] ? vm_area_dup+0x290/0x290 [ 2041.350071] ? __raw_spin_lock_init+0x36/0x110 [ 2041.351055] copy_process+0x23f8/0x66f0 [ 2041.351910] ? lock_downgrade+0x6d0/0x6d0 [ 2041.352840] ? __cleanup_sighand+0xb0/0xb0 [ 2041.353747] ? __lockdep_reset_lock+0x180/0x180 [ 2041.354752] ? find_held_lock+0x2c/0x110 [ 2041.355630] kernel_clone+0xe7/0xa20 [ 2041.356435] ? lock_downgrade+0x6d0/0x6d0 [ 2041.357319] ? find_held_lock+0x2c/0x110 [ 2041.358187] ? copy_init_mm+0x20/0x20 [ 2041.359005] ? ksys_write+0x12d/0x250 [ 2041.359823] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2041.360881] __do_sys_fork+0x8a/0xc0 [ 2041.361681] ? kernel_clone+0xa20/0xa20 [ 2041.362549] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2041.363667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2041.364777] ? trace_hardirqs_on+0x5b/0x180 [ 2041.365699] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2041.366806] do_syscall_64+0x33/0x40 [ 2041.367602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2041.368708] RIP: 0033:0x7f89b6ef5b19 [ 2041.369507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2041.373468] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2041.375101] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2041.376643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2041.378181] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2041.379716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:11:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000500)=0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40250040}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=@getae={0x188, 0x1f, 0x100, 0x70bd2d, 0x25dfdbfd, {{@in=@local, 0x4d6, 0xa, 0x3c}, @in6=@local, 0x29, 0x3505}, [@policy_type={0xa, 0x10, {0x1}}, @sa={0xe4, 0x6, {{@in=@broadcast, @in6=@mcast1, 0x4e22, 0x4, 0x4e21, 0xff, 0xa, 0x80, 0x20, 0x5e, r2, r3}, {@in=@loopback, 0x3, 0x32}, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, {0xd86, 0xa2a1, 0x3ff, 0x801, 0xfffffffffffffffe, 0x4, 0x9, 0x5}, {0x1a, 0x0, 0x8, 0x8001}, {0x1ff, 0x5, 0x3}, 0x70bd2a, 0x0, 0x2, 0x2, 0x6}}, @extra_flags={0x8, 0x18, 0x3}, @migrate={0x50, 0x11, [{@in=@loopback, @in6=@private1, @in=@multicast1, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x32, 0x3, 0x0, 0x3504, 0x2, 0xa}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000800) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2041.381276] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:11:52 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) 00:11:52 executing program 4: socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) [ 2041.506205] device lo entered promiscuous mode 00:11:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x4}) [ 2041.537117] device lo left promiscuous mode 00:11:52 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x2, 0x5, 0x1, 0x81, 0x0, 0x200, 0x88710, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0xffffffff}, 0x10804, 0x2c9, 0x0, 0x0, 0x8, 0x7, 0x8, 0x0, 0x3f, 0x0, 0x1}, r2, 0x10, 0xffffffffffffffff, 0x0) [ 2041.569086] device lo entered promiscuous mode [ 2041.579197] device lo left promiscuous mode 00:11:53 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5422, &(0x7f0000000000)) 00:11:53 executing program 1: write$bt_hci(0xffffffffffffffff, &(0x7f00000000c0)={0x1, @read_clock={{0x1407, 0x3}, {0xc9}}}, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x80) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0xfff9, 0x2}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x9) 00:11:53 executing program 3: fork() (fail_nth: 46) [ 2041.592644] blktrace: Concurrent blktraces are not allowed on loop10 [ 2041.597108] blktrace: Concurrent blktraces are not allowed on loop10 [ 2041.818413] FAULT_INJECTION: forcing a failure. [ 2041.818413] name failslab, interval 1, probability 0, space 0, times 0 [ 2041.821405] CPU: 1 PID: 11066 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2041.823235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2041.826052] Call Trace: [ 2041.826725] dump_stack+0x107/0x163 [ 2041.827670] should_fail.cold+0x5/0xa [ 2041.828556] ? create_object.isra.0+0x3a/0xa20 [ 2041.829672] should_failslab+0x5/0x10 [ 2041.830746] kmem_cache_alloc+0x5b/0x350 [ 2041.831619] create_object.isra.0+0x3a/0xa20 [ 2041.832680] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2041.834022] kmem_cache_alloc+0x159/0x350 [ 2041.834912] anon_vma_fork+0xed/0x630 [ 2041.835853] ? __vm_enough_memory+0x184/0x360 [ 2041.837021] dup_mm+0x861/0x1110 [ 2041.837786] ? vm_area_dup+0x290/0x290 [ 2041.838605] ? __raw_spin_lock_init+0x36/0x110 [ 2041.839581] copy_process+0x23f8/0x66f0 [ 2041.840437] ? lock_downgrade+0x6d0/0x6d0 [ 2041.841325] ? __cleanup_sighand+0xb0/0xb0 [ 2041.842255] ? find_held_lock+0x2c/0x110 [ 2041.843128] kernel_clone+0xe7/0xa20 [ 2041.843921] ? lock_downgrade+0x6d0/0x6d0 [ 2041.844804] ? find_held_lock+0x2c/0x110 [ 2041.845673] ? copy_init_mm+0x20/0x20 [ 2041.846507] ? ksys_write+0x12d/0x250 [ 2041.847338] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2041.848399] __do_sys_fork+0x8a/0xc0 [ 2041.849190] ? kernel_clone+0xa20/0xa20 [ 2041.850055] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2041.851173] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2041.852279] ? trace_hardirqs_on+0x5b/0x180 [ 2041.853205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2041.854303] do_syscall_64+0x33/0x40 [ 2041.855101] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2041.856196] RIP: 0033:0x7f89b6ef5b19 [ 2041.856998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2041.860988] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2041.862613] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2041.864139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2041.865669] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2041.867193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2041.868723] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2056.897404] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:12:17 executing program 3: fork() (fail_nth: 47) 00:12:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2, 0x2) fsmount(r1, 0x0, 0x4) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:12:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4200c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) fcntl$dupfd(r0, 0x0, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:12:17 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0xa}) 00:12:17 executing program 4: socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:12:17 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0101282, 0x0) 00:12:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5423, &(0x7f0000000000)) 00:12:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) splice(r1, &(0x7f0000000040)=0x4, r0, &(0x7f0000000080)=0x8, 0x9, 0xe) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fallocate(r2, 0x2e, 0xfffffffffffffff9, 0x8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2065.795362] blktrace: Concurrent blktraces are not allowed on loop10 [ 2065.797775] blktrace: Concurrent blktraces are not allowed on loop10 00:12:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5424, &(0x7f0000000000)) 00:12:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000440)={0xb5, 0x4, &(0x7f0000000040)}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:12:17 executing program 4: socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x2}) 00:12:17 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) [ 2065.857902] FAULT_INJECTION: forcing a failure. [ 2065.857902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2065.860666] CPU: 0 PID: 11092 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2065.862179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2065.864674] Call Trace: [ 2065.865250] dump_stack+0x107/0x163 [ 2065.866049] should_fail.cold+0x5/0xa [ 2065.866879] __alloc_pages_nodemask+0x182/0x680 [ 2065.867896] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2065.869311] ? copy_page_range+0x2821/0x3810 [ 2065.870273] alloc_pages_current+0x187/0x280 [ 2065.871227] get_zeroed_page+0x14/0xa0 [ 2065.872075] __pud_alloc+0x33/0x270 [ 2065.872874] copy_page_range+0x2be1/0x3810 [ 2065.873790] ? lock_chain_count+0x20/0x20 [ 2065.874705] ? lock_downgrade+0x6d0/0x6d0 [ 2065.875614] ? up_write+0x191/0x550 [ 2065.876399] ? vm_iomap_memory+0x190/0x190 [ 2065.877329] ? downgrade_write+0x3a0/0x3a0 [ 2065.878252] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2065.879427] ? __vma_link_rb+0x540/0x700 [ 2065.880312] dup_mm+0x8b9/0x1110 [ 2065.881063] ? vm_area_dup+0x290/0x290 [ 2065.881906] ? __raw_spin_lock_init+0x36/0x110 [ 2065.882899] copy_process+0x23f8/0x66f0 [ 2065.883793] ? __cleanup_sighand+0xb0/0xb0 [ 2065.884743] ? finish_task_switch+0x126/0x5d0 [ 2065.885714] kernel_clone+0xe7/0xa20 [ 2065.886526] ? copy_init_mm+0x20/0x20 [ 2065.887347] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2065.888314] ? trace_hardirqs_on+0x5b/0x180 [ 2065.889254] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2065.890227] ? finish_task_switch+0x126/0x5d0 [ 2065.891198] ? finish_task_switch+0xef/0x5d0 [ 2065.892147] ? __switch_to+0x572/0xff0 [ 2065.892992] ? __switch_to_asm+0x42/0x70 [ 2065.893863] ? __switch_to_asm+0x36/0x70 [ 2065.894747] ? __schedule+0x850/0x1e80 [ 2065.895586] __do_sys_fork+0x8a/0xc0 [ 2065.896389] ? kernel_clone+0xa20/0xa20 [ 2065.897267] ? io_schedule_timeout+0x140/0x140 [ 2065.898256] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 2065.899257] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2065.900389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2065.901506] ? trace_hardirqs_on+0x5b/0x180 [ 2065.902440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2065.903552] do_syscall_64+0x33/0x40 [ 2065.904355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2065.905479] RIP: 0033:0x7f89b6ef5b19 [ 2065.906286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2065.910289] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2065.911937] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2065.913499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2065.915053] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2065.916608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2065.918158] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:12:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)={0x260, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}]}, 0x260}, 0x1, 0x0, 0x0, 0x4008040}, 0x20008000) 00:12:17 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) r4 = gettid() r5 = getpgid(0x0) rt_tgsigqueueinfo(r5, r4, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r6 = accept(r1, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000100)=0x80) kcmp(r3, r5, 0x4, r6, r0) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:12:17 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x399}) 00:12:17 executing program 3: fork() (fail_nth: 48) [ 2066.122334] blktrace: Concurrent blktraces are not allowed on loop10 [ 2066.129089] blktrace: Concurrent blktraces are not allowed on loop10 [ 2066.259527] FAULT_INJECTION: forcing a failure. [ 2066.259527] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.261997] CPU: 1 PID: 11114 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2066.263480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2066.265923] Call Trace: [ 2066.266488] dump_stack+0x107/0x163 [ 2066.267272] should_fail.cold+0x5/0xa [ 2066.268087] ? create_object.isra.0+0x3a/0xa20 [ 2066.269072] should_failslab+0x5/0x10 [ 2066.269886] kmem_cache_alloc+0x5b/0x350 [ 2066.270768] create_object.isra.0+0x3a/0xa20 [ 2066.271704] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2066.272823] kmem_cache_alloc+0x159/0x350 [ 2066.273716] anon_vma_fork+0x1dd/0x630 [ 2066.274552] dup_mm+0x861/0x1110 [ 2066.275288] ? vm_area_dup+0x290/0x290 [ 2066.276124] ? __raw_spin_lock_init+0x36/0x110 [ 2066.277113] copy_process+0x23f8/0x66f0 [ 2066.277965] ? lock_downgrade+0x6d0/0x6d0 [ 2066.278870] ? __cleanup_sighand+0xb0/0xb0 [ 2066.279770] ? __lockdep_reset_lock+0x180/0x180 [ 2066.280790] ? find_held_lock+0x2c/0x110 [ 2066.281662] kernel_clone+0xe7/0xa20 [ 2066.282457] ? lock_downgrade+0x6d0/0x6d0 [ 2066.283338] ? find_held_lock+0x2c/0x110 [ 2066.284199] ? copy_init_mm+0x20/0x20 [ 2066.285033] ? ksys_write+0x12d/0x250 [ 2066.285869] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2066.286910] __do_sys_fork+0x8a/0xc0 [ 2066.287704] ? kernel_clone+0xa20/0xa20 [ 2066.288567] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2066.289682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2066.290792] ? trace_hardirqs_on+0x5b/0x180 [ 2066.291721] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2066.292843] do_syscall_64+0x33/0x40 [ 2066.293637] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2066.294735] RIP: 0033:0x7f89b6ef5b19 [ 2066.295537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2066.299474] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2066.301112] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2066.302638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2066.304157] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2066.305696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2066.307215] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2076.742035] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:12:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5425, &(0x7f0000000000)) 00:12:35 executing program 3: fork() (fail_nth: 49) 00:12:35 executing program 7: r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, r0, 0xe, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xff, 0x9, 0x2, 0x0, 0x0, 0xf32, 0x8802, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x6411, 0x3}, 0x5804, 0xfffffffffffffff9, 0x0, 0x9, 0x3, 0x6, 0x3, 0x0, 0x1f}, 0x0, 0xb, r2, 0x1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pread64(r4, &(0x7f0000000200)=""/157, 0x9d, 0x7) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:12:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/244, 0xf4}], 0xb, 0xe723, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) syz_open_procfs(r2, &(0x7f0000000200)='net/ip_tables_names\x00') ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pipe2(&(0x7f0000000300), 0x800) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={r2, r3, r5}, 0xc) 00:12:35 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 00:12:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') getsockname$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/19, 0x13, 0x6) 00:12:35 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) 00:12:35 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0xa00}) 00:12:35 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) [ 2084.183237] blktrace: Concurrent blktraces are not allowed on loop10 [ 2084.185723] blktrace: Concurrent blktraces are not allowed on loop10 00:12:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5427, &(0x7f0000000000)) 00:12:35 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0401273, 0x0) 00:12:35 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2084.276703] FAULT_INJECTION: forcing a failure. [ 2084.276703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2084.279605] CPU: 1 PID: 11139 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2084.281084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2084.283857] Call Trace: [ 2084.284418] dump_stack+0x107/0x163 [ 2084.285200] should_fail.cold+0x5/0xa [ 2084.286017] __alloc_pages_nodemask+0x182/0x680 00:12:35 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x2, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r3, 0x0, 0x0) preadv(r1, &(0x7f00000000c0), 0xffffffffffffff94, 0x180, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x2, 0x1, 0x5) openat$cgroup_freezer_state(r1, &(0x7f0000000100), 0x2, 0x0) [ 2084.287008] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2084.288464] ? copy_page_range+0x2821/0x3810 [ 2084.289548] alloc_pages_current+0x187/0x280 [ 2084.290716] get_zeroed_page+0x14/0xa0 [ 2084.291534] __pud_alloc+0x33/0x270 [ 2084.292304] copy_page_range+0x2be1/0x3810 [ 2084.293206] ? lock_chain_count+0x20/0x20 [ 2084.294100] ? lock_downgrade+0x6d0/0x6d0 [ 2084.295138] ? up_write+0x191/0x550 [ 2084.296044] ? vm_iomap_memory+0x190/0x190 [ 2084.297033] ? downgrade_write+0x3a0/0x3a0 [ 2084.297932] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2084.299188] ? __vma_link_rb+0x540/0x700 [ 2084.300230] dup_mm+0x8b9/0x1110 [ 2084.301021] ? vm_area_dup+0x290/0x290 [ 2084.301849] ? __raw_spin_lock_init+0x36/0x110 [ 2084.302816] copy_process+0x23f8/0x66f0 [ 2084.303664] ? lock_downgrade+0x6d0/0x6d0 [ 2084.304548] ? __cleanup_sighand+0xb0/0xb0 [ 2084.305468] ? find_held_lock+0x2c/0x110 [ 2084.306330] kernel_clone+0xe7/0xa20 [ 2084.307112] ? lock_downgrade+0x6d0/0x6d0 [ 2084.307981] ? find_held_lock+0x2c/0x110 [ 2084.308989] ? copy_init_mm+0x20/0x20 [ 2084.309975] ? ksys_write+0x12d/0x250 [ 2084.310839] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2084.312066] __do_sys_fork+0x8a/0xc0 [ 2084.313026] ? kernel_clone+0xa20/0xa20 [ 2084.313915] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2084.315321] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2084.316489] ? trace_hardirqs_on+0x5b/0x180 [ 2084.317477] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2084.318784] do_syscall_64+0x33/0x40 [ 2084.319642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2084.320722] RIP: 0033:0x7f89b6ef5b19 [ 2084.321519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2084.325435] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2084.327041] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2084.328549] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2084.330064] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2084.331573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2084.333096] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2084.379255] blktrace: Concurrent blktraces are not allowed on loop10 [ 2084.382691] blktrace: Concurrent blktraces are not allowed on loop10 [ 2096.371279] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:12:56 executing program 3: fork() (fail_nth: 50) 00:12:56 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 00:12:56 executing program 7: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, r1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0x9, 0xfa, 0x5, 0x80, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x9, 0x7}, 0x40000, 0xba4d, 0x7, 0x9, 0x28, 0x6e4, 0x43f, 0x0, 0x10000, 0x0, 0x9}, r1, 0xf, r0, 0xb) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r5 = pidfd_getfd(r4, r3, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r5, 0x80286722, &(0x7f0000000100)={&(0x7f0000000180)=""/237, 0xed, 0x633d, 0x1}) r6 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x7ff, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000340)="98b33901393341ab323d05452af7554298", 0x11, 0x80}, {&(0x7f0000000380)="1aa3e65ee0fb7a8593696795d4d213b7a94b858c2b657386ad842c68d9", 0x1d, 0x81}, {&(0x7f00000005c0)="3fce291caf56e8dba5e5deb32e48f68cf0f26128318c3a4496dae6d2653690d76876a7e11b2461c71594662806126efc1605b98d19a0706d85d88cb673bee912ce538e15f014697303ca4deb9262267e7e9743b84bd1dd5627d4c9bb3080d6f55cf2abe5a23282ad63f232a0e2428afd9cab719843bcb6c0ddacc4d2d77a687fc9f3506bdf49de9390ddb48a1a5e6e07c5ed2add93d998e2f52ee86b3c39c3476bdd297d0d98bda2f6a06049f33cfaa8caffc52828caf406e26e4b69ff366a271b76e8cd88e64e1bde02dff9b8f6cea8c921d095dfbaf92083c4ed90446f8c5bdfa1a4932426c2e802fe9a3b6399f6dd717394eb06f7f4528f444429676f22cbd9604f198bb3429e9dce48d4e8fd46f086edec8a7a169b977cc977048271ea13fcd89ca69ecb1785cb284a723782ff988ab04c200c32fe421d922bb04814ae9fc86e13a243460d2bf48dc9e1d392fbcd95c7063228feab238ad04fe69a80b61ba0063e74705c7bfd94d7e130186ecc18ba35489089df5c1cbfbb77a802958777af5cf8426ba462f7e6f236c2a1fcf303636dc346f6ee406e8c256b99951bd9c335442b58463c5ec8cdf2ff27890d50198ec5e703b465324378e905d7cd8a3f4755476cde7e82683f6f07878c9229676917da8ee6f2a8b137d7271ce912a169cc955a1c9434aa4f80c879a3cfac94d5af58e3bdda87f06c697a74e8d08046e758af4351db98bc5d513500758e357ae8d031d35be49195ccfadecc103a73350edfa4c0ef26bdbcc2ced5820fa1fcd8b483790c51d9688f998da2e6cb31d1177e7a1d1e19b4b6e00412f9c7ddb13d7479212676f23f0b1c3157df81cf905ad2983b9bbee3b68811d9500969837e2e900da70e022e6f00aaa011d77ba94667a945358e611763b4eba772b026e47ebb70929d7d68e912e2db12e8cf73a9aa808a0ec156f183b35b60614339da11fdfbbc9a575a79fd77292393869c96ad2fa76003ac0b39ab8a3537129535ab8ae81a5888dcf2c7dfaf9b344245ec33da5e07faa8315d68456e30d13b42148bb2364880a82ebabf38af6ecd8c45aeb0e4e0086fdb418c8260ca7344926209dabedb0d7aefb157756b7aa68dc240c0806974c4a0a2044619a1e4cbdfb0abfcbdc5c83041ddd7007455cee0b7dd4592c3135310883493241ea076002b789b8b3c222fcac7f4efeeb20a1fabaa3394573ef144205f40538275907df34dbace252756b88da1c31e2988485ecc24a9561a806e06ef19a40980aaa9cd3a182f6c3a22eee1c96741d0e5da812396b32dc504dbd62d92690f5b0c900b2d58f007067698547d3c7c58a3895d23acb20683ec1488c0ab7eb2d73b5e98ee6dd3a420285e7dc7c69d7378bde254c9356a9253d251ad538c7da1d03738eb094b53fe2b283822f57b5bfafd0b9e20ae3c5c7040c8687f2548522143de73e6177eeccc955a37aed86eee59886a0774861430a5870b4c0fb28c654cc244f9c354eafc0ecd3147470dfc9d2c09b9dfd500948c7c1687d319a7d8699a0e73321c0989782f37a5bf3692bfe8e6388c76e2f927676c94f210730da275b220a4333f8da3db08fb6894cccc27bf09307127de5a2112c048999b3661c9ed9c8067de18ae061a8ef27ed929216adfa49c1e15d183115dd4a5d1520553bff847e25feffe8f37049ac5278ce28c13a10c8b35d1fed0174a8947e7884629ae4fd4b7f4626d14abbd8c578c559707ef3c8b5ae53d8d08ef1774b6f8a307c42f70e2a9061ef9b87e20120403f8352b0efd0f3f4ea021fdec2765e6fb9be2cc75066abc54fd21d40a9cbeb479a2797d2104ed799e58705d40a27f5331f1e5dd7fcef10694a3b2ffbb4c423bbdb6d6f7cce4ed28b40cd973ef1f3e54b96521a514f6465d662125433165c8be2b13864fef5812c8c9336acb77570575e656a4169b2ec427c50fd6ad6c6cface9ecdce4e1a1d6563781a9fba34309e48bbe9fe4191c7620e778bc8c22500c36c455661fe920bcb7480dc33e68fbdf7d48541ec7d32f31337c13cb648833cd56f300d74351e87ed37d011f91d3ae2372f1c657d27ad72e25f0eab617cc46505586d0edffeb64f12f2e07cabcbe1d066e3720cc39ef708e095da8fe75a430746e0f01b92e98d97b1b38ee19f1c4e314ed709dfce62be780c6a4bdeab4f56dc2f6c5d94ef5f08f15e0e46b120cd86111faac8026225fcd3db28d73646dd31e5c3a8b1afb9ac7bf346afe8e86de76a4ea0158c6b0a63746eb52560a01624c6ed4b678ddb5a9d010ff352fc87d061a0a2a69026ab38cea2119cf13caf4ae9b844ec60ac942e1204f4b72f2f3995ebdd12f4051bad7f5ab466e0a95d3b6e89b643fed09003f6fadfbdd01ced4c8c5c4fa2174b405efe39682c193fa69ce5bd5fbff49c94bcd3ab66182ba0aea436deafefd1c87fa41b17aad0a7926b109f9df943de9fc3e932a4e7b6a35387ec05838f84ad9ef4a370a9eb53d07ad1f82bb2e66fc3e5bc9b2d2e7e9ba5feabac13f8b717ad1733f66e52e1d57911a28c70d720e9f77563ec6be204ca03423c4aafc399e02416f5a3bd9eaedda95371b3c6cc8b1368ac00600a5161882ec166653e35f4a59cbb4cb973e81c5e9c4dcde2a1eb087c53a30dc197186084ae03c5829d024b2cd446036fa8d0a46bcc474f1d5bdafe5e561f33a02859d28f8b3a49ac0d8b8b38971d529272ade0f6fb4cd2e1395137204db1bbf1a44c3fa18f95b636af5da9f597b735b2a80bf1251b373e1290bdc21860425ec6adee927bf5e37211685c146534dbf338d26eda2a40f0af8451a24aa9be6f964ef3353510341fac0acad3cd988c9989c22ac36b49c41adf4fae2a8453f1f2f555a203b4b7c7505605deba6fde444826a9195f2191d2673b61f496358d86de25a82b8dd9cf0d4a229baaabb9581814dbe1131855e62a11ed9ec773289f389125d4a174eec1d089cf1c7ea79cf2f6dab8c4ff015a421d08504dbf823d3b868dd6dea2017fcd112a2e6dfeef1d56535d82dc2455906deffae271d2f3df7a9831dbf2ceb0c2037912f970ebe2ec1e091f2296c5252daeb863718f893f714ee048cd0b3eeea127a5e43540c9a39fd735da1dc65418bbf5c6f035cc5a754bf45c24938f50a91be47817bf0e74306068a987ed969550ff2f6c3193bdfa21a101c5e06f214ad76392596f2a45702eb53eafd91c15a8a79c15b9915b1a948116cb681d9c80bd0a813c65b1666bacfdcc9b9e3151f38f0a30cef66eed3cc33e79647ad805fa547f784d31810b713fa4860755068240bfd65d8161785bc238a4ef97f8dcfe0d86fbcff83ab1fdf32157f7d63d2d34957d8dc7be3ba181fbcf64175fd7b276e6f27d9c0040c8b464467699ea53b983453083d7f9dfb3b79f441fd815ccb749eebf281f94af2b4591346cd303908dd598917d8e6b56eac5bf3d77f554ca09802ce726ad5c6f1fc8b0c57ee50e0a2d0140f35a4c3e7473c6d62cd21ff37b439cb4deb59c69f88c72d2cea6a1203b5f943b5ff415e72cc8351ae9728fb788dc2816f068df8b6ab5dea0498559381f1773e1cf2bce5fde2c516396a84e03f06bcbc062e8492baa70c70a783e76ae839dcf458bae2f9d74a3c4f7296e152ddefcf7fee1218625b1697f5699d7a3ad3f6e11d8692faab83de1065d148a4e4476eb547576f5e691a10d832595063c7b31819f28d1f24493121900ac1ea5aae9c93383d69832458f0e92a660b53e425ca8fd5c8f46140e6f677c2aa9fa7c0420c87862aed20a53e444014f614bfe77f12aa7985d07140e4aa59dca0c045d0b0c94b561760d7f3f5ef426074467d969eb2f83cd7f2e4268ca64c06d883202b96b9be10ba34273285d68a3e0c5c54a297250fe20c0096f228c63dbfd44c6ad203a51165263ec21f88ff9253921fdd59098d6aa72ed3b1e1697eedb4567e0bad43a80ec23b1cf70527343136d1b07368084dd0d311fd91dde101bdf3c2280c432d3d3162c20efa693a8b434b2382789d6beb5cc938d4ee150f257442679773ad9698eaf8f5cafccc104286827768bc9c8fd1d9301fd1c120aa023fc2818a7abd2a498ce015c32522faa457985ada9eb41481a1a2612e1c9003cfdfccf699e2fa3bd34adf8b00ebe6140f073ed6a4e818359264ab92185308bb45d9fc487063a956fcd28b51e58d60d49fba390eb63fc344939c94bdf04d43d7bff7521d6a87e39409ea669c0fccb42a9931924b3feccec0c251e263c27196d0711204325e49e5ff5299aeddfe92903d1b7a86c32b099b1b1c727aee3e07a8c4e7abfe57698f22a5ba256d75a14e87a86b7b78c0ae6c5c8de67822d160c1caec7e609ea99ed262afcc77ac110d57687d69c8eb20bc822e46e3267528c15048ebf71ea4e9caab7405e9bdde384f52e6cbaa735e56fffd172f88101915e877e2ca03179cbbe1fdacdb868e95364e6653eb510ea07a1571d5a554168148d0b62efa44e0a70af1bbf1920451219073467eeb2a57c52684141dde32b468561e0b8779f22f7d102f49cc5f9457bc030176bc12cc2e1c5598e42b6c6f16c5186119d6a1f62fc4faf910ee5fd7cbda0e41149644c0da6d5d715ebdae13efa35b0d40b3aaa25bdc31f2f02ecb58587cdf9467afeb10960818e235c8f899cc2f8f4f4f873a96f82b5718fbca54667299dbb6220d9817581034d5002dd5ade70d5059c7db3df46243fbf0ca03064c073266f8a347a176bc7cfafe316997bfae83aca7ff702ebb29ad378b9e95c368484cb3eae0d9488e5aa0c4c723b5017090dca1fa20bc65b96ed9dc52ad30bf3e4a4b360cfdaf16fb39e94d3f59f5fabc59a082d82c47559954d0d886589f02d6c6d8803349e0ba4d800429839f17eceecd89f68e8855a46f6cbf6caa31aaa6b92bba2352ea1bd9f074a6d5dcbbc9ae38d4778dc43220ce429ebfa6c0560e64e95f3c884d94047b099e8a9f99ad257ff17a2cf82ad12856148dd0f7307b9a90f8f36ab446f354c2b1e132711a0b25c13003fa95329d22f5b51cde888c8b8cc5cb151e151cb01416f4cff6d196dc405df0fb309a290a09bd8f79758accb89427c004830d2d0df2746f96bd83e8bf9ad5683e6af4d88f83c8b37aeecb34e430cc315e8c723f383c8ba941ecc84116a9b245d3368abb93a5c0e47cb20a53e9d97f26ee067df071d927d1223f7848af3b2737611bbbf7d7da2d8799d3782f91f9b262586aadea3099b12e84759d5aa4af82395befa9d08c25e7c8f279ded4f79501aabcf5c94965540027cdc3bf59b16132c6d231929b35a41ee19d3088c37997502cce1ab5f4281d71ccf318c518a5fb628b7a980d4e7c9e495ba0a97c5b9b3f29c1231aa04e99cc42ade9b4551b5e49cd55515978bfde6d46e23ef151bad66aca28ec070c0bfebfff23d162776ca7e7fbec903d8f2ee3521a36c9baefe2853c1819cb0971aecf5eca97ecc6e6e98a66b807636f905de0b894c04bc8b074177af33de50e0f6c886aa46ecb93c1010ddcca9850edcbc1c672c373c4a8f5c40b7b0024efbefcbcc92bcd1904b1870a71cf7766343e6045cbbfcd8a151e20424bb5772e69c8146f4f7940da0484d1b99929a960f5f5129d5a5f54dacbbbf12bf07807ca860fda8aa9c4b43269b730f299f91592776eeffa05db0d7ef1aa165c8a709f8d02084e804a5c9f58caea6fd2c96443a9cd50e2d23b8db6c6adcb9f2db7b8d22963facb572f26dbc96fca2d0b63782df75b199938944e3baf6d565e86c604f2e90f74bc52dba86dcb9904ce1d8484a3ae9079db3e3cbd029dd3783", 0x1000, 0x5087}, {&(0x7f00000003c0)="e5ba8c159549d17f53d9246c32452d715735868e40752742b5fbb7227a683a2a37a8602bce2cba9d8baf7388a409c9f7e2fb14d44105", 0x36, 0x100000001}, {&(0x7f0000000400)="5dd67837a963fd204697c0b6579d806b676bb368e8f7e3faea98f7be9316b6e38301f6447a8f6efed112da5896ea093e3083ccbb8dfc9b5ea556b07ed68345ad9e5f896c793fd17d5a2cddb0110cb7e307ab930e4741b1acc092ff398f56f61c32dac2fae69e2c587b1a800a8bdf0166a67e4393c431a01cc7bd69c147b3b137becac3b4c3b2643cd39e22e190dcb578d06ffde333eaf24a06522eafd2452fe8c9465f9631cb01ff808cbd51aa21ff206fa8a0afc11d847a4d4a161b94", 0xbd, 0x400}], 0x0, &(0x7f0000001700)={[{@fat=@nocase}, {@dots}, {@fat=@gid}, {@dots}, {@nodots}, {@fat=@errors_remount}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'devlink\x00'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@appraise_type}]}) preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x800, 0x0) 00:12:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x4000}) 00:12:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5428, &(0x7f0000000000)) 00:12:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) 00:12:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:12:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18454}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) dup2(r1, r0) clone3(&(0x7f0000000400)={0x200080, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240), {0xe}, &(0x7f0000000280)=""/240, 0xf0, &(0x7f0000000380)=""/58, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f00000005c0)={0x38a, 0x4, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) write(r3, &(0x7f0000000480)="a348dba57c5b2c09f8be53fe92a9f6e84f49dadbb88ac8d238c14d90291deb9fb66b456ee4e09aea1450a306665e89647b226e71a0cbf6dc493cdc88e5d87013196625bb83a9c0d27678b1213fcc4100da625c2101a9301563baf71523e303301dae2c52b095346827be6c5bc13049cdd79bc8c34b96bd2d78ea0fc8d4f0e8645a31f828a9cdeb6ff25cac5db87d46a905bd1b32e45e9f1cd225245cf37e131dafe2363c5192651caabfbe93479e1922ab3ae73aebd9613cca68716e7ca37c7a0c9b6aaa7bfc62a4975cc6d5c617075ea6421a6ce469", 0xd6) 00:12:56 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) [ 2105.127718] blktrace: Concurrent blktraces are not allowed on loop10 [ 2105.141478] blktrace: Concurrent blktraces are not allowed on loop10 00:12:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5429, &(0x7f0000000000)) [ 2105.155089] FAULT_INJECTION: forcing a failure. [ 2105.155089] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2105.157801] CPU: 1 PID: 11175 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2105.159279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2105.161691] Call Trace: [ 2105.162257] dump_stack+0x107/0x163 [ 2105.163033] should_fail.cold+0x5/0xa [ 2105.163854] __alloc_pages_nodemask+0x182/0x680 [ 2105.164854] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2105.166526] ? lock_downgrade+0x6d0/0x6d0 [ 2105.167585] ? do_raw_spin_lock+0x121/0x260 [ 2105.168684] alloc_pages_current+0x187/0x280 [ 2105.169835] __pmd_alloc+0x37/0x5e0 [ 2105.170763] copy_page_range+0x2b18/0x3810 [ 2105.171833] ? lock_chain_count+0x20/0x20 [ 2105.172928] ? up_write+0x191/0x550 [ 2105.173858] ? vm_iomap_memory+0x190/0x190 [ 2105.174929] ? downgrade_write+0x3a0/0x3a0 [ 2105.176006] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2105.177393] ? __vma_link_rb+0x540/0x700 [ 2105.178431] dup_mm+0x8b9/0x1110 [ 2105.179304] ? vm_area_dup+0x290/0x290 [ 2105.180306] ? __raw_spin_lock_init+0x36/0x110 [ 2105.181477] copy_process+0x23f8/0x66f0 [ 2105.182326] ? lock_downgrade+0x6d0/0x6d0 [ 2105.183201] ? __cleanup_sighand+0xb0/0xb0 [ 2105.184109] ? find_held_lock+0x2c/0x110 [ 2105.184989] kernel_clone+0xe7/0xa20 [ 2105.185785] ? lock_downgrade+0x6d0/0x6d0 [ 2105.186674] ? find_held_lock+0x2c/0x110 [ 2105.187535] ? copy_init_mm+0x20/0x20 [ 2105.188346] ? ksys_write+0x12d/0x250 [ 2105.189167] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2105.190208] __do_sys_fork+0x8a/0xc0 [ 2105.190997] ? kernel_clone+0xa20/0xa20 [ 2105.191867] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2105.192985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2105.194114] ? trace_hardirqs_on+0x5b/0x180 [ 2105.195044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2105.196153] do_syscall_64+0x33/0x40 [ 2105.196941] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2105.198041] RIP: 0033:0x7f89b6ef5b19 [ 2105.198832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2105.202713] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2105.204326] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2105.205816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2105.207372] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2105.208848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2105.210404] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:12:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="58090000000000162e2f66696c653000438ff88eebf35faea37834d5c455f74f0532783d8fef455aa43141a087da745726d736ea58100b0e4f2eb8c5fd82a76d8c2b69990ad092bb893f9c381655eaa57534395b74d729d8937539804e2948a3bcf73f01c93e28dde30c9051ac4736c857d5c48d1480c4c92b8d9764bfcd20b7d4daa1e1318fb6dc79827037583ccd7bdd2e6840ff69e298460baf8fd22d6ae8c2acf5bc00e61a04aa4d9dc9140e0c17f7ca936e7f25e533"]) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'L-', 0x4}, 0x16, 0x2) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:12:56 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 00:12:56 executing program 2: socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/raw\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:12:56 executing program 3: fork() (fail_nth: 51) 00:12:56 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:12:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x9903}) 00:12:56 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5437, &(0x7f0000000000)) [ 2105.432304] blktrace: Concurrent blktraces are not allowed on loop10 00:12:56 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x12, 0x101}, 0x14}}, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2105.611290] FAT-fs (loop7): Unrecognized mount option "smackfstransmute=devlink" or missing value [ 2105.692570] FAULT_INJECTION: forcing a failure. [ 2105.692570] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.695557] CPU: 0 PID: 11207 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2105.697290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2105.700030] Call Trace: [ 2105.700660] dump_stack+0x107/0x163 [ 2105.701572] should_fail.cold+0x5/0xa [ 2105.702510] ? __pmd_alloc+0x94/0x5e0 [ 2105.703505] should_failslab+0x5/0x10 [ 2105.704419] kmem_cache_alloc+0x5b/0x350 [ 2105.705421] __pmd_alloc+0x94/0x5e0 [ 2105.706314] copy_page_range+0x2b18/0x3810 [ 2105.707372] ? up_write+0x191/0x550 [ 2105.708244] ? vm_iomap_memory+0x190/0x190 [ 2105.709273] ? downgrade_write+0x3a0/0x3a0 [ 2105.710302] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2105.711598] ? __vma_link_rb+0x540/0x700 [ 2105.712586] dup_mm+0x8b9/0x1110 [ 2105.713433] ? vm_area_dup+0x290/0x290 [ 2105.714382] ? __raw_spin_lock_init+0x36/0x110 [ 2105.715497] copy_process+0x23f8/0x66f0 [ 2105.716465] ? lock_downgrade+0x6d0/0x6d0 [ 2105.717513] ? __cleanup_sighand+0xb0/0xb0 [ 2105.718559] ? find_held_lock+0x2c/0x110 [ 2105.719546] kernel_clone+0xe7/0xa20 [ 2105.720451] ? lock_downgrade+0x6d0/0x6d0 [ 2105.721396] ? find_held_lock+0x2c/0x110 [ 2105.722404] ? copy_init_mm+0x20/0x20 [ 2105.723334] ? ksys_write+0x12d/0x250 [ 2105.724262] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2105.725453] __do_sys_fork+0x8a/0xc0 [ 2105.726363] ? kernel_clone+0xa20/0xa20 [ 2105.727348] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2105.728614] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2105.729901] ? trace_hardirqs_on+0x5b/0x180 [ 2105.730954] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2105.732196] do_syscall_64+0x33/0x40 [ 2105.733098] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2105.734366] RIP: 0033:0x7f89b6ef5b19 [ 2105.735282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2105.739774] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2105.741633] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2105.743383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2105.745141] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2105.746902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2105.748637] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2105.886364] FAT-fs (loop7): Unrecognized mount option "smackfstransmute=devlink" or missing value 00:12:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5441, &(0x7f0000000000)) 00:12:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0xc, 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)='veth0_to_bond\x00', 0x0, 0x3a0, 0xfff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) dup3(r0, r2, 0x0) 00:12:57 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:12:57 executing program 1: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) 00:12:57 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2}) 00:12:57 executing program 3: fork() (fail_nth: 52) 00:12:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x4, 0x8, 0xf8, 0x0, 0x0, 0x20080, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x2000, 0x2, 0xda9e00, 0x1, 0x200, 0x4, 0x0, 0x0, 0x2, 0x0, 0xaf6}, 0x0, 0xf, r1, 0x19) [ 2106.247272] FAULT_INJECTION: forcing a failure. [ 2106.247272] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.250160] CPU: 0 PID: 11229 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2106.251772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2106.254284] Call Trace: [ 2106.254881] dump_stack+0x107/0x163 [ 2106.255673] should_fail.cold+0x5/0xa [ 2106.256513] ? create_object.isra.0+0x3a/0xa20 [ 2106.257540] should_failslab+0x5/0x10 [ 2106.258403] kmem_cache_alloc+0x5b/0x350 [ 2106.259331] create_object.isra.0+0x3a/0xa20 [ 2106.260311] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2106.261472] kmem_cache_alloc+0x159/0x350 [ 2106.262406] __pmd_alloc+0x94/0x5e0 [ 2106.263239] copy_page_range+0x2b18/0x3810 [ 2106.264180] ? lock_chain_count+0x20/0x20 [ 2106.265159] ? up_write+0x191/0x550 [ 2106.265979] ? vm_iomap_memory+0x190/0x190 [ 2106.266932] ? downgrade_write+0x3a0/0x3a0 [ 2106.267875] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2106.269082] ? __vma_link_rb+0x540/0x700 [ 2106.270005] dup_mm+0x8b9/0x1110 [ 2106.270768] ? vm_area_dup+0x290/0x290 [ 2106.271642] ? __raw_spin_lock_init+0x36/0x110 [ 2106.272663] copy_process+0x23f8/0x66f0 [ 2106.273565] ? lock_downgrade+0x6d0/0x6d0 [ 2106.274508] ? __cleanup_sighand+0xb0/0xb0 [ 2106.275473] ? find_held_lock+0x2c/0x110 [ 2106.276404] kernel_clone+0xe7/0xa20 [ 2106.277251] ? lock_downgrade+0x6d0/0x6d0 [ 2106.278169] ? find_held_lock+0x2c/0x110 [ 2106.279082] ? copy_init_mm+0x20/0x20 [ 2106.279928] ? ksys_write+0x12d/0x250 [ 2106.280783] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2106.281875] __do_sys_fork+0x8a/0xc0 [ 2106.282689] ? kernel_clone+0xa20/0xa20 [ 2106.283591] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2106.284758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.285930] ? trace_hardirqs_on+0x5b/0x180 [ 2106.286903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.288108] do_syscall_64+0x33/0x40 [ 2106.289156] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2106.290555] RIP: 0033:0x7f89b6ef5b19 [ 2106.291536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2106.295660] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2106.297378] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2106.298985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2106.300579] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2106.302189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2106.303775] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2119.214632] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:13:18 executing program 3: fork() (fail_nth: 53) 00:13:18 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3) 00:13:18 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5450, &(0x7f0000000000)) 00:13:18 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0x114}], 0x1, 0xe720, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f00000006c0)=""/142, 0x8e}], 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pread64(r2, &(0x7f0000000780)=""/115, 0x73, 0x7) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000180)='wchan\x00') fcntl$setsig(r1, 0xa, 0x3b) syz_io_uring_setup(0x1e6d, &(0x7f00000003c0)={0x0, 0x20e1c1, 0x20, 0x0, 0x48}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)) syz_mount_image$nfs(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x8001, 0x2, &(0x7f0000000600)=[{&(0x7f0000000540)="a6e3439664335af4e979b6ef8e445a1a6582a7e23615463b176dad0bd26abdc13a83e72c4338fcc4cb95623b92562f4e7c992b61", 0x34, 0x80000000}, {&(0x7f00000005c0)="24040575dc463ed731416edc6271ec454635e683d50d3805be394c75c35fc3ac28b2e3ca6c0c8cdf706a2ef38625533a6914dd15529acf4c37", 0x39, 0xdc336ff}], 0x102000, &(0x7f0000000640)={[{'wchan\x00'}, {'{@\x04\\'}, {}], [{@uid_lt={'uid<', 0xee00}}, {@fsname={'fsname', 0x3d, '/dev/hpet\x00'}}]}) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) pidfd_getfd(r4, r4, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:13:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0xc, 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)='veth0_to_bond\x00', 0x0, 0x3a0, 0xfff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) dup3(r0, r2, 0x0) 00:13:18 executing program 1: sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x34}, @val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000040}, 0x90) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x90, r1, 0x200, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x4a}}}}, [@NL80211_ATTR_IE={0x5b, 0x2a, [@preq={0x82, 0x36, @ext={{0x0, 0x0, 0x1}, 0x9, 0x3, 0x6, @device_a, 0x7ff, @device_a, 0xffff, 0x1000, 0x2, [{{0x1}, @device_b, 0xfffffffe}, {{0x0, 0x0, 0x1}, @device_a, 0x3f}]}}, @cf={0x4, 0x6, {0x7f, 0x8, 0x3f, 0x7}}, @rann={0x7e, 0x15, {{0x1}, 0xff, 0x8, @device_a, 0x6ff3, 0x2, 0x3}}]}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x3b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000814) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000140)) 00:13:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4}) 00:13:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @empty}, {0x2, 0x4e21, @remote}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x969, 0x3, 0x6}) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2127.080689] blktrace: Concurrent blktraces are not allowed on loop10 [ 2127.135339] FAULT_INJECTION: forcing a failure. [ 2127.135339] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.137797] CPU: 1 PID: 11251 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2127.139259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2127.141652] Call Trace: [ 2127.142211] dump_stack+0x107/0x163 [ 2127.142983] should_fail.cold+0x5/0xa [ 2127.143782] ? create_object.isra.0+0x3a/0xa20 [ 2127.144743] should_failslab+0x5/0x10 [ 2127.145571] kmem_cache_alloc+0x5b/0x350 [ 2127.146437] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2127.147702] create_object.isra.0+0x3a/0xa20 [ 2127.148631] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2127.149717] kmem_cache_alloc+0x159/0x350 [ 2127.150604] ptlock_alloc+0x1d/0x70 [ 2127.151367] pte_alloc_one+0x68/0x190 [ 2127.152159] __pte_alloc+0x1d/0x320 [ 2127.152926] copy_page_range+0x1a1d/0x3810 [ 2127.153827] ? SOFTIRQ_verbose+0x10/0x10 [ 2127.154670] ? lock_chain_count+0x20/0x20 [ 2127.155577] ? up_write+0x191/0x550 [ 2127.156351] ? vm_iomap_memory+0x190/0x190 [ 2127.157232] ? downgrade_write+0x3a0/0x3a0 [ 2127.158145] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2127.159277] ? __vma_link_rb+0x540/0x700 [ 2127.160145] dup_mm+0x8b9/0x1110 [ 2127.160867] ? vm_area_dup+0x290/0x290 [ 2127.161723] ? __raw_spin_lock_init+0x36/0x110 [ 2127.162711] copy_process+0x23f8/0x66f0 [ 2127.163574] ? lock_downgrade+0x6d0/0x6d0 [ 2127.164476] ? __cleanup_sighand+0xb0/0xb0 [ 2127.165393] ? find_held_lock+0x2c/0x110 [ 2127.166275] kernel_clone+0xe7/0xa20 [ 2127.167070] ? lock_downgrade+0x6d0/0x6d0 [ 2127.167951] ? find_held_lock+0x2c/0x110 [ 2127.168817] ? copy_init_mm+0x20/0x20 [ 2127.169654] ? ksys_write+0x12d/0x250 [ 2127.170480] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2127.171519] __do_sys_fork+0x8a/0xc0 [ 2127.172331] ? kernel_clone+0xa20/0xa20 [ 2127.173196] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2127.174326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2127.175424] ? trace_hardirqs_on+0x5b/0x180 [ 2127.176349] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2127.177469] do_syscall_64+0x33/0x40 [ 2127.178264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2127.179362] RIP: 0033:0x7f89b6ef5b19 [ 2127.180159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2127.184137] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2127.185787] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2127.187325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2127.188866] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2127.190420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2127.191945] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2139.454935] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:13:38 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300) 00:13:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5451, &(0x7f0000000000)) 00:13:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4205}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0xa08880, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none}]}}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup(r2) 00:13:38 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 00:13:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x20}}, './file0\x00'}) openat(r1, &(0x7f0000000180)='./file0\x00', 0x424406, 0x80) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:13:38 executing program 3: fork() (fail_nth: 54) 00:13:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xa}) 00:13:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0xfc) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x901, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000140)={0x8, 0x4, {0x5, @usage=0x9, 0x0, 0x6, 0x2, 0x7, 0x100, 0x1, 0x82, @usage=0x6, 0x4, 0x0, [0x0, 0x4, 0x7, 0x5, 0x4, 0x5]}, {0x3, @struct={0x58, 0x4c9c}, 0x0, 0x80000001, 0x7f, 0xfffffffffffeffff, 0x3, 0x0, 0x401, @usage=0x1, 0x40, 0x7fffffff, [0x5, 0x6, 0x5, 0x5, 0x8000, 0x5]}, {0x1, @usage=0x5, 0x0, 0x7b2, 0x4, 0x9, 0x8001, 0x4, 0x7d, @usage=0x800, 0x1, 0x6, [0x1b3600000000000, 0xffffffffffffff00, 0x7fff, 0xfb4, 0x7fffffff, 0x1]}, {0x377, 0x9, 0x4}}) [ 2146.686216] FAULT_INJECTION: forcing a failure. [ 2146.686216] name failslab, interval 1, probability 0, space 0, times 0 [ 2146.688805] CPU: 0 PID: 11283 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2146.690347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2146.692793] Call Trace: [ 2146.693361] dump_stack+0x107/0x163 [ 2146.694166] should_fail.cold+0x5/0xa [ 2146.694986] ? create_object.isra.0+0x3a/0xa20 [ 2146.695964] should_failslab+0x5/0x10 [ 2146.696782] kmem_cache_alloc+0x5b/0x350 [ 2146.697655] create_object.isra.0+0x3a/0xa20 [ 2146.698621] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2146.699892] kmem_cache_alloc+0x159/0x350 [ 2146.700921] __pmd_alloc+0x94/0x5e0 [ 2146.701835] copy_page_range+0x2b18/0x3810 [ 2146.702878] ? lock_chain_count+0x20/0x20 [ 2146.703944] ? up_write+0x191/0x550 [ 2146.704833] ? vm_iomap_memory+0x190/0x190 [ 2146.705890] ? downgrade_write+0x3a0/0x3a0 [ 2146.706929] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2146.708264] ? __vma_link_rb+0x540/0x700 [ 2146.709282] dup_mm+0x8b9/0x1110 [ 2146.710154] ? vm_area_dup+0x290/0x290 [ 2146.711122] ? __raw_spin_lock_init+0x36/0x110 [ 2146.712256] copy_process+0x23f8/0x66f0 [ 2146.713234] ? lock_downgrade+0x6d0/0x6d0 [ 2146.714284] ? __cleanup_sighand+0xb0/0xb0 [ 2146.715334] ? find_held_lock+0x2c/0x110 [ 2146.716332] kernel_clone+0xe7/0xa20 [ 2146.717246] ? lock_downgrade+0x6d0/0x6d0 [ 2146.718265] ? find_held_lock+0x2c/0x110 [ 2146.719261] ? copy_init_mm+0x20/0x20 [ 2146.720207] ? ksys_write+0x12d/0x250 [ 2146.721151] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2146.722361] __do_sys_fork+0x8a/0xc0 [ 2146.723270] ? kernel_clone+0xa20/0xa20 [ 2146.724263] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2146.725550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2146.726835] ? trace_hardirqs_on+0x5b/0x180 [ 2146.727896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2146.729159] do_syscall_64+0x33/0x40 [ 2146.730092] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2146.731344] RIP: 0033:0x7f89b6ef5b19 [ 2146.732256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2146.736765] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2146.738637] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2146.740383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2146.742139] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2146.743881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2146.745630] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:13:38 executing program 1: ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:13:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5452, &(0x7f0000000000)) 00:13:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x399}) 00:13:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:13:38 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000) 00:13:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x545d, &(0x7f0000000000)) 00:13:38 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) 00:13:38 executing program 3: fork() (fail_nth: 55) 00:13:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat(r1, &(0x7f0000000180)='./file0\x00', 0x400402, 0x10) [ 2147.284121] FAULT_INJECTION: forcing a failure. [ 2147.284121] name failslab, interval 1, probability 0, space 0, times 0 [ 2147.287184] CPU: 1 PID: 11315 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2147.288950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2147.291835] Call Trace: [ 2147.292510] dump_stack+0x107/0x163 [ 2147.293438] should_fail.cold+0x5/0xa [ 2147.294422] ? create_object.isra.0+0x3a/0xa20 [ 2147.295579] should_failslab+0x5/0x10 [ 2147.296423] kmem_cache_alloc+0x5b/0x350 [ 2147.297282] create_object.isra.0+0x3a/0xa20 [ 2147.298226] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2147.299287] kmem_cache_alloc+0x159/0x350 [ 2147.300164] vm_area_dup+0x78/0x290 [ 2147.300939] ? _cond_resched+0x12/0x80 [ 2147.301763] ? copy_page_range+0x242d/0x3810 [ 2147.302715] ? vm_area_alloc+0x110/0x110 [ 2147.303567] ? up_write+0x191/0x550 [ 2147.304329] ? vm_iomap_memory+0x190/0x190 [ 2147.305216] ? downgrade_write+0x3a0/0x3a0 [ 2147.306126] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2147.307261] ? __vma_link_rb+0x540/0x700 [ 2147.308118] dup_mm+0x44d/0x1110 [ 2147.308863] ? vm_area_dup+0x290/0x290 [ 2147.309694] ? __raw_spin_lock_init+0x36/0x110 [ 2147.310728] copy_process+0x23f8/0x66f0 [ 2147.311569] ? lock_downgrade+0x6d0/0x6d0 [ 2147.312492] ? __cleanup_sighand+0xb0/0xb0 [ 2147.313388] ? find_held_lock+0x2c/0x110 [ 2147.314302] kernel_clone+0xe7/0xa20 [ 2147.315082] ? lock_downgrade+0x6d0/0x6d0 [ 2147.315995] ? find_held_lock+0x2c/0x110 [ 2147.316849] ? copy_init_mm+0x20/0x20 [ 2147.317710] ? ksys_write+0x12d/0x250 [ 2147.318520] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2147.319566] __do_sys_fork+0x8a/0xc0 [ 2147.320353] ? kernel_clone+0xa20/0xa20 [ 2147.321221] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2147.322334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2147.323432] ? trace_hardirqs_on+0x5b/0x180 [ 2147.324344] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2147.325450] do_syscall_64+0x33/0x40 [ 2147.326245] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2147.327356] RIP: 0033:0x7f89b6ef5b19 [ 2147.328142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2147.332129] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2147.333739] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2147.335277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2147.336809] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2147.338364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2147.339912] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2159.142775] kmemleak: 70 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:13:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5460, &(0x7f0000000000)) 00:13:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xa00}) 00:13:59 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 00:13:59 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x2002, 0x9, 0x7f}) 00:13:59 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:13:59 executing program 3: fork() (fail_nth: 56) 00:13:59 executing program 7: r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{0x8, 0x3, 0x8}, {0xef72, 0x1, 0x20, 0x401}]}) pread64(r3, &(0x7f00000001c0)=""/187, 0xbb, 0x4000000000) 00:13:59 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000) 00:13:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5601, &(0x7f0000000000)) [ 2167.945870] blktrace: Concurrent blktraces are not allowed on loop10 [ 2167.984609] FAULT_INJECTION: forcing a failure. [ 2167.984609] name failslab, interval 1, probability 0, space 0, times 0 [ 2167.987485] CPU: 0 PID: 11339 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2167.989124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2167.991571] Call Trace: [ 2167.992151] dump_stack+0x107/0x163 [ 2167.992932] should_fail.cold+0x5/0xa [ 2167.993751] ? vm_area_dup+0x78/0x290 [ 2167.994583] should_failslab+0x5/0x10 [ 2167.995412] kmem_cache_alloc+0x5b/0x350 [ 2167.996297] vm_area_dup+0x78/0x290 [ 2167.997094] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 2167.998114] ? lock_downgrade+0x6d0/0x6d0 [ 2167.999006] ? copy_page_range+0x242d/0x3810 [ 2167.999970] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 2168.000982] ? avc_has_extended_perms+0xec0/0xec0 [ 2168.002035] ? vm_area_alloc+0x110/0x110 [ 2168.002919] ? selinux_vm_enough_memory+0x10f/0x170 [ 2168.004012] ? selinux_sb_statfs+0x250/0x250 [ 2168.004962] ? percpu_counter_add_batch+0x8b/0x130 [ 2168.006041] ? __vm_enough_memory+0x184/0x360 [ 2168.007006] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2168.008118] dup_mm+0x44d/0x1110 [ 2168.008862] ? vm_area_dup+0x290/0x290 [ 2168.009704] ? __raw_spin_lock_init+0x36/0x110 [ 2168.010700] copy_process+0x23f8/0x66f0 [ 2168.011559] ? lock_downgrade+0x6d0/0x6d0 [ 2168.012469] ? __cleanup_sighand+0xb0/0xb0 [ 2168.013395] ? find_held_lock+0x2c/0x110 [ 2168.014304] kernel_clone+0xe7/0xa20 [ 2168.015109] ? lock_downgrade+0x6d0/0x6d0 [ 2168.016001] ? find_held_lock+0x2c/0x110 [ 2168.016877] ? copy_init_mm+0x20/0x20 00:13:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000}) [ 2168.017702] ? ksys_write+0x12d/0x250 [ 2168.018688] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2168.019736] __do_sys_fork+0x8a/0xc0 [ 2168.020536] ? kernel_clone+0xa20/0xa20 [ 2168.021412] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2168.022572] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2168.023687] ? trace_hardirqs_on+0x5b/0x180 [ 2168.024635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2168.025748] do_syscall_64+0x33/0x40 [ 2168.026561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2168.027672] RIP: 0033:0x7f89b6ef5b19 [ 2168.028478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2168.032472] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2168.034132] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2168.035683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2168.037225] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2168.038781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2168.040323] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:13:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TCFLSH(r1, 0x540b, 0x0) 00:13:59 executing program 3: fork() (fail_nth: 57) 00:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:13:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5602, &(0x7f0000000000)) 00:13:59 executing program 7: getpid() r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x72, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200000}, r1, 0xd, 0xffffffffffffffff, 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r4, 0x40bc5311, &(0x7f0000000180)={0xffffff00, 0x1, 'client0\x00', 0xffffffff80000003, "b8779a4c6875a7ed", "78cb50ccb201e803c1df893e305a87c614cb51f70d7bbbeb3a2f56bb62aa786b", 0x8a30, 0x3}) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:13:59 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$KDDISABIO(r0, 0x4b37) 00:13:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) [ 2168.349304] FAULT_INJECTION: forcing a failure. [ 2168.349304] name failslab, interval 1, probability 0, space 0, times 0 [ 2168.352044] CPU: 0 PID: 11359 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2168.353607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2168.356131] Call Trace: [ 2168.356708] dump_stack+0x107/0x163 [ 2168.357491] should_fail.cold+0x5/0xa [ 2168.358334] ? create_object.isra.0+0x3a/0xa20 [ 2168.359328] should_failslab+0x5/0x10 [ 2168.360144] kmem_cache_alloc+0x5b/0x350 [ 2168.361023] create_object.isra.0+0x3a/0xa20 [ 2168.361969] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2168.363066] kmem_cache_alloc+0x159/0x350 [ 2168.363959] vm_area_dup+0x78/0x290 [ 2168.364756] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 2168.365760] ? lock_downgrade+0x6d0/0x6d0 [ 2168.366664] ? copy_page_range+0x242d/0x3810 [ 2168.367617] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 2168.368623] ? avc_has_extended_perms+0xec0/0xec0 [ 2168.369660] ? vm_area_alloc+0x110/0x110 [ 2168.370557] ? selinux_vm_enough_memory+0x10f/0x170 [ 2168.371633] ? selinux_sb_statfs+0x250/0x250 [ 2168.372588] ? percpu_counter_add_batch+0x8b/0x130 [ 2168.373643] ? __vm_enough_memory+0x184/0x360 [ 2168.374629] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2168.375728] dup_mm+0x44d/0x1110 [ 2168.376469] ? vm_area_dup+0x290/0x290 [ 2168.377311] ? __raw_spin_lock_init+0x36/0x110 [ 2168.378299] copy_process+0x23f8/0x66f0 [ 2168.379159] ? lock_downgrade+0x6d0/0x6d0 [ 2168.380067] ? __cleanup_sighand+0xb0/0xb0 [ 2168.380977] ? find_held_lock+0x2c/0x110 [ 2168.381855] kernel_clone+0xe7/0xa20 [ 2168.382654] ? lock_downgrade+0x6d0/0x6d0 [ 2168.383540] ? find_held_lock+0x2c/0x110 [ 2168.384404] ? copy_init_mm+0x20/0x20 [ 2168.385220] ? ksys_write+0x12d/0x250 [ 2168.386059] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2168.387100] __do_sys_fork+0x8a/0xc0 [ 2168.387897] ? kernel_clone+0xa20/0xa20 [ 2168.388758] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2168.389872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2168.390977] ? trace_hardirqs_on+0x5b/0x180 [ 2168.391900] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2168.393001] do_syscall_64+0x33/0x40 [ 2168.393793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2168.394915] RIP: 0033:0x7f89b6ef5b19 [ 2168.395724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2168.399744] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2168.401382] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2168.403058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2168.404566] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2168.406080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2168.407609] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:13:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2180.731514] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:14:19 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000) 00:14:19 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x9903}) 00:14:19 executing program 1: ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000140)="8958e4ab093dab909a7fddd111e42982e2696b8ffbd26520305b35853f8526abea3dde33c3646e56c985e0e9f4a55fdd4d9510df7b4c6e45d4f5666ccfb7d73ffcacf56f3658eeffb1320ef69a463f9e982ffd9d10fdca6a4a71f7ca0ba7aa7309e5172798bc59ee17fbb3a50f24317d91907d0ff900694e3776952f96114da53ead5f64efe78e0ec647ce32ebce78c45cb97e4d78bd727d612b4513f9d890") sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0xa, 0x0, 0x4}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:14:19 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext={0x5, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180), 0x47, 0x202000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x4, 0x9, 0xfff, 0xffffffffffffffbc}) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000100)={@broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x32}}, 0xc) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:19 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) 00:14:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5605, &(0x7f0000000000)) 00:14:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x6}, 0x1ca10, 0x2, 0x3f, 0x0, 0xa, 0xd953}, 0xffffffffffffffff, 0xffffffffffffffe2, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:14:19 executing program 3: fork() (fail_nth: 58) [ 2188.544921] blktrace: Concurrent blktraces are not allowed on loop10 00:14:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000080)) [ 2188.619289] FAULT_INJECTION: forcing a failure. [ 2188.619289] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.623606] CPU: 0 PID: 11392 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2188.625222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2188.627791] Call Trace: [ 2188.628378] dump_stack+0x107/0x163 [ 2188.629192] should_fail.cold+0x5/0xa [ 2188.630050] ? anon_vma_clone+0xdc/0x580 [ 2188.630971] should_failslab+0x5/0x10 [ 2188.631838] kmem_cache_alloc+0x5b/0x350 [ 2188.632761] anon_vma_clone+0xdc/0x580 [ 2188.633658] anon_vma_fork+0x82/0x630 [ 2188.634522] ? __vm_enough_memory+0x184/0x360 [ 2188.635565] dup_mm+0x861/0x1110 [ 2188.636312] ? vm_area_dup+0x290/0x290 [ 2188.637192] ? __raw_spin_lock_init+0x36/0x110 [ 2188.638188] copy_process+0x23f8/0x66f0 [ 2188.639104] ? lock_downgrade+0x6d0/0x6d0 [ 2188.640013] ? __cleanup_sighand+0xb0/0xb0 [ 2188.640933] ? find_held_lock+0x2c/0x110 [ 2188.641816] kernel_clone+0xe7/0xa20 [ 2188.642650] ? lock_downgrade+0x6d0/0x6d0 [ 2188.643539] ? find_held_lock+0x2c/0x110 [ 2188.644414] ? copy_init_mm+0x20/0x20 [ 2188.645239] ? ksys_write+0x12d/0x250 [ 2188.646070] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2188.647135] __do_sys_fork+0x8a/0xc0 [ 2188.647944] ? kernel_clone+0xa20/0xa20 [ 2188.648833] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2188.649983] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2188.651116] ? trace_hardirqs_on+0x5b/0x180 [ 2188.652062] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2188.653186] do_syscall_64+0x33/0x40 [ 2188.654003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2188.655141] RIP: 0033:0x7f89b6ef5b19 [ 2188.655958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2188.660013] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2188.661684] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2188.663287] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2188.664861] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2188.666442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2188.668015] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:14:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) openat2(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x424181, 0x0, 0xb}, 0x18) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x64, 0x1, 0x1, 0x3, 0x0, 0x9e0, 0x26042, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x12}, 0x1c800, 0x5419, 0x81, 0x8, 0x0, 0xffff, 0xfff7, 0x0, 0x40, 0x0, 0x100}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) 00:14:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5606, &(0x7f0000000000)) 00:14:20 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x1000000}) 00:14:20 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:14:20 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0xffffffffffff8001) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/usb_storage', 0x200, 0x11) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) [ 2200.929898] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:14:40 executing program 3: fork() (fail_nth: 59) 00:14:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x9, 0x0, 0x0, 0x80002, 0xe0100, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7, 0x4, @perf_config_ext={0x3f, 0x80000006}, 0x408c3, 0x1, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:40 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3000000) 00:14:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:14:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2000000}) 00:14:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7, 0x7, 0x6, 0x1f, 0x0, 0x100000001, 0x80210, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0x80}, 0x200, 0x2, 0xad7a, 0x4, 0x6, 0x3ff, 0x7, 0x0, 0x7, 0x0, 0x60000000}, 0x0, 0x5, 0xffffffffffffffff, 0xb) 00:14:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5607, &(0x7f0000000000)) [ 2209.128869] blktrace: Concurrent blktraces are not allowed on loop10 00:14:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5608, &(0x7f0000000000)) [ 2209.177584] FAULT_INJECTION: forcing a failure. [ 2209.177584] name failslab, interval 1, probability 0, space 0, times 0 [ 2209.180133] CPU: 1 PID: 11431 Comm: syz-executor.3 Not tainted 5.10.123 #1 00:14:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2209.181668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2209.184314] Call Trace: [ 2209.185114] dump_stack+0x107/0x163 [ 2209.186117] should_fail.cold+0x5/0xa [ 2209.187076] ? create_object.isra.0+0x3a/0xa20 [ 2209.188091] should_failslab+0x5/0x10 [ 2209.188934] kmem_cache_alloc+0x5b/0x350 [ 2209.189837] create_object.isra.0+0x3a/0xa20 [ 2209.190975] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2209.192391] kmem_cache_alloc+0x159/0x350 [ 2209.193433] anon_vma_clone+0xdc/0x580 [ 2209.194593] anon_vma_fork+0x82/0x630 [ 2209.195455] ? __vm_enough_memory+0x184/0x360 [ 2209.196640] dup_mm+0x861/0x1110 [ 2209.197567] ? vm_area_dup+0x290/0x290 [ 2209.198570] ? __raw_spin_lock_init+0x36/0x110 [ 2209.199892] copy_process+0x23f8/0x66f0 [ 2209.200890] ? lock_downgrade+0x6d0/0x6d0 [ 2209.202002] ? __cleanup_sighand+0xb0/0xb0 [ 2209.203052] ? find_held_lock+0x2c/0x110 [ 2209.203969] kernel_clone+0xe7/0xa20 [ 2209.204902] ? lock_downgrade+0x6d0/0x6d0 [ 2209.205817] ? find_held_lock+0x2c/0x110 [ 2209.206723] ? copy_init_mm+0x20/0x20 [ 2209.207568] ? ksys_write+0x12d/0x250 [ 2209.208587] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2209.209736] __do_sys_fork+0x8a/0xc0 [ 2209.210569] ? kernel_clone+0xa20/0xa20 [ 2209.211466] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2209.212857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2209.214201] ? trace_hardirqs_on+0x5b/0x180 [ 2209.215315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2209.216405] do_syscall_64+0x33/0x40 [ 2209.217349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2209.218615] RIP: 0033:0x7f89b6ef5b19 [ 2209.219667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2209.224422] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2209.226269] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2209.227958] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2209.229447] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2209.231065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2209.232809] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:14:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5609, &(0x7f0000000000)) [ 2220.526389] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:14:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x85, 0x400}) 00:14:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000100), 0x2, 0x0) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/233, 0xe9}, {&(0x7f00000003c0)=""/21, 0x15}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f00000004c0)=""/175, 0xaf}, {&(0x7f00000005c0)=""/35, 0x23}, {&(0x7f0000000600)=""/2, 0x2}, {&(0x7f0000000640)=""/41, 0x29}], 0x9) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000740)={0x0, 0x8001, 0x1, [0x4, 0x8000, 0x0, 0xebdb, 0x423], [0xe381, 0x3ff, 0x9, 0x4, 0xd837, 0x9, 0x9, 0x8, 0xfff, 0xded3, 0x6, 0x7, 0x10000, 0x3, 0x8, 0x8, 0xaef, 0x8, 0x80000001, 0x9ea, 0x1, 0x5, 0xea, 0x40, 0x2, 0x4, 0x6, 0x37, 0x1, 0x3, 0x6, 0x7, 0x8, 0xfffffffffffffffa, 0x7fff, 0x1, 0x2, 0x6, 0x8000, 0xf9c, 0x9, 0x80000001, 0x401, 0x9, 0x6, 0xb9, 0x9, 0x342, 0x6, 0x80, 0x599, 0x9, 0x7, 0x7f, 0xffc0000000000000, 0xa, 0x0, 0x40, 0x8, 0x0, 0x6, 0x6, 0x7, 0x20, 0x800, 0x80000001, 0x8, 0x7b, 0x401, 0x4, 0x1ff, 0x6, 0x2a, 0x9, 0x1, 0x8, 0xfffffffffffffff9, 0x9d15, 0x4, 0x974, 0x6, 0x4, 0xc0, 0xffffffff, 0x628, 0xfffffffffffffffc, 0x8, 0x6, 0x200, 0x8, 0x1, 0x9, 0x8, 0x4, 0x9, 0x7, 0x1000, 0x2, 0x4, 0x8df9, 0x1, 0x3, 0x6, 0x20, 0x9, 0x20, 0x3, 0x5, 0x9, 0x678b, 0x7, 0x8, 0x7, 0x80000001, 0xffffffffffffffff, 0x40, 0x20, 0x9, 0x1, 0x2, 0x1000]}) 00:14:57 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000000}) 00:14:57 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000000) 00:14:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) close_range(r0, r1, 0x0) socket$inet(0x2, 0xa, 0x0) syz_io_uring_setup(0x2316, &(0x7f0000000180)={0x0, 0x5918, 0x20, 0x3, 0x2f1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560a, &(0x7f0000000000)) 00:14:57 executing program 3: fork() (fail_nth: 60) [ 2226.373032] blktrace: Concurrent blktraces are not allowed on loop10 00:14:57 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0xffc9, 0xf4b}) [ 2226.459337] FAULT_INJECTION: forcing a failure. [ 2226.459337] name failslab, interval 1, probability 0, space 0, times 0 [ 2226.461538] CPU: 0 PID: 11471 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2226.462909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2226.465009] Call Trace: [ 2226.465507] dump_stack+0x107/0x163 [ 2226.466176] should_fail.cold+0x5/0xa [ 2226.466913] ? anon_vma_fork+0xed/0x630 [ 2226.467649] should_failslab+0x5/0x10 [ 2226.468352] kmem_cache_alloc+0x5b/0x350 [ 2226.469112] anon_vma_fork+0xed/0x630 [ 2226.469817] ? __vm_enough_memory+0x184/0x360 [ 2226.470650] dup_mm+0x861/0x1110 [ 2226.471291] ? vm_area_dup+0x290/0x290 [ 2226.472026] ? __raw_spin_lock_init+0x36/0x110 [ 2226.472855] copy_process+0x23f8/0x66f0 [ 2226.473613] ? lock_downgrade+0x6d0/0x6d0 [ 2226.474376] ? __cleanup_sighand+0xb0/0xb0 [ 2226.475200] ? find_held_lock+0x2c/0x110 [ 2226.475938] kernel_clone+0xe7/0xa20 [ 2226.476641] ? lock_downgrade+0x6d0/0x6d0 [ 2226.477385] ? find_held_lock+0x2c/0x110 [ 2226.478122] ? copy_init_mm+0x20/0x20 [ 2226.478842] ? ksys_write+0x12d/0x250 [ 2226.479541] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2226.480423] __do_sys_fork+0x8a/0xc0 [ 2226.481097] ? kernel_clone+0xa20/0xa20 [ 2226.481834] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2226.482797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2226.483721] ? trace_hardirqs_on+0x5b/0x180 [ 2226.484512] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2226.485437] do_syscall_64+0x33/0x40 [ 2226.486113] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2226.487052] RIP: 0033:0x7f89b6ef5b19 [ 2226.487728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2226.491066] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2226.492447] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2226.493729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2226.495034] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2226.496376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2226.497663] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:14:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560b, &(0x7f0000000000)) 00:14:57 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:14:57 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xa000000}) 00:14:57 executing program 3: fork() (fail_nth: 61) 00:14:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_io_uring_setup(0x481e, &(0x7f0000000240)={0x0, 0xf6bc, 0x8, 0x0, 0x3e, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) r2 = dup2(r0, r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xb09, 0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000180)={0x7, 0x80, 0x81, 0x3, 0x8, 0x24, 0x0, 0x7ae8, 0x2, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000100), 0xe}, 0x20, 0x7f, 0x0, 0x0, 0x56c3, 0x40, 0x4, 0x0, 0xfffffffb, 0x0, 0x3}, 0xffffffffffffffff, 0xf, r5, 0x1) clock_gettime(0x0, &(0x7f0000003880)={0x0, 0x0}) recvmmsg$unix(r5, &(0x7f0000003640)=[{{&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000980)=""/190, 0xbe}], 0x1, &(0x7f0000000a80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000000b40), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000bc0)=""/198, 0xc6}], 0x1}}, {{&(0x7f0000000d00)=@abs, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000d80)=""/194, 0xc2}], 0x1, &(0x7f0000000ec0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{&(0x7f0000000fc0)=@abs, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000001040)=""/104, 0x68}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001100)=""/203, 0xcb}, {&(0x7f0000001200)=""/135, 0x87}, {&(0x7f00000012c0)=""/154, 0x9a}, {&(0x7f0000001380)=""/149, 0x95}, {&(0x7f0000001440)=""/151, 0x97}], 0x5}}, {{&(0x7f0000001580), 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001600)=""/161, 0xa1}], 0x1, &(0x7f0000001700)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000001780), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001800)=""/95, 0x5f}, {&(0x7f0000001880)=""/131, 0x83}, {&(0x7f0000001940)=""/104, 0x68}, {&(0x7f00000019c0)=""/239, 0xef}], 0x4, &(0x7f0000001b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xf8}}, {{&(0x7f0000001c00), 0x6e, &(0x7f0000001d40)=[{&(0x7f0000001c80)=""/152, 0x98}], 0x1}}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000002e00)=""/119, 0x77}, {&(0x7f0000002e80)=""/149, 0x95}, {&(0x7f0000002f40)=""/96, 0x60}, {&(0x7f0000002fc0)=""/116, 0x74}, {&(0x7f0000003040)=""/138, 0x8a}, {&(0x7f0000003100)=""/192, 0xc0}, {&(0x7f00000031c0)=""/251, 0xfb}, {&(0x7f00000032c0)=""/143, 0x8f}, {&(0x7f0000003380)=""/68, 0x44}, {&(0x7f0000003400)=""/173, 0xad}], 0xa, &(0x7f0000003580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}], 0x9, 0x2, &(0x7f00000038c0)={r6, r7+60000000}) syz_open_procfs(r8, &(0x7f0000003900)='oom_score\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) ftruncate(r4, 0x2) 00:14:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000004c0)={0x7f, 0x4, 0x9, 0x7d, 0xb, "17c71da3552d89be29f4967f2d6a3298e67506"}) 00:14:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560c, &(0x7f0000000000)) [ 2226.936413] FAULT_INJECTION: forcing a failure. [ 2226.936413] name failslab, interval 1, probability 0, space 0, times 0 [ 2226.938173] CPU: 0 PID: 11496 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2226.939430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2226.941453] Call Trace: [ 2226.941927] dump_stack+0x107/0x163 [ 2226.942580] should_fail.cold+0x5/0xa [ 2226.943279] ? create_object.isra.0+0x3a/0xa20 [ 2226.944099] should_failslab+0x5/0x10 [ 2226.944781] kmem_cache_alloc+0x5b/0x350 [ 2226.945512] create_object.isra.0+0x3a/0xa20 [ 2226.946274] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2226.947033] kmem_cache_alloc+0x159/0x350 [ 2226.947646] anon_vma_fork+0xed/0x630 [ 2226.948203] ? __vm_enough_memory+0x184/0x360 [ 2226.948860] dup_mm+0x861/0x1110 [ 2226.949364] ? vm_area_dup+0x290/0x290 [ 2226.949936] ? __raw_spin_lock_init+0x36/0x110 [ 2226.950607] copy_process+0x23f8/0x66f0 [ 2226.951201] ? lock_downgrade+0x6d0/0x6d0 [ 2226.951819] ? __cleanup_sighand+0xb0/0xb0 [ 2226.952447] ? find_held_lock+0x2c/0x110 [ 2226.953045] kernel_clone+0xe7/0xa20 [ 2226.953589] ? lock_downgrade+0x6d0/0x6d0 [ 2226.954197] ? find_held_lock+0x2c/0x110 [ 2226.954807] ? copy_init_mm+0x20/0x20 [ 2226.955366] ? ksys_write+0x12d/0x250 [ 2226.955923] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2226.956633] __do_sys_fork+0x8a/0xc0 [ 2226.957177] ? kernel_clone+0xa20/0xa20 [ 2226.957771] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2226.958538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2226.959300] ? trace_hardirqs_on+0x5b/0x180 [ 2226.959930] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2226.960685] do_syscall_64+0x33/0x40 [ 2226.961236] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2226.961983] RIP: 0033:0x7f89b6ef5b19 [ 2226.962530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2226.965263] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2226.966367] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2226.967409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2226.968459] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2226.969502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2226.970527] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:14:58 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x100000000000000) 00:14:58 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x28fa) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0x14, {0x2, 0x4e20, @local}, 'tunl0\x00'}) 00:14:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x349080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9, 0xd1, 0x9b, 0xdf, 0x0, 0xdb, 0x2000, 0x7, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x100000000, 0x3}, 0x8, 0xe81b, 0x3f, 0x0, 0xffffffffffffff01, 0x3, 0x24d, 0x0, 0x2, 0x0, 0x1ff}, r0, 0x8, r1, 0x9) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:14:58 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffbfffffffffffe) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x5, 0x8, 0xfffffffa, 0x3f, 0x81, "e335b7f19deb56d069dbea87eff3dd6775c95b", 0x2, 0x68df}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xffffffff) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x42001, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000001c0)=""/158) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) 00:14:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560d, &(0x7f0000000000)) [ 2227.084821] blktrace: Concurrent blktraces are not allowed on loop10 00:14:58 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x1, 0x28fa) [ 2240.079758] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:15:19 executing program 3: fork() (fail_nth: 62) 00:15:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560e, &(0x7f0000000000)) 00:15:19 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x200000000000000) 00:15:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3e}}, './file0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_STATX={0x15, 0x0, 0x0, r2, &(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x200, 0x2000, 0x0, {0x0, r7}}, 0x8) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r8, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:15:19 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) perf_event_open(&(0x7f0000001d80)={0x2, 0x94, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:15:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x85786fa2b064fece) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x12000, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000180)=0x2) 00:15:19 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x40000000}) 00:15:19 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x12, 0x13, 0x10a, &(0x7f0000000040)="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"}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2248.041145] blktrace: Concurrent blktraces are not allowed on loop10 00:15:19 executing program 1: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, '+..!{$:[^\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000050}, 0x4c040) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2248.148811] FAULT_INJECTION: forcing a failure. [ 2248.148811] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.151691] CPU: 0 PID: 11539 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2248.153370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2248.156133] Call Trace: [ 2248.156763] dump_stack+0x107/0x163 [ 2248.157626] should_fail.cold+0x5/0xa [ 2248.158523] ? anon_vma_fork+0x1dd/0x630 [ 2248.159502] should_failslab+0x5/0x10 [ 2248.160397] kmem_cache_alloc+0x5b/0x350 [ 2248.161363] anon_vma_fork+0x1dd/0x630 [ 2248.162284] dup_mm+0x861/0x1110 [ 2248.163105] ? vm_area_dup+0x290/0x290 [ 2248.164028] ? __raw_spin_lock_init+0x36/0x110 [ 2248.165134] copy_process+0x23f8/0x66f0 [ 2248.166072] ? lock_downgrade+0x6d0/0x6d0 [ 2248.167073] ? __cleanup_sighand+0xb0/0xb0 [ 2248.168068] ? __lockdep_reset_lock+0x180/0x180 [ 2248.169172] ? find_held_lock+0x2c/0x110 [ 2248.170132] kernel_clone+0xe7/0xa20 [ 2248.171006] ? lock_downgrade+0x6d0/0x6d0 [ 2248.171979] ? find_held_lock+0x2c/0x110 [ 2248.172921] ? copy_init_mm+0x20/0x20 [ 2248.173815] ? ksys_write+0x12d/0x250 [ 2248.174710] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2248.175848] __do_sys_fork+0x8a/0xc0 [ 2248.176721] ? kernel_clone+0xa20/0xa20 [ 2248.177664] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2248.178878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2248.180089] ? trace_hardirqs_on+0x5b/0x180 [ 2248.181091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2248.182291] do_syscall_64+0x33/0x40 [ 2248.183162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2248.184350] RIP: 0033:0x7f89b6ef5b19 [ 2248.185216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2248.189489] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2248.191253] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2248.192894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2248.194543] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2248.196201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2248.197846] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2260.209923] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:15:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560f, &(0x7f0000000000)) 00:15:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x99030000}) 00:15:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) read(r0, &(0x7f0000000200)=""/169, 0xa9) 00:15:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@empty, @broadcast}, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000180)={0x0, 0x0, 0x5994}) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:15:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000080)=0x2) 00:15:40 executing program 3: fork() (fail_nth: 63) 00:15:40 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300000000000000) 00:15:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/wakeup_count', 0x80282, 0x18c) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:15:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40049409, &(0x7f0000000000)) [ 2269.164858] blktrace: Concurrent blktraces are not allowed on loop10 [ 2269.172866] FAULT_INJECTION: forcing a failure. [ 2269.172866] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.175496] CPU: 0 PID: 11570 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2269.176997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2269.179443] Call Trace: [ 2269.180026] dump_stack+0x107/0x163 [ 2269.180819] should_fail.cold+0x5/0xa [ 2269.181645] ? create_object.isra.0+0x3a/0xa20 [ 2269.182642] should_failslab+0x5/0x10 [ 2269.183491] kmem_cache_alloc+0x5b/0x350 [ 2269.184390] create_object.isra.0+0x3a/0xa20 [ 2269.185365] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2269.186529] kmem_cache_alloc+0x159/0x350 [ 2269.187487] anon_vma_fork+0xed/0x630 [ 2269.188480] ? __vm_enough_memory+0x184/0x360 [ 2269.189470] dup_mm+0x861/0x1110 [ 2269.190365] ? vm_area_dup+0x290/0x290 [ 2269.191230] ? __raw_spin_lock_init+0x36/0x110 [ 2269.192260] copy_process+0x23f8/0x66f0 [ 2269.193296] ? lock_downgrade+0x6d0/0x6d0 [ 2269.194224] ? __cleanup_sighand+0xb0/0xb0 [ 2269.195349] ? find_held_lock+0x2c/0x110 [ 2269.196266] kernel_clone+0xe7/0xa20 [ 2269.197226] ? lock_downgrade+0x6d0/0x6d0 [ 2269.198133] ? find_held_lock+0x2c/0x110 [ 2269.199179] ? copy_init_mm+0x20/0x20 [ 2269.200039] ? ksys_write+0x12d/0x250 [ 2269.201031] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2269.202104] __do_sys_fork+0x8a/0xc0 [ 2269.203065] ? kernel_clone+0xa20/0xa20 [ 2269.203968] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2269.205327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2269.206456] ? trace_hardirqs_on+0x5b/0x180 [ 2269.207592] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2269.208730] do_syscall_64+0x33/0x40 [ 2269.209550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2269.210675] RIP: 0033:0x7f89b6ef5b19 [ 2269.211508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.215535] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2269.217203] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2269.218772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2269.220356] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2269.221920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2269.223498] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:15:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) read(r0, &(0x7f0000000200)=""/169, 0xa9) 00:15:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'filter\x00', 0x0, [0xea76, 0xa71, 0x0, 0x0, 0x3]}, &(0x7f0000000100)=0x54) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x4eb, 0x7f, 0x3}, 0xc) 00:15:40 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = dup2(r1, r2) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r7 = getegid() setgid(r7) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r7) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r6, r7}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {r5, r7}}, './file0\x00'}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000001c0)={0x86, 0x5, 0x3630}) 00:15:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40086602, &(0x7f0000000000)) 00:15:40 executing program 4: read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:15:41 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r0, 0x0) dup2(r1, r2) socket$inet(0x2, 0xa, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:15:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40087602, &(0x7f0000000000)) [ 2281.952368] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:16:01 executing program 4: read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:16:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) 00:16:01 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000000) 00:16:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000400), 0x4080, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0xfff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x80201, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000340), 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, '\x00'}) preadv(r2, &(0x7f0000000380)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x80000000, 0x58bf) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x84, 0x28, 0x200, 0x70bd29, 0x25dfdbff, {0x7}, [@generic="ddfa0c3685137f13e965d41d372f677705b1211f61e22fa19efaccab7f9dfaba5e72656d9f294e86335f9469d5dda47987ad6ce02374679d199f980c9c2c2617599d5df2529055168f7d2ce71d82fc453b543b897992b251c5092456f9c388c463b34edf02bea500000000000000"]}, 0x84}, 0x1, 0x0, 0x0, 0x41}, 0x40000) 00:16:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$KDENABIO(r0, 0x4b36) 00:16:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfdffffff}) 00:16:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4020940d, &(0x7f0000000000)) 00:16:01 executing program 3: fork() (fail_nth: 64) [ 2289.814907] blktrace: Concurrent blktraces are not allowed on loop10 00:16:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfffffffd}) 00:16:01 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x3, 0x80}) 00:16:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045432, &(0x7f0000000000)) 00:16:01 executing program 4: read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:16:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x8, 0x3, 0x80, 0x1, 0x0, 0xac9000, 0x20100, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x3, 0x2455}, 0xa516, 0x9, 0x400, 0x3, 0xdd3, 0x2, 0x40, 0x0, 0xffff, 0x0, 0x81}, 0x0, 0xd, r0, 0x2) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2289.930738] FAULT_INJECTION: forcing a failure. [ 2289.930738] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.933341] CPU: 1 PID: 11620 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2289.934897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2289.937337] Call Trace: [ 2289.937909] dump_stack+0x107/0x163 [ 2289.938693] should_fail.cold+0x5/0xa [ 2289.939505] ? anon_vma_fork+0x1dd/0x630 [ 2289.940395] should_failslab+0x5/0x10 [ 2289.941205] kmem_cache_alloc+0x5b/0x350 [ 2289.942078] anon_vma_fork+0x1dd/0x630 [ 2289.942914] dup_mm+0x861/0x1110 [ 2289.943661] ? vm_area_dup+0x290/0x290 [ 2289.944523] ? __raw_spin_lock_init+0x36/0x110 [ 2289.945570] copy_process+0x23f8/0x66f0 [ 2289.946432] ? lock_downgrade+0x6d0/0x6d0 [ 2289.947358] ? __cleanup_sighand+0xb0/0xb0 [ 2289.948300] ? __lockdep_reset_lock+0x180/0x180 [ 2289.949336] ? find_held_lock+0x2c/0x110 [ 2289.950244] kernel_clone+0xe7/0xa20 [ 2289.951107] ? lock_downgrade+0x6d0/0x6d0 [ 2289.952031] ? find_held_lock+0x2c/0x110 [ 2289.952918] ? copy_init_mm+0x20/0x20 [ 2289.953749] ? ksys_write+0x12d/0x250 [ 2289.954587] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2289.955671] __do_sys_fork+0x8a/0xc0 [ 2289.956482] ? kernel_clone+0xa20/0xa20 [ 2289.957378] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2289.958493] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2289.959594] ? trace_hardirqs_on+0x5b/0x180 [ 2289.960521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2289.961615] do_syscall_64+0x33/0x40 [ 2289.962408] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.963504] RIP: 0033:0x7f89b6ef5b19 [ 2289.964308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2289.968248] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2289.969880] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2289.971400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2289.972929] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2289.974452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2289.976006] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:16:01 executing program 3: fork() (fail_nth: 65) 00:16:01 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045440, &(0x7f0000000000)) 00:16:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) 00:16:01 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) read(r0, &(0x7f0000000200)=""/169, 0xa9) [ 2290.349166] FAULT_INJECTION: forcing a failure. [ 2290.349166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2290.351725] CPU: 1 PID: 11643 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2290.353216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2290.355573] Call Trace: [ 2290.356132] dump_stack+0x107/0x163 [ 2290.356893] should_fail.cold+0x5/0xa [ 2290.357750] __alloc_pages_nodemask+0x182/0x680 [ 2290.358727] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2290.360060] alloc_pages_current+0x187/0x280 [ 2290.360984] allocate_slab+0x26b/0x380 [ 2290.361796] ___slab_alloc+0x46c/0x700 [ 2290.362618] ? vm_area_dup+0x78/0x290 [ 2290.363415] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2290.364517] ? obj_cgroup_charge+0xc2/0x460 [ 2290.365409] ? trace_hardirqs_on+0x5b/0x180 [ 2290.366308] ? vm_area_dup+0x78/0x290 [ 2290.367102] ? kmem_cache_alloc+0x33f/0x350 [ 2290.368000] ? vm_area_dup+0x78/0x290 [ 2290.368790] kmem_cache_alloc+0x33f/0x350 [ 2290.369660] vm_area_dup+0x78/0x290 [ 2290.370428] ? _cond_resched+0x12/0x80 [ 2290.371242] ? copy_page_range+0x242d/0x3810 [ 2290.372211] ? vm_area_alloc+0x110/0x110 [ 2290.373060] ? up_write+0x191/0x550 [ 2290.373815] ? vm_iomap_memory+0x190/0x190 [ 2290.374693] ? downgrade_write+0x3a0/0x3a0 [ 2290.375577] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2290.376720] ? __vma_link_rb+0x540/0x700 [ 2290.377573] dup_mm+0x44d/0x1110 [ 2290.378293] ? vm_area_dup+0x290/0x290 [ 2290.379107] ? __raw_spin_lock_init+0x36/0x110 [ 2290.380080] copy_process+0x23f8/0x66f0 [ 2290.380913] ? lock_downgrade+0x6d0/0x6d0 [ 2290.381792] ? __cleanup_sighand+0xb0/0xb0 [ 2290.382688] ? find_held_lock+0x2c/0x110 [ 2290.383556] kernel_clone+0xe7/0xa20 [ 2290.384343] ? lock_downgrade+0x6d0/0x6d0 [ 2290.385203] ? find_held_lock+0x2c/0x110 [ 2290.386047] ? copy_init_mm+0x20/0x20 [ 2290.386841] ? ksys_write+0x12d/0x250 [ 2290.387636] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2290.388649] __do_sys_fork+0x8a/0xc0 [ 2290.389414] ? kernel_clone+0xa20/0xa20 [ 2290.390261] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2290.391339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2290.392421] ? trace_hardirqs_on+0x5b/0x180 [ 2290.393326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2290.394398] do_syscall_64+0x33/0x40 [ 2290.395175] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.396255] RIP: 0033:0x7f89b6ef5b19 [ 2290.397030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2290.400872] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2290.402451] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2290.403962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2290.405447] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2290.406933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2290.408425] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:16:02 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x110) 00:16:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000180), 0x77bc, 0x80800) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, &(0x7f00000001c0)=0x5) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x400, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000240)) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000100)={0x4, 0x9, 0x200, 0xd8, 0x3f, 0xffffffff}) 00:16:02 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/210, 0xd2}, {&(0x7f0000000280)=""/114, 0x72}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000001300)=""/210, 0xd2}], 0x4, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="05000000000000050000000000000000"]) recvfrom$inet6(r3, &(0x7f0000000300)=""/213, 0xd5, 0x141, &(0x7f0000000400)={0xa, 0x4e24, 0x59, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, 0x1c) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000100)) 00:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80086601, &(0x7f0000000000)) 00:16:02 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) read(r0, &(0x7f0000000200)=""/169, 0xa9) 00:16:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x100000000000000}) 00:16:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0xff) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x8000}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) 00:16:02 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x400, 0x0) read(r0, &(0x7f0000000200)=""/169, 0xa9) [ 2290.677492] blktrace: Concurrent blktraces are not allowed on loop10 00:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80087601, &(0x7f0000000000)) [ 2303.697794] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:16:23 executing program 3: fork() (fail_nth: 66) 00:16:23 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(r0, &(0x7f0000000200)=""/169, 0xa9) 00:16:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400c, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:16:23 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='clone_children,cpuset_v2_mode,freezeb,\x00']) mkdir(&(0x7f0000000080)='./file0/../file0\x00', 0x80) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x10004, 0xb91, 0x1000000, 0x80000, r0}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 00:16:23 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="4d520197d66a8d4fc6ee8ff4c53f1e6a5bff017142aa00cef79442b33bf724eab41063394d6a40da7a9139b579ee3f58b40f889990fb6ff4049a175f4086e8bccd2dd62e9ad623", 0x47, 0x20000841, &(0x7f0000000240)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x5, 0xff, 0xfe, 0x81, 0x0, 0xffff, 0x2400, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3, 0x10001}, 0x40044, 0x1, 0x3, 0x0, 0xe9f, 0x101, 0x7, 0x0, 0x8, 0x0, 0x101}, r2, 0x1, r3, 0x1) 00:16:23 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000180)=0xd) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000100)={0x9, 0xf000, 0x400, 0x4cb, 0x5}) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, 0x0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000340)=r4) fspick(r3, &(0x7f0000000200)='./file0\x00', 0x0) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000040)=0x5) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000380)=""/245, 0xf5}], 0x1, 0xe720, 0x100) fstatfs(r5, &(0x7f0000000240)=""/195) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x5, 0x60, 0x20000000, 0xa72, 0x0, "6ba6c90c5f41d6b19a4bfa96e7f360d221bbae", 0x7fffffff, 0x8}) 00:16:23 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x200000000000000}) 00:16:23 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) [ 2311.955513] FAULT_INJECTION: forcing a failure. [ 2311.955513] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.958215] CPU: 1 PID: 11686 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2311.959751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2311.962442] Call Trace: [ 2311.963004] dump_stack+0x107/0x163 [ 2311.963960] should_fail.cold+0x5/0xa [ 2311.964840] ? __pmd_alloc+0x94/0x5e0 [ 2311.965655] should_failslab+0x5/0x10 [ 2311.966476] kmem_cache_alloc+0x5b/0x350 [ 2311.967467] __pmd_alloc+0x94/0x5e0 [ 2311.968394] copy_page_range+0x2b18/0x3810 [ 2311.969293] ? SOFTIRQ_verbose+0x10/0x10 [ 2311.970162] ? lock_chain_count+0x20/0x20 [ 2311.971095] ? up_write+0x191/0x550 [ 2311.971866] ? vm_iomap_memory+0x190/0x190 [ 2311.972781] ? downgrade_write+0x3a0/0x3a0 [ 2311.973684] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2311.974849] ? __vma_link_rb+0x540/0x700 [ 2311.975726] dup_mm+0x8b9/0x1110 [ 2311.976490] ? vm_area_dup+0x290/0x290 [ 2311.977328] ? __raw_spin_lock_init+0x36/0x110 [ 2311.978313] copy_process+0x23f8/0x66f0 [ 2311.979168] ? lock_downgrade+0x6d0/0x6d0 [ 2311.980080] ? __cleanup_sighand+0xb0/0xb0 [ 2311.980997] ? find_held_lock+0x2c/0x110 [ 2311.981872] kernel_clone+0xe7/0xa20 [ 2311.982666] ? lock_downgrade+0x6d0/0x6d0 [ 2311.983545] ? find_held_lock+0x2c/0x110 [ 2311.984414] ? copy_init_mm+0x20/0x20 [ 2311.985228] ? ksys_write+0x12d/0x250 [ 2311.986046] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2311.987082] __do_sys_fork+0x8a/0xc0 [ 2311.987891] ? kernel_clone+0xa20/0xa20 [ 2311.988758] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2311.989878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.990984] ? trace_hardirqs_on+0x5b/0x180 [ 2311.991917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2311.993023] do_syscall_64+0x33/0x40 [ 2311.993814] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2311.994912] RIP: 0033:0x7f89b6ef5b19 [ 2311.995715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2311.999656] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2312.001302] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2312.002824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2312.004361] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.005887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2312.007431] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:16:23 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:16:23 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) [ 2324.301868] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:16:42 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x400000000000000}) 00:16:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0189436, &(0x7f0000000000)) 00:16:42 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:16:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x5, 0x40080) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) r4 = syz_open_dev$ttys(0xc, 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4, {r5, r6}}, './file0\x00'}) 00:16:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="50932e686cc7745a1a4a6d8d1f7300ef1b43a051d545cea69226c929796df8e6cfc70ce58e7d435d5d479fc973", @ANYRES16=0x0, @ANYBLOB="000829bd7000fbdbdf250a000000b000028004000100a60004000dd2c7931d4a6081a98a4cbb8f76510d908ab198f19fdca32f95dd02beefabce107db6bdb80a2507dcf2ad4349357d10636bb4e0b7daa783cdda69f5391662cf5b162c6f18f632260343a92693a3a4a410becbfff802c70e1e4f8a95441775c0e5f195400e67815d9bf3178a131c12703217461609cc4187c0b97fae711fda37f2b2dc02fcafbdb1134c0560b6882351e4afd8292886f129cc55ba86272278511fe90000"], 0xc4}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)) 00:16:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x4, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xe, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:16:42 executing program 3: fork() (fail_nth: 67) 00:16:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc020660b, &(0x7f0000000000)) 00:16:42 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/169, 0xa9) 00:16:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x5}) r1 = gettid() r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, r1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r3 = syz_open_procfs(r1, &(0x7f0000000100)='fdinfo/3\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x2) 00:16:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xffff}}, './file0\x00'}) close_range(r0, r3, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup2(r1, r4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2331.448604] FAULT_INJECTION: forcing a failure. [ 2331.448604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2331.451494] CPU: 1 PID: 11721 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2331.453160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2331.455790] Call Trace: [ 2331.456519] dump_stack+0x107/0x163 [ 2331.457348] should_fail.cold+0x5/0xa [ 2331.458231] __alloc_pages_nodemask+0x182/0x680 [ 2331.459377] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2331.460795] ? lock_downgrade+0x6d0/0x6d0 [ 2331.461804] ? do_raw_spin_lock+0x121/0x260 [ 2331.462786] alloc_pages_current+0x187/0x280 [ 2331.463858] __pmd_alloc+0x37/0x5e0 [ 2331.464679] copy_page_range+0x2b18/0x3810 [ 2331.465647] ? SOFTIRQ_verbose+0x10/0x10 [ 2331.466641] ? lock_chain_count+0x20/0x20 [ 2331.467558] ? up_write+0x191/0x550 [ 2331.468348] ? vm_iomap_memory+0x190/0x190 [ 2331.469284] ? downgrade_write+0x3a0/0x3a0 [ 2331.470215] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2331.471359] ? __vma_link_rb+0x540/0x700 [ 2331.472369] dup_mm+0x8b9/0x1110 [ 2331.473110] ? vm_area_dup+0x290/0x290 [ 2331.473937] ? __raw_spin_lock_init+0x36/0x110 [ 2331.474908] copy_process+0x23f8/0x66f0 [ 2331.475751] ? lock_downgrade+0x6d0/0x6d0 [ 2331.476651] ? __cleanup_sighand+0xb0/0xb0 [ 2331.477574] ? find_held_lock+0x2c/0x110 [ 2331.478428] kernel_clone+0xe7/0xa20 [ 2331.479229] ? lock_downgrade+0x6d0/0x6d0 [ 2331.480089] ? find_held_lock+0x2c/0x110 [ 2331.480971] ? copy_init_mm+0x20/0x20 [ 2331.481766] ? ksys_write+0x12d/0x250 [ 2331.482594] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2331.483606] __do_sys_fork+0x8a/0xc0 [ 2331.484428] ? kernel_clone+0xa20/0xa20 [ 2331.485296] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2331.486404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2331.487487] ? trace_hardirqs_on+0x5b/0x180 [ 2331.488408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2331.489486] do_syscall_64+0x33/0x40 [ 2331.490272] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2331.491349] RIP: 0033:0x7f89b6ef5b19 [ 2331.492165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2331.496115] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2331.497720] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2331.499254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2331.500803] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2331.502350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:16:42 executing program 5: syz_io_uring_setup(0x5e6b, &(0x7f0000000100)={0x0, 0xae0, 0x4, 0x3, 0x135}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) r3 = syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x5, 0x2, &(0x7f0000000440)=[{&(0x7f0000000240)="c66bf07909e625209377e57299acd7989dd1d0df23e69ca0c26de20a9e3281fab342f8c0ba323f2da6d2db303613de9d165faa6c8d04480ab548787bd5878f43c2f6304d7e8f247e31a260fbc6bccba8edd7a4146b0c795cbaa9478efdace78b9a8586859da7df3610194c3fba8c47fc87c4cf522b6356d244e32f85e0f7092e106ed581cee77c381a41ef56dcc13e66990bd235dd17f9b615b22fc1300127be67f531440f507997ba98dc5baf5c8c17d0600515f010b98514aaed8c061906810e3f44270e5565f638960f038b8c2d3f4c9d54c23c", 0xd5, 0x7fffffff}, {&(0x7f0000000340)="a3a5e6b122ae8594012508756b65ca437937af9f8d7ab7b97b9f5ddd8f5c6a30f13fbdbd021aeb01defa0a6c8014c1f1cfd3cb57e549185bb0e0fbeb6b7a26e29b8e2eeac6d9fc6ac7e50469ada804267c6845a91e6369638e63e3eb318ad6913c849f5ab27ac933c4c10b8c53dfb8f2bcf2b51008c3043228991e553ac65aedfb824bc20732ed5dbe1d4e807ac2bd242a57610be5d9", 0x96, 0xcbc}], 0x204a2, &(0x7f0000000480)={[{',-'}, {'\x00'}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@dont_measure}, {@seclabel}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@audit}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000540)=@IORING_OP_POLL_ADD={0x6, 0xbeffdc23c4efc902, 0x0, @fd=r3, 0x0, 0x0, 0x0, {0x103}, 0x0, {0x0, r8}}, 0x1) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r9 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r9, 0x1276, 0x0) [ 2331.503886] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:16:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:16:43 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xa00000000000000}) 00:16:43 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(r0, 0x0, 0x0) 00:16:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/95, 0x5f}, {&(0x7f0000000200)=""/102, 0x66}], 0x2) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000280)={r1, 0xff, 0xd5, 0x6}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f00000002c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 00:16:43 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x87e}) [ 2342.551457] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:17:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000040)=0x8) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) 00:17:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x4000000000000000}) 00:17:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x7e08}) 00:17:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000180)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/230, 0xe6}], 0x1, 0xe720, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000001c0)={r2, 0x2, 0x2, 0x7}) openat$cgroup_int(r3, &(0x7f0000000200)='cpu.weight\x00', 0x2, 0x0) 00:17:02 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000100)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:17:02 executing program 3: fork() (fail_nth: 68) 00:17:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3e}}, './file0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000002c0)=@IORING_OP_STATX={0x15, 0x0, 0x0, r2, &(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x200, 0x2000, 0x0, {0x0, r7}}, 0x8) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r8, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:17:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x71a5, @private=0xa010101}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x800, 0x47}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x8, 0x6, 0x3a, 0x6, 0x0, 0x200, 0x34818, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x894, 0x0, @perf_config_ext={0xffffffffffffffe1, 0x3}, 0x50102, 0x74927a37, 0x1, 0x0, 0x7, 0xcc, 0x8, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) 00:17:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:17:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000240)=""/244, 0xf4}], 0x1, 0xe720, 0x48c) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000340)='./binderfs/custom0\x00', 0x800, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000180)=0x20) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000100)={0x23, 0x4, 0x2}) r4 = openat$cgroup_ro(r3, &(0x7f00000001c0)='cgroup.kill\x00', 0x0, 0x0) r5 = accept4$inet6(r4, 0x0, &(0x7f0000000380), 0x0) connect$inet6(r5, &(0x7f00000003c0)={0xa, 0x4e21, 0x80, @empty}, 0x1c) sendfile(r0, r4, &(0x7f0000000200)=0x6, 0x800) 00:17:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3f}, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4, 0x0) [ 2351.302049] FAULT_INJECTION: forcing a failure. [ 2351.302049] name failslab, interval 1, probability 0, space 0, times 0 [ 2351.304692] CPU: 0 PID: 11790 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2351.306207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2351.308680] Call Trace: [ 2351.309261] dump_stack+0x107/0x163 [ 2351.310056] should_fail.cold+0x5/0xa [ 2351.310888] ? __pmd_alloc+0x94/0x5e0 [ 2351.311720] should_failslab+0x5/0x10 [ 2351.312557] kmem_cache_alloc+0x5b/0x350 [ 2351.313494] __pmd_alloc+0x94/0x5e0 [ 2351.314325] copy_page_range+0x2b18/0x3810 [ 2351.315281] ? perf_trace_lock+0xac/0x490 [ 2351.316208] ? lock_chain_count+0x20/0x20 [ 2351.317189] ? up_write+0x191/0x550 [ 2351.318009] ? vm_iomap_memory+0x190/0x190 [ 2351.318955] ? downgrade_write+0x3a0/0x3a0 [ 2351.319917] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2351.321181] ? __vma_link_rb+0x540/0x700 [ 2351.322114] dup_mm+0x8b9/0x1110 [ 2351.322887] ? vm_area_dup+0x290/0x290 [ 2351.323767] ? __raw_spin_lock_init+0x36/0x110 [ 2351.324831] copy_process+0x23f8/0x66f0 [ 2351.325761] ? __cleanup_sighand+0xb0/0xb0 [ 2351.326720] ? finish_task_switch+0x126/0x5d0 [ 2351.327746] kernel_clone+0xe7/0xa20 [ 2351.328595] ? copy_init_mm+0x20/0x20 [ 2351.329449] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2351.330474] ? trace_hardirqs_on+0x5b/0x180 [ 2351.331448] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2351.332493] ? finish_task_switch+0x126/0x5d0 [ 2351.333494] ? finish_task_switch+0xef/0x5d0 [ 2351.334439] ? __switch_to+0x572/0xff0 [ 2351.335274] ? __switch_to_asm+0x42/0x70 [ 2351.336148] ? __switch_to_asm+0x36/0x70 [ 2351.337036] ? __schedule+0x850/0x1e80 [ 2351.337901] __do_sys_fork+0x8a/0xc0 [ 2351.338723] ? kernel_clone+0xa20/0xa20 [ 2351.339583] ? io_schedule_timeout+0x140/0x140 [ 2351.340589] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 2351.341595] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2351.342729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2351.343842] ? trace_hardirqs_on+0x5b/0x180 [ 2351.344787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2351.345903] do_syscall_64+0x33/0x40 [ 2351.346712] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2351.347832] RIP: 0033:0x7f89b6ef5b19 [ 2351.348673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2351.352715] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2351.354474] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2351.355987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2351.357522] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2351.359034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2351.360554] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:17:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x71a5, @private=0xa010101}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x800, 0x47}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x8, 0x6, 0x3a, 0x6, 0x0, 0x200, 0x34818, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x894, 0x0, @perf_config_ext={0xffffffffffffffe1, 0x3}, 0x50102, 0x74927a37, 0x1, 0x0, 0x7, 0xcc, 0x8, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) 00:17:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x9903000000000000}) [ 2364.470173] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:17:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x87e}) 00:17:24 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:17:24 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0xfdffffff00000000}) 00:17:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:17:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/240) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:17:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x71a5, @private=0xa010101}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x800, 0x47}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x8, 0x6, 0x3a, 0x6, 0x0, 0x200, 0x34818, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x894, 0x0, @perf_config_ext={0xffffffffffffffe1, 0x3}, 0x50102, 0x74927a37, 0x1, 0x0, 0x7, 0xcc, 0x8, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) 00:17:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') sendto$inet(r0, &(0x7f0000000000)="829dbb99f64d9b411832e0e070e4968f3381ca76d4c4d834566803897e31f7f7d590d2fab0d0d1d46c1b35f918362fb95c461b29b1786f52330675e225963fec1ff11aa72a4dc56817a54d3cab00191ed11f3f5016dfda33a86b60370ebc93c8ef5651bc51982802191875048d5c935e77722900a278a90fde1bf0b00ef10b03c28111208549809154d79305addffaaa94fef54a9900dfe511ba0a536e7e0272c3", 0xa1, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) 00:17:24 executing program 3: fork() (fail_nth: 69) [ 2372.797345] FAULT_INJECTION: forcing a failure. [ 2372.797345] name failslab, interval 1, probability 0, space 0, times 0 [ 2372.799294] CPU: 0 PID: 11829 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2372.800443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2372.802335] Call Trace: [ 2372.802773] dump_stack+0x107/0x163 [ 2372.803376] should_fail.cold+0x5/0xa [ 2372.804007] ? ptlock_alloc+0x1d/0x70 [ 2372.804641] should_failslab+0x5/0x10 [ 2372.805275] kmem_cache_alloc+0x5b/0x350 [ 2372.805950] ptlock_alloc+0x1d/0x70 [ 2372.806558] pte_alloc_one+0x68/0x190 [ 2372.807172] __pte_alloc+0x1d/0x320 [ 2372.807761] copy_page_range+0x1a1d/0x3810 [ 2372.808451] ? SOFTIRQ_verbose+0x10/0x10 [ 2372.809112] ? lock_chain_count+0x20/0x20 [ 2372.809811] ? up_write+0x191/0x550 [ 2372.810396] ? vm_iomap_memory+0x190/0x190 [ 2372.811083] ? downgrade_write+0x3a0/0x3a0 [ 2372.811767] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2372.812644] ? __vma_link_rb+0x540/0x700 [ 2372.813342] dup_mm+0x8b9/0x1110 [ 2372.813911] ? vm_area_dup+0x290/0x290 [ 2372.814551] ? __raw_spin_lock_init+0x36/0x110 [ 2372.815304] copy_process+0x23f8/0x66f0 [ 2372.815964] ? lock_downgrade+0x6d0/0x6d0 [ 2372.816665] ? __cleanup_sighand+0xb0/0xb0 [ 2372.817379] ? find_held_lock+0x2c/0x110 [ 2372.818057] kernel_clone+0xe7/0xa20 [ 2372.818669] ? lock_downgrade+0x6d0/0x6d0 [ 2372.819351] ? find_held_lock+0x2c/0x110 [ 2372.820020] ? copy_init_mm+0x20/0x20 [ 2372.820654] ? ksys_write+0x12d/0x250 [ 2372.821316] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2372.822119] __do_sys_fork+0x8a/0xc0 [ 2372.822735] ? kernel_clone+0xa20/0xa20 [ 2372.823400] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2372.824213] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2372.825022] ? trace_hardirqs_on+0x5b/0x180 [ 2372.825700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2372.826531] do_syscall_64+0x33/0x40 [ 2372.827116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2372.827938] RIP: 0033:0x7f89b6ef5b19 [ 2372.828542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2372.831533] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2372.832779] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2372.833992] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2372.835245] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2372.836513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2372.837754] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:17:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x71a5, @private=0xa010101}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x800, 0x47}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x8, 0x6, 0x3a, 0x6, 0x0, 0x200, 0x34818, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x894, 0x0, @perf_config_ext={0xffffffffffffffe1, 0x3}, 0x50102, 0x74927a37, 0x1, 0x0, 0x7, 0xcc, 0x8, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) 00:17:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x100, 0x8, 0xd7a, 0x2, 0xf9, "ea1ace81d8f9bfd21711ce274f5a1af451a6ed", 0x200100}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x1) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x100000000000000) 00:17:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x7e08}) 00:17:24 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x2}) 00:17:24 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000004000)=[{&(0x7f0000002e80)=""/255, 0xfffffffffffffe74}, {&(0x7f0000005240)=""/4097, 0xfffffed5}, {&(0x7f0000003e80)=""/78, 0x4e}, {&(0x7f0000003080)=""/196, 0xbb}], 0x4, 0x7f, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) writev(r2, &(0x7f0000002e00)=[{&(0x7f0000001880)="802166ed7d3f0da7f5ff27dd64d66e227d24f96e274711e2da67eb8f3d307587a4443d6435a712434834be018379ed409935aacc0e7844cf1179d9c20a543827f5416cbb7398989db353a1e4af5464db9683bf8d45a04e6b7fc195cb90f0fcba9943ebb1cb0441b21de99eda5e7b2847a8bf555b2ca41c60d7c406aeaec657954e8cdccdc875a120ef4cc3bd0ce63e80d224300ac485e845131019cd196a12101fa33406f3c36e9db0de3d53db4b6e1c7ba4755588155893f4cc5f23ddb42c96", 0xc0}, {&(0x7f0000001940)="a63bbc9fa1d074f9d296604c99835ba6cba08392896a0ee43a4642e3abdbbb5a4e47d53bebe250202959fb06c6e5da31a0c060bc9c1c901856c384228279fb2504fe3cdc50b4c4", 0x47}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f00000019c0)="5b9e93455fd000f3f5cf74144dbf0cbe00112932ae1a77c26f2d5e8355d6cc300ca3f496545cd7bd990349397eb4b5a7f7595e594cc04aaf276106a8e398697caba4b5f7eceb4ef8dce00b76b166db972208c2a4e918a560b0b747ed9878981e895d52378dbfc2b977715634b2112620ee274488bf2d7fe66a5f34ca252a63002760ae16da2a5e0f711eac5c79b37f9d180eedaf67b608046e5fc056fc1e231df37a35ed8b1108", 0xa7}, {&(0x7f0000001a80)="4a3492de583881986c640839af142aba6b5a83c5e545de8851fe905c81fe23b68715bb89e5918624311c9cf0e452e7a5e978b9978e074765eab568042cfc729def9b80dc7f0d6e9470a880ceed47c15b6b177d4eaee49b8aa8314211448c3169ec928ecfa9cef5db380511bf9c3d6aad859edfa2d62671cdd22fc8ec7301c7a55ed40c6f08af8701ba181447cbcf569840b21b89e2b9e5b75172b102508b18c7a1ee37a6d03fd6c5c77fdf6a52f1c41cc3e9bcaedabad36d9a3a00c90ebc7429c553a1d0d15dc0ce2177e287d3a71441edd71b77b62bfbbb814d", 0xda}, {&(0x7f0000001b80)="bd8c05b679499bd097e84015551754085e9b88a04887beaa7ea685d6e5f4091751a7100cab6c206bd7402de246cc046025738328b3393d17f22e833cc340eaab903cf9047607124d1eb3f811ee2c3c06c66b763e0ab5fae67e1718305a769aa4d5b2c145ae2eea083479d5d3017cd8f2a6d69b59062b094488f980f066e6003d6634c96bf3ecd1dfbc8986544e05309b", 0x90}, {&(0x7f0000001c40)="caba1a22d47853d5141a46f14c6cdda690fc87732a6d6c7136f5b49d9ba55c6ee71517f4881ff19ce2d91ba00984", 0x2e}, {&(0x7f0000001c80)="7462c82267c73d404d06bae6fbde7b487ca5a64e2bdd6a0a2750e05e47c0383111a9c96ddbcbfda04955778c7dead3ac1b2a6d00dd00b46576d3ba446dab5e7b6b8bd01ead855915cd0dba86b81e93ad9911b3187c3c9d380140654de43ea7ff51ae6255cc87682ac0fe9a69c708eefda424043ef534936570068ebdd797c9b7dac5605e061a730bfcf0bfd115ef71c32aa06a13757f610fec198a4c77e418d3b7bd3498fe8d04c897117f9f1335731741cc5208fbaeafc25e1285e3d98121d0ece48441c62065e5f8a096146820a024eeb9d116bd44db84e5ab862ebe92a6438543ffb45b9c85f2b10a2b443411c61f4a94167a72d256279e", 0xf9}], 0x8) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/187, 0xbb}, {&(0x7f0000000300)=""/205, 0xcd}, {&(0x7f0000000400)=""/49, 0x31}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/64, 0x40}], 0x6) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000002f80)=0x7, 0x4) preadv(r0, &(0x7f0000001800)=[{&(0x7f0000000500)=""/55, 0x37}, {&(0x7f00000015c0)=""/147, 0x93}, {&(0x7f0000000540)=""/10, 0xa}, {&(0x7f0000001680)=""/150, 0x96}, {&(0x7f0000001740)=""/173, 0xad}], 0x5, 0xc4, 0x7) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x2) 00:17:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:17:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:17:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x40, 0x1}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x40) syz_open_dev$tty20(0xc, 0x4, 0x0) 00:17:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000001c0)={@dev, @dev, @initdev}, &(0x7f0000000200)=0xc) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00'}) [ 2386.135843] kmemleak: 36 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:17:44 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4}) 00:17:44 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x633905c9f92ab5c1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3ff, 0x527d, 0xb91, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:17:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x800, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x151040, 0x0) recvmmsg(r2, &(0x7f0000005f80)=[{{&(0x7f0000000200)=@rc={0x1f, @none}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/178, 0xb2}, {&(0x7f0000000340)=""/101, 0x65}, {&(0x7f00000003c0)=""/133, 0x85}], 0x3, &(0x7f00000005c0)=""/198, 0xc6}, 0xa0000000}, {{&(0x7f00000004c0)=@caif=@rfm, 0x80, &(0x7f0000001940)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/111, 0x6f}, {&(0x7f0000000540)=""/10, 0xa}, {&(0x7f0000001740)=""/174, 0xae}, {&(0x7f0000001800)=""/14, 0xe}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/199, 0xc7}], 0x7, &(0x7f00000019c0)=""/248, 0xf8}, 0xffff0000}, {{&(0x7f0000001ac0)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000005c80)=""/46, 0x2e}], 0x1, &(0x7f0000001bc0)=""/208, 0xd0}}, {{0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/134, 0x86}, {&(0x7f0000003e00)=""/232, 0xe8}, {&(0x7f0000003f00)=""/108, 0x6c}, {&(0x7f0000003f80)=""/22, 0x16}, {&(0x7f0000005cc0)=""/177, 0xb1}, {&(0x7f0000004080)=""/108, 0x6c}], 0x7, &(0x7f0000003fc0)=""/102, 0x66}, 0x4}, {{&(0x7f0000004200)=@x25={0x9, @remote}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004280)=""/112, 0x70}, {&(0x7f0000004300)=""/179, 0xb3}, {&(0x7f00000043c0)=""/206, 0xce}], 0x3, &(0x7f0000004500)=""/155, 0x9b}}, {{0x0, 0x0, &(0x7f0000005900)=[{&(0x7f00000045c0)=""/247, 0xf7}, {&(0x7f00000046c0)=""/6, 0x6}, {&(0x7f0000004700)=""/255, 0xff}, {&(0x7f0000004800)=""/182, 0xb6}, {&(0x7f00000048c0)=""/4096, 0x1000}, {&(0x7f00000058c0)=""/37, 0x25}], 0x6, &(0x7f0000005980)=""/240, 0xf0}, 0x2}, {{&(0x7f0000005a80)=@nfc, 0x80, &(0x7f0000005b80)=[{&(0x7f0000005b00)=""/1, 0x1}, {&(0x7f0000005b40)=""/31, 0x1f}], 0x2, &(0x7f0000005bc0)=""/21, 0x15}, 0x101}, {{&(0x7f0000005c00)=@isdn, 0x80, &(0x7f0000005ec0), 0x0, &(0x7f0000005f40)=""/49, 0x31}, 0x2}], 0x8, 0x100, &(0x7f0000006180)) connect$inet(r2, &(0x7f00000062c0)={0x2, 0x4e21, @multicast1}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001b40), 0x200) sendfile(r4, r1, &(0x7f0000004040)=0x68dea832, 0x4) sendto$inet(r3, &(0x7f0000006300)="d74ccc402ae59b2e748ee87f9e3a2c7df9b85a73ae7fdfb2cd2f42b505018ae39f072921bcd799d9f56d5e4ad9aff4aee9e2a677c05b38ea9ff2b4e7d5f9d554f262c6c1e9d614f6e3c42da3d22e9b62137cbbad311528990f3203e2ea830425572ab61462fdd5e057ac71b9f9061ab833e6778892f979c886c18a999966ddd4b223b26584b3333023479d8a", 0x8c, 0x20004000, 0x0, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000061c0)={@in6={{0xa, 0x4e21, 0x3f, @local, 0x3}}, 0x0, 0x0, 0xf, 0x0, "2b69fae1b7b90b89b5c928ae7c634e0bce3be152686bc18fd0d775ff50bfb3777d8dc39fe0b221cc735156af0a066f68243df10192030eb27522830cd5c7c1b028821dc8cfbff0299f887500d215e6c8"}, 0xd8) 00:17:44 executing program 3: fork() (fail_nth: 70) 00:17:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:17:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000040)={0x9, 0x7, 0xa7}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:17:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x87e}) 00:17:44 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') creat(&(0x7f0000000100)='./file0\x00', 0x20) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:17:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x7e08}) 00:17:44 executing program 1: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)) 00:17:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2393.360871] FAULT_INJECTION: forcing a failure. [ 2393.360871] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.363511] CPU: 0 PID: 11884 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2393.365159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2393.367646] Call Trace: [ 2393.368234] dump_stack+0x107/0x163 [ 2393.369042] should_fail.cold+0x5/0xa [ 2393.369866] ? create_object.isra.0+0x3a/0xa20 [ 2393.370858] should_failslab+0x5/0x10 [ 2393.371687] kmem_cache_alloc+0x5b/0x350 [ 2393.372569] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2393.373902] create_object.isra.0+0x3a/0xa20 [ 2393.374855] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2393.375965] kmem_cache_alloc+0x159/0x350 [ 2393.376874] ptlock_alloc+0x1d/0x70 [ 2393.377676] pte_alloc_one+0x68/0x190 [ 2393.378503] __pte_alloc+0x1d/0x320 [ 2393.379295] copy_page_range+0x1a1d/0x3810 [ 2393.380211] ? SOFTIRQ_verbose+0x10/0x10 [ 2393.381110] ? lock_chain_count+0x20/0x20 [ 2393.382050] ? up_write+0x191/0x550 [ 2393.382834] ? vm_iomap_memory+0x190/0x190 [ 2393.383749] ? downgrade_write+0x3a0/0x3a0 [ 2393.384669] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2393.385861] ? __vma_link_rb+0x540/0x700 [ 2393.386749] dup_mm+0x8b9/0x1110 [ 2393.387499] ? vm_area_dup+0x290/0x290 [ 2393.388344] ? __raw_spin_lock_init+0x36/0x110 [ 2393.389364] copy_process+0x23f8/0x66f0 [ 2393.390230] ? lock_downgrade+0x6d0/0x6d0 [ 2393.391145] ? __cleanup_sighand+0xb0/0xb0 [ 2393.392074] ? find_held_lock+0x2c/0x110 [ 2393.392957] kernel_clone+0xe7/0xa20 [ 2393.393783] ? lock_downgrade+0x6d0/0x6d0 [ 2393.394678] ? find_held_lock+0x2c/0x110 [ 2393.395556] ? copy_init_mm+0x20/0x20 [ 2393.396385] ? ksys_write+0x12d/0x250 [ 2393.397227] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2393.398283] __do_sys_fork+0x8a/0xc0 [ 2393.399085] ? kernel_clone+0xa20/0xa20 [ 2393.399963] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2393.401107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.402220] ? trace_hardirqs_on+0x5b/0x180 [ 2393.403155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.404269] do_syscall_64+0x33/0x40 [ 2393.405093] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2393.406204] RIP: 0033:0x7f89b6ef5b19 [ 2393.407019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.411028] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2393.412688] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2393.414250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2393.415803] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.417380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.418931] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:17:44 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = getegid() setgid(r1) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, r1}}, './file0\x00'}) getresgid(&(0x7f0000005940), &(0x7f0000005980), &(0x7f00000059c0)) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r3 = getegid() setgid(r3) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r3) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="2e2f66696c83bf00"]) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r5 = getegid() setgid(r5) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r5) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r4, r5}}, './file0\x00'}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {0x1, 0x8}, [{0x2, 0x0, r4}, {0x2, 0x4}, {0x2, 0x7}, {}, {0x2, 0xf}], {0x4, 0x1}, [], {0x10, 0x3ac062db99232303}, {0x20, 0x2}}, 0x4c, 0x2) 00:17:44 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xa}) 00:17:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) lseek(r0, 0x8, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @local}, 0x10) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000100)={@loopback, @loopback, r4}, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/vlan/config\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:17:44 executing program 3: fork() (fail_nth: 71) [ 2393.640277] device lo entered promiscuous mode [ 2393.651583] device lo left promiscuous mode 00:17:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x1cd, 0x7, 0x200}) [ 2393.679805] device lo entered promiscuous mode 00:17:45 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000180)) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000100)={0x1f, 0x32, 0x10, 0x5, 0x7, 0x81, 0x6, 0x12f, 0x1}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000080)={0x4, 0x40, 0x40, 0x400, 0x81, "9f47601ce93f3ffc6849bb6be19ba74c5bd3a7", 0xfff, 0x3ff}) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f00000000c0)={0x1f, 0x80000000, 0x801, 0x209, 0x4, "48f5eb326d0000000000000400", 0x8, 0x9ab}) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000000)) [ 2393.694721] device lo left promiscuous mode [ 2393.703941] FAULT_INJECTION: forcing a failure. [ 2393.703941] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.706487] CPU: 1 PID: 11907 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2393.707955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2393.710334] Call Trace: [ 2393.710895] dump_stack+0x107/0x163 [ 2393.711663] should_fail.cold+0x5/0xa [ 2393.712469] ? __pmd_alloc+0x94/0x5e0 [ 2393.713285] should_failslab+0x5/0x10 [ 2393.714095] kmem_cache_alloc+0x5b/0x350 [ 2393.714960] __pmd_alloc+0x94/0x5e0 [ 2393.715725] copy_page_range+0x2b18/0x3810 [ 2393.716622] ? SOFTIRQ_verbose+0x10/0x10 [ 2393.717487] ? lock_chain_count+0x20/0x20 [ 2393.718416] ? up_write+0x191/0x550 [ 2393.719180] ? vm_iomap_memory+0x190/0x190 [ 2393.720079] ? downgrade_write+0x3a0/0x3a0 [ 2393.720980] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2393.722134] ? __vma_link_rb+0x540/0x700 [ 2393.723011] dup_mm+0x8b9/0x1110 [ 2393.723745] ? vm_area_dup+0x290/0x290 [ 2393.724577] ? __raw_spin_lock_init+0x36/0x110 [ 2393.725562] copy_process+0x23f8/0x66f0 [ 2393.726410] ? lock_downgrade+0x6d0/0x6d0 [ 2393.727311] ? __cleanup_sighand+0xb0/0xb0 [ 2393.728223] ? find_held_lock+0x2c/0x110 [ 2393.729115] kernel_clone+0xe7/0xa20 [ 2393.729906] ? lock_downgrade+0x6d0/0x6d0 [ 2393.730783] ? find_held_lock+0x2c/0x110 [ 2393.731644] ? copy_init_mm+0x20/0x20 [ 2393.732458] ? ksys_write+0x12d/0x250 [ 2393.733286] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2393.734320] __do_sys_fork+0x8a/0xc0 [ 2393.735110] ? kernel_clone+0xa20/0xa20 [ 2393.735973] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2393.737100] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.738197] ? trace_hardirqs_on+0x5b/0x180 [ 2393.739114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2393.740210] do_syscall_64+0x33/0x40 [ 2393.741016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2393.742106] RIP: 0033:0x7f89b6ef5b19 [ 2393.742898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.746817] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2393.748431] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2393.749963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2393.751480] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2393.753001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2393.754519] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2407.682451] kmemleak: 47 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:18:06 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) syz_io_uring_setup(0x2f86, &(0x7f0000000180)={0x0, 0xa1f8, 0x10, 0x0, 0x41}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000200)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6000001, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000280)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0xd6aa, {0x0, r0}, 0x2, 0x0, 0x1, {0x0, 0x0, r6}}, 0x6) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:06 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) r1 = dup3(r0, r0, 0x80000) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r2, 0xee00}}, './file0\x00'}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:18:06 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x399}) 00:18:06 executing program 3: fork() (fail_nth: 72) 00:18:06 executing program 6: io_uring_enter(0xffffffffffffffff, 0x7f53, 0x62ee, 0x2, &(0x7f0000000040), 0x8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:18:06 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x1}) 00:18:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:18:07 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x100) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000100)={@id={0x2, 0x0, @a}}) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000000)) 00:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) 00:18:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x3f, 0x7f, 0x8, 0x0, 0x722d6976, 0x90311, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1200000, 0x4, @perf_config_ext={0x20, 0x7}, 0x0, 0xffffffffffffffd7, 0x1, 0x4, 0x7fffffff, 0x2, 0x7fff, 0x0, 0x8}, 0xffffffffffffffff, 0xa, r0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack_expect\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000040)={0x9}) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x80000) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f00000000c0)={0x7d6, 0x7, 0x8, 0x6ebf06ce, 0x1, "b2a5848366047239e0940c5997a8643b566ef8", 0x8, 0xffff0001}) fchown(r1, r2, 0x0) [ 2415.722818] FAULT_INJECTION: forcing a failure. [ 2415.722818] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.725543] CPU: 1 PID: 11954 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2415.727018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2415.729438] Call Trace: [ 2415.730004] dump_stack+0x107/0x163 [ 2415.730787] should_fail.cold+0x5/0xa [ 2415.731598] ? ptlock_alloc+0x1d/0x70 [ 2415.732405] should_failslab+0x5/0x10 [ 2415.733211] kmem_cache_alloc+0x5b/0x350 [ 2415.734095] ptlock_alloc+0x1d/0x70 [ 2415.734873] pte_alloc_one+0x68/0x190 [ 2415.735683] __pte_alloc+0x1d/0x320 [ 2415.736464] copy_page_range+0x1a1d/0x3810 [ 2415.737392] ? SOFTIRQ_verbose+0x10/0x10 [ 2415.738302] ? up_write+0x191/0x550 [ 2415.739074] ? vm_iomap_memory+0x190/0x190 [ 2415.739976] ? downgrade_write+0x3a0/0x3a0 [ 2415.740876] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2415.742041] ? __vma_link_rb+0x540/0x700 [ 2415.742916] dup_mm+0x8b9/0x1110 [ 2415.743649] ? vm_area_dup+0x290/0x290 [ 2415.744488] ? __raw_spin_lock_init+0x36/0x110 [ 2415.745479] copy_process+0x23f8/0x66f0 [ 2415.746330] ? mark_lock+0xf5/0x2df0 [ 2415.747131] ? lock_downgrade+0x6d0/0x6d0 [ 2415.748036] ? __cleanup_sighand+0xb0/0xb0 [ 2415.748949] ? find_held_lock+0x2c/0x110 [ 2415.749822] kernel_clone+0xe7/0xa20 [ 2415.750618] ? lock_downgrade+0x6d0/0x6d0 [ 2415.751495] ? find_held_lock+0x2c/0x110 [ 2415.752369] ? copy_init_mm+0x20/0x20 [ 2415.753180] ? ksys_write+0x12d/0x250 [ 2415.754022] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2415.755052] ? vfs_write+0x2ac/0xa20 [ 2415.755858] __do_sys_fork+0x8a/0xc0 [ 2415.756649] ? kernel_clone+0xa20/0xa20 [ 2415.757528] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2415.758645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2415.759738] ? trace_hardirqs_on+0x5b/0x180 [ 2415.760656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2415.761766] do_syscall_64+0x33/0x40 [ 2415.762560] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2415.763653] RIP: 0033:0x7f89b6ef5b19 [ 2415.764450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2415.768385] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2415.770015] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2415.771529] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2415.773048] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2415.774579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2415.776094] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2425.991886] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:18:25 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x10, 0x1) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) fallocate(r1, 0x48, 0x9, 0xffffffff) 00:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) 00:18:25 executing program 3: fork() (fail_nth: 73) 00:18:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000040)) 00:18:25 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xa00}) 00:18:25 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x4400, 0x0, 0x2, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, r1, 0x11, &(0x7f0000000480)={0x4, 0x0, 0x6}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x81, 0x1f, 0x6, 0x5, 0x0, 0x771, 0x20080, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000180)}, 0x102, 0x4, 0x0, 0x7, 0x3, 0x4, 0x101, 0x0, 0x8, 0x0, 0x80000001}, r1, 0xffffffffffffffff, r0, 0x3) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b80)='/sys/module/hid', 0x82, 0x16f) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r4 = gettid() r5 = getpgid(0x0) rt_tgsigqueueinfo(r5, r4, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) process_vm_readv(r5, &(0x7f0000000500)=[{0xfffffffffffffffe}, {&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f0000000300)=""/228, 0xe4}, {&(0x7f00000005c0)=""/159, 0x9f}, {&(0x7f0000000400)=""/60, 0x3c}], 0x5, &(0x7f0000000800)=[{&(0x7f0000000440)}, {&(0x7f0000000680)=""/165, 0xa5}, {&(0x7f0000000740)=""/72, 0x48}, {&(0x7f00000007c0)=""/52, 0x34}], 0x4, 0x0) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000a00)={0x0}, &(0x7f0000000a40)=0xc) rt_tgsigqueueinfo(r6, r1, 0x7, &(0x7f0000000a80)={0x18, 0x81, 0x7}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)=0x0) ptrace$getsig(0x4202, r2, 0x180000000, &(0x7f00000008c0)) rt_sigqueueinfo(r7, 0x19, &(0x7f0000000840)={0x10019, 0x978, 0x3}) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x9, 0x73, 0x5, 0x7f, 0x0, 0x7f, 0xc870a, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000940)}, 0x40044, 0x81, 0xffffffff, 0x7, 0x8001, 0x95, 0x2, 0x0, 0x8dd, 0x0, 0x6}, r1, 0xe, r0, 0x9) r8 = fcntl$getown(r3, 0x9) rt_sigqueueinfo(r8, 0x0, &(0x7f0000000b00)={0x40, 0xffff7fff, 0x222}) 00:18:25 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pread64(r1, &(0x7f00000000c0)=""/12, 0xc, 0xfffffffffffffe01) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x250, r0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xe4, 0xa8, @random="a3d1957bd94c005e1905eb67601f612cfd0f5857b7dc234519fe81592a1b8639407ebda0aa6bdd757eec367bc520b3f49e258bc2dc303f9cac0613d9e542c5c1ddc827dfe809da1c0791359df3e2883c84df33e0a43c78024ae58fb6cfce7c5bd1528956e43cdf9131cc671cd8b09ea04128cc1330fe018dd74d6ec8b4be51889f2823689a281bc4011f9635955c9f10c3097a9c880d245d56e56ded7c9b67147a5fa42769f1b2b30b53309b86d77a0a1285c11f3588e76dab45b30bb22adeb03c662b4076940a82e309a1d7db359ba9431da1d39a792d1246e2a37d65059779"}, @DEVLINK_ATTR_RATE_NODE_NAME={0xfd, 0xa8, @random="36445f2d08828c8dee63bf0b8b44176ccd1a6d4f7c47584c1fe337b90c5a86e40009f665de6ccbabe00af00878e2558a9e6be26f6aa858fb1b6028ce4b9994ecb4fcf8ba0a7ae8c0e845a1e8049ead1c8ca70f26cf156321d5579331f50c94e66965991bab07255babc9ad150ec7d74114606c4068079c18f698a97bfd44e7252d49601189f9bb32225a5bd2fa6e8e3e24d1c7e7f171542259bb0df9acfa60d2485eec02e6816af520cb55bf7c2182bc84299b6f02bb28f42d92e3b9d9365ba65ec2f6458e0570eb6a6bffd2f28468385d7062225e14da4afa724315973fb25799c1a5de1f069348ad98fc26ba272f9094c4ccd14d356ba255"}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@pci={{0x8}, {0x11}}]}, 0x250}, 0x1, 0x0, 0x0, 0x24000004}, 0x4001) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f00000008c0)={0x0, 0x0, "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", "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"}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r5 = openat(r4, &(0x7f0000000100)='./file0\x00', 0x165800, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f00000018c0)={r3, 0xffffffffffff8001}) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r5, {0x81, 0x2}}, './file0\x00'}) sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000028c0)={0x15c, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}]}, 0x15c}}, 0x4) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000600)={[0x2]}, 0x8, 0x80000) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r7, &(0x7f0000000880)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5c010000", @ANYRES16=r8, @ANYBLOB="00032cbd7000fbdbdf2506000000080001007063690011000200303030303a30303a31302e3000000000080003000200000006000400030000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000200000006000400020000000e0001006e657464657673036d0000000f0002006e6574645556a4e4657673696d300000080003000300000006000400020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000348000000000600040003000000080001007063690011000200303030303a30303a31302e3000000000080003000200000006000400030000000e0001006e657564657673696d0000000f0002006e657464657673696d300000080003000200000006000400030000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000006000400"], 0x15c}, 0x1, 0x0, 0x0, 0x20094}, 0x50000) [ 2434.240627] FAULT_INJECTION: forcing a failure. [ 2434.240627] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.243150] CPU: 0 PID: 11991 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2434.244631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2434.247080] Call Trace: [ 2434.247671] dump_stack+0x107/0x163 [ 2434.248480] should_fail.cold+0x5/0xa [ 2434.249323] ? vm_area_dup+0x78/0x290 [ 2434.250175] should_failslab+0x5/0x10 [ 2434.251011] kmem_cache_alloc+0x5b/0x350 [ 2434.251921] vm_area_dup+0x78/0x290 [ 2434.252736] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 2434.253784] ? lock_downgrade+0x6d0/0x6d0 [ 2434.254695] ? copy_page_range+0x242d/0x3810 [ 2434.255694] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 2434.256728] ? avc_has_extended_perms+0xec0/0xec0 [ 2434.257820] ? vm_area_alloc+0x110/0x110 [ 2434.258730] ? selinux_vm_enough_memory+0x10f/0x170 [ 2434.259830] ? selinux_sb_statfs+0x250/0x250 [ 2434.260812] ? percpu_counter_add_batch+0x8b/0x130 [ 2434.261909] ? __vm_enough_memory+0x184/0x360 [ 2434.262899] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2434.264035] dup_mm+0x44d/0x1110 [ 2434.264807] ? vm_area_dup+0x290/0x290 [ 2434.265687] ? __raw_spin_lock_init+0x36/0x110 [ 2434.266708] copy_process+0x23f8/0x66f0 [ 2434.267589] ? lock_downgrade+0x6d0/0x6d0 [ 2434.268522] ? __cleanup_sighand+0xb0/0xb0 [ 2434.269469] ? find_held_lock+0x2c/0x110 [ 2434.270378] kernel_clone+0xe7/0xa20 [ 2434.271202] ? lock_downgrade+0x6d0/0x6d0 [ 2434.272478] ? find_held_lock+0x2c/0x110 [ 2434.272495] ? copy_init_mm+0x20/0x20 [ 2434.272518] ? ksys_write+0x12d/0x250 [ 2434.275065] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2434.275092] __do_sys_fork+0x8a/0xc0 [ 2434.275109] ? kernel_clone+0xa20/0xa20 [ 2434.275148] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2434.275165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.275181] ? trace_hardirqs_on+0x5b/0x180 00:18:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) dup2(r0, r0) 00:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 2434.275203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.275218] do_syscall_64+0x33/0x40 [ 2434.275235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2434.275246] RIP: 0033:0x7f89b6ef5b19 00:18:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @rand_addr=0x64010101}, 0x10) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r3 = accept4$unix(r0, 0x0, &(0x7f0000000100), 0x80800) dup3(r3, r0, 0x0) [ 2434.275265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2434.275274] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 00:18:25 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) [ 2434.275293] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2434.275303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2434.275313] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2434.275322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2434.275333] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:18:25 executing program 3: fork() (fail_nth: 74) 00:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:18:25 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x8) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000000)) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) 00:18:26 executing program 2: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffff9c, &(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0x2, 0x6000, 0x1}, 0x7ff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:26 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x9, 0x10001, 0x0, 0x7, 0x800, 0x1}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x7ff, 0x5}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)={0x0, @aes256, 0x0, @desc4}) 00:18:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000}) 00:18:26 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000200)={0x0, 0x1, 0x80000000}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x10201, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000180)={0x63, 0x0, '\x00', 0x1, &(0x7f0000000180)}) 00:18:26 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000180)}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000100)={0x0, 0x4000}) [ 2434.695344] FAULT_INJECTION: forcing a failure. [ 2434.695344] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.697862] CPU: 1 PID: 12018 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2434.699352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2434.702079] Call Trace: [ 2434.702711] dump_stack+0x107/0x163 [ 2434.703503] should_fail.cold+0x5/0xa [ 2434.704334] ? ptlock_alloc+0x1d/0x70 [ 2434.705159] should_failslab+0x5/0x10 [ 2434.705988] kmem_cache_alloc+0x5b/0x350 [ 2434.706991] ptlock_alloc+0x1d/0x70 [ 2434.707856] pte_alloc_one+0x68/0x190 [ 2434.708781] __pte_alloc+0x1d/0x320 [ 2434.709593] copy_page_range+0x1a1d/0x3810 [ 2434.710492] ? SOFTIRQ_verbose+0x10/0x10 [ 2434.711363] ? lock_chain_count+0x20/0x20 [ 2434.712288] ? up_write+0x191/0x550 [ 2434.713071] ? vm_iomap_memory+0x190/0x190 [ 2434.713996] ? downgrade_write+0x3a0/0x3a0 [ 2434.715020] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2434.716425] ? __vma_link_rb+0x540/0x700 [ 2434.717314] dup_mm+0x8b9/0x1110 [ 2434.718071] ? vm_area_dup+0x290/0x290 [ 2434.718914] ? __raw_spin_lock_init+0x36/0x110 [ 2434.719900] copy_process+0x23f8/0x66f0 [ 2434.720770] ? lock_downgrade+0x6d0/0x6d0 [ 2434.721685] ? __cleanup_sighand+0xb0/0xb0 [ 2434.722715] ? find_held_lock+0x2c/0x110 [ 2434.723672] kernel_clone+0xe7/0xa20 [ 2434.724635] ? lock_downgrade+0x6d0/0x6d0 [ 2434.725528] ? find_held_lock+0x2c/0x110 [ 2434.726395] ? copy_init_mm+0x20/0x20 [ 2434.727212] ? ksys_write+0x12d/0x250 [ 2434.728036] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2434.729076] __do_sys_fork+0x8a/0xc0 [ 2434.729893] ? kernel_clone+0xa20/0xa20 [ 2434.730762] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2434.731993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.733245] ? trace_hardirqs_on+0x5b/0x180 [ 2434.734232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2434.735332] do_syscall_64+0x33/0x40 [ 2434.736128] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2434.737223] RIP: 0033:0x7f89b6ef5b19 [ 2434.738038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2434.742398] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2434.744257] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2434.746071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2434.747765] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2434.749503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2434.751196] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2447.596431] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:18:47 executing program 3: fork() (fail_nth: 75) 00:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) 00:18:47 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x7fff, 0x204140) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:18:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000123f4b5dd000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000000)={0x0, 0x6, 0x800}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100), &(0x7f0000000180)={'L-', 0x10001}, 0x16, 0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 00:18:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x2, 0x4, 0x8, 0x0, 0x0, 0x4006, 0x82110, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_config_ext={0x36d, 0x800}, 0x1880, 0x9, 0xff, 0x9, 0xffffffffffffffff, 0x6, 0x1, 0x0, 0x8, 0x0, 0x5}, r1, 0x8, r2, 0xa) 00:18:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0xf, 0x80, 0x3f, 0x5, 0x7, 0xff, 0x0, 0xe08e, 0x20, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000100), 0x8}, 0x18000, 0x5, 0x8, 0x2, 0x1ff, 0x11, 0x9, 0x0, 0x7, 0x0, 0x2}, r0, 0x2, r2, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:18:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x9903}) 00:18:47 executing program 5: mknod$loop(&(0x7f0000000080)='./file0/file0\x00', 0x1000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000140), &(0x7f0000000180)=0x200007ff, 0xfffffffffffffedb, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x36}}, './file0\x00'}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, r3, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) openat2(r1, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)={0x2001, 0x155, 0x1}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r6 = fcntl$dupfd(r0, 0x0, r5) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc8, 0x10001, 0x100b91, 0x0, 0x3, r4}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)={0x40, 0x9}, 0x18) [ 2455.742638] FAULT_INJECTION: forcing a failure. [ 2455.742638] name failslab, interval 1, probability 0, space 0, times 0 [ 2455.745522] CPU: 1 PID: 12052 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2455.747125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2455.749684] Call Trace: [ 2455.750289] dump_stack+0x107/0x163 [ 2455.751111] should_fail.cold+0x5/0xa [ 2455.751970] ? vm_area_dup+0x78/0x290 [ 2455.752825] should_failslab+0x5/0x10 [ 2455.753695] kmem_cache_alloc+0x5b/0x350 [ 2455.754642] vm_area_dup+0x78/0x290 [ 2455.755487] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 2455.756554] ? lock_downgrade+0x6d0/0x6d0 [ 2455.757492] ? copy_page_range+0x242d/0x3810 [ 2455.758521] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 2455.759587] ? avc_has_extended_perms+0xec0/0xec0 [ 2455.760701] ? vm_area_alloc+0x110/0x110 [ 2455.761626] ? selinux_vm_enough_memory+0x10f/0x170 [ 2455.762782] ? selinux_sb_statfs+0x250/0x250 [ 2455.763793] ? percpu_counter_add_batch+0x8b/0x130 [ 2455.764930] ? __vm_enough_memory+0x184/0x360 [ 2455.765963] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2455.767140] dup_mm+0x44d/0x1110 [ 2455.768025] ? vm_area_dup+0x290/0x290 [ 2455.769074] ? __raw_spin_lock_init+0x36/0x110 [ 2455.770232] copy_process+0x23f8/0x66f0 [ 2455.771148] ? lock_downgrade+0x6d0/0x6d0 [ 2455.772108] ? __cleanup_sighand+0xb0/0xb0 [ 2455.773092] ? find_held_lock+0x2c/0x110 [ 2455.774099] kernel_clone+0xe7/0xa20 [ 2455.774885] ? lock_downgrade+0x6d0/0x6d0 [ 2455.775755] ? find_held_lock+0x2c/0x110 [ 2455.776607] ? copy_init_mm+0x20/0x20 [ 2455.777414] ? ksys_write+0x12d/0x250 [ 2455.778250] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2455.779272] __do_sys_fork+0x8a/0xc0 [ 2455.780050] ? kernel_clone+0xa20/0xa20 [ 2455.781026] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2455.782148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.783437] ? trace_hardirqs_on+0x5b/0x180 [ 2455.784345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2455.785424] do_syscall_64+0x33/0x40 [ 2455.786228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2455.787308] RIP: 0033:0x7f89b6ef5b19 [ 2455.788092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2455.792711] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2455.794572] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2455.796380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2455.798128] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2455.799869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2455.801686] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:18:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:18:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x1000000}) 00:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:18:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x280000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000200)={0x5, 0x80, 0x63, 0x1f, 0x80, 0x0, 0x0, 0x7fffffff, 0x8000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x1200, 0xfffffffffffffffc, 0x80000001, 0x3, 0x5, 0x0, 0x3, 0x0, 0xfff, 0x0, 0x8}) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x456) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000100)={0x101, 0x1, 0x1, 0x9, 0x5, "2ac5b9e04f7526998ef06938acaec5abf96a29", 0x3, 0xffffffff}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x7) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000180)) 00:18:47 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockname(r0, &(0x7f0000000100)=@in={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x80) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendfile(r1, r0, &(0x7f0000000180)=0x7, 0x8) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') 00:18:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/11) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:18:47 executing program 3: fork() (fail_nth: 76) 00:18:47 executing program 6: prctl$PR_SET_FPEMU(0xa, 0x2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:18:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffeffffffffffffd, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:18:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8, 0x1f, 0x7, 0x3f, 0x0, 0x8ec, 0x10340, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000100), 0x7}, 0x2a001, 0x1, 0x5, 0x4, 0x80, 0xd5, 0xffff, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffe}, r0, 0x2, r2, 0x3) socket$inet(0x2, 0xa, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:18:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2456.272469] FAULT_INJECTION: forcing a failure. [ 2456.272469] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.275676] CPU: 0 PID: 12092 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2456.277594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2456.280762] Call Trace: [ 2456.281592] dump_stack+0x107/0x163 [ 2456.282441] should_fail.cold+0x5/0xa [ 2456.283311] ? create_object.isra.0+0x3a/0xa20 [ 2456.284351] should_failslab+0x5/0x10 [ 2456.285217] kmem_cache_alloc+0x5b/0x350 [ 2456.286156] create_object.isra.0+0x3a/0xa20 [ 2456.287156] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2456.288311] kmem_cache_alloc+0x159/0x350 [ 2456.289267] anon_vma_clone+0xdc/0x580 [ 2456.290176] anon_vma_fork+0x82/0x630 [ 2456.291049] ? __vm_enough_memory+0x184/0x360 [ 2456.292077] dup_mm+0x861/0x1110 [ 2456.292861] ? vm_area_dup+0x290/0x290 [ 2456.293757] ? __raw_spin_lock_init+0x36/0x110 [ 2456.294802] copy_process+0x23f8/0x66f0 [ 2456.295720] ? lock_downgrade+0x6d0/0x6d0 [ 2456.296680] ? __cleanup_sighand+0xb0/0xb0 [ 2456.297664] ? find_held_lock+0x2c/0x110 [ 2456.298596] kernel_clone+0xe7/0xa20 [ 2456.299448] ? lock_downgrade+0x6d0/0x6d0 [ 2456.300385] ? find_held_lock+0x2c/0x110 [ 2456.301314] ? copy_init_mm+0x20/0x20 [ 2456.302197] ? ksys_write+0x12d/0x250 [ 2456.303081] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2456.304188] __do_sys_fork+0x8a/0xc0 [ 2456.305038] ? kernel_clone+0xa20/0xa20 [ 2456.305971] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2456.307169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.308343] ? trace_hardirqs_on+0x5b/0x180 [ 2456.309332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.310504] do_syscall_64+0x33/0x40 [ 2456.311358] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2456.312522] RIP: 0033:0x7f89b6ef5b19 [ 2456.313378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.317577] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2456.319313] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2456.320934] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2456.322561] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2456.324181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.325798] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2470.551617] kmemleak: 41 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:19:09 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x2000000}) 00:19:09 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/21, 0x15, 0x10000, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:19:09 executing program 1: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="54010000", @ANYRES16=0x0, @ANYBLOB="080028bd7000fddbdf25070000006000038008000500e000000214000200687372300000000000000000000000000800030000000000080001000200000014000600fc0000000000000000000000000000010800030002000000140002006d6163766c616e3100000000000000000c00018008000500030000000c00028005000d000000000008000500010000001400028006000f00050000000800090037af000034000280060002004e200000080003000300000006000f000700000005000d00000000000800060004000000080006000800000054000380080001000200000005003e32e80c755b4ffe8108000400000008000500ac1e00010800010000000000140002006272696467655f736c6176655f30000006000400080000001400020073797a5f74756e000000000000000000240001800800050001000000060002003a000000080009002c00000008000500010000000640ea89c94c8a002400b45af25d2c1cbab864da1f968bc8fd57c6361e1aa55fd80c913128b665340592d151185075c00d21b4543b9700010b58100c61b649e8f06c8f239caf3a4772b6bcb6ac5d5cada2e83917ba600a724b2ba79eb6ca25cad67cbf63982cb7b70c02b450b9d3a24994fde8218b82d50b7051e8fa5169e555b39ea43631581f6d3982c8bfaf5d8c65fe7c2e1df58e5dc81af9c6a16282bd8e31c26d9ff14829c17c0d06d515fbdb"], 0x154}, 0x1, 0x0, 0x0, 0x2000c000}, 0x20040040) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSBRKP(r0, 0x5425, 0x3840) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000280)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:19:09 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000005b00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="edd1ed32000000002e2f66696c653000"]) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000005b40)={0x0, r1, 0x4, 0xfffffffffffff000, 0x1, 0xffffffffffffa2ed}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:19:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/227, 0xe3}, {&(0x7f0000000280)=""/251, 0xfb}], 0x3) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x200, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x6) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000400)=@IORING_OP_CONNECT={0x10, 0x7, 0x0, r5, 0x80, &(0x7f0000000380)=@can, 0x0, 0x0, 0x1}, 0x0) 00:19:09 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:19:09 executing program 3: fork() (fail_nth: 77) 00:19:09 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) [ 2478.408188] blktrace: Concurrent blktraces are not allowed on loop10 00:19:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x101) [ 2478.468322] FAULT_INJECTION: forcing a failure. [ 2478.468322] name failslab, interval 1, probability 0, space 0, times 0 [ 2478.470772] CPU: 1 PID: 12123 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2478.472388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2478.475029] Call Trace: [ 2478.475675] dump_stack+0x107/0x163 [ 2478.476447] should_fail.cold+0x5/0xa [ 2478.477340] ? down_write+0xe0/0x150 [ 2478.478213] ? anon_vma_clone+0xdc/0x580 [ 2478.479132] should_failslab+0x5/0x10 [ 2478.480029] kmem_cache_alloc+0x5b/0x350 [ 2478.480927] anon_vma_clone+0xdc/0x580 [ 2478.481807] anon_vma_fork+0x82/0x630 [ 2478.482755] ? __vm_enough_memory+0x184/0x360 [ 2478.483701] dup_mm+0x861/0x1110 [ 2478.484504] ? vm_area_dup+0x290/0x290 [ 2478.485464] ? __raw_spin_lock_init+0x36/0x110 [ 2478.486531] copy_process+0x23f8/0x66f0 [ 2478.487476] ? lock_downgrade+0x6d0/0x6d0 [ 2478.488424] ? __cleanup_sighand+0xb0/0xb0 [ 2478.489407] ? find_held_lock+0x2c/0x110 [ 2478.490399] kernel_clone+0xe7/0xa20 [ 2478.491238] ? lock_downgrade+0x6d0/0x6d0 [ 2478.492154] ? find_held_lock+0x2c/0x110 [ 2478.493109] ? copy_init_mm+0x20/0x20 [ 2478.493955] ? ksys_write+0x12d/0x250 [ 2478.494883] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2478.495915] __do_sys_fork+0x8a/0xc0 [ 2478.496703] ? kernel_clone+0xa20/0xa20 [ 2478.497563] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2478.498680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.499772] ? trace_hardirqs_on+0x5b/0x180 [ 2478.500691] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.501780] do_syscall_64+0x33/0x40 [ 2478.502597] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2478.503683] RIP: 0033:0x7f89b6ef5b19 [ 2478.504473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.508391] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2478.509999] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2478.511517] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2478.513026] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.514561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2478.516070] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:19:09 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:19:09 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206000, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x1, 0x7}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_io_uring_setup(0x6ca1, &(0x7f00000000c0)={0x0, 0xcdf, 0x4, 0x1, 0xb1, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x1}) [ 2490.499712] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:19:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) pipe2$9p(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81000) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000001380)=ANY=[@ANYBLOB="0000000000c001000200000000000000010000008002000009000000000000000300000000000000090000000000000009000000000000000000000000000000000000000000000002010000000000000000000000000000ff01000000000000010400000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000010000000100000006000000000000000000000000000000000000000000000000000000000000000000000000000000b10f000000000000a1680000000000000000000000000000000000000000000000000000000000008020000000000000000000000000000000000000000000000800000000000000050000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000440600000000000001000000000000000000000000000000000000000000000004040000000000000000000000000000080000000000000000000000000003000000000000000000000000000000000000000000000092010000000000000000000000000000ffffffff0000000003138500000000000600000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000009e00000000000000e8000000000000000000000000000000000000000000000000020000000000000000000000000000279376e615b3be12903d7784a256cb51d80e38b20ecbeffea6c391ddb7fdb3e76d10f27d1cab2907181b06f3dafecfabf2b6ccbe28a06547990cabbf52d054953fa4a5a98a87"]) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) write$P9_RATTACH(r3, &(0x7f0000001340)={0x14, 0x69, 0x1, {0x8, 0x4}}, 0x14) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000001080)=0x4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r5, 0x4018f50b, &(0x7f0000001100)={0x1, 0x0, 0xffffffffffffff81}) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000040)=""/4096) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000001040)) 00:19:28 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:19:28 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @local}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000340)={@private2, 0x0}, &(0x7f0000000380)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000000)={r9, 0x1, 0x6, @local}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @empty}}}}, &(0x7f00000004c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'tunl0\x00', &(0x7f00000005c0)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x400, 0x0, {{0x1c, 0x4, 0x3, 0x5, 0x70, 0x68, 0x0, 0x7, 0x4, 0x0, @private=0xa010100, @multicast1, {[@generic={0x86, 0x12, "6d4ef87edf1595758354c9c2ddbb45dc"}, @timestamp={0x44, 0x20, 0xda, 0x0, 0x1, [0x10000000, 0x7, 0xcd44, 0x4, 0x7f, 0x1, 0x5e]}, @end, @lsrr={0x83, 0x27, 0xf7, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @multicast1, @local]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x214, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x214}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r12, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:19:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000005740)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005680)=[{{&(0x7f00000031c0)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000003fc0)=""/56, 0x38}], 0x1, &(0x7f0000004040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}}, {{0x0, 0x0, &(0x7f00000041c0)=[{&(0x7f0000004100)=""/42, 0x2a}, {&(0x7f0000004140)=""/110, 0x6e}], 0x2, &(0x7f0000004200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{&(0x7f0000004300)=@abs, 0x6e, &(0x7f0000005600)=[{&(0x7f0000004380)=""/68, 0x44}, {&(0x7f0000004400)=""/129, 0x81}, {&(0x7f00000044c0)=""/13, 0xd}, {&(0x7f0000004500)=""/4096, 0x1000}, {&(0x7f0000005500)=""/251, 0xfb}], 0x5}}], 0x3, 0x40002101, &(0x7f0000005780)={r1, r2+60000000}) tee(r3, r0, 0x20, 0xc) r5 = socket$inet(0x2, 0xa, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') recvmmsg$unix(r6, &(0x7f0000003940)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000000300), 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000400)=""/147, 0x93}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/223, 0xdf}, {&(0x7f00000004c0)=""/181, 0xb5}], 0x5, &(0x7f0000001740)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f00000017c0)=@abs, 0x6e, &(0x7f0000001940)=[{&(0x7f0000001840)=""/234, 0xea}], 0x1, &(0x7f0000001980)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x100}}, {{&(0x7f0000001a80), 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001b00)=""/7, 0x7}, {&(0x7f0000001b40)=""/36, 0x24}, {&(0x7f0000001b80)=""/196, 0xc4}, {&(0x7f0000001c80)=""/86, 0x56}], 0x4, &(0x7f0000001e00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000001ec0), 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d40)=""/29, 0x1d}, {&(0x7f0000001f40)=""/29, 0x1d}], 0x2, &(0x7f0000001fc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000002000)=@abs, 0x6e, &(0x7f0000003180)=[{&(0x7f0000002080)=""/196, 0xc4}, {&(0x7f0000002180)=""/4096, 0x1000}], 0x2, &(0x7f0000003d40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}}, {{0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000003240)=""/135, 0x87}, {&(0x7f0000003300)}], 0x2, &(0x7f0000003380)}}, {{&(0x7f00000033c0), 0x6e, &(0x7f00000034c0)=[{&(0x7f0000003440)=""/66, 0x42}], 0x1, &(0x7f0000003500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000003580), 0x6e, &(0x7f0000003800)=[{&(0x7f0000003600)=""/99, 0x63}, {&(0x7f0000003680)=""/122, 0x7a}, {&(0x7f0000003700)=""/198, 0xc6}], 0x3, &(0x7f0000003840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}], 0x9, 0x100, &(0x7f0000003b80)={0x0, 0x989680}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000003d00)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000003cc0)='./file0\x00', 0x100, 0x2040, 0x12345}, 0x5) ioctl$sock_inet_SIOCADDRT(r9, 0x890b, &(0x7f0000003c40)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @empty}, 0x721, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1ff, 0x2, 0x3ff}) r10 = signalfd(r4, &(0x7f00000057c0)={[0xe51]}, 0x8) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r10, &(0x7f0000005900)={&(0x7f0000005800)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000058c0)={&(0x7f0000005840)={0x70, 0x0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xff}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000050) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000005980)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x88, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005940)='team_slave_0\x00', 0x6, 0x1, 0x1000}) pread64(r8, &(0x7f0000003bc0)=""/125, 0x7d, 0x101) copy_file_range(r5, &(0x7f0000003300)=0x4, r7, &(0x7f0000003380)=0x65d1920a, 0x7fff, 0x0) preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r10, 0x801c581f, &(0x7f0000005a00)={0x1000, 0x400, 0xbf3, 0x0, 0x4}) 00:19:28 executing program 3: fork() (fail_nth: 78) 00:19:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:19:28 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000000}) 00:19:28 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2497.413909] FAULT_INJECTION: forcing a failure. [ 2497.413909] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.417138] CPU: 0 PID: 12168 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2497.417253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2497.417259] Call Trace: [ 2497.417283] dump_stack+0x107/0x163 [ 2497.417304] should_fail.cold+0x5/0xa [ 2497.417323] ? create_object.isra.0+0x3a/0xa20 [ 2497.417341] should_failslab+0x5/0x10 [ 2497.417356] kmem_cache_alloc+0x5b/0x350 00:19:28 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2497.417380] create_object.isra.0+0x3a/0xa20 [ 2497.417395] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 00:19:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x28, 0x20, 0x6, 0x3f, 0x0, 0x3, 0x291, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0xc9, 0xbc3}, 0x0, 0x469bf4b, 0xffff1791, 0x5, 0x1, 0x2, 0x400, 0x0, 0x6, 0x0, 0xa0}, 0xffffffffffffffff, 0x2, r0, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="5c0100003600080029bd7000fcdbdf250900000008001300", @ANYRES32=r2, @ANYBLOB="0104000000000000", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB], 0x15c}, 0x1, 0x0, 0x0, 0x80}, 0x20000011) epoll_create(0x7fffffff) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:19:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000100)={0x6, 0x99, 0x3, 0x2, 0x0, "18eead710eeefa57a440c99feec6a2109a9457", 0x8459, 0xda05}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x8, 0x7fff, 0x8, 0x6, 0xf, "0abed6373e5ea440"}) [ 2497.417417] kmem_cache_alloc+0x159/0x350 [ 2497.417442] anon_vma_clone+0xdc/0x580 [ 2497.417471] anon_vma_fork+0x82/0x630 [ 2497.417490] ? __vm_enough_memory+0x184/0x360 [ 2497.417511] dup_mm+0x861/0x1110 [ 2497.417543] ? vm_area_dup+0x290/0x290 [ 2497.417567] ? __raw_spin_lock_init+0x36/0x110 [ 2497.417591] copy_process+0x23f8/0x66f0 [ 2497.417612] ? lock_downgrade+0x6d0/0x6d0 [ 2497.417649] ? __cleanup_sighand+0xb0/0xb0 [ 2497.417681] ? find_held_lock+0x2c/0x110 [ 2497.417703] kernel_clone+0xe7/0xa20 [ 2497.417719] ? lock_downgrade+0x6d0/0x6d0 [ 2497.417732] ? find_held_lock+0x2c/0x110 [ 2497.417747] ? copy_init_mm+0x20/0x20 [ 2497.417767] ? ksys_write+0x12d/0x250 [ 2497.417792] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2497.417819] __do_sys_fork+0x8a/0xc0 [ 2497.417834] ? kernel_clone+0xa20/0xa20 [ 2497.417869] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2497.417886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.417902] ? trace_hardirqs_on+0x5b/0x180 [ 2497.417926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2497.417941] do_syscall_64+0x33/0x40 [ 2497.417957] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2497.417969] RIP: 0033:0x7f89b6ef5b19 [ 2497.417988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.417997] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2497.418016] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2497.418026] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2497.418036] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2497.418045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:19:29 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2497.418055] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2497.609700] device lo entered promiscuous mode 00:19:29 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) [ 2497.786017] device lo left promiscuous mode [ 2497.802461] device lo entered promiscuous mode [ 2497.849209] device lo left promiscuous mode [ 2509.987869] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:19:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:19:49 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:19:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x81) 00:19:49 executing program 3: fork() (fail_nth: 79) 00:19:49 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x22441, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, 0x0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) rt_tgsigqueueinfo(r2, 0x0, 0x40, &(0x7f0000000680)={0x2c, 0x4f0e, 0x2}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x0, 0x4, 0x8, 0x4b, 0x0, 0x4, 0x6089e, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x2, @perf_bp={&(0x7f00000004c0), 0x8}, 0x10200, 0x1, 0xfffffffa, 0x4, 0x40, 0x2, 0x0, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0xa) pread64(r3, &(0x7f0000000580)=""/119, 0x77, 0x7ff) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x113003, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$TIOCSCTTY(r6, 0x540e, 0x80000001) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000440)={0x85, 0x2, 0x6}) fdatasync(r1) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000040)=0xd3) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) r7 = openat2(r4, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x20100, 0x188, 0xb}, 0x18) clone3(&(0x7f0000000380)={0x18000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0x1b}, &(0x7f00000001c0)=""/131, 0x83, &(0x7f0000000280)=""/167, &(0x7f0000000340), 0x0, {r7}}, 0x58) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) kcmp(0xffffffffffffffff, r8, 0x0, r9, r0) 00:19:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:19:49 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xa000000}) 00:19:49 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x1) 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2518.639776] FAULT_INJECTION: forcing a failure. [ 2518.639776] name failslab, interval 1, probability 0, space 0, times 0 [ 2518.642343] CPU: 0 PID: 12212 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2518.643938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2518.646548] Call Trace: [ 2518.647171] dump_stack+0x107/0x163 [ 2518.648000] should_fail.cold+0x5/0xa [ 2518.648837] ? anon_vma_clone+0xdc/0x580 [ 2518.649727] should_failslab+0x5/0x10 [ 2518.650558] kmem_cache_alloc+0x5b/0x350 [ 2518.651461] anon_vma_clone+0xdc/0x580 00:19:50 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000180)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f00000005c0)={r1, "153973ad321e834492aa00ecf17f6e58"}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCEXCL(r2, 0x540c) [ 2518.652325] anon_vma_fork+0x82/0x630 [ 2518.653342] ? __vm_enough_memory+0x184/0x360 [ 2518.654327] dup_mm+0x861/0x1110 [ 2518.655101] ? vm_area_dup+0x290/0x290 [ 2518.655960] ? __raw_spin_lock_init+0x36/0x110 [ 2518.656966] copy_process+0x23f8/0x66f0 [ 2518.657837] ? lock_downgrade+0x6d0/0x6d0 [ 2518.658771] ? __cleanup_sighand+0xb0/0xb0 [ 2518.659694] ? __lockdep_reset_lock+0x180/0x180 [ 2518.660726] ? find_held_lock+0x2c/0x110 [ 2518.661614] kernel_clone+0xe7/0xa20 [ 2518.662427] ? lock_downgrade+0x6d0/0x6d0 [ 2518.663354] ? find_held_lock+0x2c/0x110 [ 2518.664242] ? copy_init_mm+0x20/0x20 [ 2518.665076] ? ksys_write+0x12d/0x250 [ 2518.665915] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2518.667001] __do_sys_fork+0x8a/0xc0 [ 2518.667807] ? kernel_clone+0xa20/0xa20 [ 2518.668689] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2518.669863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2518.671000] ? trace_hardirqs_on+0x5b/0x180 00:19:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/packet\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0xfffffffffffffde4) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="03000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000a004e2000000001fc010000000000000000000000000001ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200400040fc000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e12900000000000a004e2200000009fe880000000000000000000000000101000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22000000defca21af7ba07a0f3da"], 0x410) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xec, 0x2, 0x1, 0x6, 0x0, 0x8, 0x1402, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4b, 0x1, @perf_config_ext={0xea}, 0x8440, 0x91, 0x6, 0x3, 0x49, 0x9, 0x8000, 0x0, 0x22, 0x0, 0x80000000}, r4, 0xf, r1, 0x2) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000000000000a00000000000000010000000000000000000000000000000000000000000000bf0800000000c400"/142], 0x90) preadv(r2, &(0x7f00000001c0), 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)) [ 2518.671948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2518.673189] do_syscall_64+0x33/0x40 [ 2518.674011] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2518.675147] RIP: 0033:0x7f89b6ef5b19 [ 2518.675965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2518.680004] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2518.681668] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2518.683249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2518.684817] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2518.686380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2518.687944] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:19:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCNXCL(r0, 0x540d) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl(r1, 0x9b, &(0x7f0000000040)="f28bbd91c6e2e29c7bdba9207f290a2843e490eaa29dc500e2280854990b8f5a7f132ffd0b264c8b59a9635d0f00995a1e9902ae40f71fd6d29992b6d7d76411d43048a8cd07672c01571624b5d6c8fd15013980f63103035801d5274fa76b6c21888c6bab3b206ea5eab140e29404ec2cc40d1263bbed635bf480852adf69d9bc4dfaf61bf4f3df52b67cd6d9a20d4c953fa4a660733294ee4a33f14fd1794a24f37b8d33f978a65af85fc7d9b51c5d4e19d8df5ec95d394110e1fa8fbf8a95022f864aec4554b49ef5ca59b60dd5e60e3115757a7a190bf879b4d478b25e656a7c18e299c6fb7b03b322fd11d02de6e1c08fcb5d0aeb20453d41") 00:19:50 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x40000000}) 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:19:50 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x7}) 00:19:50 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x5, 0x40, 0x1f, 0x9, 0x0, 0x5, 0x400, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x2, 0xb9}, 0x7a00, 0x7fff, 0x1, 0x6, 0x8000, 0x7, 0x5, 0x0, 0x9, 0x0, 0x1}, 0x0, 0x5, r0, 0x8) socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2530.366534] kmemleak: 41 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:20:10 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:20:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x99030000}) 00:20:10 executing program 3: fork() (fail_nth: 80) 00:20:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000180)={'vlan1\x00', {0x2, 0x0, @multicast2}}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:20:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) recvmsg$unix(r0, &(0x7f0000000ac0)={&(0x7f0000000800)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000880)=""/118, 0x76}, {&(0x7f0000000900)=""/229, 0xe5}], 0x2, &(0x7f0000000a40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x50}, 0x2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000b00)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3ff}}, './file0\x00'}) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x2, 0x5, 0x3, 0x7f, 0x0, 0x3, 0x40020, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x6, 0x6a}, 0x80, 0x7, 0x7, 0x9, 0x7fff, 0x8001, 0x80, 0x0, 0x83, 0x0, 0x9789}, r2, 0x7, r3, 0x4) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000b40)={{0x1, 0x1, 0x18, r0, {0x9964}}, './file0/../file0\x00'}) ioctl$KDADDIO(r5, 0x4b34, 0x3f) preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) readv(r4, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/172, 0xac}, {&(0x7f0000000240)=""/140, 0x8c}, {0xfffffffffffffffd}, {&(0x7f0000000300)=""/219, 0xdb}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000000c0)=""/99, 0x63}, {&(0x7f00000004c0)=""/93, 0x5d}, {&(0x7f0000000540)=""/128, 0x80}, {&(0x7f00000005c0)=""/231, 0xe7}], 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:20:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000040)={0x2, 0x5, @start={0x0, 0x0, "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", "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"}, [0x0, 0x4, 0x790, 0x40, 0x5, 0x1200, 0x0, 0x8, 0x8, 0xa8f, 0xf6, 0x8, 0x26a, 0x4, 0x7, 0x1, 0x6, 0x7f, 0x9, 0x3, 0x8, 0x121f, 0x6, 0x5, 0xffff, 0x7fffffff, 0x5, 0x0, 0x1, 0x5, 0x100, 0x0, 0x101, 0x2, 0x1, 0x100000000, 0x9, 0x400, 0x1, 0x7, 0x3f, 0x2, 0x2, 0x6, 0x80000000, 0x8, 0x8, 0x8001, 0xffff, 0x8, 0x10000, 0x3, 0x9, 0x5845, 0x9, 0x2, 0x2, 0x3, 0x1, 0x1ff, 0x0, 0x2000000000, 0x10001, 0x1]}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000a80)={0x2, 0x1, {0x0, @struct={0x56e, 0x5}, r2, 0x100, 0x8001, 0x7f, 0x87b, 0x1000, 0x3, @struct={0xc0, 0x1}, 0x2b2, 0xffff1491, [0x8, 0x2, 0x7fff, 0x7, 0x3, 0x7fffffff]}, {0x3f, @struct={0x8, 0x9}, 0x0, 0x7f, 0x332, 0x1, 0x8, 0x2, 0x0, @struct={0x6, 0x5}, 0x1ff, 0x7, [0x207a5545, 0x8, 0x51c5, 0x2, 0x7e597dec, 0x4]}, {0x9, @struct={0x3f, 0x6ec6}, 0x0, 0x3, 0x9, 0xfffffffffffffff7, 0x7, 0xff, 0x9, @struct={0x623, 0x23}, 0x6, 0x0, [0xb80, 0x1, 0x7f, 0x7, 0x5e9, 0x8]}, {0x8, 0x0, 0x2}}) 00:20:10 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/241, 0xf1}], 0x1, 0xe720, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x9, 0x6}) [ 2538.802507] blktrace: Concurrent blktraces are not allowed on loop10 00:20:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfdffffff}) 00:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2538.870816] FAULT_INJECTION: forcing a failure. [ 2538.870816] name failslab, interval 1, probability 0, space 0, times 0 [ 2538.873468] CPU: 1 PID: 12262 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2538.874974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2538.877412] Call Trace: [ 2538.877978] dump_stack+0x107/0x163 [ 2538.878773] should_fail.cold+0x5/0xa [ 2538.879604] ? create_object.isra.0+0x3a/0xa20 [ 2538.880589] should_failslab+0x5/0x10 [ 2538.881407] kmem_cache_alloc+0x5b/0x350 [ 2538.882293] create_object.isra.0+0x3a/0xa20 [ 2538.883398] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2538.884579] kmem_cache_alloc+0x159/0x350 [ 2538.885687] anon_vma_fork+0xed/0x630 [ 2538.886510] ? __vm_enough_memory+0x184/0x360 [ 2538.887662] dup_mm+0x861/0x1110 [ 2538.888402] ? vm_area_dup+0x290/0x290 [ 2538.889239] ? __raw_spin_lock_init+0x36/0x110 [ 2538.890218] copy_process+0x23f8/0x66f0 [ 2538.891083] ? lock_downgrade+0x6d0/0x6d0 [ 2538.891993] ? __cleanup_sighand+0xb0/0xb0 [ 2538.892920] ? find_held_lock+0x2c/0x110 [ 2538.893802] kernel_clone+0xe7/0xa20 [ 2538.894606] ? lock_downgrade+0x6d0/0x6d0 [ 2538.895494] ? find_held_lock+0x2c/0x110 [ 2538.896360] ? copy_init_mm+0x20/0x20 [ 2538.897179] ? ksys_write+0x12d/0x250 [ 2538.898006] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2538.899198] __do_sys_fork+0x8a/0xc0 [ 2538.900286] ? kernel_clone+0xa20/0xa20 [ 2538.901157] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2538.902275] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2538.903376] ? trace_hardirqs_on+0x5b/0x180 [ 2538.904295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2538.905400] do_syscall_64+0x33/0x40 [ 2538.906213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2538.907335] RIP: 0033:0x7f89b6ef5b19 [ 2538.908133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2538.912356] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2538.914083] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2538.915619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2538.917147] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2538.918673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2538.920201] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:20:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0)="cfc5b7cb4a7ee2d3ca6f18846a2db6d500eda7528ba1fee3f11c8afc93782f1c22c5e8c79c105f49b5fd559eff4a724fa01f0fa906072f43e2a630347678bd87a43b67eb2819ae71c7da56c73155", 0x4e, 0x8001}, {&(0x7f0000000240)="58c09260a8819bddde46765a526af288da14b7d39237a866bc6ad7e7b261", 0x1e, 0x2}, {&(0x7f00000005c0)="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", 0x1000, 0x8}], 0x805, &(0x7f0000000300)={[{@sysvgroups}, {@journal_checksum}, {@init_itable_val={'init_itable', 0x3d, 0x7fffffff}}, {@noinit_itable}], [{@obj_role={'obj_role', 0x3d, 'net/packet\x00'}}, {@permit_directio}, {@dont_hash}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f00000003c0)={0x0, 0x20, 0x7bf}) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:20:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/arp\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f0000000100)=""/29, 0x1d}], 0x2, 0xe722, 0x7ffffffe) ioctl$KDSETLED(r1, 0x4b32, 0x8001) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 00:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2539.188344] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2552.252339] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:20:30 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0xe4761991430efc44, 0x80, 0x1f, 0x76, 0x2, 0x8, 0x0, 0x0, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_config_ext={0x315, 0x1}, 0xe08, 0x2, 0x1ff, 0x1, 0x9, 0x800, 0xca05, 0x0, 0x54e, 0x0, 0x6}, 0x0, 0xc, r0, 0xb) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001900)={0x2, 0x80, 0x1f, 0x7, 0xa8, 0x8, 0x0, 0x6, 0x6902, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000018c0), 0x2}, 0x26e230d18d0378e9, 0x32d09775, 0x10001, 0x1, 0x400, 0x2, 0x3, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x4, r1, 0x8) r2 = syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000480)=[{&(0x7f00000005c0)="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", 0x1000, 0x7}, {&(0x7f0000000300)="705776b17288553d3d71a756776dc37539a97e39c394c998c45051c9a547e369715e", 0x22, 0x4}, {&(0x7f0000000340)="4956efb35760479094ecc5a283e2f572c139ccb21c3a4289a523ee", 0x1b, 0xffff}, {&(0x7f0000000380)="8d8b7bddb04376f16b547ec16650b9bc3273280e02c44e34f90dd0a33149eb6d9bf41f2a1cc74b41e685c77bf2b065e47d05003c76be81a8ce1150068a6d65fbe5a5702b86908c059ed2fdbd38f094a664e1943bf56b1d4e368f2e4cbd6e8788d6ac50042170cf8ade3af1f1762d906f048e97553f5ca765757d843708778cf545e3791ee6c13497ce379338142de2b53780abed3e0f8e647afd3609e3e0556bb0eab1d12cf676a9fb71d82859addc6df78ad109c72f313434cba1c7ef04af082783c2cd5662defe39c6747172b4e926b5b5fb5a9e6e", 0xd6, 0x10001}], 0x1004080, &(0x7f0000000500)={[{@fat=@flush}], [{@dont_appraise}, {@euid_lt={'euid<', 0xee01}}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000017c0)=@IORING_OP_WRITEV={0x2, 0x5, 0x2004, @fd=r2, 0x5, &(0x7f0000000540)=[{&(0x7f00000015c0)="5ea0a08e18cfee18703a90e41e159d24c21acf2c92c7f73925f46b73e56be2263b97e52ebd4bc7cc2ba9c31a4dfa0bfa311fe4f877f7e7ba570fb881eadcfb5937f27bb8fec99a5cc8d6e8715e040aed2a3235d26f352817a297e75fab5d70daef99578535ff896aecd846c6f79bcaa53831381261ce8387dac9b289412a8c00870814a4d983b2ebbc769022c335b17aeafbd71e7ff5660a6dd55694911d6ef42811b036173cba8d56ba", 0xaa}, {&(0x7f0000001680)="66057c73f141c68799a373875b5a02d2ff8093cdb1cca7cd5beaf847e2c57561894b65f06279a0b542643b091fb10a7c8a6f3736f8db753044b9067a6eb145bece37b2b2ddc4b287f04be305d167367f33d78cda4121cfdf963d12f771ca2fc9f87cb51b06f618fcdc4528c1ef735379e7ad617513e375737631689801c06dfc6f3efd6f918698861d935861176f659d2ff07dbc6beb9715b23a71607b", 0x9d}, {&(0x7f0000001740)="064da122b4d851468945770d0c4ddaddb383cb537aebf204e25d371966e51c58b82e130b3885c420291eb387b32387ad7d634697e8961c8f66cebffe994b5b58527a928bf46d0f897ff3dd714d0296c095336fb3db907e836189a2ffd8f2a4cb204bbbb19798380cc48dbeafc78a92ffd858f7f2a181b1cb1630f8", 0x7b}], 0x3, 0x9, 0x1, {0x3}}, 0x5) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) getsockname$unix(r3, &(0x7f0000001800), &(0x7f0000001880)=0x6e) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r7, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) io_submit(0x0, 0x5, &(0x7f0000001e00)=[&(0x7f0000001a80)={0x0, 0x0, 0x0, 0x5, 0x1, r2, &(0x7f0000001980)="8cb8361ae8f8d4f94707399913e742fb53d69158b0bfddc49a8febb3b97d5db7f2b555e2f3c7687c3f9aef13105f029a8b00bc490cf092406267dcfedcd4fa427bd29709adbd3573cc527172d9d7ba8af0d6307d9afd0620041a21e66f4e8d52afb51beccf1d19121bf4376479811f0164efd5fd84927f9682b523ead8c7246f041d84817b5e613c55db8dac0749cda69db88139122d9dc77c0755f31f2e457eb8647ddb58ee88a27faa56fe302d939f084c827c3c0cc716cc33b802332443526d9159178f774edf84ace92c94710efc106f6c5bad5ec5fb53c6afb7c9d4a0d6fcbb03351e1c831d38e4ed558b21f2bb6f422a486087a3", 0xf7, 0x1, 0x0, 0x1}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x7, 0xfff9, r0, &(0x7f0000001ac0)="7c22414ffe6dd89deb629ee9649953ed5a3d933486e60ba5c290b5254dab31cb6ca4960cef950d3917e5e2e8b61445f30824936cc43052556967eefa1f85757bf491b4a1d1febfd9cc5c4ba4becfb222aeadf69aa47e0edfa382fdd3d32e034604aa41972c60a74b5ecfd955c8c7f82c64c56c8535c0b9369eea9eed9a9e2348d77663e83918e26a8d37ea5b0c1bbe396ac7f4", 0x93, 0x401}, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x7, 0x8000, 0xffffffffffffffff, &(0x7f0000001bc0)="b984f92679ac0ccf9ab5465b4bc8697e198e888c4cd79d45db4cfb86c0bceb24a653bbaa374bcf65a16f35", 0x2b, 0x33, 0x0, 0x0, r3}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x6, 0x6, 0xffffffffffffffff, &(0x7f0000001c40)="f94052ab2a4ed6922353cb0b39bf7bb4a25444d9c62c485ecbc9d800fd71c0ada17dee5b5ad87a12b5ab890d044ef387547c790e8d62cd79557aaffbef2355df073b85db1b6a7dd9abab1cff120e90a7c2d1e7e505976b380768f8d51dd0447e6f62b31eb80fe7b0921da5d61c18e8c6b84b9cadf2711604cc9dfa8e5514f94676a10de509c69ec9d5832252a6343bd84327c55877cbc0b7c9e6681ca2f724cc3fb0da64b7a852398aa617a1387aad0a8b480571c307211f2d08c77d14331ad11c8162077aad1a56", 0xc8, 0x6, 0x0, 0x0, r1}, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x7ff, r5, &(0x7f0000001d80)="9ed8b29109d9f6acffb71fcd87afdecbda19fc393ba80463416c0c0775", 0x1d, 0x4, 0x0, 0x2, r7}]) copy_file_range(r5, &(0x7f0000000100)=0x81, r6, 0x0, 0x5, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYBLOB="010000110100000600000000", @ANYRES32=r6, @ANYBLOB='file0\x00'/16]) bind$802154_dgram(r8, &(0x7f0000000240)={0x24, @short={0x2, 0x3}}, 0x14) preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:20:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfffffffd}) 00:20:30 executing program 3: fork() (fail_nth: 81) 00:20:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:20:30 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000440)={0x1, 0x1, 0x1f, 0x15, 0x18e, &(0x7f0000000040)}) 00:20:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) r1 = gettid() r2 = getpgid(0x0) rt_tgsigqueueinfo(r2, r1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x1, 0x1f, 0x5, 0x0, 0x0, 0x16400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x100, 0x4}, 0x840, 0x1, 0x1, 0x2, 0x8000, 0x6, 0x8, 0x0, 0x36e, 0x0, 0x1ff}, r2, 0x10, 0xffffffffffffffff, 0x2) 00:20:30 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x9) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000005c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=@nl=@kern={0x10, 0x0, 0x0, 0x4000}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)="1c6bd0646c62d439896f744021391a8df792b68982bc7126dc2548e1ec0edc3be3671846d50973cb6b4f635b6e9b3550dd1e2934773278bcab43db7ab2dada525aa963b23268211f970b0d38a3e40cd295b03653cca10a0dd67a30cc242d04a10c2ffd2c3474d16289dbfd985098590807e2416a9cf8fa4fbb7e311c2557fd6f7d4858247c4e35cb67332ffb11c72fbfdfaf2a3cea6d2badee090ec4cc2199091b2cb0014084532826da8bb75c5c026a2cadaabd11f5299e2c9d787e52c204a67b6d9c", 0xc3}, {&(0x7f0000000380)="c4ec371ba919f74b7fa9bdf133e48ce6dac0b99495e03d6e4ef4c514ccc1438c4111a97f42860e5abc2aae0e6dfe1b6b53beea6a065b76c7d84b8f84ade9c17bb47847ef73d4048c42a1cfbe160917ddb5e64aa76666ac63a8c8a2926f8bb352846af63c842ad2ed2ebe774297eaee31dcaf3bcbdcda3b7366ae3b0c4908e566f79e4bfc4058ac7e5456393747c86d6916efde97243573cb13a15f92f019b8e08957918fd31ec82fa10d46411d6f0113ce8cc4564ab80612dcc64f5eb7032bb682", 0xc1}, {&(0x7f0000000480)="88f488ef5882308b7d015e715a", 0xd}, {&(0x7f00000004c0)="09edebd1b9ca149ad4dff94ff0b79bcaa221c1c47e0d3ed7f3d12cd3d1c1e775f45a405e19652586e3b9af29154074a6d4", 0x31}], 0x4}, 0x0, 0x801, 0x1, {0x0, r7}}, 0x401) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in=@empty, @in6=@initdev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) 00:20:30 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb8e}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) quotactl(0x4, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000240)="53cd19a0ec9720797da0ae5c9997bf043cac920b099fa2a708a08a05fe08dd048771457ea7746e3675c214e8d86eeae0dae9350a79c14bd44bf5e2e728848c04901b7f775d4dbd70982bda6860627bc5b923a995f4fd7e0a2bcff9dc480a265af69ee7336d1035eddddf8155347ad6989335a7f0e18a7bba78dfeec1707c391aaa40efbddba983c68b29cd0a9e36c6fa1244122bfcdc9871b2745c45d01848c8bd4f0e7ecd59a92cb2f8") r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$BTRFS_IOC_INO_PATHS(r3, 0xc0389423, &(0x7f00000001c0)={0x1, 0x18, [0x1f, 0x2, 0x0, 0xffff], &(0x7f0000000180)=[0x0, 0x0, 0x0]}) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x203) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/dev\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) openat(r4, &(0x7f0000000100)='./file0\x00', 0x81, 0xc0) 00:20:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:20:30 executing program 2: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000280)=""/228) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') syz_io_uring_setup(0x6ed0, &(0x7f0000000180)={0x0, 0xf83f, 0x8, 0x2, 0x91, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000200)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x0, 0x0, r0, 0x0, r0, 0x2, 0x0, 0x1}, 0x5) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:20:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:20:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3051e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:20:30 executing program 3: fork() (fail_nth: 82) 00:20:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x100000000000000}) [ 2559.086596] FAULT_INJECTION: forcing a failure. [ 2559.086596] name failslab, interval 1, probability 0, space 0, times 0 00:20:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, 0x0, 0x0) [ 2559.086617] CPU: 0 PID: 12310 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2559.086627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2559.086632] Call Trace: [ 2559.086653] dump_stack+0x107/0x163 [ 2559.086671] should_fail.cold+0x5/0xa [ 2559.086686] ? anon_vma_fork+0xed/0x630 [ 2559.086702] should_failslab+0x5/0x10 [ 2559.086715] kmem_cache_alloc+0x5b/0x350 [ 2559.086735] anon_vma_fork+0xed/0x630 [ 2559.086749] ? __vm_enough_memory+0x184/0x360 [ 2559.086767] dup_mm+0x861/0x1110 [ 2559.086793] ? vm_area_dup+0x290/0x290 [ 2559.086813] ? __raw_spin_lock_init+0x36/0x110 [ 2559.086833] copy_process+0x23f8/0x66f0 [ 2559.086850] ? lock_downgrade+0x6d0/0x6d0 [ 2559.086880] ? __cleanup_sighand+0xb0/0xb0 [ 2559.086906] ? find_held_lock+0x2c/0x110 [ 2559.086930] kernel_clone+0xe7/0xa20 [ 2559.086943] ? lock_downgrade+0x6d0/0x6d0 [ 2559.086954] ? find_held_lock+0x2c/0x110 [ 2559.086967] ? copy_init_mm+0x20/0x20 [ 2559.086984] ? ksys_write+0x12d/0x250 [ 2559.087005] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2559.087027] __do_sys_fork+0x8a/0xc0 [ 2559.087040] ? kernel_clone+0xa20/0xa20 [ 2559.087069] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2559.087084] ? syscall_enter_from_user_mode+0x1d/0x50 00:20:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @private=0xa010100}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000180)={{0x2, 0x4e21, @empty}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e21, @broadcast}, 'vlan0\x00'}) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) [ 2559.087097] ? trace_hardirqs_on+0x5b/0x180 [ 2559.087113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2559.087125] do_syscall_64+0x33/0x40 [ 2559.087140] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2559.087150] RIP: 0033:0x7f89b6ef5b19 [ 2559.087166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2559.087174] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2559.087189] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2559.087220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2559.087229] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2559.087237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2559.087245] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2559.401703] FAT-fs (loop7): Unrecognized mount option "dont_appraise" or missing value [ 2559.607300] FAT-fs (loop7): Unrecognized mount option "dont_appraise" or missing value [ 2559.696159] FAULT_INJECTION: forcing a failure. [ 2559.696159] name failslab, interval 1, probability 0, space 0, times 0 [ 2559.696182] CPU: 1 PID: 12347 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2559.696194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2559.696200] Call Trace: [ 2559.696225] dump_stack+0x107/0x163 [ 2559.696245] should_fail.cold+0x5/0xa [ 2559.696266] ? create_object.isra.0+0x3a/0xa20 [ 2559.696284] should_failslab+0x5/0x10 [ 2559.696300] kmem_cache_alloc+0x5b/0x350 [ 2559.696324] create_object.isra.0+0x3a/0xa20 [ 2559.696339] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2559.696361] kmem_cache_alloc+0x159/0x350 [ 2559.696386] anon_vma_fork+0xed/0x630 [ 2559.696404] ? __vm_enough_memory+0x184/0x360 [ 2559.696427] dup_mm+0x861/0x1110 [ 2559.696459] ? vm_area_dup+0x290/0x290 [ 2559.696481] ? __raw_spin_lock_init+0x36/0x110 [ 2559.696505] copy_process+0x23f8/0x66f0 [ 2559.696526] ? lock_downgrade+0x6d0/0x6d0 [ 2559.696562] ? __cleanup_sighand+0xb0/0xb0 [ 2559.696598] ? find_held_lock+0x2c/0x110 [ 2559.696620] kernel_clone+0xe7/0xa20 [ 2559.696636] ? lock_downgrade+0x6d0/0x6d0 [ 2559.696648] ? find_held_lock+0x2c/0x110 [ 2559.696663] ? copy_init_mm+0x20/0x20 [ 2559.696683] ? ksys_write+0x12d/0x250 [ 2559.696708] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2559.696734] __do_sys_fork+0x8a/0xc0 [ 2559.696749] ? kernel_clone+0xa20/0xa20 [ 2559.696784] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2559.696800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2559.696817] ? trace_hardirqs_on+0x5b/0x180 [ 2559.696835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2559.696854] do_syscall_64+0x33/0x40 [ 2559.696871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2559.696883] RIP: 0033:0x7f89b6ef5b19 [ 2559.696901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2559.696911] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2559.696930] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2559.696940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2559.696951] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2559.696961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2559.696971] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2571.346666] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:20:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, 0x0, 0x0) 00:20:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x200000000000000}) 00:20:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000180)=""/250, 0xfa}], 0x1, 0xe71e, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x4, 0x8, 0x8}) 00:20:51 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_MIN_BE={0x5, 0x11, 0x80}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0x4}, @NL802154_ATTR_MIN_BE={0x5, 0x11, 0x2}, @NL802154_ATTR_MIN_BE={0x5, 0x11, 0x78}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x3c}}, 0x4000000) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r4 = openat$cgroup_type(r3, &(0x7f0000000100), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000200)={r2, 0x0, 0x7f, 0x3}) r6 = accept$unix(r3, &(0x7f0000000280), &(0x7f0000000300)=0x6e) copy_file_range(r5, &(0x7f0000000240)=0x9, r6, &(0x7f0000000340)=0x2, 0x1b4, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r7, &(0x7f0000000580)=[{&(0x7f0000000380)=""/250, 0xfa}], 0x1, 0xe720, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r7, 0x4018f50b, &(0x7f00000001c0)={0x0, 0x5, 0x7a7}) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r4, 0x40049366, &(0x7f0000000180)) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r4, 0xf505, 0x0) 00:20:51 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) 00:20:51 executing program 3: fork() (fail_nth: 83) 00:20:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000400)=@ethtool_sset_info={0x11}}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)={0x87, 0x29, 0x2, {0xb9, [{{0x10, 0x1, 0x3}, 0x8, 0x0, 0x7, './file0'}, {{0x20, 0x1, 0x5}, 0x100000001, 0x81, 0x7, './file0'}, {{0x4, 0x0, 0x3}, 0x800, 0xef, 0x7, './file0'}, {{0x20, 0x4, 0x4}, 0x9, 0x0, 0x7, './file0'}]}}, 0x87) 00:20:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 2579.672955] blktrace: Concurrent blktraces are not allowed on loop10 00:20:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, 0x0, 0x0) [ 2579.715109] FAULT_INJECTION: forcing a failure. [ 2579.715109] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2579.718236] CPU: 0 PID: 12373 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2579.720035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2579.722965] Call Trace: [ 2579.723664] dump_stack+0x107/0x163 [ 2579.724611] should_fail.cold+0x5/0xa [ 2579.725611] __alloc_pages_nodemask+0x182/0x680 [ 2579.726821] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2579.728421] alloc_pages_current+0x187/0x280 [ 2579.729566] pte_alloc_one+0x16/0x190 [ 2579.730551] __pte_alloc+0x1d/0x320 [ 2579.731504] copy_page_range+0x1a1d/0x3810 [ 2579.732661] ? up_write+0x191/0x550 [ 2579.733603] ? vm_iomap_memory+0x190/0x190 [ 2579.734521] ? downgrade_write+0x3a0/0x3a0 [ 2579.735629] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2579.736815] ? __vma_link_rb+0x540/0x700 [ 2579.737873] dup_mm+0x8b9/0x1110 [ 2579.738626] ? vm_area_dup+0x290/0x290 [ 2579.739643] ? __raw_spin_lock_init+0x36/0x110 [ 2579.740645] copy_process+0x23f8/0x66f0 [ 2579.741514] ? lock_downgrade+0x6d0/0x6d0 [ 2579.742431] ? __cleanup_sighand+0xb0/0xb0 [ 2579.743546] ? find_held_lock+0x2c/0x110 [ 2579.744441] kernel_clone+0xe7/0xa20 [ 2579.745402] ? lock_downgrade+0x6d0/0x6d0 [ 2579.746298] ? find_held_lock+0x2c/0x110 [ 2579.747346] ? copy_init_mm+0x20/0x20 [ 2579.748359] ? ksys_write+0x12d/0x250 [ 2579.749197] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2579.750253] __do_sys_fork+0x8a/0xc0 [ 2579.751062] ? kernel_clone+0xa20/0xa20 [ 2579.751975] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2579.753115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2579.754254] ? trace_hardirqs_on+0x5b/0x180 [ 2579.755207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2579.756353] do_syscall_64+0x33/0x40 [ 2579.757174] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2579.758306] RIP: 0033:0x7f89b6ef5b19 [ 2579.759138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2579.763173] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2579.764870] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2579.766448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2579.768036] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.769615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2579.771197] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:20:51 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5600, &(0x7f0000000000)) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000040)={0x7ff, 0x5, 0x2, 0x2, 0x80, "fe950d91ce90fe512356c54006ae15d2389e18", 0x0, 0x1ff}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0xc0001, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1', "59dd867b1977ea27ebb118fa4780d0"}, 0x13) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000001000000180000ff54c9e604581b0f03bd9294990412a0f2ebe01a6720fe1aa6a9561adee834f91a98e2d181408182066f41bad2a15fe9579e328ffdfbccea75695f0fcff4aaea3d74f267f87e727541b4d5d6487dd81c4edd368e2ebb58e7ade0a88c1ab78d7d54600b16e85106e69d51a5706df566899e5354196235d5394d0ade40834daba0d964a77b38cce85e7a8cfb777cb515883df2e4b2e2873cb0955f777e6d9c3d099256cf828cf03fe27ba5f87bb5b11da73acbfe8e0533b90c7ba0234a06beb4635659ff5a9afcd1f1831da90000", @ANYRES32=r0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000140)) 00:20:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x400000000000000}) 00:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x400000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/232, 0xe8}], 0x1, 0x7, 0x0) 00:20:51 executing program 3: fork() (fail_nth: 84) 00:20:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xa00000000000000}) 00:20:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 00:20:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:20:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8008}, 0x0, 0x8, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x294, 0x24, 0x300, 0x70bd2a, 0x25dfdbfe, {0x18}, [@generic="c1fc5ab5806f7f9edcfa4146f5cc34e830f2f0e0b2d207574b7e69dd919ce35fc9111bffce425643df23c512fa2c1828ddd79c376fd45902182589ccb299fe18bd06a44b2829e60f6783bdeda2e2a085c666261d010b1ef61a06e41aa7157393f7a30070b6e1d81d2f4fdfec96082614b966e5e3305e57ec312917a0acee18f8bbbb0d6f7ee166a37118ca9adb7a8aca30a11d06d2cf31fe3448bba0791aff3569d24294b7eb4d8190093add01fa96", @generic="0e95b8c02bba9d731e448e7b9abe0f798e870eb16588fe1d4dcb2a2cc044edfdfe71f6d469f36198c478fc254cb125a206a14d1cce8b27b7c0d1300e915ae0a2b8112839ac2501e31280de118b831a85a176496094a3946792ec6e95e0ed4924bb532e98276fb5be6626792e254f0724011fc8acfb740eac727ddbbb", @nested={0xc5, 0x2f, 0x0, 0x1, [@typed={0x14, 0x49, 0x0, 0x0, @ipv6=@mcast1}, @generic="5becd5082cc108145368d95ec491a747bd503bb7db8d41cf4269cee6ef12be4602726291ebdc3e787a398111105699ab5977788eb51fac18eff40ff01b1340d7a42a69309c43683a6caab269887cc76b02ce1e1214f49044a18be757bedbd27b60ae14647108dec17a49e3dc36208646e150d4d310b3487809119a78a5f4f56f1b46ae83cb4453", @generic="66043b5ba3cb57eafa506041454343f9fa93e5a588ce93b481a7059d349a195a1807bc2e6d24"]}, @nested={0x6e, 0x91, 0x0, 0x1, [@generic="ad4b7f744cba1a85825135dd7ea2f0e915d4b704b23a5a6027ffcd29a9ffe08e36bca98c0347971ca5288aaf9c06b1f8f3e854d5b535fa469a307f8c403fa75f9da77eec19e2f34ca06465a1124668c512ffeda671ca10ae1d5a", @typed={0x8, 0x85, 0x0, 0x0, @uid=r3}, @typed={0x8, 0x7, 0x0, 0x0, @uid=0xee01}]}, @typed={0x14, 0x56, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x50, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x294}, 0x1, 0x0, 0x0, 0x814}, 0x10) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:20:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x6) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0x1, 0x4, 0x7}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/142) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCSETSW2(r4, 0x402c542c, &(0x7f0000000240)={0x0, 0x2, 0x6, 0x8000, 0x8, "f2a4597531e400055a0d000000090000ae00", 0x2, 0x93b}) ioctl$VT_GETSTATE(r2, 0x5600, &(0x7f0000000180)={0xfffc, 0x12, 0xfffe}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x202, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000002c0)={0x2, 0x10001, 0x9, 0x6, 0xa, "4bcf685cd0600f0b4853566ddb3c5cee3ed634"}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCL_PASTESEL(r6, 0x541c, &(0x7f0000000300)) [ 2580.255429] FAULT_INJECTION: forcing a failure. [ 2580.255429] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.257848] CPU: 0 PID: 12407 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2580.259342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2580.261800] Call Trace: [ 2580.262367] dump_stack+0x107/0x163 [ 2580.263248] should_fail.cold+0x5/0xa [ 2580.264089] ? create_object.isra.0+0x3a/0xa20 [ 2580.265115] should_failslab+0x5/0x10 [ 2580.265954] kmem_cache_alloc+0x5b/0x350 [ 2580.266861] create_object.isra.0+0x3a/0xa20 [ 2580.267845] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2580.268981] kmem_cache_alloc+0x159/0x350 [ 2580.269913] anon_vma_fork+0x1dd/0x630 [ 2580.270790] dup_mm+0x861/0x1110 [ 2580.271585] ? vm_area_dup+0x290/0x290 [ 2580.272462] ? __raw_spin_lock_init+0x36/0x110 [ 2580.273466] copy_process+0x23f8/0x66f0 [ 2580.274335] ? lock_downgrade+0x6d0/0x6d0 [ 2580.275253] ? __cleanup_sighand+0xb0/0xb0 [ 2580.276194] ? find_held_lock+0x2c/0x110 [ 2580.277083] kernel_clone+0xe7/0xa20 [ 2580.277895] ? lock_downgrade+0x6d0/0x6d0 [ 2580.278789] ? find_held_lock+0x2c/0x110 [ 2580.279693] ? copy_init_mm+0x20/0x20 [ 2580.280525] ? ksys_write+0x12d/0x250 [ 2580.281373] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2580.282540] __do_sys_fork+0x8a/0xc0 [ 2580.283368] ? kernel_clone+0xa20/0xa20 [ 2580.284268] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2580.285424] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.286556] ? trace_hardirqs_on+0x5b/0x180 [ 2580.287518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.288654] do_syscall_64+0x33/0x40 [ 2580.289480] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2580.290614] RIP: 0033:0x7f89b6ef5b19 [ 2580.291442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.295528] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2580.297209] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2580.298776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2580.300354] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.301929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.303525] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2593.653566] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:21:18 executing program 3: fork() (fail_nth: 85) 00:21:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x4000000000000000}) 00:21:18 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x101, 0xb94, 0xffffffffffffffff, 0xffffffff}) r1 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x41fc6e80, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="0c4585afcae3387762a4c8311b41ce3057cc07bce56467e9f6443678bca72d23c99346894581d56f8b971009794a0a88e8ff6823c25746e1be8982304c942f134ea90725202e4c929e8adb95681318ed2db862177c6a27dc2997d512cbb68f42aaf71ce1a46930bd2ae05731c534c900192c4797b4a2199c3313efdbb5491ab931dd8a170905b6730dde46b4de8508be08be", 0x92, 0x2}], 0x20080, &(0x7f00000002c0)={[{@map_acorn}, {@check_strict}, {@map_normal}, {@check_strict}, {@map_normal}, {@mode={'mode', 0x3d, 0x9}}, {@map_off}, {@sbsector}, {@map_acorn}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@obj_role}, {@obj_role={'obj_role', 0x3d, 'trusted.overlay.redirect\x00'}}]}) flistxattr(r1, &(0x7f0000000440)=""/231, 0xe7) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:21:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 00:21:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xc35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r3, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:21:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') setresuid(0x0, 0x0, 0x0) getgroups(0x2, &(0x7f00000007c0)=[0x0, 0xee00]) r3 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r5 = getegid() setgid(r5) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r5) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r4, r5}}, './file0\x00'}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = accept4$bt_l2cap(r1, &(0x7f0000000800)={0x1f, 0x0, @none}, &(0x7f0000000840)=0xe, 0x800) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r9 = getegid() setgid(r9) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r9) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r8, r9}}, './file0\x00'}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000200)="09a04f934c1e18c00e52653fc833614e55f4cb315704a13d36c2d4eb3192e9f454fb2fccb88b7d1576860311462dde13fd182bdfc183474bd48c8586b0dcfce1f0f08ebed409b405ef594578fe596a53cbccb953db66b0aa9af3cc25c6545a9f0f5d9a25b4da663e930ed83cb0950e2d7ea1e4ec01ec14cb166ee70e47b0841cb586d6316847d2511a54e687642e8a3226ca389b", 0x94}, {&(0x7f00000002c0)="ce8f1342ca16a86dad7e2c979204cc8fe83b5fa3c8290d9525d91ba5b07d6fec1d4ead823beb656b3220dee09db733067338245b0cd255683e8319aeed18a617abbecb9241e3148395cd660828a821a2001723aa7718436ad72626dcd2ae4e29630a5c7513", 0x65}, {&(0x7f0000000340)="ededd00e7468650a8b6fe02592ad62e662f915dd0c3ec0df8638d068e6fe3839909d41de1874153696382c690c1582a9304650959c48cbc2e39d0be7b9f87aaca12383c70d043cfbe553ebb633ade5d65b3d0c52a2341dcd32b1683908824eae1639d041964ff4aeafb7531c02167834bebfd32c0d5633bb13607c9ef0fb1ebbb2461738d789e890cbfaf200f34efd12f5729f3014", 0x95}, {&(0x7f0000000100)="6bb4d3eb01d5db3600ad04b28ad4d33e81fb0f866b1bb9576fb084da854c6c08b5ed1eee6a94dceb8ba7c8180c", 0x2d}, {&(0x7f0000000400)="4e1d81deb4ddfb1b7cbeb2e14fd5ed55d680498438ba0a982ca230343f82cbf96e9b02cdda8d004bfd1f13a1ec820ae721ec1fbdf8d4de8f260d51988371c38318c831b13f98719f6b44ee272666dd3724286b43a0b131406fe4444932f68ec8b5197c2999d973bc6c7d6b3772913c45f8791304053e81eaedc9f8f984de720e9acfd5587f3f109c734c9bc967102ad30d6ed8cf443f187adffb8ca09ec04cdedb8517a8023c", 0xa6}, {&(0x7f00000004c0)="0a0402", 0x3}, {&(0x7f00000005c0)="31e4718b3f4d95ff6d88baeea0e499d4493299648de41dd932b8cb71f6fa5ad13364588078b1d04bdf02e6015e051eb2361cc5f94cea5b3f2f02cd67588ef0857ed874c8344cbf765966cd4ba98f60b2ab9cc3c55a9f00a30a6a2d8bb51af95fadbdbd059026646217d10294e44997a73e6f2a66d0e967443cbff7dbcb9e3ee7998982ddcce383faadca2ab7a6a5b812f222808fe7e60569046942b30115f35de1d1c54a6c9ca504a4c049258cdf596c516f48837815f51a70c488933262d90e3a8780abbd0dae5d0989d28593e094333d5c1c248b1c49a9591013a6caa8d307d519f645e99160d5fd89435b0f32cd1a", 0xf0}, {&(0x7f00000006c0)="936a7ca6267b73f5d999de5fa0d216abedfda73a75753a45e81d77afd1876a11da9754d03e30b3d9508ae9af5cb8e63d801d865fca7b553b937efb3655b686500fb42696a6a61c0e38a39323ece5e785ff02cf39095668d20efea7839e34352b90ca4bc5f434183af95800c21cc60c1962b556bdbb56508165633e02892ba7b0bef9de2377578a7133a9e279c413f3431668a5c49d45e9c4aa65a0727c6995990848e89dda6a5d4e053cf212c1c7e0406ff97cc2f1f4ab315ac04df79aacff52a4ff4a97c08063722a7461cdaf42d2b9cdbc32208e4713f5bdd3b42dd37dd5894e854a0df95a299c737215ea7b", 0xed}], 0x8, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, r5}}}, @rights={{0x30, 0x1, 0x1, [r6, r1, r0, r1, r7, r0, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r9}}}], 0x90, 0x40}, 0x4000000) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:21:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x81, 0x7, 0x4, 0x0, 0x0, 0x10, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x10001, 0x40, 0x1, 0x1, 0x7574fcc4, 0x1, 0x2, 0x0, 0x97, 0x0, 0x3}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:21:18 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001400)={0x38, r3, 0x19, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "2c5c88b4cfafb0a43d68c1f2ee"}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x10, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000045}, 0x20040800) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = signalfd4(0xffffffffffffffff, &(0x7f00000002c0)={[0x6]}, 0x8, 0x0) ioctl$TIOCSTI(r5, 0x5412, &(0x7f0000000300)=0xe1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000080)={0x6, "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"}) ioctl$VT_GETSTATE(r4, 0x5600, &(0x7f0000000000)) ioctl$KDENABIO(r4, 0x4b36) [ 2607.064276] blktrace: Concurrent blktraces are not allowed on loop10 00:21:18 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x2}) 00:21:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 00:21:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000400)={0xa008000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2d}, &(0x7f0000000240)=""/112, 0x70, &(0x7f00000002c0)=""/235, &(0x7f00000003c0)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) socket$inet(0x2, 0xa, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup3(r1, r3, 0x0) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:21:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408000, 0x15) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:21:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x9903000000000000}) 00:21:18 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xe) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) renameat2(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x6) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x2, 0xfffffffc) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x2, 0x10d, 0x5, 0x6}) [ 2607.318458] FAULT_INJECTION: forcing a failure. [ 2607.318458] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.321760] CPU: 0 PID: 12437 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2607.323312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2607.325832] Call Trace: [ 2607.326414] dump_stack+0x107/0x163 [ 2607.327239] should_fail.cold+0x5/0xa [ 2607.328297] ? create_object.isra.0+0x3a/0xa20 [ 2607.329311] ? create_object.isra.0+0x3a/0xa20 [ 2607.330315] should_failslab+0x5/0x10 [ 2607.331184] kmem_cache_alloc+0x5b/0x350 [ 2607.332114] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2607.333462] create_object.isra.0+0x3a/0xa20 [ 2607.334424] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2607.335586] kmem_cache_alloc+0x159/0x350 [ 2607.336519] ptlock_alloc+0x1d/0x70 [ 2607.337306] pte_alloc_one+0x68/0x190 [ 2607.338146] __pte_alloc+0x1d/0x320 [ 2607.338965] copy_page_range+0x1a1d/0x3810 [ 2607.339969] ? up_write+0x191/0x550 [ 2607.340774] ? vm_iomap_memory+0x190/0x190 [ 2607.341728] ? downgrade_write+0x3a0/0x3a0 [ 2607.342679] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2607.343924] ? __vma_link_rb+0x540/0x700 [ 2607.344830] dup_mm+0x8b9/0x1110 [ 2607.345609] ? vm_area_dup+0x290/0x290 [ 2607.346479] ? __raw_spin_lock_init+0x36/0x110 [ 2607.347526] copy_process+0x23f8/0x66f0 [ 2607.348404] ? lock_downgrade+0x6d0/0x6d0 [ 2607.349355] ? __cleanup_sighand+0xb0/0xb0 00:21:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000001c0)={@dev, @dev, @initdev}, &(0x7f0000000200)=0xc) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00'}) [ 2607.350285] ? __lockdep_reset_lock+0x180/0x180 [ 2607.351496] ? find_held_lock+0x2c/0x110 [ 2607.352428] kernel_clone+0xe7/0xa20 [ 2607.353251] ? lock_downgrade+0x6d0/0x6d0 [ 2607.354169] ? find_held_lock+0x2c/0x110 [ 2607.355091] ? copy_init_mm+0x20/0x20 [ 2607.355955] ? ksys_write+0x12d/0x250 [ 2607.356815] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2607.357884] __do_sys_fork+0x8a/0xc0 [ 2607.358731] ? kernel_clone+0xa20/0xa20 [ 2607.359649] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2607.360837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.361985] ? trace_hardirqs_on+0x5b/0x180 [ 2607.363188] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.364629] do_syscall_64+0x33/0x40 [ 2607.365681] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2607.367119] RIP: 0033:0x7f89b6ef5b19 [ 2607.368158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.373042] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2607.374853] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2607.376448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2607.378035] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.379620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.381213] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:21:18 executing program 3: fork() (fail_nth: 86) 00:21:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:21:18 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) 00:21:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) vmsplice(r1, &(0x7f0000000600)=[{&(0x7f0000000180)="7449500f5a480d4dde1039fb1c5525ec8b82fff1f61157c9439914bdc1eef52092cdf9e6a35cc0d7c3faf7768b50f3ddf41ff09c1ed4884ae545770eeb9f5fe3b1458b817e0e0ab788c4a144d4f11982fdab2a9c9ce2701d4f634b8f681752e2a8a578ea02183824b303186b4cf9f47247f8848ebeefb0ad22bf95c3d062466e57243e116e1e806cdcf520d7f02a6e0a73783593e2ba3c6a31ff", 0x9a}, {&(0x7f0000000100)="70e6c5d9fa0036fdab6d973e", 0xc}, {&(0x7f0000000240)="6819233d6f7c981be78e6d3a3441c6ef585566", 0x13}, {&(0x7f0000000280)="2dc0137c0adceb7467b5dd5b21c7fe970bfd8dbad1523709d4f62759a79a7df4f6ea4babe07e8b4597e949be813e0b6c9c5fb94f9dfcae9eedc9b72c24e8c25cb6777654b4e80a3790642f1f2700840d4c9eac", 0x53}, {&(0x7f0000000300)}, {&(0x7f0000000340)="9f9af6911519de58b053846d391c5e1478ff794aeff174aea6d005023b0cba9a07eb767a4d007e10a1fb346c5cd8bf387d09b81e128b2cf8873397ceb04af29175a0bfa46a6990644c3582e5635ea1bae341aba8a05f60700fc0367381ebb92eb2f8108651344af3283a30631d09ab88d831468368586eebc6c2b0c0bcb947e707cd442e168de870110d5968713ebf6ed3b2951c4b76cbe8b41b5402a1d0419b402608c70dfbeaa9103c65d7d2562a4d2f7e5313804d9fa48697e78773324a0c133347f08eaa55d2411850c6ebdba7334622be577fe4899d7e17a21213c326e400fec3f00603fb0376c2db20e19af633", 0xf0}, {&(0x7f0000000440)="0dd0b119c44b991fec16984187c59772aa27bb1d6ed29fad1b493115fe73dfeab5a77ad03e2a6d4d8fee58d37175df5405e124a014a3a9e38fb7597dd499ba8a6ab5d260cca96c2b030db3dd88646b9a53935cdc3c52cf41e4adc184edae", 0x5e}, {&(0x7f00000004c0)="30ec68825a5d8c4c28fd735e7cd137cc3b6d5946136c800d377ce230ba03ebee7b7024e611fdc27a486380ba7477902935aee4ef69d4cc6848815b8cbbf8e7c62cc2b7840cf37d77b8d48a4ed7ea0577c4f1eeb6eacd5478b6a5e8ade8391a7a0f06807867ffec12f991ebee1e91c4c26ba58cb113a5185463685321fc3da1526406e0e9b4fb55bbf8ea12873fb60883307ae5c09a29853a5151143a4d1a21005f839b16eb043016542261e6", 0xac}, {&(0x7f00000005c0)="f98623ded9d7c7a3fbd78b00f66520b839a8bfc71afb8c70ff5353050c26cc8684339b70bb89d54ecb1a34efbcbb33", 0x2f}], 0x9, 0x0) [ 2607.841897] FAULT_INJECTION: forcing a failure. [ 2607.841897] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.844433] CPU: 1 PID: 12465 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2607.845975] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2607.848476] Call Trace: [ 2607.849046] dump_stack+0x107/0x163 [ 2607.849821] should_fail.cold+0x5/0xa [ 2607.850628] ? vm_area_dup+0x78/0x290 [ 2607.851440] should_failslab+0x5/0x10 [ 2607.852293] kmem_cache_alloc+0x5b/0x350 [ 2607.853163] ? lock_downgrade+0x6d0/0x6d0 [ 2607.854051] vm_area_dup+0x78/0x290 [ 2607.854837] ? _cond_resched+0x12/0x80 [ 2607.855671] ? copy_page_range+0x242d/0x3810 [ 2607.856655] ? vm_area_alloc+0x110/0x110 [ 2607.857539] ? up_write+0x191/0x550 [ 2607.858330] ? vm_iomap_memory+0x190/0x190 [ 2607.859231] ? downgrade_write+0x3a0/0x3a0 [ 2607.860125] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2607.861288] ? __vma_link_rb+0x540/0x700 [ 2607.862155] dup_mm+0x44d/0x1110 [ 2607.862881] ? vm_area_dup+0x290/0x290 [ 2607.863700] ? __raw_spin_lock_init+0x36/0x110 [ 2607.864733] copy_process+0x23f8/0x66f0 [ 2607.865574] ? lock_downgrade+0x6d0/0x6d0 [ 2607.866471] ? __cleanup_sighand+0xb0/0xb0 [ 2607.867371] ? find_held_lock+0x2c/0x110 [ 2607.868247] kernel_clone+0xe7/0xa20 [ 2607.869027] ? lock_downgrade+0x6d0/0x6d0 [ 2607.869880] ? find_held_lock+0x2c/0x110 [ 2607.870717] ? copy_init_mm+0x20/0x20 [ 2607.871507] ? ksys_write+0x12d/0x250 [ 2607.872319] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2607.873328] __do_sys_fork+0x8a/0xc0 [ 2607.874099] ? kernel_clone+0xa20/0xa20 [ 2607.874941] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2607.876031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.877096] ? trace_hardirqs_on+0x5b/0x180 [ 2607.877987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.879057] do_syscall_64+0x33/0x40 [ 2607.879830] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2607.880906] RIP: 0033:0x7f89b6ef5b19 [ 2607.881678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.885510] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2607.887082] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2607.888567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2607.890038] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.891510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2607.893004] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2619.594441] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:21:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:21:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x400}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x8000, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) close(r0) socket$inet(0x2, 0x3, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:21:38 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fork() recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000380)=""/20, 0x14}], 0x4, &(0x7f0000000700)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}, 0x2060) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r4 = getegid() setgid(r4) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r2, {0x0, r4}}, './file0\x00'}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x800000000000, r1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:21:38 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r1, 0x8030942b, &(0x7f0000000180)={0x100000001, {0x0, 0x10000, 0x8000, 0x2, 0x5}}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = dup2(r0, r0) sendfile(r3, r0, &(0x7f0000000100)=0x8, 0x3ff) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:21:38 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0xfdffffff00000000}) 00:21:38 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000040)={0x0, 0x0, 0xfff8}) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x1, 0x56a, 0x2, 0x15, "5263b8018862d4a501eb1c2ccd06971b0af71c"}) 00:21:38 executing program 3: fork() (fail_nth: 87) 00:21:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2, 0x2) fsmount(r1, 0x0, 0x4) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0) 00:21:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 2626.673000] FAULT_INJECTION: forcing a failure. [ 2626.673000] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.675768] CPU: 0 PID: 12487 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2626.677375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2626.679817] Call Trace: [ 2626.680402] dump_stack+0x107/0x163 [ 2626.681189] should_fail.cold+0x5/0xa [ 2626.682015] ? create_object.isra.0+0x3a/0xa20 [ 2626.683003] should_failslab+0x5/0x10 [ 2626.683823] kmem_cache_alloc+0x5b/0x350 [ 2626.684720] create_object.isra.0+0x3a/0xa20 [ 2626.685664] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2626.686760] kmem_cache_alloc+0x159/0x350 [ 2626.687666] vm_area_dup+0x78/0x290 00:21:38 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="fc893540e897160be295989a7960f33db434639fefa23721a5037f57f550081e94ecf41d31c7588d8b0998cf18c55db8db8704d948675dbe9847206816bf67ba5c3f17f9d6d93d4d67fa171628212633b0ab1f847fe64b765acb53cccd4ecc331aaebf9da5e3a981d9f9390bedb74edde80425bfafd16cbe364f87b9ce32cd3d26e78e0b3098e8c1653d63911aaf4227a55c4b6c92a480a76b4d9a9f4fd350f4a65903e10fc7ebcd71effa28e027a4bf3d998fe18c41624cb38a9f28d774eff2e3f2e5df9c1594e06994a2845961155862007dfa625ab399af24", 0xda}, {&(0x7f0000000100)="0e1c8892f971be06f55b44a90a459f253c95caf8d34684a19cabc15d23777712e0553f13063eedc437877f89a8ef00d03bf97f4f", 0x34}], 0x2) [ 2626.688476] ? _cond_resched+0x12/0x80 [ 2626.689404] ? copy_page_range+0x242d/0x3810 [ 2626.690389] ? vm_area_alloc+0x110/0x110 [ 2626.691272] ? up_write+0x191/0x550 [ 2626.692057] ? vm_iomap_memory+0x190/0x190 [ 2626.692983] ? downgrade_write+0x3a0/0x3a0 [ 2626.693898] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2626.695074] ? __vma_link_rb+0x540/0x700 [ 2626.695955] dup_mm+0x44d/0x1110 [ 2626.696714] ? vm_area_dup+0x290/0x290 [ 2626.697565] ? __raw_spin_lock_init+0x36/0x110 [ 2626.698556] copy_process+0x23f8/0x66f0 [ 2626.699416] ? lock_downgrade+0x6d0/0x6d0 [ 2626.700335] ? __cleanup_sighand+0xb0/0xb0 [ 2626.701262] ? find_held_lock+0x2c/0x110 [ 2626.702139] kernel_clone+0xe7/0xa20 [ 2626.702936] ? lock_downgrade+0x6d0/0x6d0 [ 2626.703831] ? find_held_lock+0x2c/0x110 [ 2626.704713] ? copy_init_mm+0x20/0x20 [ 2626.705538] ? ksys_write+0x12d/0x250 [ 2626.706364] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2626.707414] __do_sys_fork+0x8a/0xc0 [ 2626.708230] ? kernel_clone+0xa20/0xa20 [ 2626.709105] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2626.710236] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2626.711387] ? trace_hardirqs_on+0x5b/0x180 [ 2626.712401] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2626.713609] do_syscall_64+0x33/0x40 [ 2626.714476] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2626.715669] RIP: 0033:0x7f89b6ef5b19 [ 2626.716556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2626.720819] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2626.722578] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2626.724233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2626.725868] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2626.727522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2626.729185] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2639.924871] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:21:58 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x8, 0x1, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff4ed, 0x8}, 0x0, 0x89, 0x0, 0x0, 0x0, 0x18}, r1, 0xffffffffffffffff, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:21:58 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fork() recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/34, 0x22}, {&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000380)=""/20, 0x14}], 0x4, &(0x7f0000000700)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}, 0x2060) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000004c0)) r4 = getegid() setgid(r4) lchown(&(0x7f0000000180)='./file1\x00', 0xee00, r4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r2, {0x0, r4}}, './file0\x00'}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x800000000000, r1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:21:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5423, &(0x7f0000000000)) 00:21:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}}) 00:21:58 executing program 3: fork() (fail_nth: 88) 00:21:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:21:58 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0x270, 0x1, 0x3, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x1, 0x5}}, @NFQA_MARK={0x8}, @NFQA_EXP={0x178, 0xf, 0x0, 0x1, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xff}, @CTA_EXPECT_NAT={0x48, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x14, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_TUPLE={0x90, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3ae3ba72a2c8a07a}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_MASK={0x94, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_EXP={0x2c, 0xf, 0x0, 0x1, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x4c24}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_PAYLOAD={0x89, 0xa, "140f325110be88533c16657364fa93a2a21b0576c42955ef10eb39c513e438b967ca0e5d880f98b5d1ab167ab3cceed25a8e6907b3cf5f91175992bffd86b1113441d4d1c9680e122fd7be4292f9fa365c9c8761059dba4e7882bef082cc9fc3c3f67048280687036c4bb4e546bc62393c7142b3fa4eac86ca8dc3e44037e209df92545ec3"}]}, 0x270}, 0x1, 0x0, 0x0, 0x4801}, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000100)) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:21:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00175944788300802e2f66696c653000"]) sendmsg$IPSET_CMD_FLUSH(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0x6, 0x401, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x41) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) preadv(r3, &(0x7f0000000440)=[{&(0x7f00000004c0)=""/9, 0x9}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/98, 0x62}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, 0x401, 0x10000) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) [ 2647.445615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12513 comm=syz-executor.4 [ 2647.482319] blktrace: Concurrent blktraces are not allowed on loop10 00:21:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:21:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000100)={0x97, 0x1d, &(0x7f0000000180)="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"}) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xfffffff8, 0x0, 0x7a, 0x2, 0x4, "56632ff07368ff68cb74c9ac9280b35f33320f", 0xfff, 0x2}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x14) syz_open_dev$tty20(0xc, 0x4, 0x0) 00:21:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r1, &(0x7f0000000100), 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/24, 0x18, 0x4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xfff) [ 2647.592708] FAULT_INJECTION: forcing a failure. [ 2647.592708] name failslab, interval 1, probability 0, space 0, times 0 [ 2647.595176] CPU: 1 PID: 12523 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2647.596681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2647.599109] Call Trace: [ 2647.599675] dump_stack+0x107/0x163 [ 2647.600468] should_fail.cold+0x5/0xa [ 2647.601286] ? ptlock_alloc+0x1d/0x70 [ 2647.602104] should_failslab+0x5/0x10 [ 2647.602919] kmem_cache_alloc+0x5b/0x350 [ 2647.603797] ptlock_alloc+0x1d/0x70 [ 2647.604594] pte_alloc_one+0x68/0x190 [ 2647.605409] __pte_alloc+0x1d/0x320 [ 2647.606190] copy_page_range+0x1a1d/0x3810 [ 2647.607146] ? up_write+0x191/0x550 [ 2647.607935] ? vm_iomap_memory+0x190/0x190 [ 2647.608846] ? downgrade_write+0x3a0/0x3a0 [ 2647.609749] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2647.610914] ? __vma_link_rb+0x540/0x700 [ 2647.611796] dup_mm+0x8b9/0x1110 [ 2647.612544] ? vm_area_dup+0x290/0x290 [ 2647.613377] ? __raw_spin_lock_init+0x36/0x110 [ 2647.614360] copy_process+0x23f8/0x66f0 [ 2647.615209] ? lock_downgrade+0x6d0/0x6d0 [ 2647.616114] ? __cleanup_sighand+0xb0/0xb0 [ 2647.617048] ? find_held_lock+0x2c/0x110 [ 2647.617927] kernel_clone+0xe7/0xa20 [ 2647.618721] ? lock_downgrade+0x6d0/0x6d0 [ 2647.619604] ? find_held_lock+0x2c/0x110 [ 2647.620475] ? copy_init_mm+0x20/0x20 [ 2647.621290] ? ksys_write+0x12d/0x250 [ 2647.622109] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2647.623145] __do_sys_fork+0x8a/0xc0 [ 2647.623935] ? kernel_clone+0xa20/0xa20 [ 2647.624817] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2647.625922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2647.627020] ? trace_hardirqs_on+0x5b/0x180 [ 2647.627932] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2647.629030] do_syscall_64+0x33/0x40 [ 2647.629816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2647.630909] RIP: 0033:0x7f89b6ef5b19 [ 2647.631704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2647.635620] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2647.637246] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2647.638769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2647.640281] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2647.641813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2647.643351] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2647.690298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12529 comm=syz-executor.4 00:21:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x0, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:21:59 executing program 3: fork() (fail_nth: 89) 00:21:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000c99b1feb61d98a24", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x420100, 0x90) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000000c0)={0x800, 0x104}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:21:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r1, &(0x7f0000000100), 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/24, 0x18, 0x4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xfff) [ 2647.829763] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12538 comm=syz-executor.4 00:21:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0x0, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2648.091887] FAULT_INJECTION: forcing a failure. [ 2648.091887] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.094523] CPU: 0 PID: 12548 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2648.096004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2648.098441] Call Trace: [ 2648.099007] dump_stack+0x107/0x163 [ 2648.099789] should_fail.cold+0x5/0xa [ 2648.100619] ? create_object.isra.0+0x3a/0xa20 [ 2648.101588] should_failslab+0x5/0x10 [ 2648.102393] kmem_cache_alloc+0x5b/0x350 [ 2648.103261] create_object.isra.0+0x3a/0xa20 [ 2648.104191] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2648.105279] kmem_cache_alloc+0x159/0x350 [ 2648.106164] vm_area_dup+0x78/0x290 [ 2648.106945] ? _cond_resched+0x12/0x80 [ 2648.107781] ? copy_page_range+0x242d/0x3810 [ 2648.108771] ? vm_area_alloc+0x110/0x110 [ 2648.109645] ? up_write+0x191/0x550 [ 2648.110425] ? vm_iomap_memory+0x190/0x190 [ 2648.111321] ? downgrade_write+0x3a0/0x3a0 [ 2648.112230] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2648.113386] ? __vma_link_rb+0x540/0x700 [ 2648.114269] dup_mm+0x44d/0x1110 [ 2648.115001] ? vm_area_dup+0x290/0x290 [ 2648.115837] ? __raw_spin_lock_init+0x36/0x110 [ 2648.116824] copy_process+0x23f8/0x66f0 [ 2648.117684] ? lock_downgrade+0x6d0/0x6d0 [ 2648.118580] ? __cleanup_sighand+0xb0/0xb0 [ 2648.119502] ? find_held_lock+0x2c/0x110 [ 2648.120365] kernel_clone+0xe7/0xa20 [ 2648.121159] ? lock_downgrade+0x6d0/0x6d0 [ 2648.122037] ? find_held_lock+0x2c/0x110 [ 2648.122894] ? copy_init_mm+0x20/0x20 [ 2648.123701] ? ksys_write+0x12d/0x250 [ 2648.124534] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2648.125568] __do_sys_fork+0x8a/0xc0 [ 2648.126354] ? kernel_clone+0xa20/0xa20 [ 2648.127227] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2648.128343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2648.129451] ? trace_hardirqs_on+0x5b/0x180 [ 2648.130375] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2648.131476] do_syscall_64+0x33/0x40 [ 2648.132275] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2648.133379] RIP: 0033:0x7f89b6ef5b19 [ 2648.134179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.138107] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2648.139715] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2648.141233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2648.142745] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.144258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2648.145794] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2662.188259] kmemleak: 46 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:22:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0x0, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:22:21 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x2}) 00:22:21 executing program 5: prctl$PR_SET_FPEXC(0xc, 0x80000) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pwrite64(r1, &(0x7f0000000100)="8ba16cc1a641eebfe24cc9c33c72adaeff76fcce353e61e080ee494f080a1ef6385f479e84e081cab29463b9e2a5ab189489fadb44265f9001d1071e566a16708a7627f7ee9f74c73e5dd0defd702766fd44d8ce82ce", 0x56, 0x100) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 00:22:21 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r1, &(0x7f0000000100), 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/24, 0x18, 0x4) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0xfff) 00:22:21 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/67, 0x43}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/157, 0x9d}], 0x4) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:22:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x0, 0x81, 0x7f, 0x1}, {0x1, 0xfe, 0x1f, 0x1}, {0x9, 0x39, 0x5, 0x600}]}) writev(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)="fc36fd439ff15d13a5b9405152c4f3e864d434a3f4f5c24527c836188187b033dca38df4d8d4a4c166984f0bb4bf4e17bb50cde0677cf611e38085c92eb67c7112d8f8528473da602d488c6d76974d439afb7d89da037921af3d92d0bfd27d629b21927056729778174e92365121b56bea0f35eb73794899aff9c9331f899bcc60c67225f1f32acd3a9641de4b872487a7d46848cf2a4975db5ffb3651232a35a64f84c791f5c72ca024101acc0aa7598a1dd77b472ff590258871b8d7fcd6ff4f4dee7b012748d6cac1cc6d756d8136a90f56da3b1a1fa02fc1fc6442e79ad7ebdcc65214a57ebd6b21e8", 0xeb}, {&(0x7f00000001c0)="dad613590e14dee7b5afbcf1b799fd8e6e3ffb363556f775e4374d7bc7ad2932ad5eb1e766109eeef96d1125bde527899ca3e80d6fa63daccb707ff8ca65c6de9d3021bcba3479201ab5c4b02708528602ef974a4ce5dde7e070b57d25e03dc3bfa66e7b1528a14fbb73e9420ff9bb5df4fdf075a77c76c425218c3181d4dda8d8002a8e9d14e5b2301b12a593ab3fcc7232b96e", 0x94}, {&(0x7f0000000280)="8ca8860465bed31cb0d43c0de36b2706919311e96af71139bd9fc904b51dedfef963a17282a8d672dd36ab5ddd27d364b48471647edc69aa0f8dfbbba2fea353f8a1223df5f32ff5ffae", 0x4a}, {&(0x7f0000000300)="beb79909e503a1238354b7ac8cade8402bf7dfff0fe25d66f4993e6c61ab07967240bf67deb2015a74a24352aa7413dfe81ba40dd46fbf71b4c8a80647060dc2bc07e7a8e2796a1b3020a28483e1330eca4f5f285bb3f157f8fb02c86fd04dbac310b6a57fd9bc5307a7b1ecf71f9dfb0d934c573fc1a388263f72fd9716daa88d311ecd91fffe5fe1bd0e9cafbbdc6cbeb41aff63602d2a9462be", 0x9b}, {&(0x7f00000003c0)="d224199b72390a4ceac249035b8edcb4a4b88375e98a7497b362b0486b8de32d83864efbaf409e8c07892fec8a9921e6140636ef9ae1f1c05976d76ea8870039c4823ff8f1781b13df045367a9ef3fd2cdf04d7d45fb2c9bbf", 0x59}], 0x5) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x401}) 00:22:21 executing program 3: fork() (fail_nth: 90) 00:22:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000100)={0x97, 0x1d, &(0x7f0000000180)="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"}) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xfffffff8, 0x0, 0x7a, 0x2, 0x4, "56632ff07368ff68cb74c9ac9280b35f33320f", 0xfff, 0x2}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x14) syz_open_dev$tty20(0xc, 0x4, 0x0) 00:22:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0x0, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2669.955807] blktrace: Concurrent blktraces are not allowed on loop10 00:22:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0xffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 2670.056466] FAULT_INJECTION: forcing a failure. [ 2670.056466] name failslab, interval 1, probability 0, space 0, times 0 [ 2670.059096] CPU: 1 PID: 12571 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2670.060554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2670.062959] Call Trace: [ 2670.063520] dump_stack+0x107/0x163 [ 2670.064288] should_fail.cold+0x5/0xa [ 2670.065097] ? create_object.isra.0+0x3a/0xa20 [ 2670.066055] should_failslab+0x5/0x10 [ 2670.066858] kmem_cache_alloc+0x5b/0x350 [ 2670.067719] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2670.069008] create_object.isra.0+0x3a/0xa20 [ 2670.069930] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2670.071005] kmem_cache_alloc+0x159/0x350 [ 2670.071886] ptlock_alloc+0x1d/0x70 [ 2670.072655] pte_alloc_one+0x68/0x190 [ 2670.073465] __pte_alloc+0x1d/0x320 [ 2670.074239] copy_page_range+0x1a1d/0x3810 [ 2670.075194] ? vm_iomap_memory+0x190/0x190 [ 2670.076093] ? up_write+0x191/0x550 [ 2670.076879] ? downgrade_write+0x3a0/0x3a0 [ 2670.077773] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2670.078828] ? __vma_link_rb+0x540/0x700 [ 2670.079694] dup_mm+0x8b9/0x1110 [ 2670.080428] ? vm_area_dup+0x290/0x290 [ 2670.081263] ? __raw_spin_lock_init+0x36/0x110 [ 2670.082235] copy_process+0x23f8/0x66f0 [ 2670.083080] ? lock_downgrade+0x6d0/0x6d0 [ 2670.083974] ? __cleanup_sighand+0xb0/0xb0 [ 2670.084871] ? __lockdep_reset_lock+0x180/0x180 [ 2670.085864] ? find_held_lock+0x2c/0x110 [ 2670.086837] kernel_clone+0xe7/0xa20 [ 2670.087669] ? lock_downgrade+0x6d0/0x6d0 [ 2670.088712] ? find_held_lock+0x2c/0x110 [ 2670.089570] ? copy_init_mm+0x20/0x20 [ 2670.090378] ? ksys_write+0x12d/0x250 [ 2670.091190] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2670.092217] __do_sys_fork+0x8a/0xc0 [ 2670.093167] ? kernel_clone+0xa20/0xa20 [ 2670.094026] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2670.095398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2670.096485] ? trace_hardirqs_on+0x5b/0x180 [ 2670.097409] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2670.098501] do_syscall_64+0x33/0x40 [ 2670.099290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2670.100479] RIP: 0033:0x7f89b6ef5b19 [ 2670.101456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2670.105362] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2670.106995] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2670.108610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2670.110390] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2670.111914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2670.113454] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:22:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b62, &(0x7f0000000000)) 00:22:21 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r1, &(0x7f0000000100), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/24, 0x18, 0x4) 00:22:21 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x4}) 00:22:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x38, 0x0) 00:22:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:22:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r0, &(0x7f0000000100), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:22:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000040)={0x201f, 0x8001, 0x9f}) 00:22:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x260800, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x100000000}}, './file0\x00'}) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$EXT4_IOC_GETSTATE(r2, 0x40046629, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) dup3(0xffffffffffffffff, r4, 0x80000) r5 = getpgid(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000180)=r5) [ 2681.501341] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:22:40 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:22:40 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 00:22:40 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000300)=""/258, 0x8e}], 0x1, 0x5, 0x0) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/55, 0x37}, {&(0x7f0000000180)=""/13, 0xd}, {&(0x7f00000001c0)=""/35, 0x23}], 0x3, 0x1, 0x1) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r4 = io_uring_setup(0x1f8c, &(0x7f0000000240)={0x0, 0x8cbf, 0x20, 0x2, 0xec, 0x0, r1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r5, &(0x7f0000000540)=[{&(0x7f0000000440)=""/194, 0xc2}], 0x1, 0xe720, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r7, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r8, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r9, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fallocate(r9, 0x25, 0x4, 0x4) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f00000002c0)=[r0, r5, r6, r7, r8], 0x5) 00:22:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:22:40 executing program 3: fork() (fail_nth: 91) 00:22:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) readv(r0, &(0x7f0000000100), 0x0) 00:22:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000400)=ANY=[]) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0xa) syz_mount_image$nfs(0x0, &(0x7f0000000640)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x80) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000300)) mount$9p_unix(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x2029001, 0x0) umount2(&(0x7f0000000040)='./file0/../file0\x00', 0x0) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:22:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xa}) [ 2689.118428] FAULT_INJECTION: forcing a failure. [ 2689.118428] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.120985] CPU: 0 PID: 12623 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2689.122512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2689.125107] Call Trace: [ 2689.125700] dump_stack+0x107/0x163 [ 2689.126536] should_fail.cold+0x5/0xa [ 2689.127401] ? vm_area_dup+0x78/0x290 [ 2689.128259] should_failslab+0x5/0x10 [ 2689.129129] kmem_cache_alloc+0x5b/0x350 [ 2689.130035] ? lock_downgrade+0x6d0/0x6d0 [ 2689.130979] vm_area_dup+0x78/0x290 [ 2689.131785] ? _cond_resched+0x12/0x80 [ 2689.132659] ? copy_page_range+0x242d/0x3810 [ 2689.133664] ? vm_area_alloc+0x110/0x110 [ 2689.134562] ? vm_iomap_memory+0x190/0x190 [ 2689.135481] ? up_write+0x191/0x550 [ 2689.136272] ? downgrade_write+0x3a0/0x3a0 [ 2689.137209] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2689.138296] ? __vma_link_rb+0x540/0x700 [ 2689.139183] dup_mm+0x44d/0x1110 [ 2689.139934] ? vm_area_dup+0x290/0x290 [ 2689.140783] ? __raw_spin_lock_init+0x36/0x110 [ 2689.141794] copy_process+0x23f8/0x66f0 [ 2689.142660] ? lock_downgrade+0x6d0/0x6d0 [ 2689.143578] ? __cleanup_sighand+0xb0/0xb0 [ 2689.144509] ? find_held_lock+0x2c/0x110 [ 2689.145404] kernel_clone+0xe7/0xa20 [ 2689.146213] ? lock_downgrade+0x6d0/0x6d0 [ 2689.147108] ? find_held_lock+0x2c/0x110 [ 2689.147989] ? copy_init_mm+0x20/0x20 [ 2689.148818] ? ksys_write+0x12d/0x250 [ 2689.149669] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2689.150723] __do_sys_fork+0x8a/0xc0 [ 2689.151539] ? kernel_clone+0xa20/0xa20 [ 2689.152418] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2689.153565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2689.154685] ? trace_hardirqs_on+0x5b/0x180 [ 2689.155623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2689.156735] do_syscall_64+0x33/0x40 [ 2689.157559] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2689.158671] RIP: 0033:0x7f89b6ef5b19 [ 2689.159481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.163489] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2689.165153] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2689.166704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.168451] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.170008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2689.171550] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:22:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580), 0x0, 0xe720, 0x0) 00:22:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:22:40 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="040000000000000000f8ff0000000000"]) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$TCSETS(r0, 0x5402, &(0x7f0000001540)={0x400, 0x65a, 0x3, 0x1000, 0xf, "b9412b7737aff2dcd77d8151a7725ad51c8211"}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) pread64(r0, &(0x7f00000014c0)=""/94, 0x5e, 0x9) pwritev2(r4, &(0x7f0000001400)=[{&(0x7f0000000080)="8b53fcad378627d53dce6d45e36b05b040705f03c43dd6a6d3e1f7d710b6276643d472509ad5745babf90c76418b3df608f8aa389eb420ac58c316f33e6e9d5ba0b27559a406e620d84212d7900f83cf3fa7c18424d7e1a6f60719b1fce20b418ab33d7f169b4eacaeaced7170caa1e3ee42a893045ee44d1a62847b51a9bbf119cbd21d111c5edf49f29fef95bd1df04631fed0da4215fb2156e9b4777ed914f911b492912304bb118062448b3f7537dd2c87b5bcaf840faa19f67d15740e078e582fecb2f3c23814be95677ee9625cc7906d7af78e005a3b1b539d415d4a4766376a73a96c65b8", 0xe8}, {&(0x7f0000000180)="11ec97cdd4fd4e5d3b1071674930d28218007ec1cf2da2a3d4dcb5f9cea03ca53611082c013579960a4bef672b4ff2f80f5c25864d3d9f0f03b93e76f2acfa1e5ea421a03b0ce0de4959d596b2b3bf75605d63d56ace5361c57103d75ed264d37867d0dcec674f67e3f9bc404c5a62297f77cd4c9369a138d63a5789aacf2f8c7e1e7e586ddcbee43ac201ccbbae23b7d1e99153ace045df2a89edc8955e53", 0xfffffffffffffdb1}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="bce6409502869b9ad11a50fad059a145fe0e34f7ac46517f1f894cf00ce6b58b8b90a52ac41d509f970ffda814eb093f2890f02f54eba0cab9916f7dc063bc9f3999799d457248dee315b5fcda5757b8054a3544ec8252195023c879c0c8052ed2242a507123919d376816f5bb7dddfc7992ba1b01fb367c0add642a99e83367682e6535c9d531f4d36269470f4403f01fb86b5c14e3dd29d828db0cc0230b7fd00d274f20c363e7b17258abe85fd197b415394dd2e000af7402d33c889928b251b63a24e6c7459ab309f020c902614194e3e0001a7be1f0fccf2e71c0fd0d9956c5e65301e69d7297", 0xe9}, {&(0x7f0000001340)="9adf512f59eff6fc20afa30dab55e3de0dd6c5cb2dbbedd5691fe81d23fa0a971422e38f09a4456049c8b5e9b079825509bd41ec70fe5f2a608f1dafdcb3ff2f540d0ba09baa99df7f9d73cea7feb1ead569cb4e7605eaed3e6b45d5736ae9b599abc703", 0x64}, {&(0x7f00000013c0)="902e1937ec1622baa2aca9a2d8fac505e81c373b86f0163ca5e638de9ba6b471ca5ab9171dfb06978f364078dff273c41333bbeeff71", 0x36}], 0x6, 0x4ec3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000001480)={0x1dd0, 0x8, 0xb40, 0x5, 0x59, "d1c4a681003554f7dfdad253237bfa8d626bd4", 0x1, 0x3}) 00:22:40 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x399}) 00:22:40 executing program 3: fork() (fail_nth: 92) 00:22:40 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x8c39}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = timerfd_create(0x2, 0x40000) readv(r1, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/197, 0xc5}, {&(0x7f0000000340)=""/79, 0x4f}, {&(0x7f00000003c0)=""/5, 0x5}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f00000015c0)=""/193, 0xc1}, {&(0x7f0000000500)=""/67, 0x43}, {&(0x7f00000016c0)=""/197, 0xc5}], 0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0xbfded8998601abbd, 0x80, 0x6, 0x3f, 0x6, 0x0, 0x0, 0xfff, 0x900e4, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x33, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x12240, 0x200, 0x80000001, 0x8, 0x80, 0x7ff, 0xfe8b, 0x0, 0x7ff, 0x0, 0xbff}, 0xffffffffffffffff, 0x8, r0, 0x1) finit_module(r2, &(0x7f0000000200)='\x00', 0x3) 00:22:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) 00:22:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') 00:22:40 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2689.649606] FAULT_INJECTION: forcing a failure. [ 2689.649606] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.652259] CPU: 0 PID: 12647 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2689.653828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2689.656290] Call Trace: [ 2689.656863] dump_stack+0x107/0x163 [ 2689.657663] should_fail.cold+0x5/0xa [ 2689.658488] ? ptlock_alloc+0x1d/0x70 [ 2689.659313] should_failslab+0x5/0x10 [ 2689.660136] kmem_cache_alloc+0x5b/0x350 [ 2689.661028] ptlock_alloc+0x1d/0x70 [ 2689.661816] pte_alloc_one+0x68/0x190 [ 2689.662639] __pte_alloc+0x1d/0x320 [ 2689.663430] copy_page_range+0x1a1d/0x3810 [ 2689.664396] ? vm_iomap_memory+0x190/0x190 [ 2689.665330] ? up_write+0x191/0x550 [ 2689.666119] ? downgrade_write+0x3a0/0x3a0 [ 2689.667031] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2689.668110] ? __vma_link_rb+0x540/0x700 [ 2689.669003] dup_mm+0x8b9/0x1110 [ 2689.669750] ? vm_area_dup+0x290/0x290 [ 2689.670595] ? __raw_spin_lock_init+0x36/0x110 [ 2689.671590] copy_process+0x23f8/0x66f0 [ 2689.672455] ? lock_downgrade+0x6d0/0x6d0 [ 2689.673387] ? __cleanup_sighand+0xb0/0xb0 [ 2689.674316] ? find_held_lock+0x2c/0x110 [ 2689.675198] kernel_clone+0xe7/0xa20 [ 2689.676003] ? lock_downgrade+0x6d0/0x6d0 [ 2689.676894] ? find_held_lock+0x2c/0x110 [ 2689.677783] ? copy_init_mm+0x20/0x20 [ 2689.678613] ? ksys_write+0x12d/0x250 [ 2689.679446] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2689.680496] __do_sys_fork+0x8a/0xc0 [ 2689.681328] ? kernel_clone+0xa20/0xa20 [ 2689.682210] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2689.683336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2689.684457] ? trace_hardirqs_on+0x5b/0x180 [ 2689.685395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2689.686536] do_syscall_64+0x33/0x40 [ 2689.687343] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2689.688462] RIP: 0033:0x7f89b6ef5b19 [ 2689.689289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.693300] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2689.694952] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2689.696498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.698045] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.699586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2689.701137] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2689.784811] blktrace: Concurrent blktraces are not allowed on loop2 [ 2703.784969] kmemleak: 49 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:23:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xa00}) 00:23:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 00:23:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) 00:23:02 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9, 0x8, &(0x7f0000000700)=[{&(0x7f0000000140)="01e73420b83858cac546a946817e87309b623a0438ae74db7e06b324b48105d8a95e5c88cd7d2c717532eeec68e7a8294683e8b72bffe0a470d40ed53e799fe1f3ed4a69fc89a21434ccd8cf1797710e05a28e2aa89791a8cbf04f847096935cc1726ac5d3ce0313513ad0aa4d44cfc019c8c4a471f4a13acd25428134cfb2a4143173cfb540f26bc759c8dfceaf509579fc314b8fc79b7108e90ec30809b38ef620e14bd9853231e0a558c943e7830ba84ce0811ea41ec3930a", 0xba, 0x401}, {&(0x7f0000000200)="82d1c4891db9e1f47d2b50359d6bddb7", 0x10, 0x3ff}, {&(0x7f0000000240)="ae2ee0161becf5f53d086b50537c14af625e393c375d069596168ffabd77c4809ac9b00b997dc2f7a5b192294c211c90dae1dc4391d67bec80b347864719b7e0b2d94754f6e254", 0x47, 0x6}, {&(0x7f00000002c0)="d4a06e46d26285ef30", 0x9, 0x9}, {&(0x7f0000000300)="57bc6035b3265df7afd311ab749332b95f55666efccadddc005caa62e940455125b8d9f0243b50e0d9f8a9d476a711cb84b690a0724b60a26967b8ac7c57236302b4e98a8c072f58a7c46dbb033dc6d1e7da7184537a3c2a26ec6de6152a49210a4e0853cc73298282158c06db15c44c95e8b79228264d2f46ea30b085e2907954542e065f26dbecb843d76ae4fad198027e949b3145a6d660d820d22b5dd7c918c74381dcd60a2d84f9be6ed36c20d01627f55c2e5612e92133571e895a99a3851ece58969984d5e1e61660c8235d7659692bb35d39", 0xd6, 0x9}, {&(0x7f0000000440)="63306a7787a74a6b526a88c51a6047f1a5572517270819d78c2dc56422151a7074b950a03b0b14fbc7984edd6a57f183c8c3f96f26f04172c4cd11843ca739c0d6c773f6700cb129feb211fcb995022daf87ef97a6376121c09e8be412a61daff4adc4ef383896791ba9bc2a37e5e41df289124f6b9b91b4d38b1810d2c44d607311d4a6255311654768869423750ffb49f621f121e57962d215b8ac2aad1dafa60614d0057e4beeea98b7f51ab833c4d61d61", 0xb3, 0x5}, {&(0x7f0000000500)="a0902a3779a5b11f131a374d473f45771aa61518123df2b6a0a9e776941755d23b7913c059dfdb562f941e30a8eb2577f435fab889506afff16cc90652633ee56457008b35245b2e035c02204f763a2317f793aee0526d4525e8a3d8dce7d7302257730a7f9ffe7f0b6dc556e82ff37822baa22a806ac4f0cd000299445133249ee37380e6ec403f88790af0a04d0c41900829ee39630df7e404d051e8f5bad52dfd7d6cdc8874c83ecf4a807eb617a2f2c00aad4ff574fe82645e7f0af8fe0bdac9aa0a291400c8e1cfb0a14eb711ca3bec217e39e1922d712a0d9450db422369e23e855f50409a1cdaca120ab5b2", 0xef, 0xa2d9}, {&(0x7f0000000600)="61a6f0974f8d011faec6358be83a20150c2c2605f6d19665fde63ab66b8306ed8bbba0c27c6f9e0713fc2d3c8714c0efb23a430740d8545105199b6fa327eb174bb159ce3955bedf66aa3d6ce1e354469acf65783f2a9ea72e6a6f2ff6f43081f09d52941d1183ef1865d93d2a365eed2b25b4b2f104b41b15e1deecc0cf95326222853f42dd995611c1b3da046775ecce5a30ded5080685fad4490949b799f2a5bd4eda5381037a5f5fa19d93786f6cab1bbd3b60429a485ec45d82e09adf66d863580ae3dc0714d525", 0xca, 0x1}], 0x20000, &(0x7f00000007c0)={[{@shortname_mixed}, {@shortname_win95}, {@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'iso8859-3'}}, {@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'iso8859-13'}}, {@uni_xlateno}, {@shortname_winnt}, {@uni_xlateno}], [{@subj_type={'subj_type', 0x3d, '\x00'}}, {@permit_directio}]}) write$binfmt_aout(r1, &(0x7f0000000880)={{0x0, 0x6, 0x6, 0xc9, 0x18f, 0xf006, 0x1ee, 0x401}, "900ee1692a4b47aec83f2a2c419c20e82a0203c17d23f77733a805e2d42c9d151df8857ffe23c84275b7f8f19697a04467f14ad9979a6f13894206f6df9795de67e0bac9dfa710214e090e67cf37dd970b37b799082aa3ccf3cbe04664bf3c0a852d7dc8db6fc0b942ef63b4630b0eaab73712930e9b111ddaf6d33ef220be6ec33a60061030f9a5374d139b13f43388fe6a7996283fb20ee3b96012448702946c829a0e53de645c01eb07a5bdc0934b830697aa3f5690e3b47bc5a057b4c4adf630315bc60688cf31607442f8613f1f55152c7866ccbe4b068e0af4321fb57824bc529d8f54c927d716ff7c4390e24b6d46fea1afa6692216", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa19) 00:23:02 executing program 3: fork() (fail_nth: 93) 00:23:02 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:23:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = fork() r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x2, 0xff, 0x0, 0x3, 0x92, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x20, 0xaa9}, 0x40000, 0x8, 0x7ff, 0x3, 0x1, 0x401, 0x8, 0x0, 0x1, 0x0, 0x6}, r1, 0xc, r2, 0x0) [ 2711.313577] blktrace: Concurrent blktraces are not allowed on loop2 00:23:02 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:02 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:23:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}]}, 0x1c}}, 0x0) [ 2711.379008] FAULT_INJECTION: forcing a failure. [ 2711.379008] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2711.381863] CPU: 0 PID: 12671 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2711.383380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2711.385853] Call Trace: [ 2711.386432] dump_stack+0x107/0x163 [ 2711.387229] should_fail.cold+0x5/0xa [ 2711.388069] __alloc_pages_nodemask+0x182/0x680 [ 2711.389087] ? __lockdep_reset_lock+0x180/0x180 [ 2711.390125] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2711.391614] alloc_pages_current+0x187/0x280 [ 2711.392683] pte_alloc_one+0x16/0x190 [ 2711.393614] __pte_alloc+0x1d/0x320 [ 2711.394501] copy_page_range+0x1a1d/0x3810 [ 2711.395593] ? vm_iomap_memory+0x190/0x190 [ 2711.396620] ? up_write+0x191/0x550 [ 2711.397512] ? downgrade_write+0x3a0/0x3a0 [ 2711.398497] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2711.399582] ? __vma_link_rb+0x540/0x700 [ 2711.400475] dup_mm+0x8b9/0x1110 [ 2711.401229] ? vm_area_dup+0x290/0x290 [ 2711.402101] ? __raw_spin_lock_init+0x36/0x110 [ 2711.403114] copy_process+0x23f8/0x66f0 [ 2711.403985] ? lock_downgrade+0x6d0/0x6d0 [ 2711.404910] ? __cleanup_sighand+0xb0/0xb0 [ 2711.405842] ? __lockdep_reset_lock+0x180/0x180 [ 2711.406884] ? find_held_lock+0x2c/0x110 [ 2711.407773] kernel_clone+0xe7/0xa20 [ 2711.408583] ? lock_downgrade+0x6d0/0x6d0 [ 2711.409497] ? find_held_lock+0x2c/0x110 [ 2711.410379] ? copy_init_mm+0x20/0x20 [ 2711.411213] ? ksys_write+0x12d/0x250 [ 2711.412044] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2711.413104] __do_sys_fork+0x8a/0xc0 [ 2711.413920] ? kernel_clone+0xa20/0xa20 [ 2711.414804] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2711.415949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2711.417082] ? trace_hardirqs_on+0x5b/0x180 [ 2711.418034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2711.419150] do_syscall_64+0x33/0x40 [ 2711.419956] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2711.421071] RIP: 0033:0x7f89b6ef5b19 [ 2711.421904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2711.425917] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2711.427580] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2711.429132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2711.430701] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2711.432260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2711.433832] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:23:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f00000010c0)=0x2) r1 = signalfd(r0, &(0x7f0000000040)={[0x8]}, 0x8) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000001080)={&(0x7f0000000080)=""/4096, 0x1000, 0x8, 0x547}) [ 2725.404044] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:23:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0xfffe, 0x98, 0xfffd}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000180)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x80) 00:23:25 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000840)='./file0\x00', 0x8, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop3', 0x400080, 0x103) sendmsg$sock(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)="dfe150c80ca9db7d22e889b400825a97872eefd26910f99fcc25574ea9571323059c8baffe45b8af195e7ca455f79a2370fa5a06a93fcb9635662ae0b4ba9280a8c77de2da7f83e277de64e12d06af66bdda47007516793e4b07f2012f3c6e0d5899fe9961e28e71805fef9968ce04396589509a815a91fc027ddc4541a78c38f93af498219db0ef31ca242c971d6ac74200d6281c5ca96bf331944b296893fb87929ab6fcb52b2f0f10d286ca5319ff473b93a1588f8bd7086a52c375fab50fef5b15bbbf04b062ecd7a9c1b77cd7e09b9bc627755bd4c7ce6a18e7b5b25933bedf816bff60f5fed3207fde28fe8b2d4013db15", 0xf4}, {&(0x7f0000000200)="5f2572d6dffe1aa0f77fe006b72bb65d82f9ec4a68441295fc28aa358e5f0e01502c3b5b0e16c48652b7936ffc8aa2158b83f43a52d83408b105fe2d9a91677003f6c726bcce8238374458245c0a6bbcee8ead9ad3e6978fbe1ebde47667597da7aab9531cda1e9d47060141384b4fad13ad5f913507261c06a33600de542bc13681a1aef8a8d09e3c17fc948851", 0x8e}, {&(0x7f0000000880)="9fcf71a825870b4b7504bf220c138f4c8175d5edb70d3ab06b447c110b8a1f685ab4b9f656d41702c65b29b4481f1a66660e33d03afd1b0fb8cb89164d0c23883f3d1283c79756cd588ec649d895c85d399874e61ecdbf1f9b2a57b11e94ad55090e00e0ff000000000086a252df536af7ec6d5f68f0418aaa5bff7f0000eaf24cc0acf805c309c845b24b20c36167c15525df73187c8c0700a7ba4e5250f8d6079443d5aa8ad1ece744457ee4311d13610807f7c2f95926e1d12f25bfcafb547e59a26ae84c3dcb5521d0262053f20cbb7fbb7aa966e6265a6300260372", 0xbc}, {&(0x7f0000000380)="d330d0a25f250643cab0a764b8424cb29961c6bfe956b78b6fa06e86f02043d7a090346e549e34b62475f6d3aa4844ee7a3805ae3b8c1b4a21a32fe6ff240cdada94fd4504ef43f40e3671033ec71c", 0x4f}, {&(0x7f0000000440)="caaf2563b708b313f2e799a199cbf0fe15cd391a3fb23e4f1ded2d23b4eeb74c6f123a", 0x23}, {&(0x7f0000000480)="b34db88fb8b6a67347bb184db1ee9fa0cc97846abc58adebba48665c8fb3b0c03977071ce83506bd8958eb7570b232257c994a0e3b2a688a8e5becfd47fc405090a19223d268c88b350d58291d326d6a3f280001c180cd62b2c57035ef5f9f023c1bc2b3c4c7b92b3289f5e27bdd3fa1f0c1a59b8d", 0x75}, {&(0x7f0000000500)="8c12d2360703520ac574c541aaeac7eaba64b1470c30a840a11ce20dd43d23f4744507b0a17ac6fec2aab65e8f6ea0cfab85ac2e04fbebb4b419d6fce5fe219303dbeb42841824876db7e4f25e4d5ecf726e7357866f95cc4f20d0ca77669410d1a2bbb91486287a38665bce0ea9830a4045bd9d96bdf2752671f7694ff31e4176aa5131a758b786b83f9155387cd1c79c17dea41a61e39319e94e97e3e377ddf4e86a10f6818cdcb7c92c0dbbd7ba698b8ab90f8116befb353e372933d2ae266e7564fe05bc34a8", 0xc8}], 0x7, &(0x7f0000000980)=[@mark={{0x27, 0x1, 0x24, 0x593}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x7fff}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0xa2cc}}, @timestamping={{0x0, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0xffffffd5, 0x1, 0x25, 0x4}}], 0xf0}, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10001, 0xb93, 0x0, 0x4000004}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000680)={0x0, 0xfb, 0xbd, 0x2, 0x7f, "4fb01b82bd375f8421fcddf78921b6f3", "19a0119af75d728ebecf715eb3aaf89300b94e4acd5a06848a1cb2c3b4b6020a469526bc2147e7ae5653c9e72e12f7ff6c044fcb1e7d8a20b16a474a1f2f928455718b53fb3efee5409ce87865967cca0caac4049f2ca30dc97be50e0ef12723deda59d2fd360b4fb3e61818dba437ff8d66d57f8d63f309edb61c28c415821b6d5e0402e2e65f54fb8e470beee0c7b35ee14f23d6e8b86138f30dd7ccc32772821d1afe6e9aece2"}, 0xbd, 0x2) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:23:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:23:25 executing program 3: fork() (fail_nth: 94) 00:23:25 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:23:25 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x4000}) 00:23:25 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000100)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x8000, 0xe64c, 0x1afb, 0xffffffffffff0000, 0x4, 0x29502ff}}, 0x292580) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) write$cgroup_pid(r2, &(0x7f0000000180)=0xffffffffffffffff, 0x12) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:23:25 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x80, "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"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x81) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x6}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) 00:23:25 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2733.776825] FAULT_INJECTION: forcing a failure. [ 2733.776825] name failslab, interval 1, probability 0, space 0, times 0 [ 2733.779394] CPU: 1 PID: 12707 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2733.780888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2733.783304] Call Trace: [ 2733.783880] dump_stack+0x107/0x163 [ 2733.784653] should_fail.cold+0x5/0xa [ 2733.785475] ? ptlock_alloc+0x1d/0x70 [ 2733.786287] should_failslab+0x5/0x10 [ 2733.787096] kmem_cache_alloc+0x5b/0x350 [ 2733.787977] ptlock_alloc+0x1d/0x70 [ 2733.788760] pte_alloc_one+0x68/0x190 [ 2733.789598] __pte_alloc+0x1d/0x320 [ 2733.790387] copy_page_range+0x1a1d/0x3810 [ 2733.791359] ? vm_iomap_memory+0x190/0x190 [ 2733.792272] ? up_write+0x191/0x550 [ 2733.793060] ? downgrade_write+0x3a0/0x3a0 [ 2733.793985] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2733.795060] ? __vma_link_rb+0x540/0x700 [ 2733.795949] dup_mm+0x8b9/0x1110 [ 2733.796700] ? vm_area_dup+0x290/0x290 [ 2733.797563] ? __raw_spin_lock_init+0x36/0x110 [ 2733.798567] copy_process+0x23f8/0x66f0 [ 2733.799427] ? lock_downgrade+0x6d0/0x6d0 [ 2733.800340] ? __cleanup_sighand+0xb0/0xb0 [ 2733.801252] ? __lockdep_reset_lock+0x180/0x180 [ 2733.802273] ? find_held_lock+0x2c/0x110 [ 2733.803150] kernel_clone+0xe7/0xa20 [ 2733.803957] ? lock_downgrade+0x6d0/0x6d0 [ 2733.804838] ? find_held_lock+0x2c/0x110 [ 2733.805711] ? copy_init_mm+0x20/0x20 [ 2733.806531] ? ksys_write+0x12d/0x250 [ 2733.807354] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2733.808396] __do_sys_fork+0x8a/0xc0 [ 2733.809188] ? kernel_clone+0xa20/0xa20 [ 2733.810080] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2733.811199] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2733.812294] ? trace_hardirqs_on+0x5b/0x180 [ 2733.813219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2733.814333] do_syscall_64+0x33/0x40 [ 2733.815130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2733.816221] RIP: 0033:0x7f89b6ef5b19 [ 2733.817026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2733.820982] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2733.822630] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2733.824162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2733.825697] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2733.827227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2733.828757] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:23:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:23:25 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:25 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x9903}) 00:23:25 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1274, 0x0) 00:23:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000440)={0x2, 0x0, 0x16, 0x8, 0x7d, &(0x7f0000000040)="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"}) 00:23:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:25 executing program 7: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r2 = syz_io_uring_setup(0x5d3, &(0x7f0000000180)={0x0, 0x74a1, 0x0, 0x2, 0x18a, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000200)) r4 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, r4, &(0x7f00000002c0)={0x420440, 0x102, 0x4}, &(0x7f0000000300)='./file0\x00', 0x18, 0x0, 0x23456, {0x0, r5}}, 0x8) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1, 0x0, '\x00', [{0x6, 0x6, 0x800, 0x9, 0x1000, 0xffffffffffffff80}, {0x7f, 0x1, 0xffff, 0xfffffffffffffffe, 0xfffffffffffff711, 0x8}], ['\x00']}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) [ 2747.202627] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:23:45 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), r0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={'\x00', 0x0, 0x9, 0xb91, 0x0, 0x8}) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}, 0x40) readv(r2, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/253, 0xfd}, {&(0x7f0000000440)=""/228, 0xe4}, {&(0x7f0000000540)=""/14, 0xe}], 0x3) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 00:23:45 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x104, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x8}, @void, @void}}, [@NL80211_ATTR_VENDOR_SUBCMD={0x8}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x5}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x20}, @NL80211_ATTR_VENDOR_DATA={0xa7, 0xc5, "4826945a4e2763969107c9a1385055ea5e67466ea8569d8607b88ef8d65db46c55d5b6c3c0dc0765c45a89de3681f8c7a7026d7f9a11e5fe2f4318a4b4fb6a7ee4abe8717816712492a4b645e1d1bf1938385ce5fc9eb665481ca0954331a5d4ce09520be914990ffadd76d967d17806ba485ab8d4077876c7d75eeafb075b154f8036f286c99f75883f22a8e6487ea2964c56d6c337dde2406ab62cd5598caa3e8c09"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x800}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x2d}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x100}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x2}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x3}]}, 0x104}, 0x1, 0x0, 0x0, 0x4010}, 0x40800) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:23:45 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1274, 0x0) 00:23:45 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 00:23:45 executing program 3: fork() (fail_nth: 95) 00:23:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:23:45 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000180), 0x3042, 0x0) fallocate(r1, 0x60, 0x86a8, 0x400) preadv2(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/219, 0xdb}], 0x1, 0x62, 0x20, 0x2) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r2, 0x5600, &(0x7f0000000040)={0x0, 0x3}) 00:23:45 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1274, 0x0) 00:23:45 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x28}}, 0x0) [ 2753.945410] FAULT_INJECTION: forcing a failure. [ 2753.945410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2753.948349] CPU: 0 PID: 12760 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2753.949931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2753.952408] Call Trace: [ 2753.952988] dump_stack+0x107/0x163 [ 2753.953785] should_fail.cold+0x5/0xa [ 2753.954635] __alloc_pages_nodemask+0x182/0x680 [ 2753.955647] ? __lockdep_reset_lock+0x180/0x180 [ 2753.956663] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2753.958023] alloc_pages_current+0x187/0x280 [ 2753.958993] pte_alloc_one+0x16/0x190 [ 2753.959822] __pte_alloc+0x1d/0x320 [ 2753.960621] copy_page_range+0x1a1d/0x3810 [ 2753.961605] ? vm_iomap_memory+0x190/0x190 [ 2753.962535] ? up_write+0x191/0x550 [ 2753.963330] ? downgrade_write+0x3a0/0x3a0 [ 2753.964224] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2753.965312] ? __vma_link_rb+0x540/0x700 [ 2753.966226] dup_mm+0x8b9/0x1110 [ 2753.966983] ? vm_area_dup+0x290/0x290 [ 2753.967836] ? __raw_spin_lock_init+0x36/0x110 [ 2753.968841] copy_process+0x23f8/0x66f0 [ 2753.969715] ? lock_downgrade+0x6d0/0x6d0 [ 2753.970652] ? __cleanup_sighand+0xb0/0xb0 [ 2753.971575] ? __lockdep_reset_lock+0x180/0x180 [ 2753.972605] ? find_held_lock+0x2c/0x110 [ 2753.973498] kernel_clone+0xe7/0xa20 [ 2753.974324] ? lock_downgrade+0x6d0/0x6d0 [ 2753.975227] ? find_held_lock+0x2c/0x110 [ 2753.976114] ? copy_init_mm+0x20/0x20 [ 2753.976953] ? ksys_write+0x12d/0x250 [ 2753.977795] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2753.978868] __do_sys_fork+0x8a/0xc0 [ 2753.979680] ? kernel_clone+0xa20/0xa20 [ 2753.980567] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2753.981718] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2753.982859] ? trace_hardirqs_on+0x5b/0x180 [ 2753.983810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2753.984939] do_syscall_64+0x33/0x40 [ 2753.985756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2753.986900] RIP: 0033:0x7f89b6ef5b19 [ 2753.987718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2753.991749] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2753.993424] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2753.994994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2753.996563] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2753.998146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2753.999718] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:23:45 executing program 5: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x4, 0x7ff, 0x0, 0x8}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/netpoll', 0x101000, 0x10) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:23:45 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:23:45 executing program 3: fork() (fail_nth: 96) 00:23:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 00:23:45 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)=[{{&(0x7f0000000240), 0x6e, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/172, 0xac}, {&(0x7f0000000380)=""/66, 0x42}, {&(0x7f0000000400)=""/69, 0x45}, {&(0x7f0000000480)=""/152, 0x98}], 0x4}}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/85, 0x55}, {&(0x7f0000000780)=""/108, 0x6c}, {&(0x7f0000000800)=""/99, 0x63}], 0x5, &(0x7f0000000900)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/152, 0x98}], 0x2, &(0x7f0000001bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000d0a85d2030812f67ffbf461ba5e178", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRESOCT=r0, @ANYRES16, @ANYRES32=0x0, @ANYRES64, @ANYBLOB='\x00\x00\x00\x00'], 0x78}}], 0x3, 0x12023, 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000001b80)) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x5, 0x22, 0x54, 0x0, 0x7, 0xc2484, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x2000, 0x4, 0x16d, 0x5, 0x1, 0x6580, 0x80, 0x0, 0xf778, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r5, 0x3) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000100)=0x1) preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r7, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001a80)={0x0, 0x0}, &(0x7f0000001c80)=0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r9, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000002f40)={0x0, 0x0}) sendmsg$netlink(r7, &(0x7f0000004280)={&(0x7f0000001a40)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2000}, 0xc, &(0x7f0000004240)=[{&(0x7f0000001cc0)={0x1270, 0x11, 0x100, 0x70bd25, 0x25dfdbfe, "", [@typed={0xc, 0x8a, 0x0, 0x0, @u64=0x4}, @nested={0x85, 0x25, 0x0, 0x1, [@typed={0x8, 0x3e, 0x0, 0x0, @ipv4=@local}, @generic="9bc4b6c8a3cb63e0ea447d0ec840ac03efe52d6de66fe924ffeb69008a940f9bd22b83e1c912a27452b8c785f2920698ee67cd3740ecfb91f2c895f8781b70f3a333040ae2107bb751acb46689c9f7da4a06a831cfb4cb72bb165e2dd1dcea38b1ed51b9e97a0ac7d1391212ea95917875", @typed={0x8, 0x83, 0x0, 0x0, @uid=r8}]}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@mcast2}, @generic="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", @generic="65a22782f95b135167c78efde94303ed587e8bbc161c79a4649a7e03c180078d97c0e8b93857ce9d86b0363fd0a461282f031b4d1e83c143cedb786e3bc291b43ce8a9aa66947872ae654ea7328d94a42b749616bad785c23140d42a2def0e43387e35b27ba5c9a4bc4f64418bb8dcccaf7e81ce04124fca2d496e27c87ac34bbc98c0d37e6b4fb7", @generic="b6ff052c557397e1145dccfe9e03bc5721470710c0b0dfc7cfe446fc5d7a2e58ad4266f06c61d18a8476c47af7d625a077bb1b84e93207c8a4cd8ff8f77a49b5cd2e3fe84976909e9da9130813c87397f5fe3b683c18d6bc02949e7f1fde62bcb4f2dad831e1f5b404f886686b2f5cb8a2051efc818f60d84c7a01279adf3811753ada0cf5669b853c30f66ff4d1f912c1c69ac2ea12cae522576c78f229c8cf8609974f24cdaa3a3247b0f95ed8cb86e907d460457b2c253a74ca734f88aaacfa922281257ee676582fa639dd472e8467ad70c73f224921072a9bad5601bba6bf23d207284f8ed9ebe1748baaf49e", @typed={0xc, 0x65, 0x0, 0x0, @u64=0x200}, @nested={0x18, 0x55, 0x0, 0x1, [@typed={0x14, 0x38, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0xc}}]}, @nested={0x1c, 0x78, 0x0, 0x1, [@typed={0x8, 0x51, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x8, 0x2e, 0x0, 0x0, @pid=r3}, @typed={0x6, 0x87, 0x0, 0x0, @str='&\x00'}]}]}, 0x1270}, {&(0x7f0000002f80)={0x12ac, 0x24, 0x2, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x69, 0x0, 0x0, @fd=r9}, @typed={0x4, 0x1f}, @nested={0x18, 0x5e, 0x0, 0x1, [@typed={0x11, 0x6c, 0x0, 0x0, @str='-+-[{{!.$.+}/'}]}, @nested={0x1143, 0x6f, 0x0, 0x1, [@typed={0x32, 0x43, 0x0, 0x0, @binary="346d17de3d2c519e4c4cedf1d4d130412095f42552a6734062c4a9f601c2585b3a630840b3124d4389b392a89542"}, @typed={0x3a, 0x28, 0x0, 0x0, @binary="5e2d3680640a037535b01de8b362464af0a7d43e414ad3dd6c9c82f123c27ea19df73098a70a4f444378ef60d7064a7e0d305ef9b77b"}, @generic="d5976b0c516e83766fe1ab958081015f33f56bfb1198cd1cf02223054bc001e9ba1fa0a43cdf44d905943c4b12741134fb7cfb2d022dca814e857cd060ad24f4a561efb8f4b9c2176630dc108012a2948a2047d97ddb825d55619468cd95b12ea0cdeb12ab85d00b11d96c8af429e0e799e0425ae4aae2bea96a189e865b654a7ba93c0a7896ac54b1938deee769f2c350a5ed330b60876c020d28b054043d09bb5b9cfbec264fd4cb7776791e80c201a87a06c1b10f4eae40ff424b571ab829", @generic="1dc132f536338d7c18e72841b9580c2ce112c3813e46c0d0cdd4145684453b03ae3f9cf6fc8c7616d5ebad843f5ce587dafac2e7864537469a8f6d9fa7716d2bbe73bab3fbadca1cddabafc5d668586e55d60203afa996dfbe9a64755fd7709511efc7344e318f199f2734ceb68130e9b3d3ef90168b126f92c9ce6100854a0c9fc11a40ca39c700fc4988ca357c06f64531e37679dee65728c8a87d03711f1c1be01ed1446f6ed140d8ede2026c0af19df6adf76c70d4169b6b23441902b367cb9550a98bca305c0c2f021cafa3ac67b16237b93c331b29c8bbe962f75064632c69ebb114eaa55ba6f92c8daef237607d7236ffdc5e8f73c6f8d3b20bd3c5d1554adb40865e5dcd4a2d20adfccb7ce0012c568a3b23a7d63eee1c038adbb3f3358b41f7ee5525fdfd1e7360a3713610d5de81bc8cf0b2c9bc492b1048e852e74a3356fd4a8f85ea59e7d3f6533a1a036d6ee73ba448a23952ff500f040ffd8fcc820d8268b9ad0b156fb84c29c11dba85b9c4057699056c853baa25f17800d286aa04873821db56b30bb92e3906d0c819cf1f13f7461e5d5c4a4548a0cde71248b4b55ae65a897bd8aaca07b1f8dd1a2eb3ae3bc16793731c01d9d79d210cae2e7c3a86fd00ac20290f7c574095fee16af85fd2f7104701bcb953f7c21093655c6a254e206c0f2caada5d7eec17983ee107eb4906767e0d283baa5a2d7cdd4a0b02434210b6cb1a68efd9ba4bec1620b5002c99eaf176fb54a6926b28a607865898d8aa3ccfb195bda7e0e05430c9e7fe9513aefafc7dd552025b7d1cfe0e31fcfc2e558703672ce73d0c2db9c3ef14995982043e4ad2d14173a0fcd735da37c49f631d6f32c5ba217b410968113bdea190044bc9298a7ae029c63c9164c5cbfa22afc092ecb0db5833c0e982d700dbcc49928bcc6f6775e620aa619fa6318f3bd4821ac0c263fc080b101bb1f83b3de94ab865037c3948163c1f29de218eee0af5e7fc6d5080329b51cf9059ce0ac0821d0c50120f703feaf7717ddd8aa29da284392a0bbe11434a44848974c807d99740e19e2d06c437f5525761f00b34b31f00d82fb87547bfe6161eacc6376d7a40b9faafb2e5cd66858b33f2bdff53e1b606a9b7631a4d832b57c3410fd50db8e98f5114dd57f87950a70ad730b993f550ea462799a05724ce7f8f0a6f545e8ba433fb0bb416762d24baef17007e95445f749a09629b171cfe62219dc75316dc631b2a9f41160804a83e7ecce51c04716ae388f2a0ef278799538a69aec8759aaa7bde3bb044b56c25844309d1d5bf4a0f2247dc1b525ac05db917fd9bb9aa9ffd220f276363fcb6fc591b152bae8707c0f6cd201eb1884eb8ce8848ebfcdc14a8cefb5d9673bd056e4676c10959a0916a86a54472ee66234aa325aa84ad52bc6dc29831712a1b6d8e908d24565cdb4f8e4c9ac8f8b6829ce1bf5a0859cd266266cd3b99964ce964c1bfeebbced3e69cf77b40f8b05e05f67602e37488bbe0beda15d8a0c8ab1c0a3d7f4e8552a23b6a230ede7181ed83a354ae25f6efc9f875fc3c344d9d17ae805f79d9bd864d9e6a8ee7750cc17f30de1cfe753b03179f4b458b0e84fad9976cc290ce4a43cfda6f743cc5666ef2abc6ac891ed3fcae0302077d9282ee1ec47989f5d1a768bdf97296d9d0653e18709daa31b1fccdc0ea58a491278526ed239c34fdb5ef3376f16f3e61407e5a291d1d313e638326678d2998c441964aa82c69787e0b1aadb1c8d736578e8e4a464f16382f2ff89909356cdbfc1272b4d9644c44f505c551b63c8e90f0dd59f3d42624789eab3e1d9199c49a46b19d4531ff98d801e9392ae7bc30584ecaa9ea167e84b591504789d99368ba04cb5307219defede780c1fe2b5983431340e45fd9ee674fc108c34e597cd2aa05ac0b77452578f5ab0f1502237c1775d56cedc2e5d794967d26a0f5f4c8df23889727f28ee5b66a50f0323a57f85551ee43729f475cc2c385d2dd1f5188c3fec550a3be676cfc6db6604f8c90a354ed4ea52b23464293f819ff40fbc6489ea592e4847cb54595589a48b27b620549cd3e9a89203e0922fe559a7d434a52558a69008194622dc65bb00b489f2ad9f80d20b6e285712fc6bd02e8bae3234c735214933fd2ffb3749a7c3801ce5854448f22d92dc40e9ac1055cf2a07ffb553ab0a01841bcef8a237d94b3d7eda59959ba6767d04fcd80b766614ad43607fb64ff53ab611ca81cedcb2c5359a12a6bfeef5f493e416e45e7931391046f51e7c746dc44b10e7a477cf7dce65e1f29a90a1f44cda5c2fae2073850b469e22986e2e5b16f0339ac4999548539f474dc91bf5a63804885f8845cb94ec478ee1b15d26b2a8e0b1dbb529a41120b24805abbabd2dd37d190410ac0ab92ad50188506a090219b4343d1c6a20cd2d7868d9a31d7851a9fa604ad946193cdd54cc91aae4ad4dcc39563b7abccb2cd9fdd4c1db9c6914fcf6e744029d94f798307f7a22de0769fa3a5014aebb9bb8eaa5177dd95e34c237ad257439d5da54c7805c2b8b1f9d5b6a7001ae8aacfbebb4c2616706b949bf11f726ada0cbc61e017da3e7ace311efcfeb1787c37f836727cf886fede32bc8de2f6a76bbe551cfa25ec63d69746fb01d1fd17a5ba8adc98d9e3baace078b723353786359fc01ba31a03f0b8ed4451d1e213d7c192bb08218adf519e5ade30b05a5a1ab831ff2aa4ccc3ce08454bc326b6886923e87243390fc3a3489e59e5ac0eeee50c23a15c49d5597efc2d65b17fe9af17b5ba006cbba8af73949c7b76fc0e5e281a655d203372cc7b557a545f1d419134e963ffb1840010a3c270ff39184e63dcc0796e5285aabf2fd4e1b88be1f38dd6e13d968fb0c810989bf61a2e1bcbc6eb44dee3d3bbcea518c07b3a7630a8f6889cd9f5f7eefff368c7017f387040c73e240aa92559388f7068c5f5fd9c73b4d597a1676c6c29b7041772dc52d4df8423a842f4fb1e2c5f1bd27231464fcdb5f55adf58d155fbf345b81b2769d42e960cb267c0e6cf3958de0fe69019d065f22710591c54cf7a08a88912a8acb8a131e05779f91d53f6c0e64d025932dc11770236a5fc2c7dfd6eed3a0634aa0d64f8f7ae0b7b86d53d7f158b10e435295e1d682c891a7d42a8f48328074ca97f24aca9fabcf25021248ad9f977822ce6ff480b72b4b9e25928e7a80c15d5b7e065c78ab9451c4e75fcef2bb994dc2ac8246c1e2f5abb815da92b1aea80b495c3b383cfe0a2e8293c00e0959e3c873cca5e0e97b1e6eab6aa425c404997015515d6aca31cfe6cc2cc3bc90e1612d65bfb05a37fe9f0bd76c53785ac2a2f5645cc0be8f4fe71f1e1ef74205a32f8e97cf57ae0cf0e62fd82a56fa43cb0b5be54c02224f892b785a54a5bbdabf7b1f0dd11d4497eb682267b32f650c849a382823843cfcd33ccbafd6ba9b98277bb30a5aa6a1aad184faf6b994b7cbfc57fbfe614d2b8e2c08cc2f6516a6045858101367c0a7c9eb138e8145fb8f82bf503c7086a61e45207eca4bd984698ad716c581e8b92fb6d3cb5c514da01762933d8a732874019003c72de5daf1cf6efed58d9fc6e69ceeb722c89555d39a038ca127a8938b6097842d0b70557b72827484f31337f72cb388ae00fa3d1ec7475321ab2834a298729fd0f061e2976bdb2ba9df71e97a70b96061caff0c3dddf8b7f164ceeaa5ee264f9584242218566598ee2bb38385ae1c9319501a1a9000dbb514c270447bc6524adf235b9514b8764b7eb2beffcb7aac1d288af74a43ec485ad76e9611ed9136d8860a77fb4c267b98e3fa11ef5ec18676e9b39272723aed1f5530d05852f8dc3f00c4bce98f9664e31f6c60fb4c9c813c2195e18f245b01960acead56513172f05721fb84db7970811861d986e5d88f5ac24407337a0ef22bf1a1810c0bd7352e735d2180a9be7c42c8c0a8444fe4250a6389e5c5b1d0a30f52203e66166607df7edb25e93dc4e2c48af47a4e7561e36015c4ef9ae4c3b512f95f8b1572b1cc5f57d3130c85bc66eecb44798839234f9ddb6f16046101fcac78f55d7835f31c5dc236a25edb20998205c401412177d11beb4daa0ec4d9f50d942777eecbc2ac26c1abe3ea28a95acf7d888f1635654170b98a8dffbae8cd0fbb84041c6a95ac6bf3f4a7baf6d4dda9883d2e567c258fc5e45d76db6396f91e8e4856d2adde117d8607c289c477de0c9decf037f65fe9b25ed8ff13e3c351704f04b8731d8c25bcb48bea874aff1a7ca518afbaaae91ceb22bed52af9d80e1ab940855db3d2abcc26622ac1df12366ddefc0c37bdb6b8ba296a16c63865aad43eb731f57fde003dd692ff0c7bc638fb2f7587ff1dd0412b6df0112178b08443010b8b206cba82623a619e74046f9acbd87b384435299587aba910c323e85f94694e7ced99d93716cbc14a07d3cff0d22a08bc341524aa4f16579c85f8eead3ab9ae579ca1c8fbfe276ba32581574e89f0b76f6f1b7f4b4a37bbd902a1600c7c6aa5cd31bea7f512611b6d156b860466ef2d7d7e9d23f61e26f300d598ef8ccf1e4717d4349265155a088f9f21c92fd73a31dbec80ba713acda012628a903ce2cf0e317bfe58aab8d5ba7e13cc6a0ed0230df483edb9a94e37abc63e738359e1eb4b2a8d4bd1c1a2e59aaa11416560e204cb3fd42f4a59957fb8e49cfcbc219baeaf545f3089e5b97ed653a65cad48ca30afa27e91f10a31d3b81213677d5c33c9cccbe92080d0a84d6984fc9ae9319ca4da826108ec0554b641a51882f69b9c6d6987441b6a5808e4dd29ba81a03b18551182ccc1bed39a90a186fbe876df4302587ec2aa1d04191a4c40da5adba3283f33ecdcfe953911c306f687e9366a47d98bdcd210d7dea31d5ac86ecf084ec7c0e43df6650e45d081872fce1768327d6c3ca5a361a971b854d941dc06227182931f88494c15be50630417446926c6c40eb21097af2ce132d6b18a4b1be56fba6b5e2466d13fd9544363aa28fc8979ca64271a6f199a25ad42ef66bd03413cd21f099196b2dba7a5f06c760da83a83ff3a6badddb230b7ef9d4242a914cac8cf88aed74abf1a4c44927dea3779be2d97cee912b00ac7bdbebdbe4f6d1271e9f15c698776c24d6bf35722847ed498f3faed3a284643a4b82bb6d113743ab9646a9879a134fad42481730b9362103c7469cf9716f29ad1fcaa2d8fbe02c221720eb88a578ca2fb4862193b6db98adf1ea433ba54498780f76373618b0af7840232b311d0020ba66f8a4c3e1dec571eacb8164dc1c7cfac150191db9ef39e183a6c862870bad80be8881fe15f4acaa36d2b30fabc3a124803d5bc0629989bb7a0c78b6e212c16fa7718eebfb42bab1861da60289fe31ed6524a7fa07915bef0f058e7e1a5a7830fb85c9043c4ffac90104b2936edc63917e0f1ae8ffb97c6d811ce2106483e98237b758fbfb4dd4951bd97cdba2ad5a359d321ff0081b691889e5095c36cf069a415e56a83ecb2e06c53c53c76f6d34883e0519df133d5e4458b08c61d1e47809d4a37e4ab7e00305c551319ecc8d1ced08da357c6b1e01f68f6b5096205a8f39503c0624f9315701e653bcb8463881d839385cb9e380892cc6bc37eb61b5d359cd5ada5287a0e0183106fac3a55fb7c63bf445775e8af8c822701d9990a8386a336a5b328d7776a7d5b3cc504eb2ad7dc2502c450cbaa166ddb9c5f1dc7aacf4b69c6ecb28e02cef5ff7a4358403203f59d9463b71e7333f9e032be9e1f04e164b6e3c19f6e907de17e5c958d9", @generic="4c80d25e22fcb121e22a36aa18039d"]}, @nested={0x12c, 0x72, 0x0, 0x1, [@typed={0xc, 0x48, 0x0, 0x0, @u64=0x8}, @typed={0x8, 0xa, 0x0, 0x0, @pid=r10}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@mcast2}, @generic="9e0b", @generic="c106834b56473eac088387ce77a274482daf91bddc1f13777fc0b252011420e2bae4d00b59e2c220060a153c18ea1aca5875a1fb1a5530b35d58986eaa8501d0ca196c748fda6fc6f01edc89c8ec89ca4c765fda8e95d7f40cfa0e5225ffad808dbf0fbe698e09b9555835d6435713b99a8ec7c13c72c819e16103e4e4e320a567935120f46b3675f2bc6aeed2867cd7586c138a29c236a4be8637fd9d281937581d0b1f6707065eea1067658bf50830ca8b84e047506486d13498cd7fe752cea7e7f3953ae16db9281efcd345a1f5e600c6f55278e917dc4d1e2824501db35a5e914837c3185d54fd277c73db70", @typed={0x4, 0x87}, @typed={0xc, 0x28, 0x0, 0x0, @u64=0xe0000000}]}, @typed={0x8, 0xe, 0x0, 0x0, @ipv4=@loopback}]}, 0x12ac}], 0x2, 0x0, 0x0, 0x10}, 0x4000) 00:23:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:23:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:23:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x28}}, 0x0) [ 2754.391607] FAULT_INJECTION: forcing a failure. 00:23:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) [ 2754.391607] name failslab, interval 1, probability 0, space 0, times 0 00:23:45 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2754.391631] CPU: 0 PID: 12787 Comm: syz-executor.3 Not tainted 5.10.123 #1 00:23:45 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000080)='}]+++\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x2) [ 2754.391643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2754.391649] Call Trace: [ 2754.391673] dump_stack+0x107/0x163 [ 2754.391695] should_fail.cold+0x5/0xa [ 2754.391722] ? vm_area_dup+0x78/0x290 [ 2754.391741] should_failslab+0x5/0x10 [ 2754.391757] kmem_cache_alloc+0x5b/0x350 [ 2754.391775] ? lock_downgrade+0x6d0/0x6d0 [ 2754.391797] vm_area_dup+0x78/0x290 [ 2754.391826] ? _cond_resched+0x12/0x80 [ 2754.391844] ? copy_page_range+0x242d/0x3810 [ 2754.391905] ? vm_area_alloc+0x110/0x110 [ 2754.391931] ? vm_iomap_memory+0x190/0x190 [ 2754.391950] ? up_write+0x191/0x550 00:23:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x28}}, 0x0) [ 2754.391970] ? downgrade_write+0x3a0/0x3a0 [ 2754.391983] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2754.392002] ? __vma_link_rb+0x540/0x700 [ 2754.392027] dup_mm+0x44d/0x1110 [ 2754.392062] ? vm_area_dup+0x290/0x290 [ 2754.392084] ? __raw_spin_lock_init+0x36/0x110 [ 2754.392109] copy_process+0x23f8/0x66f0 [ 2754.392131] ? lock_downgrade+0x6d0/0x6d0 [ 2754.392170] ? __cleanup_sighand+0xb0/0xb0 [ 2754.392187] ? __lockdep_reset_lock+0x180/0x180 [ 2754.392216] ? find_held_lock+0x2c/0x110 [ 2754.392239] kernel_clone+0xe7/0xa20 [ 2754.392256] ? lock_downgrade+0x6d0/0x6d0 [ 2754.392269] ? find_held_lock+0x2c/0x110 [ 2754.392285] ? copy_init_mm+0x20/0x20 [ 2754.392306] ? ksys_write+0x12d/0x250 [ 2754.392332] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2754.392359] __do_sys_fork+0x8a/0xc0 [ 2754.392375] ? kernel_clone+0xa20/0xa20 [ 2754.392412] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2754.392429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2754.392445] ? trace_hardirqs_on+0x5b/0x180 [ 2754.392465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2754.392480] do_syscall_64+0x33/0x40 [ 2754.392498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2754.392509] RIP: 0033:0x7f89b6ef5b19 [ 2754.392529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2754.392538] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2754.392558] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2754.392567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2754.392577] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2754.392587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2754.392597] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2766.174766] kmemleak: 46 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:24:06 executing program 3: fork() (fail_nth: 97) 00:24:06 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:06 executing program 5: copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000080)=0x4, 0x7, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:24:06 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:24:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:24:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000180)={0xa, 0x4e21, 0x1, @private2, 0x6}, 0x1c, &(0x7f00000004c0), 0x10000000000000e6}, 0x11) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:24:06 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x44, 0x0, 0x1f}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) ioctl$VT_DISALLOCATE(r0, 0x5608) 00:24:06 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}) 00:24:06 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:24:06 executing program 1: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) [ 2775.331294] FAULT_INJECTION: forcing a failure. [ 2775.331294] name failslab, interval 1, probability 0, space 0, times 0 [ 2775.333766] CPU: 1 PID: 12832 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2775.335244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2775.337626] Call Trace: [ 2775.338197] dump_stack+0x107/0x163 [ 2775.338973] should_fail.cold+0x5/0xa [ 2775.339783] ? create_object.isra.0+0x3a/0xa20 [ 2775.340750] should_failslab+0x5/0x10 [ 2775.341557] kmem_cache_alloc+0x5b/0x350 [ 2775.342446] create_object.isra.0+0x3a/0xa20 [ 2775.343373] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2775.344449] kmem_cache_alloc+0x159/0x350 [ 2775.345337] vm_area_dup+0x78/0x290 [ 2775.346131] ? _cond_resched+0x12/0x80 [ 2775.346956] ? copy_page_range+0x242d/0x3810 [ 2775.347932] ? vm_area_alloc+0x110/0x110 [ 2775.348799] ? vm_iomap_memory+0x190/0x190 [ 2775.349701] ? up_write+0x191/0x550 [ 2775.350479] ? downgrade_write+0x3a0/0x3a0 [ 2775.351378] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2775.352424] ? __vma_link_rb+0x540/0x700 [ 2775.353301] dup_mm+0x44d/0x1110 [ 2775.354029] ? vm_area_dup+0x290/0x290 [ 2775.354879] ? __raw_spin_lock_init+0x36/0x110 [ 2775.355855] copy_process+0x23f8/0x66f0 [ 2775.356706] ? lock_downgrade+0x6d0/0x6d0 [ 2775.357602] ? __cleanup_sighand+0xb0/0xb0 [ 2775.358508] ? __lockdep_reset_lock+0x180/0x180 [ 2775.359502] ? find_held_lock+0x2c/0x110 [ 2775.360376] kernel_clone+0xe7/0xa20 [ 2775.361169] ? lock_downgrade+0x6d0/0x6d0 [ 2775.362045] ? find_held_lock+0x2c/0x110 [ 2775.362914] ? copy_init_mm+0x20/0x20 [ 2775.363735] ? ksys_write+0x12d/0x250 [ 2775.364553] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2775.365590] __do_sys_fork+0x8a/0xc0 [ 2775.366404] ? kernel_clone+0xa20/0xa20 [ 2775.367272] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2775.368385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2775.369482] ? trace_hardirqs_on+0x5b/0x180 [ 2775.370409] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2775.371509] do_syscall_64+0x33/0x40 [ 2775.372302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2775.373396] RIP: 0033:0x7f89b6ef5b19 [ 2775.374200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2775.378135] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2775.379764] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2775.381284] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2775.382819] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2775.384343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2775.385869] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2788.051501] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:24:26 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x81100) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r0, 0xe00, 0x80000}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x180) write$P9_RREADLINK(r2, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 00:24:26 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) read(r0, &(0x7f0000000180)=""/151, 0x97) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:24:26 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000100)={0x800, 0x2, 0x3}) 00:24:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x399}) 00:24:26 executing program 1: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:24:26 executing program 3: fork() (fail_nth: 98) 00:24:26 executing program 1: mknod$loop(0x0, 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:24:26 executing program 6: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) setns(0xffffffffffffffff, 0x80) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 2795.367865] FAULT_INJECTION: forcing a failure. [ 2795.367865] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.370457] CPU: 1 PID: 12857 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2795.371971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2795.374618] Call Trace: [ 2795.375215] dump_stack+0x107/0x163 [ 2795.376000] should_fail.cold+0x5/0xa [ 2795.376841] ? vm_area_dup+0x78/0x290 [ 2795.377685] should_failslab+0x5/0x10 [ 2795.378530] kmem_cache_alloc+0x5b/0x350 [ 2795.379425] ? lock_downgrade+0x6d0/0x6d0 [ 2795.380344] vm_area_dup+0x78/0x290 [ 2795.381144] ? _cond_resched+0x12/0x80 [ 2795.381969] ? copy_page_range+0x242d/0x3810 [ 2795.382986] ? vm_area_alloc+0x110/0x110 [ 2795.383875] ? vm_iomap_memory+0x190/0x190 [ 2795.384807] ? up_write+0x191/0x550 [ 2795.385612] ? downgrade_write+0x3a0/0x3a0 [ 2795.386547] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2795.387625] ? __vma_link_rb+0x540/0x700 [ 2795.388531] dup_mm+0x44d/0x1110 [ 2795.389281] ? vm_area_dup+0x290/0x290 [ 2795.390124] ? __raw_spin_lock_init+0x36/0x110 [ 2795.391132] copy_process+0x23f8/0x66f0 [ 2795.391983] ? lock_downgrade+0x6d0/0x6d0 [ 2795.392914] ? __cleanup_sighand+0xb0/0xb0 [ 2795.393825] ? __lockdep_reset_lock+0x180/0x180 [ 2795.394862] ? find_held_lock+0x2c/0x110 [ 2795.395756] kernel_clone+0xe7/0xa20 [ 2795.396580] ? lock_downgrade+0x6d0/0x6d0 [ 2795.397465] ? find_held_lock+0x2c/0x110 [ 2795.398361] ? copy_init_mm+0x20/0x20 [ 2795.399211] ? ksys_write+0x12d/0x250 [ 2795.400025] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2795.401102] __do_sys_fork+0x8a/0xc0 [ 2795.401905] ? kernel_clone+0xa20/0xa20 [ 2795.402820] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2795.403934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2795.405043] ? trace_hardirqs_on+0x5b/0x180 [ 2795.405987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2795.407196] do_syscall_64+0x33/0x40 [ 2795.407991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2795.409125] RIP: 0033:0x7f89b6ef5b19 [ 2795.409935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2795.413945] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2795.415625] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2795.417172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2795.418709] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2795.420270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2795.421808] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 00:24:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}) 00:24:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:27 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) [ 2809.502995] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:24:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x283, 0x6) 00:24:48 executing program 7: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) syz_open_procfs(r1, &(0x7f0000000100)='fd/4\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, r3, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r5 = gettid() r6 = getpgid(0x0) rt_tgsigqueueinfo(r6, r5, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) clone3(&(0x7f0000000380)={0x1000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f0000000240)=""/21, 0x15, &(0x7f0000000280)=""/86, &(0x7f0000000300)=[r4, r6], 0x2, {r7}}, 0x58) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:24:48 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:48 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:48 executing program 3: fork() (fail_nth: 99) 00:24:48 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}) 00:24:48 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5000006, 0x10, r0, 0x8000000) syz_io_uring_setup(0x294f, &(0x7f0000000100)={0x0, 0x895d, 0x20, 0x2, 0xcb, 0x0, r0}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f0000000180)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd_index=0x1, 0x80000001, 0x2, 0x9, 0x1e, 0x1, {0x3, r7}}, 0x7ff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:24:48 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) socket$inet(0x2, 0x5, 0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) preadv(r3, &(0x7f0000000580), 0x0, 0xe720, 0x0) r4 = openat(r2, &(0x7f0000000180)='./file0\x00', 0x210000, 0x16) ioctl$VT_GETSTATE(r4, 0x5600, &(0x7f0000000000)={0xfffd}) 00:24:48 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x283, 0x6) 00:24:48 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:48 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9903}) [ 2816.780796] FAULT_INJECTION: forcing a failure. [ 2816.780796] name failslab, interval 1, probability 0, space 0, times 0 [ 2816.783492] CPU: 0 PID: 12906 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2816.785104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2816.787558] Call Trace: [ 2816.788138] dump_stack+0x107/0x163 [ 2816.788928] should_fail.cold+0x5/0xa [ 2816.789760] ? ptlock_alloc+0x1d/0x70 [ 2816.790585] should_failslab+0x5/0x10 [ 2816.791421] kmem_cache_alloc+0x5b/0x350 [ 2816.792314] ptlock_alloc+0x1d/0x70 [ 2816.793099] pte_alloc_one+0x68/0x190 [ 2816.793918] __pte_alloc+0x1d/0x320 [ 2816.794724] copy_page_range+0x1a1d/0x3810 [ 2816.795692] ? vm_iomap_memory+0x190/0x190 [ 2816.796602] ? up_write+0x191/0x550 [ 2816.797387] ? downgrade_write+0x3a0/0x3a0 [ 2816.798292] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2816.799371] ? __vma_link_rb+0x540/0x700 [ 2816.800252] dup_mm+0x8b9/0x1110 [ 2816.800996] ? vm_area_dup+0x290/0x290 [ 2816.801836] ? __raw_spin_lock_init+0x36/0x110 [ 2816.802841] copy_process+0x23f8/0x66f0 [ 2816.803702] ? lock_downgrade+0x6d0/0x6d0 [ 2816.804614] ? __cleanup_sighand+0xb0/0xb0 [ 2816.805526] ? __lockdep_reset_lock+0x180/0x180 [ 2816.806539] ? find_held_lock+0x2c/0x110 [ 2816.807426] kernel_clone+0xe7/0xa20 [ 2816.808231] ? lock_downgrade+0x6d0/0x6d0 [ 2816.809119] ? find_held_lock+0x2c/0x110 [ 2816.809992] ? copy_init_mm+0x20/0x20 [ 2816.810823] ? ksys_write+0x12d/0x250 [ 2816.811650] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2816.812700] __do_sys_fork+0x8a/0xc0 [ 2816.813500] ? kernel_clone+0xa20/0xa20 [ 2816.814375] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2816.815522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2816.816631] ? trace_hardirqs_on+0x5b/0x180 [ 2816.817561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2816.818677] do_syscall_64+0x33/0x40 [ 2816.819478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2816.820580] RIP: 0033:0x7f89b6ef5b19 [ 2816.821384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2816.825360] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2816.827007] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2816.828546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2816.830085] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2816.831628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2816.833162] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2816.880365] audit: type=1400 audit(1655943888.312:53): avc: denied { checkpoint_restore } for pid=12896 comm="syz-executor.7" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 00:24:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000040)) 00:24:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x283, 0x6) 00:24:48 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:24:48 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:48 executing program 3: fork() (fail_nth: 100) 00:24:48 executing program 7: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={0x0, 0x1, r3}) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:24:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) 00:24:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x283, 0x6) 00:24:48 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:24:48 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) [ 2817.391529] FAULT_INJECTION: forcing a failure. [ 2817.391529] name failslab, interval 1, probability 0, space 0, times 0 [ 2817.394477] CPU: 0 PID: 12936 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 2817.396010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2817.398392] Call Trace: [ 2817.398967] dump_stack+0x107/0x163 [ 2817.399740] should_fail.cold+0x5/0xa [ 2817.400548] ? create_object.isra.0+0x3a/0xa20 [ 2817.401511] should_failslab+0x5/0x10 [ 2817.402309] kmem_cache_alloc+0x5b/0x350 [ 2817.403187] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2817.404461] create_object.isra.0+0x3a/0xa20 [ 2817.405389] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2817.406463] kmem_cache_alloc+0x159/0x350 [ 2817.407351] ptlock_alloc+0x1d/0x70 [ 2817.408129] pte_alloc_one+0x68/0x190 [ 2817.408938] __pte_alloc+0x1d/0x320 [ 2817.409722] copy_page_range+0x1a1d/0x3810 [ 2817.410701] ? vm_iomap_memory+0x190/0x190 [ 2817.411605] ? up_write+0x191/0x550 [ 2817.412389] ? downgrade_write+0x3a0/0x3a0 [ 2817.413286] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 2817.414338] ? __vma_link_rb+0x540/0x700 [ 2817.415210] dup_mm+0x8b9/0x1110 [ 2817.415942] ? vm_area_dup+0x290/0x290 [ 2817.416766] ? __raw_spin_lock_init+0x36/0x110 [ 2817.417736] copy_process+0x23f8/0x66f0 [ 2817.418584] ? lock_downgrade+0x6d0/0x6d0 [ 2817.419486] ? __cleanup_sighand+0xb0/0xb0 [ 2817.420380] ? __lockdep_reset_lock+0x180/0x180 [ 2817.421371] ? find_held_lock+0x2c/0x110 [ 2817.422231] kernel_clone+0xe7/0xa20 [ 2817.423035] ? lock_downgrade+0x6d0/0x6d0 [ 2817.423904] ? find_held_lock+0x2c/0x110 [ 2817.424756] ? copy_init_mm+0x20/0x20 [ 2817.425560] ? ksys_write+0x12d/0x250 [ 2817.426373] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2817.427402] __do_sys_fork+0x8a/0xc0 [ 2817.428183] ? kernel_clone+0xa20/0xa20 [ 2817.429041] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2817.430142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2817.431239] ? trace_hardirqs_on+0x5b/0x180 [ 2817.432153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2817.433235] do_syscall_64+0x33/0x40 [ 2817.434019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2817.435103] RIP: 0033:0x7f89b6ef5b19 [ 2817.435888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2817.439780] RSP: 002b:00007f89b446b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2817.441534] RAX: ffffffffffffffda RBX: 00007f89b7008f60 RCX: 00007f89b6ef5b19 [ 2817.443083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2817.444622] RBP: 00007f89b446b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2817.446165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2817.447713] R13: 00007ffd1b3e2cef R14: 00007f89b446b300 R15: 0000000000022000 [ 2817.630114] audit: type=1326 audit(1655943889.066:54): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12941 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5378642b19 code=0x0 [ 2818.452482] audit: type=1326 audit(1655943889.889:55): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12941 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5378642b19 code=0x0 [ 2830.688727] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:25:09 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000040)="f5292ad4ef4b20179fc097bfe8693c68f371661fe94a36e20ab4a08a55784fd7bf9e12da7efad9322c777d02373f09f2007deac0803101c996a1bf4df89572af92ac59246741f9d11a401d94cab9e2", 0x4f}, {&(0x7f00000000c0)}, {&(0x7f0000000100)="02968584fe1a9d5d897eadfc482b174d41b03b946aaeadd01da0469b44796f0da10487e21cf6c252f36a0402d4afc08e650d600a92ac37c974d1b4f843ff38b1d34e95cdfe1c562a613a520ca61f9c570a00a950b43d4cbc6d395eecf53c4af6ed65bd6345d60df464f47df432cecb50e0863504345f4becb358063325170d4b2f4b31cc6b8a12979ccd88dae41e0cbb9bf33128d40f818edd7d6905debf1bdb48f0ba1c0631b5f35f995a04ea8c083ff9568d389e0022c84346", 0xba}, {&(0x7f00000001c0)="0e2fb94176b2a8ecffac21e4e13793f460652f32d8036fa0304c38ff9e56fcbc1b209b66e3a5d5934c1119aef959c4fd973c7312fb1e65ad7d86748e17d3bef5028a64326b6607c4d301e92837883a84068deff7e9050a968aefa0", 0x5b}, {&(0x7f0000000240)="d275181732a5f66a47f510d63b06bacefd72ddbd90a63fbb0fb0f01f9f911c50b3ea531188dffe0389a91e6c0ec1b6815f8e89b8d3e487a532f8cc63c965570ccb3ec7ce05bdb3369776b07d7a6d5f2421c4fdec210ef053f97ca7ad61b30d6f0ac8f483097783d054f109f3b5f906352aa14b680ee102c75386795ae9190c1fe3dedbd2babdaa5f404b1b49251f4080fb03a860da9621afb5e2e2a8dcfeab518bbc4312d97d3e835614aba0c7ca4a4f77c12254f5ac467953e58fb7dff6", 0xbe}], 0x5) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:25:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/processor', 0x301000, 0x40) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpu.max.burst\x00', 0x2, 0x0) tee(r0, r2, 0x3, 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:25:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x6) 00:25:09 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 00:25:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:09 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:25:09 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = getpgrp(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2010000, 0xb91, 0x0, 0xffffffffffffffff, r1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 00:25:09 executing program 3: fork() [ 2838.104463] blktrace: Concurrent blktraces are not allowed on loop10 00:25:09 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="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"]) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000001c0)=0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000100)) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 00:25:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x6) [ 2851.582098] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:25:30 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x200, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000100)) 00:25:30 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:25:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x6) 00:25:30 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000040)={0x5, 0x4, 0x9, 0xf78, 0x800}) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x81800) ftruncate(r2, 0x7fff) 00:25:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 00:25:30 executing program 3: r0 = fork() sched_getscheduler(r0) 00:25:30 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4, 0x3, 0x40, 0x3, 0x0, 0x0, 0x10000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000100), 0xe}, 0x43820, 0x8000, 0x4, 0x7, 0x8, 0x7, 0xd8c, 0x0, 0x7fffffff, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x16) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/class/rtc', 0x2000, 0x20) syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x40000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) syz_io_uring_setup(0x5b13, &(0x7f0000000200)={0x0, 0xfc75, 0x0, 0x0, 0x1f6, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/icmp\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_COALESCE(r0, 0xffffffffffffffff, 0x8000) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="190000000000000000000b0000000800030055bc51a643a747f58a507a687bb18f4a9434adfc44cbc2a23853082a4d23e8adecc33e6fccb3989b56c07f7455a6ef82a8c031b94b48f6ac34ac277230c8a2e978addb3fef39d7309c5e75ad555549805515ace4b966000000003374", @ANYRES32=r5, @ANYBLOB="0500080000000000110007002c5c88b4cfafb0a43d68c1f2ee000000"], 0x38}}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r3, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r6, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5c, 0x4d}}}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x891}, 0x8000) 00:25:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:30 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x4, 0x3, 0x3, 0x3ff}]}) pread64(r2, &(0x7f0000000200)=""/174, 0xae, 0x6) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000100)={0x0, 0x5, 0xff}) r3 = syz_open_pts(r0, 0xc40) r4 = syz_io_uring_setup(0x2406, &(0x7f0000000300)={0x0, 0x8439, 0x4, 0x2, 0x70, 0x0, r1}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) dup2(r4, r1) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000002c0)={0x800, 0x2ed, 0x8000}) 00:25:30 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:25:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x0) 00:25:30 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91, 0x0, 0x4}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = syz_open_dev$mouse(&(0x7f0000000980), 0x2, 0x4000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/17, 0x11}, {&(0x7f0000000500)=""/166, 0xa6}], 0x2, 0xe720, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f00000006c0)=""/129, 0x81}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000780)=""/193, 0xc1}, {&(0x7f0000000880)=""/199, 0xc7}], 0x4, 0x1, 0xffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000009c0)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000a40)={'\x00', 0x1000, 0xffff, 0x10000, 0x4, 0x1, r4}) r5 = syz_open_procfs(r4, &(0x7f0000000ac0)='ns\x00') ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000b00)={'\x00', 0x3f, 0xfffffff7, 0x8, 0xa779, 0x0, r4}) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/141, 0x8d}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000600)=""/147, 0x93}, {&(0x7f0000000300)=""/96, 0x60}, {&(0x7f0000000440)=""/157, 0x9d}], 0x5) 00:25:30 executing program 3: r0 = fork() r1 = getpgrp(r0) ptrace(0x8, r1) 00:25:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) [ 2859.170177] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.7'. 00:25:30 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/time_for_children\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) splice(r1, &(0x7f00000000c0)=0x1f, r2, &(0x7f0000000100)=0x4, 0xff, 0x8) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000040)) 00:25:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x0) 00:25:30 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2859.292554] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.7'. [ 2871.823194] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:25:50 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}) 00:25:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:50 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 00:25:50 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:25:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x0) 00:25:50 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x80000012}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:25:50 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000002b00)) preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000001740), 0x8, 0x10000) r6 = open_tree(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x80100) r7 = syz_io_uring_setup(0x61b1, &(0x7f0000001840)={0x0, 0xc73d, 0x10, 0x0, 0x3b2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000018c0), &(0x7f0000001900)) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) preadv(r8, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) io_submit(0x0, 0x9, &(0x7f0000002a80)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x6, 0x0, r1, &(0x7f0000000180)="91170cc14fceb1fa8caacc3b475fe665c6b87e14aea2d23c19bac7f2875fde8165f4e38573e3f72e29f0f76ce7a738a5018f05c26a2e6ed79a553a1dbac46cb300132a150a4b0e45e0afad86fc420db2866c8803765417672fdf", 0x5a, 0xba0c}, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x8, 0xff, r0, &(0x7f00000005c0)="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", 0x1000, 0x8b, 0x0, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x401, r0, &(0x7f0000000280)="369a6b42aaad8517d496c34c2bddf914ee5ff0d44dc22790e64344cb8a812355f64b2570b11ddd2dfc4b89327b62a2157bb745cbfd41c95780571e166872ccf8e311dc79e780a0999ca2149d620e2b18", 0x50, 0xfff, 0x0, 0x4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x7, r2, &(0x7f0000000340)="712ea6986417b2879ee8a579b84d79c631dfc3aaa2fd37e810c1a7272a10cd7090c1a83776d837055dbaa6457961ac77a35a6e264d060849db0a489628eafb739b0ecd8d6ac854b00eb43241f68a0e75df03cb7a43ff102b1cc9546c0e320caa3f0383b873848930da3e04558efdd3ce128eaa5a02f158cddf8826b636c06e0856dbc7e6b3396dd17db06f0711808e67bb53e8bbf66489d03a090150078925cb621d2ccfcbd3cc082a45fd4c68ea11224c67070f25899ec23a8f373889afb0efe1cd5ce76736cbe0bd43ef61353f852020decee2af37e181a13658b712b12ac4daae1acd", 0xe4, 0x7e, 0x0, 0x3}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x3, 0x3, r0, &(0x7f0000000480)="c608c213e80aa40ca919e01b8d84d0ccced1c08a0abc347cd8297489d91c54a8ec089b7fadc4f505fdc8749481a60b5ead8562ff39edad6e4188fd2ad4367c44f7b325b4d8f32a437df2c0f490450592fe2674a0d77e9c110acd643c10088a473c535368d3427ad138679850d80b6614acf9bbd6849c715563d8fad63128c37a2ac3d2eeb45512e3b2c0a03d9dc900ced9f25458ad3a5ed7d9d76b6ba98ac5c5fb2ed962f6f4a916ea35061689dfcd780f1b605aac55d9a0e3cb179746def76d7f5e2c5acd6d2b51fea0a7eb1ac734cb26ee48ad248fff37bfaafd081dcd8d8f973e9c304e12", 0xe6, 0xffffffffffffffdf, 0x0, 0x2, r3}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x7, 0x101, r4, &(0x7f0000001600)="59a55b38acb646edceb79afe1ffa49a833561de2474573d2676888dc190aed7dd1ee6d4c72599b1ac1d594c2dd48666744dd25512ec6aa8e06ff65066f8e33beb878948f16a6a369ca7701a8b8edb63bf03cf207beba20bdf3ac69e3774930655cd18e46f0bc95a0a4e1c7f5ad31d127d1519a67b37cb768267657650c49890e2a735fade55047c9975067528d86edea1239d0c36bb06174a97930e8e116fbc7b0dc74d9c8e4a25b3b2ef71db07f281f5e2bbe2591f1a795535bb31b22240adcef77d92c19a38d304734669832c84e843ccc21f8160a5d2510b2bad11e8a6615217d", 0xe2, 0xfff, 0x0, 0x4}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x8, 0xfffe, r5, &(0x7f0000001780)="e5b85251e8665f56d08534dc974cf17bcc85c76d85e3934518c1ef740e09a64e0ef0ece236b8be0fd2b67dd388d5008e681620097985a47ac8cc56", 0x3b, 0x300000000000000, 0x0, 0x0, r6}, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x2, 0x4, r7, &(0x7f0000001940)="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", 0x1000, 0x9, 0x0, 0x6}, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x1, 0x8, r0, &(0x7f0000002980)="119aa7373376055ed28225ae46f1780a37a7f1f5766f3ca8feadf262921a1ee92462f844ed75f2f0a1e30cdc93adbbef9dc798f7d12534c0ff71cf7c3d63f8a2abd07ca8605d8b96e22214641580a05dd5185eed3b5fcfd29ccee9ed1fcc39acf628fbfc0832f019deb15d83af7b67b38841113801ddae8a43a06dc0a3679c81a7e45f6d0295b39c255357db500da4428a753c3d5cd525d900f474492c5574002c399b6671f210d0e3", 0xa9, 0xb94, 0x0, 0x3, r8}]) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r9, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:25:50 executing program 3: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x20) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x14) r1 = fork() tkill(r1, 0x2c) 00:25:50 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:25:50 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x10000}}, './file0\x00'}) 00:25:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:25:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop2', 0x0, 0x6) [ 2893.391550] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:26:12 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:26:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000040)="f5292ad4ef4b20179fc097bfe8693c68f371661fe94a36e20ab4a08a55784fd7bf9e12da7efad9322c777d02373f09f2007deac0803101c996a1bf4df89572af92ac59246741f9d11a401d94cab9e2", 0x4f}, {&(0x7f00000000c0)}, {&(0x7f0000000100)="02968584fe1a9d5d897eadfc482b174d41b03b946aaeadd01da0469b44796f0da10487e21cf6c252f36a0402d4afc08e650d600a92ac37c974d1b4f843ff38b1d34e95cdfe1c562a613a520ca61f9c570a00a950b43d4cbc6d395eecf53c4af6ed65bd6345d60df464f47df432cecb50e0863504345f4becb358063325170d4b2f4b31cc6b8a12979ccd88dae41e0cbb9bf33128d40f818edd7d6905debf1bdb48f0ba1c0631b5f35f995a04ea8c083ff9568d389e0022c84346", 0xba}, {&(0x7f00000001c0)="0e2fb94176b2a8ecffac21e4e13793f460652f32d8036fa0304c38ff9e56fcbc1b209b66e3a5d5934c1119aef959c4fd973c7312fb1e65ad7d86748e17d3bef5028a64326b6607c4d301e92837883a84068deff7e9050a968aefa0", 0x5b}, {&(0x7f0000000240)="d275181732a5f66a47f510d63b06bacefd72ddbd90a63fbb0fb0f01f9f911c50b3ea531188dffe0389a91e6c0ec1b6815f8e89b8d3e487a532f8cc63c965570ccb3ec7ce05bdb3369776b07d7a6d5f2421c4fdec210ef053f97ca7ad61b30d6f0ac8f483097783d054f109f3b5f906352aa14b680ee102c75386795ae9190c1fe3dedbd2babdaa5f404b1b49251f4080fb03a860da9621afb5e2e2a8dcfeab518bbc4312d97d3e835614aba0c7ca4a4f77c12254f5ac467953e58fb7dff6", 0xbe}], 0x5) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:26:12 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) wait4(r0, &(0x7f00000001c0), 0x1, &(0x7f0000000200)) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 00:26:12 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x20800, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x200, 0x5a, 0x6, 0x37, 0x9, "df4f96ab686c445b"}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:26:12 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x6222c2, 0x120) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_GETSTATE(r1, 0x5600, &(0x7f0000000180)={0x1dc, 0x2, 0x2}) 00:26:12 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 00:26:12 executing program 3: r0 = fork() ptrace(0xffffffffffffffff, r0) 00:26:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:26:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:26:12 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:26:12 executing program 6: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x4, 0xa, 0x0, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x40010) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:26:12 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) syz_open_procfs(r1, &(0x7f0000000100)='fd/4\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r4, r3, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) r5 = gettid() r6 = getpgid(0x0) rt_tgsigqueueinfo(r6, r5, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) clone3(&(0x7f0000000380)={0x1000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f0000000240)=""/21, 0x15, &(0x7f0000000280)=""/86, &(0x7f0000000300)=[r4, r6], 0x2, {r7}}, 0x58) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:26:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:26:12 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99030000}) 00:26:12 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) [ 2914.840268] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 00:26:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:26:33 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) r3 = syz_open_dev$loop(&(0x7f00000005c0), 0x6, 0x40) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000100)=""/133, 0x85}, {&(0x7f00000001c0)=""/170, 0xaa}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000080)=""/23, 0x17}, {&(0x7f0000000380)=""/108, 0x6c}, {&(0x7f0000000440)=""/132, 0x84}], 0x6) 00:26:33 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}) 00:26:33 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1265, 0x0) 00:26:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) sendto$unix(r2, &(0x7f0000000280)="1f49a48e7ffb9c163a729e3132a255c5c161fe3e051ceaa6c8b6658859c8053b3239918cec1ef3c89af51e0f712441a25800a4d8bf8091b566cb9bb6f04bb3c672f71379ec7612eb9e0a18351768ebafec7ba57a", 0x54, 0x804, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x44, "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"}) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:26:33 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x59}, @ETHTOOL_A_COALESCE_TX_USECS_LOW={0x8, 0x10, 0xfffffff7}, @ETHTOOL_A_COALESCE_STATS_BLOCK_USECS={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x10040800) fork() 00:26:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$binfmt_elf64(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x20, 0xbc, 0x6, 0x0, 0x0, 0x6, 0x498b, 0x36c, 0x40, 0x2ea, 0x1, 0x686, 0x38, 0x2, 0x1, 0x1, 0xd585}, [{0x6, 0x3, 0x8, 0x2, 0xd2, 0x3, 0x5}], "3fa97cafdae2173b5de0cb79eab39906eff998f0abea863334439b3e708431", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x697) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) fallocate(r1, 0x6, 0x7ff, 0x3) 00:26:33 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x0, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:26:33 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}) 00:26:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) 00:26:33 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:26:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x0, 0x8, 0x8001}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x14401, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000180)={{0x84, @private=0xa010101, 0x4e22, 0x4, 'ovf\x00', 0x7, 0x80, 0x2}, {@broadcast, 0x4e21, 0x1, 0x10001, 0x800, 0x7}}, 0x44) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 00:26:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, 0x0, 0x0) 00:26:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x82, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0xe720, 0x0) 00:26:33 executing program 1: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10000}) ioctl$BLKTRACETEARDOWN(r0, 0x1274, 0x0) 00:26:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)={0x0, 0xfdfd, 0xfffd}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x6) 00:26:34 executing program 3: fork() fork() r0 = gettid() r1 = getpgid(0x0) rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x6}) ptrace$setopts(0x4206, r1, 0x62, 0x0) [ 2924.078741] syz-executor.5 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2924.080256] CPU: 0 PID: 287 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2924.081047] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2924.082362] Call Trace: [ 2924.082679] dump_stack+0x107/0x163 [ 2924.083101] dump_header+0x106/0x613 [ 2924.083531] oom_kill_process.cold+0x10/0x15 [ 2924.084037] out_of_memory+0x1108/0x1400 [ 2924.084547] ? oom_killer_disable+0x280/0x280 [ 2924.085061] ? mutex_trylock+0x233/0x2a0 [ 2924.085551] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2210 [ 2924.086229] __alloc_pages_slowpath.constprop.0+0x1bef/0x2210 [ 2924.086905] ? lock_acquire+0x117/0x490 [ 2924.087382] ? warn_alloc+0x180/0x180 [ 2924.087862] __alloc_pages_nodemask+0x54f/0x680 [ 2924.088421] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2924.089111] ? xas_load+0x66/0x2c0 [ 2924.089538] ? find_get_entry+0x2d9/0x6e0 [ 2924.090018] alloc_pages_current+0x187/0x280 [ 2924.090526] __page_cache_alloc+0x2ce/0x360 [ 2924.091031] pagecache_get_page+0x2c3/0xc80 [ 2924.091531] filemap_fault+0x1779/0x21b0 [ 2924.092002] ? read_cache_page_gfp+0x30/0x30 [ 2924.092511] ? replace_page_cache_page+0x1200/0x1200 [ 2924.093100] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2924.093706] ext4_filemap_fault+0x87/0xc0 [ 2924.094193] __do_fault+0x113/0x410 [ 2924.094611] handle_mm_fault+0x1e6e/0x3520 [ 2924.095100] ? find_held_lock+0x2c/0x110 [ 2924.095567] ? __pmd_alloc+0x5e0/0x5e0 [ 2924.096025] ? vmacache_find+0x55/0x2a0 [ 2924.096500] do_user_addr_fault+0x56e/0xc00 [ 2924.097010] exc_page_fault+0xa2/0x1a0 [ 2924.097455] ? asm_exc_page_fault+0x8/0x30 [ 2924.097944] asm_exc_page_fault+0x1e/0x30 [ 2924.098426] RIP: 0033:0x7ff575565688 [ 2924.098854] Code: Unable to access opcode bytes at RIP 0x7ff57556565e. [ 2924.099600] RSP: 002b:00007ffdaacbde90 EFLAGS: 00010212 [ 2924.100224] RAX: 0000001b2d620000 RBX: 00000000000002f8 RCX: 00000000002c99f8 [ 2924.101043] RDX: 00000000002c9d04 RSI: 0000000000000b6b RDI: 00007ffdaad4b080 [ 2924.101868] RBP: 00007ffdaacbdeec R08: 0000000000000000 R09: 00007ffdaad4b090 [ 2924.102685] R10: 00000000005278a8 R11: 0000000000000000 R12: 0000000000000032 [ 2924.103506] R13: 00000000002c99ca R14: 000000000000000b R15: 00007ffdaacbdf50 [ 2924.105288] Mem-Info: [ 2924.105592] active_anon:6091 inactive_anon:42468 isolated_anon:0 [ 2924.105592] active_file:0 inactive_file:13 isolated_file:0 [ 2924.105592] unevictable:0 dirty:14 writeback:0 [ 2924.105592] slab_reclaimable:7410 slab_unreclaimable:63339 [ 2924.105592] mapped:69650 shmem:115 pagetables:2586 bounce:0 [ 2924.105592] free:2913 free_pcp:0 free_cma:0 [ 2924.109199] Node 0 active_anon:24364kB inactive_anon:169872kB active_file:0kB inactive_file:52kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278600kB dirty:56kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:5504kB all_unreclaimable? yes [ 2924.111834] Node 0 DMA free:6532kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:4kB inactive_anon:208kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2924.114828] lowmem_reserve[]: 0 1621 1621 1621 [ 2924.115384] Node 0 DMA32 free:5120kB min:5124kB low:6780kB high:8436kB reserved_highatomic:0KB active_anon:24108kB inactive_anon:169496kB active_file:452kB inactive_file:0kB unevictable:0kB writepending:140kB present:2080640kB managed:1664884kB mlocked:0kB pagetables:10320kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2924.118587] lowmem_reserve[]: 0 0 0 0 [ 2924.119053] Node 0 DMA: 1*4kB (M) 2*8kB (M) 1*16kB (U) 1*32kB (M) 1*64kB (U) 0*128kB 1*256kB (M) 2*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (U) = 6532kB [ 2924.120793] Node 0 DMA32: 694*4kB (UME) 164*8kB (M) 66*16kB (UM) 8*32kB (U) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5464kB [ 2924.122394] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2924.123360] 154 total pagecache pages [ 2924.123791] 0 pages in swap cache [ 2924.124211] Swap cache stats: add 0, delete 0, find 0/0 [ 2924.124810] Free swap = 0kB [ 2924.125169] Total swap = 0kB [ 2924.125508] 524158 pages RAM [ 2924.125843] 0 pages HighMem/MovableOnly [ 2924.126311] 103960 pages reserved [ 2924.126745] Unreclaimable slab info: [ 2924.127484] Name Used Total [ 2924.128164] pid_3 3KB 3KB [ 2924.128770] pid_2 86KB 86KB [ 2924.129395] IEEE-802.15.4-MAC 63KB 63KB [ 2924.130015] IEEE-802.15.4-RAW 31KB 31KB [ 2924.130615] p9_req_t 8KB 8KB [ 2924.131235] fib6_nodes 28KB 28KB [ 2924.131835] ip6_dst_cache 45KB 45KB [ 2924.132472] PINGv6 63KB 63KB [ 2924.133093] RAWv6 220KB 220KB [ 2924.133694] UDPLITEv6 62KB 62KB [ 2924.134308] UDPv6 62KB 62KB [ 2924.134920] tw_sock_TCPv6 15KB 15KB [ 2924.135527] TCPv6 62KB 62KB [ 2924.136161] scsi_sense_cache 8KB 8KB [ 2924.136764] sd_ext_cdb 3KB 3KB [ 2924.137378] virtio_scsi_cmd 16KB 16KB [ 2924.138009] sgpool-128 59KB 59KB [ 2924.138619] sgpool-64 63KB 63KB [ 2924.139238] sgpool-32 110KB 110KB [ 2924.139839] sgpool-16 53KB 82KB [ 2924.140472] sgpool-8 97KB 97KB [ 2924.141092] mqueue_inode_cache 62KB 62KB [ 2924.141696] nfs_commit_data 15KB 15KB [ 2924.142312] nfs_write_data 47KB 47KB [ 2924.142932] jbd2_inode 7KB 7KB [ 2924.143549] ext4_system_zone 7KB 7KB [ 2924.144181] ext4_io_end_vec 7KB 7KB [ 2924.144792] ext4_bio_post_read_ctx 15KB 15KB [ 2924.145458] io_kiocb 30KB 30KB [ 2924.146075] kioctx 31KB 31KB [ 2924.146677] aio_kiocb 7KB 7KB [ 2924.147302] dio 15KB 15KB [ 2924.147919] bio-2 4KB 4KB [ 2924.148530] fasync_cache 7KB 7KB [ 2924.149151] pid_namespace 7KB 7KB [ 2924.149757] posix_timers_cache 15KB 15KB [ 2924.150405] rpc_buffers 31KB 31KB [ 2924.151030] rpc_tasks 3KB 3KB [ 2924.151662] UNIX 242KB 341KB [ 2924.152300] UDP-Lite 63KB 63KB [ 2924.152953] tcp_bind_bucket 8KB 8KB [ 2924.153595] inet_peer_cache 8KB 8KB [ 2924.154235] xfrm_state 16KB 16KB [ 2924.154848] ip_fib_trie 8KB 8KB [ 2924.155481] ip_fib_alias 15KB 15KB [ 2924.156148] ip_dst_cache 20KB 20KB [ 2924.156783] PING 62KB 62KB [ 2924.157406] RAW 125KB 125KB [ 2924.158046] UDP 196KB 315KB [ 2924.158664] tw_sock_TCP 15KB 15KB [ 2924.159308] request_sock_TCP 7KB 7KB [ 2924.159948] TCP 60KB 60KB [ 2924.160611] hugetlbfs_inode_cache 30KB 30KB [ 2924.161311] bio-1 11KB 11KB [ 2924.161949] eventpoll_pwq 19KB 19KB [ 2924.162870] eventpoll_epi 39KB 39KB [ 2924.163517] inotify_inode_mark 54KB 54KB [ 2924.164195] request_queue 90KB 90KB [ 2924.165028] blkdev_ioc 22KB 22KB [ 2924.165652] bio-0 407KB 448KB [ 2924.166300] biovec-max 658KB 658KB [ 2924.166952] biovec-64 173KB 173KB [ 2924.167578] biovec-16 37KB 37KB [ 2924.168229] user_namespace 31KB 31KB [ 2924.168844] uid_cache 8KB 8KB [ 2924.169509] dmaengine-unmap-2 4KB 4KB [ 2924.170143] audit_buffer 7KB 7KB [ 2924.170770] skbuff_ext_cache 1356KB 1356KB [ 2924.171401] skbuff_fclone_cache 52KB 75KB [ 2924.172047] skbuff_head_cache 1816KB 1931KB [ 2924.172681] file_lock_cache 47KB 47KB [ 2924.173322] file_lock_ctx 7KB 7KB [ 2924.173958] fsnotify_mark_connector 28KB 28KB [ 2924.174640] net_namespace 146KB 146KB [ 2924.175291] task_delay_info 135KB 135KB [ 2924.175933] taskstats 61KB 61KB [ 2924.176560] proc_dir_entry 360KB 360KB [ 2924.177197] pde_opener 43KB 43KB [ 2924.177832] seq_file 30KB 56KB [ 2924.178480] sigqueue 74KB 74KB [ 2924.179139] shmem_inode_cache 1279KB 1415KB [ 2924.179760] kernfs_iattrs_cache 216KB 216KB [ 2924.180433] kernfs_node_cache 5170KB 5195KB [ 2924.181079] mnt_cache 159KB 189KB [ 2924.181882] filp 1639KB 1848KB [ 2924.182530] names_cache 12087KB 12439KB [ 2924.183184] hashtab_node 278KB 278KB [ 2924.184005] ebitmap_node 1149KB 1149KB [ 2924.184663] avtab_node 4976KB 4976KB [ 2924.185321] avc_node 35KB 35KB [ 2924.185998] lsm_inode_cache 2637KB 2945KB [ 2924.186617] lsm_file_cache 165KB 180KB [ 2924.187263] key_jar 31KB 31KB [ 2924.187883] uts_namespace 15KB 15KB [ 2924.188538] nsproxy 7KB 7KB [ 2924.189187] vm_area_struct 1477KB 1568KB [ 2924.189818] mm_struct 350KB 472KB [ 2924.190460] fs_cache 64KB 64KB [ 2924.191109] files_cache 178KB 270KB [ 2924.191741] signal_cache 377KB 494KB [ 2924.192392] sighand_cache 404KB 420KB [ 2924.193051] task_struct 1581KB 1721KB [ 2924.193699] cred_jar 140KB 176KB [ 2924.194358] anon_vma_chain 381KB 381KB [ 2924.195014] anon_vma 392KB 392KB [ 2924.195657] pid 62KB 86KB [ 2924.196318] Acpi-Operand 215KB 253KB [ 2924.196974] Acpi-ParseExt 23KB 23KB [ 2924.197613] Acpi-Parse 43KB 59KB [ 2924.198268] Acpi-State 173KB 189KB [ 2924.198924] Acpi-Namespace 28KB 28KB [ 2924.199559] numa_policy 7KB 7KB [ 2924.200234] trace_event_file 163KB 163KB [ 2924.200874] ftrace_event_field 280KB 280KB [ 2924.201542] pool_workqueue 32KB 32KB [ 2924.202194] task_group 16KB 16KB [ 2924.202840] vmap_area 125KB 141KB [ 2924.203500] page->ptl 320KB 350KB [ 2924.204156] kmemleak_scan_area 155KB 155KB [ 2924.205287] kmemleak_object 148055KB 157942KB [ 2924.205958] kmalloc-8k 4832KB 4960KB [ 2924.206583] kmalloc-4k 6200KB 7136KB [ 2924.207235] kmalloc-2k 4196KB 4352KB [ 2924.207860] kmalloc-1k 2338KB 3456KB [ 2924.208527] kmalloc-512 7408KB 8048KB [ 2924.209178] kmalloc-256 1250KB 1280KB [ 2924.209831] kmalloc-192 470KB 556KB [ 2924.210484] kmalloc-128 477KB 536KB [ 2924.211143] kmalloc-96 609KB 820KB [ 2924.211783] kmalloc-64 1655KB 1920KB [ 2924.212463] kmalloc-32 716KB 848KB [ 2924.213103] kmalloc-16 324KB 364KB [ 2924.213750] kmalloc-8 322KB 322KB [ 2924.214384] kmem_cache_node 47KB 47KB [ 2924.215046] kmem_cache 75KB 75KB [ 2924.215670] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=287,uid=0 [ 2924.217824] Out of memory (oom_kill_allocating_task): Killed process 287 (syz-executor.5) total-vm:93280kB, anon-rss:392kB, file-rss:34508kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 2924.648849] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2924.649999] CPU: 0 PID: 178 Comm: in:imklog Not tainted 5.10.123 #1 [ 2924.650712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2924.651999] Call Trace: [ 2924.652318] dump_stack+0x107/0x163 [ 2924.652742] dump_header+0x106/0x613 [ 2924.653178] oom_kill_process.cold+0x10/0x15 [ 2924.653679] out_of_memory+0x1108/0x1400 [ 2924.654150] ? oom_killer_disable+0x280/0x280 [ 2924.654667] ? mutex_trylock+0x233/0x2a0 [ 2924.655133] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2210 [ 2924.655816] __alloc_pages_slowpath.constprop.0+0x1bef/0x2210 [ 2924.656507] ? lock_acquire+0x117/0x490 [ 2924.656978] ? warn_alloc+0x180/0x180 [ 2924.657423] __alloc_pages_nodemask+0x54f/0x680 [ 2924.657950] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2924.658663] ? xas_load+0x66/0x2c0 [ 2924.659098] ? find_get_entry+0x2d9/0x6e0 [ 2924.659608] alloc_pages_current+0x187/0x280 [ 2924.660148] __page_cache_alloc+0x2ce/0x360 [ 2924.660673] pagecache_get_page+0x2c3/0xc80 [ 2924.661197] filemap_fault+0x1779/0x21b0 [ 2924.661672] ? read_cache_page_gfp+0x30/0x30 [ 2924.662207] ? handle_mm_fault+0x28cc/0x3520 [ 2924.662731] ? lock_downgrade+0x6d0/0x6d0 [ 2924.663236] ext4_filemap_fault+0x87/0xc0 [ 2924.663734] __do_fault+0x113/0x410 [ 2924.664188] handle_mm_fault+0x1e6e/0x3520 [ 2924.664702] ? find_held_lock+0x2c/0x110 [ 2924.665194] ? __pmd_alloc+0x5e0/0x5e0 [ 2924.665679] ? vmacache_find+0x55/0x2a0 [ 2924.666160] do_user_addr_fault+0x56e/0xc00 [ 2924.666690] exc_page_fault+0xa2/0x1a0 [ 2924.667158] ? asm_exc_page_fault+0x8/0x30 [ 2924.667640] asm_exc_page_fault+0x1e/0x30 [ 2924.668147] RIP: 0033:0x7ff7bd526488 [ 2924.668597] Code: Unable to access opcode bytes at RIP 0x7ff7bd52645e. [ 2924.669386] RSP: 002b:00007ff7bd03d3e0 EFLAGS: 00010203 [ 2924.670028] RAX: 00007ff7bd05e5c8 RBX: 00007ff7bd03d40c RCX: 0000000000000000 [ 2924.670886] RDX: 000000000000005b RSI: 00007ff7bd03d40c RDI: 00007ff7bd03d400 [ 2924.671751] RBP: 00007ff7bd03dd00 R08: 0000000000000000 R09: 000055b633718e88 [ 2924.672631] R10: 0000000000000000 R11: 0000000000000000 R12: 00007ff7bd03d400 [ 2924.673489] R13: 000055b63371c4c0 R14: 00007ff7bd03dd00 R15: 00007ff7bd03dd77 [ 2924.674990] Mem-Info: [ 2924.675301] active_anon:6098 inactive_anon:42401 isolated_anon:0 [ 2924.675301] active_file:17 inactive_file:10 isolated_file:0 [ 2924.675301] unevictable:0 dirty:2 writeback:0 [ 2924.675301] slab_reclaimable:7410 slab_unreclaimable:63350 [ 2924.675301] mapped:69652 shmem:115 pagetables:2530 bounce:0 [ 2924.675301] free:2902 free_pcp:0 free_cma:0 [ 2924.679079] Node 0 active_anon:24392kB inactive_anon:169604kB active_file:68kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278608kB dirty:8kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:5472kB all_unreclaimable? yes [ 2924.681858] Node 0 DMA free:6532kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:204kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2924.685038] lowmem_reserve[]: 0 1621 1621 1621 [ 2924.685607] Node 0 DMA32 free:5076kB min:5124kB low:6780kB high:8436kB reserved_highatomic:0KB active_anon:24392kB inactive_anon:169484kB active_file:44kB inactive_file:32kB unevictable:0kB writepending:8kB present:2080640kB managed:1664884kB mlocked:0kB pagetables:10096kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2924.689051] lowmem_reserve[]: 0 0 0 0 [ 2924.689523] Node 0 DMA: 1*4kB (M) 2*8kB (M) 1*16kB (U) 1*32kB (M) 1*64kB (U) 0*128kB 1*256kB (M) 2*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (U) = 6532kB [ 2924.691293] Node 0 DMA32: 697*4kB (UME) 171*8kB (UM) 64*16kB (UM) 2*32kB (U) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5308kB [ 2924.692988] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2924.694021] 156 total pagecache pages [ 2924.694484] 0 pages in swap cache [ 2924.694897] Swap cache stats: add 0, delete 0, find 0/0 [ 2924.695541] Free swap = 0kB [ 2924.695920] Total swap = 0kB [ 2924.696292] 524158 pages RAM [ 2924.696658] 0 pages HighMem/MovableOnly [ 2924.697110] 103960 pages reserved [ 2924.697528] Unreclaimable slab info: [ 2924.697988] Name Used Total [ 2924.698644] pid_3 3KB 3KB [ 2924.699299] pid_2 86KB 86KB [ 2924.699961] IEEE-802.15.4-MAC 63KB 63KB [ 2924.700612] IEEE-802.15.4-RAW 31KB 31KB [ 2924.701269] p9_req_t 8KB 8KB [ 2924.701922] fib6_nodes 28KB 28KB [ 2924.702572] ip6_dst_cache 45KB 45KB [ 2924.703235] PINGv6 63KB 63KB [ 2924.703873] RAWv6 220KB 220KB [ 2924.704532] UDPLITEv6 62KB 62KB [ 2924.705186] UDPv6 62KB 62KB [ 2924.705824] tw_sock_TCPv6 15KB 15KB [ 2924.706483] TCPv6 62KB 62KB [ 2924.707142] scsi_sense_cache 8KB 8KB [ 2924.707785] sd_ext_cdb 3KB 3KB [ 2924.708444] virtio_scsi_cmd 16KB 16KB [ 2924.709112] sgpool-128 59KB 59KB [ 2924.709757] sgpool-64 63KB 63KB [ 2924.710412] sgpool-32 110KB 110KB [ 2924.711073] sgpool-16 53KB 82KB [ 2924.711712] sgpool-8 97KB 97KB [ 2924.712379] mqueue_inode_cache 62KB 62KB [ 2924.713040] nfs_commit_data 15KB 15KB [ 2924.713679] nfs_write_data 47KB 47KB [ 2924.714341] jbd2_inode 7KB 7KB [ 2924.714996] ext4_system_zone 7KB 7KB [ 2924.715634] ext4_io_end_vec 7KB 7KB [ 2924.716303] ext4_bio_post_read_ctx 15KB 15KB [ 2924.717011] io_kiocb 30KB 30KB [ 2924.717653] kioctx 31KB 31KB [ 2924.718318] aio_kiocb 7KB 7KB [ 2924.718975] dio 15KB 15KB [ 2924.719616] bio-2 4KB 4KB [ 2924.720213] fasync_cache 7KB 7KB [ 2924.720857] pid_namespace 7KB 7KB [ 2924.721512] posix_timers_cache 15KB 15KB [ 2924.722180] rpc_buffers 31KB 31KB [ 2924.722823] rpc_tasks 3KB 3KB [ 2924.723483] UNIX 242KB 341KB [ 2924.724154] UDP-Lite 63KB 63KB [ 2924.724796] tcp_bind_bucket 8KB 8KB [ 2924.725447] inet_peer_cache 8KB 8KB [ 2924.726103] xfrm_state 16KB 16KB [ 2924.726747] ip_fib_trie 8KB 8KB [ 2924.727342] ip_fib_alias 15KB 15KB [ 2924.728000] ip_dst_cache 20KB 20KB [ 2924.728582] PING 62KB 62KB [ 2924.729229] RAW 125KB 125KB [ 2924.729866] UDP 196KB 315KB [ 2924.730515] tw_sock_TCP 15KB 15KB [ 2924.731171] request_sock_TCP 7KB 7KB [ 2924.731808] TCP 60KB 60KB [ 2924.732475] hugetlbfs_inode_cache 30KB 30KB [ 2924.733169] bio-1 11KB 11KB [ 2924.733800] eventpoll_pwq 19KB 19KB [ 2924.734461] eventpoll_epi 39KB 39KB [ 2924.735117] inotify_inode_mark 54KB 54KB [ 2924.735766] request_queue 90KB 90KB [ 2924.736427] blkdev_ioc 26KB 26KB [ 2924.737082] bio-0 411KB 448KB [ 2924.737672] biovec-max 658KB 658KB [ 2924.738323] biovec-64 173KB 173KB [ 2924.738974] biovec-16 37KB 37KB [ 2924.739607] user_namespace 31KB 31KB [ 2924.740270] uid_cache 8KB 8KB [ 2924.740930] dmaengine-unmap-2 4KB 4KB [ 2924.741564] audit_buffer 7KB 7KB [ 2924.742224] skbuff_ext_cache 1356KB 1356KB [ 2924.742865] skbuff_fclone_cache 52KB 75KB [ 2924.743487] skbuff_head_cache 1857KB 1931KB [ 2924.744158] file_lock_cache 47KB 47KB [ 2924.744797] file_lock_ctx 7KB 7KB [ 2924.745447] fsnotify_mark_connector 28KB 28KB [ 2924.746165] net_namespace 146KB 146KB [ 2924.746807] task_delay_info 135KB 135KB [ 2924.747406] taskstats 61KB 61KB [ 2924.748065] proc_dir_entry 360KB 360KB [ 2924.748642] pde_opener 43KB 43KB [ 2924.749294] seq_file 30KB 56KB [ 2924.749866] sigqueue 74KB 74KB [ 2924.750531] shmem_inode_cache 1279KB 1415KB [ 2924.751174] kernfs_iattrs_cache 216KB 216KB [ 2924.751839] kernfs_node_cache 5170KB 5195KB [ 2924.752497] mnt_cache 159KB 189KB [ 2924.753159] filp 1639KB 1848KB [ 2924.753793] names_cache 12087KB 12439KB [ 2924.754449] hashtab_node 278KB 278KB [ 2924.755103] ebitmap_node 1149KB 1149KB [ 2924.755745] avtab_node 4976KB 4976KB [ 2924.756421] avc_node 35KB 35KB [ 2924.757101] lsm_inode_cache 2637KB 2945KB [ 2924.757735] lsm_file_cache 165KB 180KB [ 2924.758391] key_jar 31KB 31KB [ 2924.759044] uts_namespace 15KB 15KB [ 2924.759682] nsproxy 7KB 7KB [ 2924.760351] vm_area_struct 1477KB 1568KB [ 2924.761013] mm_struct 350KB 472KB [ 2924.761653] fs_cache 64KB 64KB [ 2924.762304] files_cache 178KB 270KB [ 2924.762957] signal_cache 377KB 494KB [ 2924.763543] sighand_cache 404KB 420KB [ 2924.764206] task_struct 1581KB 1721KB [ 2924.764846] cred_jar 140KB 176KB [ 2924.765504] anon_vma_chain 381KB 381KB [ 2924.766162] anon_vma 383KB 392KB [ 2924.766807] pid 62KB 86KB [ 2924.767463] Acpi-Operand 215KB 253KB [ 2924.768110] Acpi-ParseExt 23KB 23KB [ 2924.768693] Acpi-Parse 43KB 59KB [ 2924.769339] Acpi-State 173KB 189KB [ 2924.769995] Acpi-Namespace 28KB 28KB [ 2924.770637] numa_policy 7KB 7KB [ 2924.771290] trace_event_file 163KB 163KB [ 2924.771941] ftrace_event_field 280KB 280KB [ 2924.772606] pool_workqueue 32KB 32KB [ 2924.773264] task_group 16KB 16KB [ 2924.773915] vmap_area 125KB 141KB [ 2924.774562] page->ptl 320KB 350KB [ 2924.775228] kmemleak_scan_area 155KB 155KB [ 2924.776497] kmemleak_object 148380KB 157942KB [ 2924.777102] kmalloc-8k 4832KB 4960KB [ 2924.777685] kmalloc-4k 6200KB 7136KB [ 2924.778344] kmalloc-2k 4196KB 4352KB [ 2924.779015] kmalloc-1k 2338KB 3456KB [ 2924.779662] kmalloc-512 7561KB 8048KB [ 2924.780326] kmalloc-256 1250KB 1280KB [ 2924.780997] kmalloc-192 470KB 556KB [ 2924.781646] kmalloc-128 477KB 536KB [ 2924.782316] kmalloc-96 619KB 820KB [ 2924.782995] kmalloc-64 1655KB 1920KB [ 2924.783642] kmalloc-32 716KB 848KB [ 2924.784251] kmalloc-16 324KB 364KB [ 2924.784888] kmalloc-8 322KB 322KB [ 2924.785540] kmem_cache_node 47KB 47KB [ 2924.786200] kmem_cache 75KB 75KB [ 2924.786838] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=178,uid=0 [ 2924.789524] Out of memory (oom_kill_allocating_task): Killed process 176 (rsyslogd) total-vm:220876kB, anon-rss:976kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 2925.125838] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2925.127400] CPU: 1 PID: 102 Comm: systemd-journal Not tainted 5.10.123 #1 [ 2925.128374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2925.129976] Call Trace: [ 2925.130358] dump_stack+0x107/0x163 [ 2925.130871] dump_header+0x106/0x613 [ 2925.131396] oom_kill_process.cold+0x10/0x15 [ 2925.132013] out_of_memory+0x1108/0x1400 [ 2925.132595] ? oom_killer_disable+0x280/0x280 [ 2925.133231] ? mutex_trylock+0x233/0x2a0 [ 2925.133800] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2210 [ 2925.134631] __alloc_pages_slowpath.constprop.0+0x1bef/0x2210 [ 2925.135468] ? lock_acquire+0x117/0x490 [ 2925.136027] ? warn_alloc+0x180/0x180 [ 2925.136590] __alloc_pages_nodemask+0x54f/0x680 [ 2925.137240] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2925.138069] ? xas_load+0x66/0x2c0 [ 2925.138566] ? find_get_entry+0x2d9/0x6e0 [ 2925.139152] alloc_pages_current+0x187/0x280 [ 2925.139769] __page_cache_alloc+0x2ce/0x360 [ 2925.140389] pagecache_get_page+0x2c3/0xc80 [ 2925.140991] filemap_fault+0x1779/0x21b0 [ 2925.141559] ? read_cache_page_gfp+0x30/0x30 [ 2925.142171] ? replace_page_cache_page+0x1200/0x1200 [ 2925.142875] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2925.143608] ext4_filemap_fault+0x87/0xc0 [ 2925.144193] __do_fault+0x113/0x410 [ 2925.144699] handle_mm_fault+0x1e6e/0x3520 [ 2925.145293] ? find_held_lock+0x2c/0x110 [ 2925.145858] ? __pmd_alloc+0x5e0/0x5e0 [ 2925.146408] ? vmacache_find+0x55/0x2a0 [ 2925.146963] do_user_addr_fault+0x56e/0xc00 [ 2925.147571] exc_page_fault+0xa2/0x1a0 [ 2925.148116] ? asm_exc_page_fault+0x8/0x30 [ 2925.148699] asm_exc_page_fault+0x1e/0x30 [ 2925.149262] RIP: 0033:0x7f37fac0c6e4 [ 2925.149774] Code: Unable to access opcode bytes at RIP 0x7f37fac0c6ba. [ 2925.150670] RSP: 002b:00007ffe77539e90 EFLAGS: 00010202 [ 2925.151406] RAX: 0000000000000000 RBX: 00005616bed27940 RCX: 00007ffe7753a040 [ 2925.152407] RDX: 00007f37faa46000 RSI: 0000000000000026 RDI: 00005616bed19440 [ 2925.153379] RBP: 00005616bed19440 R08: 00005616bed27940 R09: 00007ffe7753cc20 [ 2925.154357] R10: 0000000000000000 R11: 00005616bed19440 R12: 0000000000000026 [ 2925.155333] R13: 0000000000000000 R14: 00007ffe77539f48 R15: 00007ffe77539ed0 [ 2925.156407] Mem-Info: [ 2925.156759] active_anon:6097 inactive_anon:42075 isolated_anon:0 [ 2925.156759] active_file:26 inactive_file:0 isolated_file:0 [ 2925.156759] unevictable:0 dirty:0 writeback:0 [ 2925.156759] slab_reclaimable:7410 slab_unreclaimable:63082 [ 2925.156759] mapped:69647 shmem:115 pagetables:2455 bounce:0 [ 2925.156759] free:2829 free_pcp:62 free_cma:0 [ 2925.161039] Node 0 active_anon:24388kB inactive_anon:168300kB active_file:104kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278588kB dirty:0kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:5344kB all_unreclaimable? no [ 2925.164179] Node 0 DMA free:6532kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:204kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2925.167758] lowmem_reserve[]: 0 1621 1621 1621 [ 2925.168451] Node 0 DMA32 free:4784kB min:5124kB low:6780kB high:8436kB reserved_highatomic:0KB active_anon:24388kB inactive_anon:168096kB active_file:212kB inactive_file:232kB unevictable:0kB writepending:0kB present:2080640kB managed:1664884kB mlocked:0kB pagetables:9796kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 2925.172354] lowmem_reserve[]: 0 0 0 0 [ 2925.172882] Node 0 DMA: 1*4kB (M) 2*8kB (M) 1*16kB (U) 1*32kB (M) 1*64kB (U) 0*128kB 1*256kB (M) 2*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (U) = 6532kB [ 2925.174921] Node 0 DMA32: 593*4kB (ME) 188*8kB (UM) 62*16kB (UM) 1*32kB (M) 1*64kB (M) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5220kB [ 2925.176865] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2925.178018] 143 total pagecache pages [ 2925.178530] 0 pages in swap cache [ 2925.179025] Swap cache stats: add 0, delete 0, find 0/0 [ 2925.179736] Free swap = 0kB [ 2925.180163] Total swap = 0kB [ 2925.180566] 524158 pages RAM [ 2925.180986] 0 pages HighMem/MovableOnly [ 2925.181514] 103960 pages reserved [ 2925.181996] Unreclaimable slab info: [ 2925.182487] Name Used Total [ 2925.183789] pid_3 3KB 3KB [ 2925.184789] pid_2 86KB 86KB [ 2925.185570] IEEE-802.15.4-MAC 63KB 63KB [ 2925.186552] IEEE-802.15.4-RAW 31KB 31KB [ 2925.187281] p9_req_t 8KB 8KB [ 2925.188024] fib6_nodes 28KB 28KB [ 2925.188988] ip6_dst_cache 45KB 45KB [ 2925.189777] PINGv6 63KB 63KB [ 2925.190514] RAWv6 220KB 220KB [ 2925.191248] UDPLITEv6 62KB 62KB [ 2925.191980] UDPv6 62KB 62KB [ 2925.192707] tw_sock_TCPv6 15KB 15KB [ 2925.193443] TCPv6 62KB 62KB [ 2925.194326] scsi_sense_cache 8KB 8KB [ 2925.195051] sd_ext_cdb 3KB 3KB [ 2925.195750] virtio_scsi_cmd 16KB 16KB [ 2925.196492] sgpool-128 59KB 59KB [ 2925.197374] sgpool-64 63KB 63KB [ 2925.198096] sgpool-32 110KB 110KB [ 2925.198806] sgpool-16 53KB 82KB [ 2925.199532] sgpool-8 97KB 97KB [ 2925.200270] mqueue_inode_cache 62KB 62KB [ 2925.201013] nfs_commit_data 15KB 15KB [ 2925.201714] nfs_write_data 47KB 47KB [ 2925.202441] jbd2_inode 7KB 7KB [ 2925.203171] ext4_system_zone 7KB 7KB [ 2925.204034] ext4_io_end_vec 7KB 7KB [ 2925.204751] ext4_bio_post_read_ctx 15KB 15KB [ 2925.205532] io_kiocb 30KB 30KB [ 2925.206260] kioctx 31KB 31KB [ 2925.206984] aio_kiocb 7KB 7KB [ 2925.207684] dio 15KB 15KB [ 2925.208409] bio-2 4KB 4KB [ 2925.209122] fasync_cache 7KB 7KB [ 2925.210001] pid_namespace 7KB 7KB [ 2925.210827] posix_timers_cache 15KB 15KB [ 2925.211589] rpc_buffers 31KB 31KB [ 2925.213075] rpc_tasks 3KB 3KB [ 2925.214484] UNIX 242KB 341KB [ 2925.216060] UDP-Lite 63KB 63KB [ 2925.217476] tcp_bind_bucket 8KB 8KB [ 2925.219013] inet_peer_cache 8KB 8KB [ 2925.220546] xfrm_state 16KB 16KB [ 2925.221863] ip_fib_trie 8KB 8KB [ 2925.223233] ip_fib_alias 15KB 15KB [ 2925.224491] ip_dst_cache 20KB 20KB [ 2925.225721] PING 62KB 62KB [ 2925.226964] RAW 125KB 125KB [ 2925.228119] UDP 196KB 315KB [ 2925.229360] tw_sock_TCP 15KB 15KB [ 2925.230606] request_sock_TCP 7KB 7KB [ 2925.231846] TCP 60KB 60KB [ 2925.233093] hugetlbfs_inode_cache 30KB 30KB [ 2925.234447] bio-1 11KB 11KB [ 2925.235713] eventpoll_pwq 19KB 19KB [ 2925.236999] eventpoll_epi 39KB 39KB [ 2925.238269] inotify_inode_mark 54KB 54KB [ 2925.239554] request_queue 90KB 90KB [ 2925.240845] blkdev_ioc 26KB 26KB [ 2925.242127] bio-0 444KB 448KB [ 2925.243331] biovec-max 658KB 658KB [ 2925.244618] biovec-64 189KB 189KB [ 2925.245931] biovec-16 37KB 37KB [ 2925.247217] user_namespace 31KB 31KB [ 2925.248501] uid_cache 8KB 8KB [ 2925.249776] dmaengine-unmap-2 4KB 4KB [ 2925.251041] audit_buffer 7KB 7KB [ 2925.252273] skbuff_ext_cache 1356KB 1356KB [ 2925.253752] skbuff_fclone_cache 52KB 75KB [ 2925.255075] skbuff_head_cache 1891KB 1927KB [ 2925.256363] file_lock_cache 47KB 47KB [ 2925.257635] file_lock_ctx 7KB 7KB [ 2925.258934] fsnotify_mark_connector 28KB 28KB [ 2925.260294] net_namespace 146KB 146KB [ 2925.261551] task_delay_info 135KB 135KB [ 2925.262805] taskstats 61KB 61KB [ 2925.264093] proc_dir_entry 360KB 360KB [ 2925.265367] pde_opener 43KB 43KB [ 2925.266635] seq_file 30KB 56KB [ 2925.267928] sigqueue 74KB 74KB [ 2925.269212] shmem_inode_cache 1279KB 1415KB [ 2925.270476] kernfs_iattrs_cache 216KB 216KB [ 2925.271785] kernfs_node_cache 5170KB 5195KB [ 2925.273059] mnt_cache 159KB 189KB [ 2925.274342] filp 1574KB 1848KB [ 2925.275619] names_cache 11177KB 11487KB [ 2925.276929] hashtab_node 278KB 278KB [ 2925.278206] ebitmap_node 1149KB 1149KB [ 2925.279481] avtab_node 4976KB 4976KB [ 2925.280777] avc_node 35KB 35KB [ 2925.282077] lsm_inode_cache 2634KB 2945KB [ 2925.283267] lsm_file_cache 165KB 180KB [ 2925.284550] key_jar 31KB 31KB [ 2925.285834] uts_namespace 15KB 15KB [ 2925.287120] nsproxy 7KB 7KB [ 2925.288338] vm_area_struct 1454KB 1540KB [ 2925.289624] mm_struct 350KB 472KB [ 2925.290932] fs_cache 64KB 64KB [ 2925.292230] files_cache 178KB 270KB [ 2925.293523] signal_cache 377KB 494KB [ 2925.294810] sighand_cache 404KB 420KB [ 2925.296098] task_struct 1536KB 1721KB [ 2925.297297] cred_jar 140KB 176KB [ 2925.298520] anon_vma_chain 350KB 381KB [ 2925.299817] anon_vma 383KB 392KB [ 2925.301135] pid 62KB 86KB [ 2925.302434] Acpi-Operand 215KB 253KB [ 2925.303734] Acpi-ParseExt 23KB 23KB [ 2925.305041] Acpi-Parse 43KB 59KB [ 2925.306353] Acpi-State 173KB 189KB [ 2925.307663] Acpi-Namespace 28KB 28KB [ 2925.308983] numa_policy 7KB 7KB [ 2925.310295] trace_event_file 163KB 163KB [ 2925.311603] ftrace_event_field 280KB 280KB [ 2925.312954] pool_workqueue 32KB 32KB [ 2925.314262] task_group 16KB 16KB [ 2925.315575] vmap_area 125KB 141KB [ 2925.316939] page->ptl 319KB 350KB [ 2925.318254] kmemleak_scan_area 155KB 155KB [ 2925.320350] kmemleak_object 148199KB 157942KB [ 2925.321695] kmalloc-8k 4832KB 4960KB [ 2925.323030] kmalloc-4k 6192KB 7136KB [ 2925.324256] kmalloc-2k 4172KB 4352KB [ 2925.325430] kmalloc-1k 2338KB 3456KB [ 2925.326596] kmalloc-512 7666KB 8048KB [ 2925.327752] kmalloc-256 1250KB 1280KB [ 2925.328939] kmalloc-192 470KB 556KB [ 2925.330103] kmalloc-128 477KB 536KB [ 2925.331273] kmalloc-96 627KB 816KB [ 2925.332473] kmalloc-64 1659KB 1920KB [ 2925.333650] kmalloc-32 716KB 848KB [ 2925.334820] kmalloc-16 324KB 364KB [ 2925.335989] kmalloc-8 322KB 322KB [ 2925.337165] kmem_cache_node 47KB 47KB [ 2925.338328] kmem_cache 75KB 75KB [ 2925.339495] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=102,uid=0 [ 2925.343439] Out of memory (oom_kill_allocating_task): Killed process 102 (systemd-journal) total-vm:31944kB, anon-rss:876kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:84kB oom_score_adj:-250 [ 2925.710501] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2925.712709] CPU: 0 PID: 257 Comm: syz-fuzzer Not tainted 5.10.123 #1 [ 2925.714088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2925.716531] Call Trace: [ 2925.717100] dump_stack+0x107/0x163 [ 2925.717883] dump_header+0x106/0x613 [ 2925.718685] oom_kill_process.cold+0x10/0x15 [ 2925.719635] out_of_memory+0x1108/0x1400 [ 2925.720523] ? oom_killer_disable+0x280/0x280 [ 2925.721485] ? mutex_trylock+0x233/0x2a0 [ 2925.722352] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2210 [ 2925.723620] __alloc_pages_slowpath.constprop.0+0x1bef/0x2210 [ 2925.724903] ? lock_acquire+0x117/0x490 [ 2925.725760] ? warn_alloc+0x180/0x180 [ 2925.726605] __alloc_pages_nodemask+0x54f/0x680 [ 2925.727604] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2925.728889] ? xas_load+0x66/0x2c0 [ 2925.729658] ? find_get_entry+0x2d9/0x6e0 [ 2925.730556] alloc_pages_current+0x187/0x280 [ 2925.731506] __page_cache_alloc+0x2ce/0x360 [ 2925.732458] pagecache_get_page+0x2c3/0xc80 [ 2925.733387] filemap_fault+0x1779/0x21b0 [ 2925.734272] ? read_cache_page_gfp+0x30/0x30 [ 2925.735218] ? replace_page_cache_page+0x1200/0x1200 [ 2925.736310] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 2925.737445] ext4_filemap_fault+0x87/0xc0 [ 2925.738332] __do_fault+0x113/0x410 [ 2925.739118] handle_mm_fault+0x1e6e/0x3520 [ 2925.740036] ? ep_read_events_proc+0x3c0/0x3c0 [ 2925.741021] ? __pmd_alloc+0x5e0/0x5e0 [ 2925.741869] ? vmacache_find+0x55/0x2a0 [ 2925.742734] do_user_addr_fault+0x56e/0xc00 [ 2925.743670] exc_page_fault+0xa2/0x1a0 [ 2925.744520] ? asm_exc_page_fault+0x8/0x30 [ 2925.745422] asm_exc_page_fault+0x1e/0x30 [ 2925.746303] RIP: 0033:0x40aaf0 [ 2925.746995] Code: Unable to access opcode bytes at RIP 0x40aac6. [ 2925.748292] RSP: 002b:000000c00003fee8 EFLAGS: 00010206 [ 2925.749429] RAX: 0000000001f4ba98 RBX: 0000000000000043 RCX: 000000c000000480 [ 2925.750956] RDX: 000002a921124363 RSI: 000000c00003f928 RDI: 0000000000000003 [ 2925.752499] RBP: 000000c00003ff28 R08: 0000000000000000 R09: 00007ffe53fc2090 [ 2925.754025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000438880 [ 2925.755545] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 2925.757213] Mem-Info: [ 2925.757761] active_anon:6096 inactive_anon:41857 isolated_anon:0 [ 2925.757761] active_file:10 inactive_file:16 isolated_file:0 [ 2925.757761] unevictable:0 dirty:0 writeback:0 [ 2925.757761] slab_reclaimable:7410 slab_unreclaimable:62961 [ 2925.757761] mapped:69650 shmem:115 pagetables:2437 bounce:0 [ 2925.757761] free:2775 free_pcp:124 free_cma:0 [ 2925.764476] Node 0 active_anon:24384kB inactive_anon:167428kB active_file:40kB inactive_file:64kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278600kB dirty:0kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:5280kB all_unreclaimable? no [ 2925.769392] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:204kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2925.775062] lowmem_reserve[]: 0 1621 1621 1621 [ 2925.776112] Node 0 DMA32 free:4592kB min:5124kB low:6780kB high:8436kB reserved_highatomic:0KB active_anon:24384kB inactive_anon:167224kB active_file:84kB inactive_file:436kB unevictable:0kB writepending:0kB present:2080640kB managed:1664884kB mlocked:0kB pagetables:9724kB bounce:0kB free_pcp:496kB local_pcp:248kB free_cma:0kB [ 2925.782280] lowmem_reserve[]: 0 0 0 0 [ 2925.783160] Node 0 DMA: 1*4kB (M) 3*8kB (UM) 1*16kB (U) 2*32kB (UM) 0*64kB 0*128kB 1*256kB (M) 2*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (U) = 6508kB [ 2925.786315] Node 0 DMA32: 511*4kB (UME) 168*8kB (UM) 60*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4348kB [ 2925.789151] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2925.791033] 153 total pagecache pages [ 2925.791845] 0 pages in swap cache [ 2925.792638] Swap cache stats: add 0, delete 0, find 0/0 [ 2925.793798] Free swap = 0kB [ 2925.794475] Total swap = 0kB [ 2925.795152] 524158 pages RAM [ 2925.795802] 0 pages HighMem/MovableOnly [ 2925.796701] 103960 pages reserved [ 2925.798113] Unreclaimable slab info: [ 2925.799490] Name Used Total [ 2925.800785] pid_3 3KB 3KB [ 2925.801979] pid_2 86KB 86KB [ 2925.803155] IEEE-802.15.4-MAC 63KB 63KB [ 2925.804337] IEEE-802.15.4-RAW 31KB 31KB [ 2925.805499] p9_req_t 8KB 8KB [ 2925.806662] fib6_nodes 28KB 28KB [ 2925.807823] ip6_dst_cache 45KB 45KB [ 2925.808995] PINGv6 63KB 63KB [ 2925.810157] RAWv6 220KB 220KB [ 2925.811316] UDPLITEv6 62KB 62KB [ 2925.812492] UDPv6 62KB 62KB [ 2925.813648] tw_sock_TCPv6 15KB 15KB [ 2925.814808] TCPv6 62KB 62KB [ 2925.815968] scsi_sense_cache 8KB 8KB [ 2925.817143] sd_ext_cdb 3KB 3KB [ 2925.818299] virtio_scsi_cmd 16KB 16KB [ 2925.819467] sgpool-128 59KB 59KB [ 2925.820633] sgpool-64 63KB 63KB [ 2925.821793] sgpool-32 189KB 189KB [ 2925.822951] sgpool-16 61KB 82KB [ 2925.824108] sgpool-8 97KB 97KB [ 2925.825276] mqueue_inode_cache 62KB 62KB [ 2925.826451] nfs_commit_data 15KB 15KB [ 2925.827613] nfs_write_data 47KB 47KB [ 2925.828794] jbd2_inode 7KB 7KB [ 2925.829953] ext4_system_zone 7KB 7KB [ 2925.831113] ext4_io_end_vec 7KB 7KB [ 2925.832284] ext4_bio_post_read_ctx 15KB 15KB [ 2925.833537] io_kiocb 30KB 30KB [ 2925.834695] kioctx 31KB 31KB [ 2925.835853] aio_kiocb 7KB 7KB [ 2925.837037] dio 15KB 15KB [ 2925.838203] bio-2 4KB 4KB [ 2925.839360] fasync_cache 7KB 7KB [ 2925.840555] pid_namespace 7KB 7KB [ 2925.841718] posix_timers_cache 15KB 15KB [ 2925.842943] rpc_buffers 31KB 31KB [ 2925.844107] rpc_tasks 3KB 3KB [ 2925.845295] UNIX 242KB 341KB [ 2925.846490] UDP-Lite 63KB 63KB [ 2925.847692] tcp_bind_bucket 8KB 8KB [ 2925.848861] inet_peer_cache 8KB 8KB [ 2925.850051] xfrm_state 16KB 16KB [ 2925.851216] ip_fib_trie 8KB 8KB [ 2925.852422] ip_fib_alias 15KB 15KB [ 2925.853619] ip_dst_cache 20KB 20KB [ 2925.854782] PING 62KB 62KB [ 2925.855980] RAW 125KB 125KB [ 2925.857171] UDP 196KB 315KB [ 2925.858377] tw_sock_TCP 15KB 15KB [ 2925.859547] request_sock_TCP 7KB 7KB [ 2925.860745] TCP 60KB 60KB [ 2925.861934] hugetlbfs_inode_cache 30KB 30KB [ 2925.863176] bio-1 11KB 11KB [ 2925.864366] eventpoll_pwq 19KB 19KB [ 2925.865544] eventpoll_epi 39KB 39KB [ 2925.866729] inotify_inode_mark 54KB 54KB [ 2925.867937] request_queue 90KB 90KB [ 2925.869146] blkdev_ioc 26KB 26KB [ 2925.870313] bio-0 456KB 456KB [ 2925.871481] biovec-max 658KB 658KB [ 2925.872686] biovec-64 189KB 189KB [ 2925.873851] biovec-16 37KB 37KB [ 2925.875045] user_namespace 31KB 31KB [ 2925.876229] uid_cache 8KB 8KB [ 2925.877422] dmaengine-unmap-2 4KB 4KB [ 2925.878590] audit_buffer 7KB 7KB [ 2925.879759] skbuff_ext_cache 1356KB 1356KB [ 2925.880966] skbuff_fclone_cache 52KB 75KB [ 2925.882171] skbuff_head_cache 1938KB 1938KB [ 2925.883356] file_lock_cache 47KB 47KB [ 2925.884535] file_lock_ctx 7KB 7KB [ 2925.885732] fsnotify_mark_connector 28KB 28KB [ 2925.887009] net_namespace 146KB 146KB [ 2925.888194] task_delay_info 135KB 135KB [ 2925.889365] taskstats 61KB 61KB [ 2925.890531] proc_dir_entry 360KB 360KB [ 2925.891700] pde_opener 43KB 43KB [ 2925.892879] seq_file 30KB 56KB [ 2925.894048] sigqueue 74KB 74KB [ 2925.895220] shmem_inode_cache 1279KB 1415KB [ 2925.896406] kernfs_iattrs_cache 216KB 216KB [ 2925.897615] kernfs_node_cache 5170KB 5195KB [ 2925.898779] mnt_cache 159KB 189KB [ 2925.899963] filp 1518KB 1848KB [ 2925.901148] names_cache 10616KB 11011KB [ 2925.902318] hashtab_node 278KB 278KB [ 2925.903483] ebitmap_node 1149KB 1149KB [ 2925.904668] avtab_node 4976KB 4976KB [ 2925.905832] avc_node 35KB 35KB [ 2925.907022] lsm_inode_cache 2634KB 2945KB [ 2925.908192] lsm_file_cache 165KB 180KB [ 2925.909356] key_jar 31KB 31KB [ 2925.910520] uts_namespace 15KB 15KB [ 2925.911683] nsproxy 7KB 7KB [ 2925.912881] vm_area_struct 1454KB 1540KB [ 2925.914043] mm_struct 350KB 472KB [ 2925.915206] fs_cache 64KB 64KB [ 2925.916383] files_cache 178KB 270KB [ 2925.917545] signal_cache 377KB 494KB [ 2925.918703] sighand_cache 404KB 420KB [ 2925.919870] task_struct 1536KB 1721KB [ 2925.921050] cred_jar 140KB 176KB [ 2925.922217] anon_vma_chain 350KB 381KB [ 2925.923383] anon_vma 383KB 392KB [ 2925.924567] pid 62KB 86KB [ 2925.925736] Acpi-Operand 215KB 253KB [ 2925.926900] Acpi-ParseExt 23KB 23KB [ 2925.928089] Acpi-Parse 43KB 59KB [ 2925.929262] Acpi-State 173KB 189KB [ 2925.930426] Acpi-Namespace 28KB 28KB [ 2925.931591] numa_policy 7KB 7KB [ 2925.932096] syz-executor.5: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null) [ 2925.932763] trace_event_file 163KB 163KB [ 2925.932793] ,cpuset= [ 2925.934758] ftrace_event_field 280KB 280KB [ 2925.934870] pool_workqueue 32KB 32KB [ 2925.934880] task_group 16KB 16KB [ 2925.934897] vmap_area 125KB 141KB [ 2925.936544] syz5 [ 2925.936976] page->ptl 319KB 350KB [ 2925.936988] kmemleak_scan_area 155KB 155KB [ 2925.937691] kmemleak_object 148302KB 157942KB [ 2925.938388] ,mems_allowed=0 [ 2925.939572] kmalloc-8k 4832KB 4960KB [ 2925.941028] CPU: 1 PID: 13145 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 2925.942115] kmalloc-4k 6152KB 7136KB [ 2925.942503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2925.942514] Call Trace: [ 2925.943668] kmalloc-2k 4172KB 4352KB [ 2925.944822] dump_stack+0x107/0x163 [ 2925.944846] warn_alloc.cold+0x95/0x18a [ 2925.946009] kmalloc-1k 2338KB 3456KB [ 2925.946599] ? zone_watermark_ok_safe+0x260/0x260 [ 2925.947740] kmalloc-512 7816KB 8048KB [ 2925.949156] ? schedule_timeout+0x1ce/0x3f0 [ 2925.949171] ? usleep_range+0x170/0x170 [ 2925.949191] ? __next_timer_interrupt+0x2b0/0x2b0 [ 2925.950341] kmalloc-256 1250KB 1280KB [ 2925.952741] __alloc_pages_slowpath.constprop.0+0x1cbf/0x2210 [ 2925.953321] kmalloc-192 470KB 556KB [ 2925.954434] ? lock_acquire+0x117/0x490 [ 2925.954461] ? warn_alloc+0x180/0x180 [ 2925.955243] kmalloc-128 477KB 536KB [ 2925.956087] __alloc_pages_nodemask+0x54f/0x680 [ 2925.957289] kmalloc-96 634KB 816KB [ 2925.958269] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 2925.958285] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2925.958306] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2925.959474] kmalloc-64 1667KB 1920KB [ 2925.960346] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2925.960387] alloc_pages_current+0x187/0x280 [ 2925.961245] kmalloc-32 715KB 848KB [ 2925.962238] relay_open_buf.part.0+0x2a5/0xc00 [ 2925.962273] relay_open+0x531/0xa10 [ 2925.963414] kmalloc-16 324KB 364KB [ 2925.964662] do_blk_trace_setup+0x4db/0xbf0 [ 2925.964682] ? _copy_from_user+0xfb/0x1b0 [ 2925.965828] kmalloc-8 322KB 322KB [ 2925.966643] __blk_trace_setup+0xca/0x180 [ 2925.966660] ? do_blk_trace_setup+0xbf0/0xbf0 [ 2925.966677] ? perf_trace_lock+0xac/0x490 [ 2925.967498] kmem_cache_node 47KB 47KB [ 2925.968650] blk_trace_ioctl+0x155/0x290 [ 2925.969656] kmem_cache 75KB 75KB [ 2925.970765] ? blk_add_trace_bio_remap+0x550/0x550 [ 2925.970779] ? do_vfs_ioctl+0x283/0x10d0 [ 2925.970799] ? selinux_inode_getsecctx+0x90/0x90 [ 2925.971936] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null) [ 2925.973061] ? generic_block_fiemap+0x60/0x60 [ 2925.973077] ? do_sys_openat2+0xa1/0x420 [ 2925.973107] blkdev_ioctl+0xc1/0x700 [ 2925.974379] ,cpuset= [ 2925.975496] ? blkdev_common_ioctl+0x1870/0x1870 [ 2925.975521] ? selinux_file_ioctl+0xb1/0x260 [ 2925.975542] block_ioctl+0xf9/0x140 [ 2925.977037] / [ 2925.977952] ? blkdev_read_iter+0x1c0/0x1c0 [ 2925.977971] __x64_sys_ioctl+0x196/0x210 [ 2925.977992] do_syscall_64+0x33/0x40 [ 2925.979356] ,mems_allowed=0 [ 2925.980306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2925.980318] RIP: 0033:0x7ff5755b8b19 [ 2925.980336] Code: Unable to access opcode bytes at RIP 0x7ff5755b8aef. [ 2925.981122] ,global_oom [ 2925.982225] RSP: 002b:00007ff572b2e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2925.982243] RAX: ffffffffffffffda RBX: 00007ff5756cbf60 RCX: 00007ff5755b8b19 [ 2925.982258] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 2925.983183] ,task_memcg= [ 2925.984031] RBP: 00007ff575612f6d R08: 0000000000000000 R09: 0000000000000000 [ 2925.984041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2925.984050] R13: 00007ffdaacbdc3f R14: 00007ff572b2e300 R15: 0000000000022000 [ 2925.984124] Mem-Info: [ 2925.985224] /system.slice/ssh.service [ 2925.986130] active_anon:6096 inactive_anon:41857 isolated_anon:0 [ 2925.986130] active_file:10 inactive_file:16 isolated_file:0 [ 2925.986130] unevictable:0 dirty:0 writeback:0 [ 2925.986130] slab_reclaimable:7410 slab_unreclaimable:62961 [ 2925.986130] mapped:69650 shmem:115 pagetables:2437 bounce:0 [ 2925.986130] free:2335 free_pcp:123 free_cma:0 [ 2925.987064] ,task=syz-fuzzer,pid=257,uid=0 [ 2925.987957] Node 0 active_anon:24384kB inactive_anon:167428kB active_file:40kB inactive_file:64kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278600kB dirty:0kB writeback:0kB shmem:460kB writeback_tmp:0kB kernel_stack:5280kB all_unreclaimable? yes [ 2925.987966] Node 0 [ 2925.989212] Out of memory (oom_kill_allocating_task): Killed process 256 (syz-fuzzer) total-vm:1170824kB, anon-rss:153860kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:768kB oom_score_adj:0 [ 2925.990059] DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:204kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:24kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2926.043671] lowmem_reserve[]: 0 1621 1621 1621 [ 2926.044715] Node 0 DMA32 free:3348kB min:7172kB low:8828kB high:10484kB reserved_highatomic:0KB active_anon:24384kB inactive_anon:167224kB active_file:84kB inactive_file:436kB unevictable:0kB writepending:0kB present:2080640kB managed:1664884kB mlocked:0kB pagetables:9724kB bounce:0kB free_pcp:620kB local_pcp:248kB free_cma:0kB [ 2926.050925] lowmem_reserve[]: 0 0 0 0 [ 2926.051760] Node 0 DMA: 2*4kB (UM) 3*8kB (UM) 0*16kB 3*32kB (UM) 0*64kB 0*128kB 1*256kB (M) 2*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (U) = 6528kB [ 2926.054836] Node 0 DMA32: 413*4kB (UME) 112*8kB (UM) 19*16kB (UM) 16*32kB (U) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3428kB [ 2926.057832] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2926.059668] 153 total pagecache pages [ 2926.060536] 0 pages in swap cache [ 2926.061297] Swap cache stats: add 0, delete 0, find 0/0 [ 2926.062466] Free swap = 0kB [ 2926.063141] Total swap = 0kB [ 2926.063792] 524158 pages RAM [ 2926.064485] 0 pages HighMem/MovableOnly [ 2926.065357] 103960 pages reserved [ 2926.163726] systemd[1]: rsyslog.service: A process of this unit has been killed by the OOM killer. [ 2926.180511] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2926.185014] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2926.210716] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2926.227636] systemd[1]: systemd-journald.service: Consumed 5.472s CPU time. [ 2926.244133] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 2926.248054] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 2926.984674] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.016421] systemd[1]: rsyslog.service: Consumed 2.184s CPU time. [ 2927.041394] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2927.043598] systemd[1]: systemd-journal-flush.service: Failed to create cgroup /system.slice/systemd-journal-flush.service: Read-only file system [ 2927.097181] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2927.173267] systemd[13196]: systemd-journal-flush.service: Failed to attach to cgroup /system.slice/systemd-journal-flush.service: No such file or directory [ 2927.197828] systemd[1]: systemd-journal-flush.service: Control process exited, code=exited, status=219/CGROUP [ 2927.205516] systemd[1]: systemd-journal-flush.service: Failed with result 'exit-code'. [ 2927.208411] systemd[1]: systemd-journal-flush.service: Failed to destroy cgroup /system.slice/systemd-journal-flush.service, ignoring: Read-only file system [ 2927.215419] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2927.253414] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 2927.275209] systemd[1]: Stopped System Logging Service. [ 2927.276836] systemd[1]: rsyslog.service: Consumed 2.184s CPU time. [ 2927.285794] systemd[1]: rsyslog.service: Failed to enable/disable controllers on cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.338622] systemd[1]: Starting System Logging Service... [ 2927.344270] systemd[1]: Stopped Journal Service. [ 2927.345849] systemd[1]: systemd-journald.service: Consumed 5.472s CPU time. [ 2927.362661] systemd[1]: systemd-journald.service: Failed to enable/disable controllers on cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.370106] systemd[13197]: rsyslog.service: Failed to attach to cgroup /system.slice/rsyslog.service: Read-only file system [ 2927.458428] systemd[1]: Starting Journal Service... [ 2927.460619] systemd[13198]: systemd-journald.service: Failed to attach to cgroup /system.slice/systemd-journald.service: Read-only file system [ 2927.468792] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 2927.478247] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2927.481674] systemd[1]: ssh.service: Consumed 41min 6.634s CPU time. [ 2927.486525] systemd[1]: system.slice: A process of this unit has been killed by the OOM killer. [ 2927.513612] systemd[1]: rsyslog.service: Main process exited, code=exited, status=219/CGROUP [ 2927.520367] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2927.529476] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.532635] systemd[1]: Failed to start System Logging Service. [ 2927.537168] systemd[1]: systemd-journald.service: Main process exited, code=exited, status=219/CGROUP [ 2927.547072] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.553985] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.557473] systemd[1]: Failed to start Journal Service. [ 2927.558753] systemd[1]: Dependency failed for Flush Journal to Persistent Storage. [ 2927.561134] systemd[1]: systemd-journal-flush.service: Job systemd-journal-flush.service/start failed with result 'dependency'. [ 2927.568455] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 2. [ 2927.572684] systemd[1]: Stopped target Bluetooth. [ 2927.573936] systemd[1]: Stopped Journal Service. [ 2927.576518] systemd[1]: systemd-journald.service: Failed to enable/disable controllers on cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.595120] systemd[1]: Starting Journal Service... [ 2927.597985] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 2927.598216] systemd[13199]: systemd-journald.service: Failed to attach to cgroup /system.slice/systemd-journald.service: Read-only file system [ 2927.599791] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2927.604712] systemd[1]: ssh.service: Consumed 41min 6.634s CPU time. [ 2927.609639] systemd[1]: ssh.service: Failed to enable/disable controllers on cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2927.635008] systemd[1]: Starting OpenBSD Secure Shell server... [ 2927.637762] systemd[1]: systemd-journald.service: Main process exited, code=exited, status=219/CGROUP [ 2927.640508] systemd[13200]: ssh.service: Failed to attach to cgroup /system.slice/ssh.service: Read-only file system [ 2927.645550] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.650559] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.654299] systemd[1]: Failed to start Journal Service. [ 2927.661038] systemd[1]: ssh.service: Control process exited, code=exited, status=219/CGROUP [ 2927.663081] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2927.667810] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2927.671192] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2927.675260] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 2. [ 2927.677318] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 3. [ 2927.679726] systemd[1]: Stopped System Logging Service. [ 2927.683881] systemd[1]: rsyslog.service: Failed to enable/disable controllers on cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.701146] systemd[1]: Starting System Logging Service... [ 2927.702677] systemd[1]: Stopped Journal Service. [ 2927.704606] systemd[13201]: rsyslog.service: Failed to attach to cgroup /system.slice/rsyslog.service: Read-only file system [ 2927.706275] systemd[1]: systemd-journald.service: Failed to enable/disable controllers on cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.725793] systemd[1]: Starting Journal Service... [ 2927.728609] systemd[1]: rsyslog.service: Main process exited, code=exited, status=219/CGROUP [ 2927.728780] systemd[13202]: systemd-journald.service: Failed to attach to cgroup /system.slice/systemd-journald.service: Read-only file system [ 2927.733369] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2927.737544] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.741211] systemd[1]: Failed to start System Logging Service. [ 2927.748293] systemd[1]: systemd-journald.service: Main process exited, code=exited, status=219/CGROUP [ 2927.755579] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.760470] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.764107] systemd[1]: Failed to start Journal Service. [ 2927.767732] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 4. [ 2927.770291] systemd[1]: Stopped Journal Service. [ 2927.773201] systemd[1]: systemd-journald.service: Failed to enable/disable controllers on cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.790600] systemd[1]: Starting Journal Service... [ 2927.793499] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 2. [ 2927.793605] systemd[13203]: systemd-journald.service: Failed to attach to cgroup /system.slice/systemd-journald.service: Read-only file system [ 2927.795334] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2927.800471] systemd[1]: ssh.service: Failed to enable/disable controllers on cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2927.817618] systemd[1]: Starting OpenBSD Secure Shell server... [ 2927.819958] systemd[13204]: ssh.service: Failed to attach to cgroup /system.slice/ssh.service: Read-only file system [ 2927.821125] systemd[1]: systemd-journald.service: Main process exited, code=exited, status=219/CGROUP [ 2927.826507] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.833692] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.837325] systemd[1]: Failed to start Journal Service. [ 2927.841553] systemd[1]: ssh.service: Control process exited, code=exited, status=219/CGROUP [ 2927.843438] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2927.849355] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2927.852574] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2927.856149] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 5. [ 2927.858405] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 3. [ 2927.860216] systemd[1]: Stopped System Logging Service. [ 2927.862784] systemd[1]: rsyslog.service: Failed to enable/disable controllers on cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.879661] systemd[1]: Starting System Logging Service... [ 2927.881135] systemd[1]: Stopped Journal Service. [ 2927.883159] systemd[13205]: rsyslog.service: Failed to attach to cgroup /system.slice/rsyslog.service: Read-only file system [ 2927.884786] systemd[1]: systemd-journald.service: Failed to enable/disable controllers on cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.907592] systemd[1]: Starting Journal Service... [ 2927.909216] systemd[13206]: systemd-journald.service: Failed to attach to cgroup /system.slice/systemd-journald.service: Read-only file system [ 2927.910377] systemd[1]: rsyslog.service: Main process exited, code=exited, status=219/CGROUP [ 2927.917295] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2927.921175] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2927.924275] systemd[1]: Failed to start System Logging Service. [ 2927.927572] systemd[1]: systemd-journald.service: Main process exited, code=exited, status=219/CGROUP [ 2927.933034] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.939209] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.942533] systemd[1]: Failed to start Journal Service. [ 2927.946606] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 6. [ 2927.949451] systemd[1]: Stopped Journal Service. [ 2927.951158] systemd[1]: systemd-journald.service: Start request repeated too quickly. [ 2927.952872] systemd[1]: systemd-journald.service: Failed with result 'exit-code'. [ 2927.956656] systemd[1]: systemd-journald.service: Failed to destroy cgroup /system.slice/systemd-journald.service, ignoring: Read-only file system [ 2927.959726] systemd[1]: Failed to start Journal Service. [ 2927.961669] systemd[1]: systemd-journald-dev-log.socket: Failed with result 'service-start-limit-hit'. [ 2927.965156] systemd[1]: systemd-journald-dev-log.socket: Failed to destroy cgroup /system.slice/systemd-journald-dev-log.socket, ignoring: Read-only file system [ 2927.969448] systemd[1]: systemd-journald.socket: Failed with result 'service-start-limit-hit'. [ 2927.974198] systemd[1]: systemd-journald.socket: Failed to destroy cgroup /system.slice/systemd-journald.socket, ignoring: Read-only file system [ 2927.978109] systemd[1]: systemd-journald-audit.socket: Failed with result 'service-start-limit-hit'. [ 2927.980727] systemd[1]: systemd-journald-audit.socket: Failed to destroy cgroup /system.slice/systemd-journald-audit.socket, ignoring: Read-only file system [ 2927.985350] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 3. [ 2927.988609] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2927.991363] systemd[1]: ssh.service: Failed to enable/disable controllers on cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.010027] systemd[1]: Starting OpenBSD Secure Shell server... [ 2928.013703] systemd[13207]: ssh.service: Failed to attach to cgroup /system.slice/ssh.service: Read-only file system [ 2928.020210] systemd[13207]: ssh.service: Failed at step CGROUP spawning /usr/sbin/sshd: Read-only file system [ 2928.032130] systemd[1]: ssh.service: Control process exited, code=exited, status=219/CGROUP [ 2928.033988] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2928.038387] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.048346] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2928.051755] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 4. [ 2928.053470] systemd[1]: Stopped System Logging Service. [ 2928.055889] systemd[1]: rsyslog.service: Failed to enable/disable controllers on cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2928.071547] systemd[1]: Starting System Logging Service... [ 2928.075297] systemd[13208]: rsyslog.service: Failed to attach to cgroup /system.slice/rsyslog.service: Read-only file system [ 2928.083898] systemd[13208]: rsyslog.service: Failed at step CGROUP spawning /usr/sbin/rsyslogd: Read-only file system [ 2928.095478] systemd[1]: rsyslog.service: Main process exited, code=exited, status=219/CGROUP [ 2928.099779] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2928.103302] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2928.106219] systemd[1]: Failed to start System Logging Service. [ 2928.258847] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 4. [ 2928.261267] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 5. [ 2928.264123] systemd[1]: Stopped System Logging Service. [ 2928.267011] systemd[1]: rsyslog.service: Failed to enable/disable controllers on cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2928.290330] systemd[1]: Starting System Logging Service... [ 2928.293001] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2928.293152] systemd[13209]: rsyslog.service: Failed to attach to cgroup /system.slice/rsyslog.service: Read-only file system [ 2928.296319] systemd[1]: ssh.service: Failed to enable/disable controllers on cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.299845] systemd[13209]: rsyslog.service: Failed at step CGROUP spawning /usr/sbin/rsyslogd: Read-only file system [ 2928.318939] systemd[1]: Starting OpenBSD Secure Shell server... [ 2928.322156] systemd[1]: rsyslog.service: Main process exited, code=exited, status=219/CGROUP [ 2928.324203] systemd[13210]: ssh.service: Failed to attach to cgroup /system.slice/ssh.service: Read-only file system [ 2928.326847] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2928.328719] systemd[13210]: ssh.service: Failed at step CGROUP spawning /usr/sbin/sshd: Read-only file system [ 2928.331448] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2928.334749] systemd[1]: Failed to start System Logging Service. [ 2928.367711] systemd[1]: ssh.service: Control process exited, code=exited, status=219/CGROUP [ 2928.369614] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2928.374226] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.377201] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2928.508134] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 6. [ 2928.510529] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 5. [ 2928.512651] systemd[1]: Stopped System Logging Service. [ 2928.514479] systemd[1]: rsyslog.service: Start request repeated too quickly. [ 2928.516408] systemd[1]: rsyslog.service: Failed with result 'exit-code'. [ 2928.522197] systemd[1]: rsyslog.service: Failed to destroy cgroup /system.slice/rsyslog.service, ignoring: Read-only file system [ 2928.525109] systemd[1]: Failed to start System Logging Service. [ 2928.527246] systemd[1]: syslog.socket: Failed with result 'service-start-limit-hit'. [ 2928.529784] systemd[1]: syslog.socket: Failed to destroy cgroup /system.slice/syslog.socket, ignoring: Read-only file system [ 2928.532973] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2928.535778] systemd[1]: ssh.service: Failed to enable/disable controllers on cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.552137] systemd[1]: Starting OpenBSD Secure Shell server... [ 2928.562882] systemd[13215]: ssh.service: Failed to attach to cgroup /system.slice/ssh.service: Read-only file system [ 2928.570846] systemd[13215]: ssh.service: Failed at step CGROUP spawning /usr/sbin/sshd: Read-only file system [ 2928.583430] systemd[1]: ssh.service: Control process exited, code=exited, status=219/CGROUP [ 2928.585401] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2928.589205] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.592249] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2928.758102] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 6. [ 2928.760282] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2928.762368] systemd[1]: ssh.service: Start request repeated too quickly. [ 2928.764231] systemd[1]: ssh.service: Failed with result 'exit-code'. [ 2928.769338] systemd[1]: ssh.service: Failed to destroy cgroup /system.slice/ssh.service, ignoring: Read-only file system [ 2928.772145] systemd[1]: Failed to start OpenBSD Secure Shell server. VM DIAGNOSIS: 00:26:38 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=ffffffff854aa074 RCX=ffffffff810959de RDX=0000000000000001 RSI=ffffffff857604c4 RDI=ffffffff854aa06c RBP=ffffffff854aa078 RSP=ffff8880084b7458 R8 =ffffffff857604c4 R9 =ffffffff857604e2 R10=0000000000030041 R11=1ffff11001096e9c R12=ffffffff854aa07c R13=ffffffff854aa06c R14=ffffffff854aa074 R15=dffffc0000000000 RIP=ffffffff8110462b RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1116b06900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f111762a4b0 CR3=000000000dfae000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 73722f6563696c73 2e6d65747379732f YMM01=0000000000000000 0000000000000000 0065636976726573 2e676f6c73797372 YMM02=0000000000000000 0000000000000000 666e6f632d6c656e 72656b2d7379732f YMM03=0000000000000000 0000000000000000 0000000000000000 0000454e4f4e692d YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000700000000 00005557714e5700 YMM06=0000000000000000 0000000000000000 697665642e313032 3a316963682d3169 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 69253d4449504e49 414d0073253d5445 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000202000200000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffffffffffff RBX=ffff888028411000 RCX=0000000000000036 RDX=0000000000000000 RSI=00000000000000ff RDI=ffffed1005082250 RBP=ffffea0000a10440 RSP=ffff8880558e7b38 R8 =0000000000000000 R9 =ffffed1005082200 R10=fffff9400014208e R11=0000000000000001 R12=ffffffff84a82720 R13=ffffffff84a82730 R14=ffffed10035e0e55 R15=ffff88803c8a9c00 RIP=ffffffff81ff9244 RFL=00000a13 [-O--A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff572acb700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb9d6afc740 CR3=0000000060f66000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000564d5a94cd70 0000564d5a950180 YMM01=0000000000000000 0000000000000000 0000000100000002 0000564d5a94cd70 YMM02=0000000000000000 0000000000000000 0000564d5a94cd30 0000000100000004 YMM03=0000000000000000 0000000000000000 0000564d5a952d60 0000564d5a9524a0 YMM04=0000000000000000 0000000000000000 00000002ffffffff 0000564d5a952d60 YMM05=0000000000000000 0000000000000000 0000564d5a93f570 0000564d5a94cd30 YMM06=0000000000000000 0000000000000000 0000564d5a950180 0000000300000002 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 20202020203a657a 697320656c696600 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000