? get_user_pages_remote+0x63/0x90 [ 1683.290678] ? get_user_pages_remote+0x6c/0x90 [ 1683.291624] bprm_execve+0x123/0x1b00 [ 1683.292428] ? acct_arg_size+0xe0/0xe0 [ 1683.293228] ? downgrade_write+0x3a0/0x3a0 [ 1683.294122] ? open_exec+0x70/0x70 [ 1683.294856] ? memcpy+0x39/0x60 [ 1683.295539] ? copy_string_kernel+0x3b6/0x450 [ 1683.296480] do_execveat_common+0x76d/0x8d0 [ 1683.297375] ? bprm_execve+0x1b00/0x1b00 [ 1683.298255] __x64_sys_execveat+0xed/0x140 [ 1683.299141] do_syscall_64+0x33/0x40 [ 1683.299910] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.300964] RIP: 0033:0x7f4478f33b19 [ 1683.301729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.305487] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.307051] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1683.308514] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.309992] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.311459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.312923] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1683.314452] CPU: 1 PID: 11143 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1683.315882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.317588] Call Trace: [ 1683.318143] dump_stack+0x107/0x167 [ 1683.318903] should_fail.cold+0x5/0xa [ 1683.319694] __alloc_pages_nodemask+0x182/0x680 [ 1683.320664] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1683.321918] ? up_write+0x191/0x550 [ 1683.322681] ? rwlock_bug.part.0+0x90/0x90 [ 1683.323558] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1683.324549] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1683.325669] alloc_pages_vma+0xbb/0x410 [ 1683.326493] handle_mm_fault+0x154b/0x3520 [ 1683.327359] ? perf_trace_lock+0xac/0x490 [ 1683.328201] ? __lockdep_reset_lock+0x180/0x180 [ 1683.329144] ? __pmd_alloc+0x5e0/0x5e0 [ 1683.329974] __get_user_pages+0x61b/0x1390 [ 1683.330849] ? follow_page_mask+0x1860/0x1860 [ 1683.331760] ? __lockdep_reset_lock+0x180/0x180 [ 1683.332705] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1683.333665] __get_user_pages_remote+0x1d5/0x870 [ 1683.334643] ? lock_downgrade+0x6d0/0x6d0 [ 1683.335495] get_user_pages_remote+0x63/0x90 [ 1683.336392] get_arg_page+0xba/0x200 [ 1683.337151] ? acct_arg_size+0xe0/0xe0 [ 1683.337944] ? downgrade_write+0x3a0/0x3a0 [ 1683.338804] ? count.constprop.0+0x1b3/0x290 [ 1683.339707] copy_string_kernel+0x1b4/0x450 [ 1683.340595] do_execveat_common+0x520/0x8d0 [ 1683.341477] ? bprm_execve+0x1b00/0x1b00 [ 1683.342338] __x64_sys_execveat+0xed/0x140 [ 1683.343206] do_syscall_64+0x33/0x40 [ 1683.343964] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.345002] RIP: 0033:0x7fbe1f492b19 [ 1683.345761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.349489] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.351047] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1683.352491] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.353941] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.355394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.356844] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1683.394269] FAULT_INJECTION: forcing a failure. [ 1683.394269] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.396615] CPU: 1 PID: 11144 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1683.398064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.399773] Call Trace: [ 1683.400318] dump_stack+0x107/0x167 [ 1683.401076] should_fail.cold+0x5/0xa [ 1683.401861] ? create_object.isra.0+0x3a/0xa20 [ 1683.402810] should_failslab+0x5/0x20 [ 1683.403591] kmem_cache_alloc+0x5b/0x360 [ 1683.404421] create_object.isra.0+0x3a/0xa20 [ 1683.405315] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1683.406361] __kmalloc_node+0x1ae/0x4b0 [ 1683.407182] kvmalloc_node+0x119/0x170 [ 1683.407973] alloc_fdtable+0x13f/0x280 [ 1683.408770] dup_fd+0x722/0xcb0 [ 1683.409457] unshare_files+0x175/0x270 [ 1683.410263] ? __ia32_sys_unshare+0x40/0x40 [ 1683.411144] ? get_user_pages_remote+0x63/0x90 [ 1683.412069] ? get_user_pages_remote+0x6c/0x90 [ 1683.412997] bprm_execve+0x123/0x1b00 [ 1683.413771] ? acct_arg_size+0xe0/0xe0 [ 1683.414565] ? downgrade_write+0x3a0/0x3a0 [ 1683.415427] ? open_exec+0x70/0x70 [ 1683.416152] ? memcpy+0x39/0x60 [ 1683.416826] ? copy_string_kernel+0x3b6/0x450 [ 1683.417747] do_execveat_common+0x76d/0x8d0 [ 1683.418647] ? bprm_execve+0x1b00/0x1b00 [ 1683.419494] __x64_sys_execveat+0xed/0x140 [ 1683.420358] do_syscall_64+0x33/0x40 [ 1683.421116] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.422164] RIP: 0033:0x7fe08a85eb19 [ 1683.422921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.426659] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.428206] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1683.429659] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.431127] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.432575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.434032] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:35:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) 04:35:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfdfdffff}) 04:35:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) [ 1683.495355] FAULT_INJECTION: forcing a failure. [ 1683.495355] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.497721] CPU: 0 PID: 11156 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1683.499174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.500889] Call Trace: [ 1683.501448] dump_stack+0x107/0x167 [ 1683.502218] should_fail.cold+0x5/0xa [ 1683.503024] ? create_object.isra.0+0x3a/0xa20 [ 1683.503975] should_failslab+0x5/0x20 [ 1683.504770] kmem_cache_alloc+0x5b/0x360 [ 1683.505618] create_object.isra.0+0x3a/0xa20 [ 1683.506528] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1683.507575] kmem_cache_alloc_trace+0x151/0x360 [ 1683.508526] ? rwlock_bug.part.0+0x90/0x90 [ 1683.509405] alloc_fdtable+0x84/0x280 [ 1683.510208] dup_fd+0x722/0xcb0 [ 1683.510920] unshare_files+0x175/0x270 [ 1683.511720] ? __ia32_sys_unshare+0x40/0x40 [ 1683.512614] ? get_user_pages_remote+0x63/0x90 [ 1683.513545] ? get_user_pages_remote+0x6c/0x90 [ 1683.514498] bprm_execve+0x123/0x1b00 [ 1683.515284] ? acct_arg_size+0xe0/0xe0 [ 1683.516078] ? downgrade_write+0x3a0/0x3a0 [ 1683.516952] ? open_exec+0x70/0x70 [ 1683.517684] ? memcpy+0x39/0x60 [ 1683.518386] ? copy_string_kernel+0x3b6/0x450 [ 1683.519328] do_execveat_common+0x76d/0x8d0 [ 1683.520221] ? bprm_execve+0x1b00/0x1b00 [ 1683.521091] __x64_sys_execveat+0xed/0x140 [ 1683.521979] do_syscall_64+0x33/0x40 [ 1683.522747] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.523791] RIP: 0033:0x7f4478f33b19 [ 1683.524555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.528303] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.529857] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1683.531312] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.532764] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.534221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.535674] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:35:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) 04:35:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 04:35:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:35:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80086601, &(0x7f0000000540)) 04:35:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5450, &(0x7f0000000540)={0x0, 0x3}) [ 1683.677132] FAULT_INJECTION: forcing a failure. [ 1683.677132] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.679660] CPU: 0 PID: 11169 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1683.681095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.682834] Call Trace: [ 1683.683393] dump_stack+0x107/0x167 [ 1683.684155] should_fail.cold+0x5/0xa [ 1683.684952] ? dup_fd+0x89/0xcb0 [ 1683.685663] should_failslab+0x5/0x20 [ 1683.686451] kmem_cache_alloc+0x5b/0x360 [ 1683.687280] ? __lockdep_reset_lock+0x180/0x180 [ 1683.688224] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1683.689181] dup_fd+0x89/0xcb0 [ 1683.689874] unshare_files+0x175/0x270 [ 1683.690693] ? __ia32_sys_unshare+0x40/0x40 [ 1683.691585] ? get_user_pages_remote+0x63/0x90 [ 1683.692512] ? get_user_pages_remote+0x6c/0x90 [ 1683.693454] bprm_execve+0x123/0x1b00 [ 1683.694244] ? acct_arg_size+0xe0/0xe0 [ 1683.695037] ? downgrade_write+0x3a0/0x3a0 [ 1683.695913] ? open_exec+0x70/0x70 [ 1683.696640] ? memcpy+0x39/0x60 [ 1683.697325] ? copy_string_kernel+0x3b6/0x450 [ 1683.698295] do_execveat_common+0x76d/0x8d0 [ 1683.699185] ? bprm_execve+0x1b00/0x1b00 [ 1683.700051] __x64_sys_execveat+0xed/0x140 [ 1683.700930] do_syscall_64+0x33/0x40 [ 1683.701695] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.702752] RIP: 0033:0x7fbe1f492b19 [ 1683.703515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.707246] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.708795] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1683.710252] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.711700] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.713147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.714604] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1683.728233] FAULT_INJECTION: forcing a failure. [ 1683.728233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1683.730675] CPU: 1 PID: 11154 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1683.732078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.733757] Call Trace: [ 1683.734313] dump_stack+0x107/0x167 [ 1683.735057] should_fail.cold+0x5/0xa [ 1683.735837] _copy_from_user+0x2e/0x1b0 [ 1683.736655] __copy_msghdr_from_user+0x91/0x4b0 [ 1683.737598] ? __ia32_sys_shutdown+0x80/0x80 [ 1683.738504] ? __lock_acquire+0x1657/0x5b00 [ 1683.739411] ___sys_recvmsg+0xd5/0x200 [ 1683.740219] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1683.741230] ? __lockdep_reset_lock+0x180/0x180 [ 1683.742196] ? lock_downgrade+0x6d0/0x6d0 [ 1683.743059] ? find_held_lock+0x2c/0x110 [ 1683.743906] ? __might_fault+0xd3/0x180 [ 1683.744727] ? lock_downgrade+0x6d0/0x6d0 [ 1683.745603] do_recvmmsg+0x24c/0x6d0 [ 1683.746401] ? ___sys_recvmsg+0x200/0x200 [ 1683.747257] ? lock_downgrade+0x6d0/0x6d0 [ 1683.748114] ? ksys_write+0x12d/0x260 [ 1683.748906] ? wait_for_completion+0x270/0x270 [ 1683.749841] ? rcu_read_lock_any_held+0x75/0xa0 [ 1683.750797] ? vfs_write+0x354/0xa30 [ 1683.751562] __x64_sys_recvmmsg+0x20f/0x260 [ 1683.752439] ? ksys_write+0x1a9/0x260 [ 1683.753215] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1683.754277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1683.755344] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1683.756398] do_syscall_64+0x33/0x40 [ 1683.757159] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.758219] RIP: 0033:0x7fd10da95b19 [ 1683.758978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.762715] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1683.764277] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1683.765730] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1683.767195] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.768643] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1683.770098] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 [ 1683.778814] FAULT_INJECTION: forcing a failure. [ 1683.778814] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.781457] CPU: 1 PID: 11174 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1683.782900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.784574] Call Trace: [ 1683.785110] dump_stack+0x107/0x167 [ 1683.785857] should_fail.cold+0x5/0xa [ 1683.786652] ? prepare_creds+0x25/0x5f0 [ 1683.787467] should_failslab+0x5/0x20 [ 1683.788234] kmem_cache_alloc+0x5b/0x360 [ 1683.789052] ? __ia32_sys_unshare+0x40/0x40 [ 1683.789932] prepare_creds+0x25/0x5f0 [ 1683.790709] prepare_exec_creds+0xd/0x260 [ 1683.791555] bprm_execve+0x1e7/0x1b00 [ 1683.792336] ? acct_arg_size+0xe0/0xe0 [ 1683.793124] ? downgrade_write+0x3a0/0x3a0 [ 1683.794000] ? open_exec+0x70/0x70 [ 1683.794724] ? memcpy+0x39/0x60 [ 1683.795399] ? copy_string_kernel+0x3b6/0x450 [ 1683.796323] do_execveat_common+0x76d/0x8d0 [ 1683.797231] ? bprm_execve+0x1b00/0x1b00 [ 1683.798096] __x64_sys_execveat+0xed/0x140 [ 1683.798959] do_syscall_64+0x33/0x40 [ 1683.799715] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.800751] RIP: 0033:0x7fe08a85eb19 [ 1683.801507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.805235] RSP: 002b:00007fe087db3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1683.806781] RAX: ffffffffffffffda RBX: 00007fe08a972020 RCX: 00007fe08a85eb19 [ 1683.808226] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1683.809668] RBP: 00007fe087db31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.811126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.812568] R13: 00007ffc771db1df R14: 00007fe087db3300 R15: 0000000000022000 [ 1683.850583] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value 04:35:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 04:35:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80087601, &(0x7f0000000540)) 04:35:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) [ 1683.967734] FAULT_INJECTION: forcing a failure. [ 1683.967734] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.970124] CPU: 1 PID: 11185 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1683.971508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1683.973151] Call Trace: [ 1683.973683] dump_stack+0x107/0x167 [ 1683.974419] should_fail.cold+0x5/0xa [ 1683.975185] ? create_object.isra.0+0x3a/0xa20 [ 1683.976099] should_failslab+0x5/0x20 [ 1683.976862] kmem_cache_alloc+0x5b/0x360 [ 1683.977678] create_object.isra.0+0x3a/0xa20 [ 1683.978564] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1683.979583] kmem_cache_alloc+0x159/0x360 [ 1683.980409] ? __lockdep_reset_lock+0x180/0x180 [ 1683.981344] dup_fd+0x89/0xcb0 [ 1683.982036] unshare_files+0x175/0x270 [ 1683.982818] ? __ia32_sys_unshare+0x40/0x40 [ 1683.983701] ? get_user_pages_remote+0x63/0x90 [ 1683.984613] ? get_user_pages_remote+0x6c/0x90 [ 1683.985529] bprm_execve+0x123/0x1b00 [ 1683.986321] ? acct_arg_size+0xe0/0xe0 [ 1683.987097] ? downgrade_write+0x3a0/0x3a0 [ 1683.987950] ? open_exec+0x70/0x70 [ 1683.988678] ? memcpy+0x39/0x60 [ 1683.989341] ? copy_string_kernel+0x3b6/0x450 [ 1683.990258] do_execveat_common+0x76d/0x8d0 [ 1683.991133] ? bprm_execve+0x1b00/0x1b00 [ 1683.991959] __x64_sys_execveat+0xed/0x140 [ 1683.992810] do_syscall_64+0x33/0x40 [ 1683.993558] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1683.994593] RIP: 0033:0x7fbe1f492b19 [ 1683.995339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.998995] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1684.000508] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1684.001931] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1684.003351] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.004786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.006221] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1684.009251] FAULT_INJECTION: forcing a failure. [ 1684.009251] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.011534] CPU: 1 PID: 11184 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1684.012914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1684.014588] Call Trace: [ 1684.015118] dump_stack+0x107/0x167 [ 1684.015853] should_fail.cold+0x5/0xa [ 1684.016620] ? kvmalloc_node+0x119/0x170 [ 1684.017438] should_failslab+0x5/0x20 [ 1684.018207] __kmalloc_node+0x76/0x4b0 [ 1684.018996] kvmalloc_node+0x119/0x170 [ 1684.019779] alloc_fdtable+0xd3/0x280 [ 1684.020540] dup_fd+0x722/0xcb0 [ 1684.021230] unshare_files+0x175/0x270 [ 1684.022024] ? __ia32_sys_unshare+0x40/0x40 [ 1684.022893] ? get_user_pages_remote+0x63/0x90 [ 1684.023803] ? get_user_pages_remote+0x6c/0x90 [ 1684.024719] bprm_execve+0x123/0x1b00 [ 1684.025479] ? acct_arg_size+0xe0/0xe0 [ 1684.026266] ? downgrade_write+0x3a0/0x3a0 [ 1684.027114] ? open_exec+0x70/0x70 [ 1684.027826] ? memcpy+0x39/0x60 [ 1684.028489] ? copy_string_kernel+0x3b6/0x450 [ 1684.029404] do_execveat_common+0x76d/0x8d0 [ 1684.030293] ? bprm_execve+0x1b00/0x1b00 [ 1684.031134] __x64_sys_execveat+0xed/0x140 [ 1684.031997] do_syscall_64+0x33/0x40 [ 1684.032745] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1684.033791] RIP: 0033:0x7f4478f33b19 [ 1684.034560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1684.038261] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1684.039786] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1684.041209] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1684.042651] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.044075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.045498] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:35:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 14) 04:35:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:35:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000540)) 04:35:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 04:35:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5451, &(0x7f0000000540)={0x0, 0x3}) 04:35:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 04:35:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 04:35:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffdfd}) [ 1696.919886] FAULT_INJECTION: forcing a failure. [ 1696.919886] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.922350] CPU: 0 PID: 11214 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1696.923773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1696.925482] Call Trace: [ 1696.926036] dump_stack+0x107/0x167 [ 1696.926676] FAULT_INJECTION: forcing a failure. [ 1696.926676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1696.926830] should_fail.cold+0x5/0xa [ 1696.929942] ? alloc_fdtable+0x84/0x280 [ 1696.930774] should_failslab+0x5/0x20 [ 1696.931560] kmem_cache_alloc_trace+0x55/0x360 [ 1696.932502] ? rwlock_bug.part.0+0x90/0x90 [ 1696.933386] alloc_fdtable+0x84/0x280 [ 1696.934198] dup_fd+0x722/0xcb0 [ 1696.934912] unshare_files+0x175/0x270 [ 1696.935714] ? __ia32_sys_unshare+0x40/0x40 [ 1696.936616] ? get_user_pages_remote+0x63/0x90 [ 1696.937548] ? get_user_pages_remote+0x6c/0x90 [ 1696.938531] bprm_execve+0x123/0x1b00 [ 1696.939329] ? acct_arg_size+0xe0/0xe0 [ 1696.940145] ? downgrade_write+0x3a0/0x3a0 [ 1696.941053] ? open_exec+0x70/0x70 [ 1696.941808] ? memcpy+0x39/0x60 [ 1696.942528] ? copy_string_kernel+0x3b6/0x450 [ 1696.943500] do_execveat_common+0x76d/0x8d0 [ 1696.944425] ? bprm_execve+0x1b00/0x1b00 [ 1696.945327] __x64_sys_execveat+0xed/0x140 [ 1696.946240] do_syscall_64+0x33/0x40 [ 1696.947004] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1696.948049] RIP: 0033:0x7fbe1f492b19 [ 1696.948810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.952525] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1696.954089] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1696.955533] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1696.956982] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.958432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1696.959871] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1696.961371] CPU: 1 PID: 11210 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1696.962782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1696.964461] Call Trace: [ 1696.964997] dump_stack+0x107/0x167 [ 1696.965738] should_fail.cold+0x5/0xa [ 1696.966529] _copy_from_user+0x2e/0x1b0 [ 1696.967341] __copy_msghdr_from_user+0x91/0x4b0 [ 1696.968279] ? __ia32_sys_shutdown+0x80/0x80 [ 1696.969172] ? __lock_acquire+0x1657/0x5b00 [ 1696.970090] ___sys_recvmsg+0xd5/0x200 [ 1696.970900] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1696.971916] ? __lockdep_reset_lock+0x180/0x180 [ 1696.972878] ? lock_downgrade+0x6d0/0x6d0 [ 1696.973747] ? find_held_lock+0x2c/0x110 [ 1696.974606] ? __might_fault+0xd3/0x180 [ 1696.975428] ? lock_downgrade+0x6d0/0x6d0 [ 1696.976312] do_recvmmsg+0x24c/0x6d0 [ 1696.977091] ? ___sys_recvmsg+0x200/0x200 [ 1696.977960] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1696.979043] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1696.979964] ? trace_hardirqs_on+0x5b/0x180 [ 1696.980849] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1696.981770] ? finish_task_switch+0x126/0x5d0 [ 1696.982708] ? finish_task_switch+0xef/0x5d0 [ 1696.983635] __x64_sys_recvmmsg+0x20f/0x260 [ 1696.984521] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1696.985581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1696.986667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1696.987724] do_syscall_64+0x33/0x40 [ 1696.988489] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1696.989541] RIP: 0033:0x7fd10da95b19 [ 1696.990327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1696.994092] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1696.995631] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1696.997068] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1696.998523] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.999955] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1697.001388] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 [ 1697.009498] FAULT_INJECTION: forcing a failure. [ 1697.009498] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.011914] CPU: 1 PID: 11215 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1697.012728] FAULT_INJECTION: forcing a failure. [ 1697.012728] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.013320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.013327] Call Trace: [ 1697.013349] dump_stack+0x107/0x167 [ 1697.013374] should_fail.cold+0x5/0xa [ 1697.019353] ? create_object.isra.0+0x3a/0xa20 [ 1697.020292] should_failslab+0x5/0x20 [ 1697.021079] kmem_cache_alloc+0x5b/0x360 [ 1697.021922] create_object.isra.0+0x3a/0xa20 [ 1697.022828] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.023867] __kmalloc_node+0x1ae/0x4b0 [ 1697.024697] kvmalloc_node+0x119/0x170 [ 1697.025492] alloc_fdtable+0xd3/0x280 [ 1697.026293] dup_fd+0x722/0xcb0 [ 1697.026997] unshare_files+0x175/0x270 [ 1697.027789] ? __ia32_sys_unshare+0x40/0x40 [ 1697.028669] ? get_user_pages_remote+0x63/0x90 [ 1697.029602] ? get_user_pages_remote+0x6c/0x90 [ 1697.030565] bprm_execve+0x123/0x1b00 [ 1697.031344] ? acct_arg_size+0xe0/0xe0 [ 1697.032136] ? downgrade_write+0x3a0/0x3a0 [ 1697.032999] ? open_exec+0x70/0x70 [ 1697.033739] ? memcpy+0x39/0x60 [ 1697.034433] ? copy_string_kernel+0x3b6/0x450 [ 1697.035362] do_execveat_common+0x76d/0x8d0 [ 1697.036238] ? bprm_execve+0x1b00/0x1b00 [ 1697.037081] __x64_sys_execveat+0xed/0x140 [ 1697.037937] do_syscall_64+0x33/0x40 [ 1697.038709] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1697.039756] RIP: 0033:0x7f4478f33b19 [ 1697.040523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.044310] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1697.045866] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1697.047328] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1697.048788] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.050252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.051708] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1697.053196] CPU: 0 PID: 11209 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1697.054639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.056337] Call Trace: [ 1697.056886] dump_stack+0x107/0x167 [ 1697.057647] should_fail.cold+0x5/0xa [ 1697.058443] ? create_object.isra.0+0x3a/0xa20 [ 1697.059389] should_failslab+0x5/0x20 [ 1697.060174] kmem_cache_alloc+0x5b/0x360 [ 1697.061028] create_object.isra.0+0x3a/0xa20 [ 1697.061936] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.063010] kmem_cache_alloc+0x159/0x360 04:35:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) [ 1697.063880] prepare_creds+0x25/0x5f0 [ 1697.064847] prepare_exec_creds+0xd/0x260 [ 1697.065706] bprm_execve+0x1e7/0x1b00 [ 1697.066507] ? acct_arg_size+0xe0/0xe0 [ 1697.067309] ? downgrade_write+0x3a0/0x3a0 [ 1697.068188] ? open_exec+0x70/0x70 [ 1697.068923] ? memcpy+0x39/0x60 [ 1697.069609] ? copy_string_kernel+0x3b6/0x450 [ 1697.070572] do_execveat_common+0x76d/0x8d0 [ 1697.071471] ? bprm_execve+0x1b00/0x1b00 [ 1697.072351] __x64_sys_execveat+0xed/0x140 [ 1697.073237] do_syscall_64+0x33/0x40 [ 1697.074009] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1697.075072] RIP: 0033:0x7fe08a85eb19 [ 1697.075840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.079608] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1697.081168] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1697.082637] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1697.084095] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.085553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.087012] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:35:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 04:35:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5452, &(0x7f0000000540)={0x0, 0x3}) [ 1697.127881] FAULT_INJECTION: forcing a failure. [ 1697.127881] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.130318] CPU: 0 PID: 11227 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1697.131748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.133455] Call Trace: [ 1697.134010] dump_stack+0x107/0x167 [ 1697.134783] should_fail.cold+0x5/0xa [ 1697.135579] ? create_object.isra.0+0x3a/0xa20 [ 1697.136531] should_failslab+0x5/0x20 [ 1697.137318] kmem_cache_alloc+0x5b/0x360 [ 1697.138202] create_object.isra.0+0x3a/0xa20 [ 1697.139110] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1697.140166] kmem_cache_alloc_trace+0x151/0x360 [ 1697.141127] ? rwlock_bug.part.0+0x90/0x90 [ 1697.142016] alloc_fdtable+0x84/0x280 [ 1697.142833] dup_fd+0x722/0xcb0 [ 1697.143553] unshare_files+0x175/0x270 [ 1697.144349] ? __ia32_sys_unshare+0x40/0x40 [ 1697.145237] ? get_user_pages_remote+0x63/0x90 [ 1697.146181] ? get_user_pages_remote+0x6c/0x90 [ 1697.147127] bprm_execve+0x123/0x1b00 [ 1697.147916] ? acct_arg_size+0xe0/0xe0 [ 1697.148709] ? downgrade_write+0x3a0/0x3a0 [ 1697.149588] ? open_exec+0x70/0x70 [ 1697.150324] ? memcpy+0x39/0x60 [ 1697.151008] ? copy_string_kernel+0x3b6/0x450 [ 1697.151947] do_execveat_common+0x76d/0x8d0 [ 1697.152839] ? bprm_execve+0x1b00/0x1b00 [ 1697.153705] __x64_sys_execveat+0xed/0x140 [ 1697.154586] do_syscall_64+0x33/0x40 [ 1697.155353] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1697.156397] RIP: 0033:0x7fbe1f492b19 [ 1697.157159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.160904] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1697.162482] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1697.163933] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1697.165380] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.166831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.168277] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:35:54 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000540)) 04:35:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 04:35:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xffffff7f}) 04:35:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 04:35:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) [ 1697.328677] FAULT_INJECTION: forcing a failure. [ 1697.328677] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.331138] CPU: 1 PID: 11237 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1697.332541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.334253] Call Trace: [ 1697.334799] dump_stack+0x107/0x167 [ 1697.335545] should_fail.cold+0x5/0xa [ 1697.336327] ? kvmalloc_node+0x119/0x170 [ 1697.337159] should_failslab+0x5/0x20 [ 1697.337970] __kmalloc_node+0x76/0x4b0 [ 1697.338787] kvmalloc_node+0x119/0x170 [ 1697.339623] alloc_fdtable+0xd3/0x280 [ 1697.340416] dup_fd+0x722/0xcb0 [ 1697.341107] unshare_files+0x175/0x270 [ 1697.341895] ? __ia32_sys_unshare+0x40/0x40 [ 1697.342783] ? get_user_pages_remote+0x63/0x90 [ 1697.343699] ? get_user_pages_remote+0x6c/0x90 [ 1697.344631] bprm_execve+0x123/0x1b00 [ 1697.345405] ? acct_arg_size+0xe0/0xe0 [ 1697.346203] ? downgrade_write+0x3a0/0x3a0 [ 1697.347075] ? open_exec+0x70/0x70 [ 1697.347790] ? memcpy+0x39/0x60 [ 1697.348453] ? copy_string_kernel+0x3b6/0x450 [ 1697.349400] do_execveat_common+0x76d/0x8d0 [ 1697.350284] ? bprm_execve+0x1b00/0x1b00 [ 1697.351128] __x64_sys_execveat+0xed/0x140 [ 1697.351990] do_syscall_64+0x33/0x40 [ 1697.352766] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1697.353834] RIP: 0033:0x7fbe1f492b19 [ 1697.354622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.358427] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1697.359985] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1697.361437] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1697.362899] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.364354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.365799] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1697.380709] FAULT_INJECTION: forcing a failure. [ 1697.380709] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.383054] CPU: 0 PID: 11235 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1697.384432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1697.386103] Call Trace: [ 1697.386638] dump_stack+0x107/0x167 [ 1697.387376] should_fail.cold+0x5/0xa [ 1697.388142] ? security_prepare_creds+0x112/0x190 [ 1697.389142] should_failslab+0x5/0x20 [ 1697.389921] __kmalloc+0x72/0x3f0 [ 1697.390661] security_prepare_creds+0x112/0x190 [ 1697.391631] prepare_creds+0x458/0x5f0 [ 1697.392439] prepare_exec_creds+0xd/0x260 [ 1697.393299] bprm_execve+0x1e7/0x1b00 [ 1697.394110] ? acct_arg_size+0xe0/0xe0 [ 1697.394911] ? downgrade_write+0x3a0/0x3a0 [ 1697.395785] ? open_exec+0x70/0x70 [ 1697.396517] ? memcpy+0x39/0x60 [ 1697.397199] ? copy_string_kernel+0x3b6/0x450 [ 1697.398158] do_execveat_common+0x76d/0x8d0 [ 1697.399057] ? bprm_execve+0x1b00/0x1b00 [ 1697.399933] __x64_sys_execveat+0xed/0x140 [ 1697.400817] do_syscall_64+0x33/0x40 [ 1697.401586] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1697.402640] RIP: 0033:0x7fe08a85eb19 [ 1697.403407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.407068] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1697.408578] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1697.409983] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1697.411397] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.412813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.414245] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1711.152680] FAULT_INJECTION: forcing a failure. [ 1711.152680] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.155024] CPU: 1 PID: 11259 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1711.156446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.158135] Call Trace: [ 1711.158701] dump_stack+0x107/0x167 [ 1711.159460] should_fail.cold+0x5/0xa [ 1711.160245] ? create_object.isra.0+0x3a/0xa20 [ 1711.161207] should_failslab+0x5/0x20 [ 1711.161990] kmem_cache_alloc+0x5b/0x360 [ 1711.162837] create_object.isra.0+0x3a/0xa20 [ 1711.163753] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.164802] __kmalloc_node+0x1ae/0x4b0 [ 1711.165635] kvmalloc_node+0x119/0x170 [ 1711.166459] alloc_fdtable+0xd3/0x280 [ 1711.167241] dup_fd+0x722/0xcb0 [ 1711.167934] unshare_files+0x175/0x270 [ 1711.168741] ? __ia32_sys_unshare+0x40/0x40 [ 1711.169638] ? get_user_pages_remote+0x63/0x90 04:36:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 04:36:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5460, &(0x7f0000000540)={0x0, 0x3}) 04:36:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) 04:36:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0189436, &(0x7f0000000540)) 04:36:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 04:36:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) 04:36:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 15) 04:36:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) [ 1711.170620] ? get_user_pages_remote+0x6c/0x90 [ 1711.171693] bprm_execve+0x123/0x1b00 [ 1711.172470] ? acct_arg_size+0xe0/0xe0 [ 1711.173262] ? downgrade_write+0x3a0/0x3a0 [ 1711.174127] ? open_exec+0x70/0x70 [ 1711.174922] ? memcpy+0x39/0x60 [ 1711.175596] ? copy_string_kernel+0x3b6/0x450 [ 1711.176517] do_execveat_common+0x76d/0x8d0 [ 1711.177395] ? bprm_execve+0x1b00/0x1b00 [ 1711.178251] __x64_sys_execveat+0xed/0x140 [ 1711.179120] do_syscall_64+0x33/0x40 [ 1711.179872] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.180907] RIP: 0033:0x7fbe1f492b19 [ 1711.181670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.185401] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.186952] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1711.188399] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.189841] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.191296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.192750] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1711.213810] FAULT_INJECTION: forcing a failure. [ 1711.213810] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.216185] CPU: 0 PID: 11266 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1711.217607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.219315] Call Trace: [ 1711.219867] dump_stack+0x107/0x167 [ 1711.220626] should_fail.cold+0x5/0xa [ 1711.221424] ? kvmalloc_node+0x119/0x170 [ 1711.222291] should_failslab+0x5/0x20 [ 1711.223079] __kmalloc_node+0x76/0x4b0 [ 1711.223882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.224930] kvmalloc_node+0x119/0x170 [ 1711.225743] alloc_fdtable+0x13f/0x280 [ 1711.226557] dup_fd+0x722/0xcb0 [ 1711.227268] unshare_files+0x175/0x270 [ 1711.228080] ? __ia32_sys_unshare+0x40/0x40 [ 1711.228455] FAULT_INJECTION: forcing a failure. [ 1711.228455] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.228969] ? get_user_pages_remote+0x63/0x90 [ 1711.232307] ? get_user_pages_remote+0x6c/0x90 [ 1711.233256] bprm_execve+0x123/0x1b00 [ 1711.234205] ? acct_arg_size+0xe0/0xe0 [ 1711.235028] ? downgrade_write+0x3a0/0x3a0 [ 1711.235917] ? open_exec+0x70/0x70 [ 1711.236655] ? memcpy+0x39/0x60 [ 1711.237350] ? copy_string_kernel+0x3b6/0x450 [ 1711.238311] do_execveat_common+0x76d/0x8d0 [ 1711.239218] ? bprm_execve+0x1b00/0x1b00 [ 1711.240102] __x64_sys_execveat+0xed/0x140 [ 1711.240991] do_syscall_64+0x33/0x40 [ 1711.241764] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.242842] RIP: 0033:0x7f4478f33b19 [ 1711.243616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.247381] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.248951] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1711.250439] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.251903] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.253365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.254831] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1711.256361] CPU: 1 PID: 11268 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1711.257798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.258573] FAULT_INJECTION: forcing a failure. [ 1711.258573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1711.259496] Call Trace: [ 1711.259520] dump_stack+0x107/0x167 [ 1711.259543] should_fail.cold+0x5/0xa [ 1711.259565] ? create_object.isra.0+0x3a/0xa20 [ 1711.264828] should_failslab+0x5/0x20 [ 1711.265610] kmem_cache_alloc+0x5b/0x360 [ 1711.266455] create_object.isra.0+0x3a/0xa20 [ 1711.267361] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.268400] __kmalloc+0x16e/0x3f0 [ 1711.269137] security_prepare_creds+0x112/0x190 [ 1711.270085] prepare_creds+0x458/0x5f0 [ 1711.270890] prepare_exec_creds+0xd/0x260 [ 1711.271739] bprm_execve+0x1e7/0x1b00 [ 1711.272520] ? acct_arg_size+0xe0/0xe0 [ 1711.273311] ? downgrade_write+0x3a0/0x3a0 [ 1711.274174] ? open_exec+0x70/0x70 [ 1711.274931] ? memcpy+0x39/0x60 [ 1711.275612] ? copy_string_kernel+0x3b6/0x450 [ 1711.276535] do_execveat_common+0x76d/0x8d0 [ 1711.277442] ? bprm_execve+0x1b00/0x1b00 [ 1711.278297] __x64_sys_execveat+0xed/0x140 [ 1711.279162] do_syscall_64+0x33/0x40 [ 1711.279927] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.280971] RIP: 0033:0x7fe08a85eb19 [ 1711.281725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.285519] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.287113] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1711.288579] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.290027] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.291487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.292938] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1711.294433] CPU: 0 PID: 11272 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1711.295859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.297556] Call Trace: [ 1711.298110] dump_stack+0x107/0x167 [ 1711.298886] should_fail.cold+0x5/0xa [ 1711.299682] _copy_from_user+0x2e/0x1b0 [ 1711.300512] __copy_msghdr_from_user+0x91/0x4b0 [ 1711.301474] ? __ia32_sys_shutdown+0x80/0x80 [ 1711.302389] ? __lock_acquire+0x1657/0x5b00 [ 1711.303307] ___sys_recvmsg+0xd5/0x200 [ 1711.304114] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1711.305121] ? __lockdep_reset_lock+0x180/0x180 [ 1711.306080] ? lock_downgrade+0x6d0/0x6d0 [ 1711.306962] ? find_held_lock+0x2c/0x110 [ 1711.307808] ? __might_fault+0xd3/0x180 [ 1711.308640] ? lock_downgrade+0x6d0/0x6d0 [ 1711.309520] do_recvmmsg+0x24c/0x6d0 [ 1711.310309] ? ___sys_recvmsg+0x200/0x200 [ 1711.311158] ? lock_downgrade+0x6d0/0x6d0 [ 1711.312024] ? ksys_write+0x12d/0x260 [ 1711.312831] ? wait_for_completion+0x270/0x270 [ 1711.313776] ? rcu_read_lock_any_held+0x75/0xa0 [ 1711.314748] ? vfs_write+0x354/0xa30 [ 1711.315526] __x64_sys_recvmmsg+0x20f/0x260 [ 1711.316428] ? ksys_write+0x1a9/0x260 [ 1711.317218] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1711.318303] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1711.319384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1711.320448] do_syscall_64+0x33/0x40 [ 1711.321219] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.322284] RIP: 0033:0x7fd10da95b19 [ 1711.323050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.326800] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1711.328355] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1711.329844] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1711.331313] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.332777] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1711.334261] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 04:36:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40049409, &(0x7f0000000540)={0x0, 0x3}) 04:36:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f0000000540)) 04:36:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 04:36:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) [ 1711.495694] FAULT_INJECTION: forcing a failure. [ 1711.495694] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.498133] CPU: 0 PID: 11284 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1711.499612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.501322] Call Trace: [ 1711.501882] dump_stack+0x107/0x167 [ 1711.502670] should_fail.cold+0x5/0xa [ 1711.503467] ? __alloc_file+0x21/0x320 [ 1711.504275] should_failslab+0x5/0x20 [ 1711.505063] kmem_cache_alloc+0x5b/0x360 [ 1711.505920] __alloc_file+0x21/0x320 [ 1711.506716] alloc_empty_file+0x6d/0x170 [ 1711.507562] path_openat+0xde/0x26d0 [ 1711.508348] ? stack_trace_save+0x8c/0xc0 [ 1711.509203] ? stack_trace_consume_entry+0x160/0x160 [ 1711.510261] ? path_lookupat+0x860/0x860 [ 1711.511116] ? kasan_save_stack+0x32/0x40 [ 1711.511970] ? kasan_save_stack+0x1b/0x40 [ 1711.512826] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.513894] ? security_prepare_creds+0x112/0x190 [ 1711.514933] ? prepare_creds+0x458/0x5f0 [ 1711.515762] ? prepare_exec_creds+0xd/0x260 [ 1711.516700] do_filp_open+0x17e/0x3d0 [ 1711.517500] ? may_open_dev+0xf0/0xf0 [ 1711.518341] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1711.519384] ? perf_trace_lock+0x2bd/0x490 [ 1711.520311] ? find_held_lock+0x2c/0x110 [ 1711.521163] do_open_execat+0x116/0x690 [ 1711.521987] ? __ia32_sys_uselib+0x40/0x40 [ 1711.522868] ? do_raw_spin_lock+0x121/0x260 [ 1711.523761] ? rwlock_bug.part.0+0x90/0x90 [ 1711.524657] bprm_execve+0x5b6/0x1b00 [ 1711.525464] ? open_exec+0x70/0x70 [ 1711.526197] ? memcpy+0x39/0x60 [ 1711.526892] ? copy_string_kernel+0x3b6/0x450 [ 1711.527834] do_execveat_common+0x76d/0x8d0 [ 1711.528729] ? bprm_execve+0x1b00/0x1b00 [ 1711.529602] __x64_sys_execveat+0xed/0x140 [ 1711.530499] do_syscall_64+0x33/0x40 [ 1711.531266] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.532313] RIP: 0033:0x7fe08a85eb19 [ 1711.533078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.536827] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.538398] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1711.539857] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.541314] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.542779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.544236] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:36:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x1000000}) 04:36:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 04:36:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40086602, &(0x7f0000000540)={0x0, 0x3}) [ 1711.614267] FAULT_INJECTION: forcing a failure. [ 1711.614267] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.616598] CPU: 1 PID: 11291 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1711.618017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.619716] Call Trace: [ 1711.620266] dump_stack+0x107/0x167 [ 1711.621020] should_fail.cold+0x5/0xa [ 1711.621800] ? kvmalloc_node+0x119/0x170 [ 1711.622645] should_failslab+0x5/0x20 [ 1711.623419] __kmalloc_node+0x76/0x4b0 [ 1711.624221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.625259] kvmalloc_node+0x119/0x170 [ 1711.626053] alloc_fdtable+0x13f/0x280 [ 1711.626867] dup_fd+0x722/0xcb0 [ 1711.627557] unshare_files+0x175/0x270 [ 1711.628350] ? __ia32_sys_unshare+0x40/0x40 [ 1711.629231] ? get_user_pages_remote+0x63/0x90 [ 1711.630159] ? get_user_pages_remote+0x6c/0x90 [ 1711.631099] bprm_execve+0x123/0x1b00 [ 1711.631878] ? acct_arg_size+0xe0/0xe0 [ 1711.632666] ? downgrade_write+0x3a0/0x3a0 [ 1711.633530] ? open_exec+0x70/0x70 [ 1711.634285] ? memcpy+0x39/0x60 [ 1711.634970] ? copy_string_kernel+0x3b6/0x450 [ 1711.635913] do_execveat_common+0x76d/0x8d0 [ 1711.636804] ? bprm_execve+0x1b00/0x1b00 [ 1711.637659] __x64_sys_execveat+0xed/0x140 [ 1711.638547] do_syscall_64+0x33/0x40 [ 1711.639316] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.640413] RIP: 0033:0x7fbe1f492b19 [ 1711.641178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.644924] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.646489] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1711.647943] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.649395] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.650859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.652313] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1711.665774] FAULT_INJECTION: forcing a failure. [ 1711.665774] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.668121] CPU: 1 PID: 11296 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1711.669532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.671243] Call Trace: [ 1711.671789] dump_stack+0x107/0x167 [ 1711.672544] should_fail.cold+0x5/0xa [ 1711.673327] ? create_object.isra.0+0x3a/0xa20 [ 1711.674290] should_failslab+0x5/0x20 [ 1711.675070] kmem_cache_alloc+0x5b/0x360 [ 1711.675910] create_object.isra.0+0x3a/0xa20 [ 1711.676812] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1711.677855] __kmalloc_node+0x1ae/0x4b0 [ 1711.678691] kvmalloc_node+0x119/0x170 [ 1711.679498] alloc_fdtable+0x13f/0x280 [ 1711.680294] dup_fd+0x722/0xcb0 [ 1711.680991] unshare_files+0x175/0x270 [ 1711.681792] ? __ia32_sys_unshare+0x40/0x40 [ 1711.682693] ? get_user_pages_remote+0x63/0x90 [ 1711.683628] ? get_user_pages_remote+0x6c/0x90 [ 1711.684571] bprm_execve+0x123/0x1b00 [ 1711.685353] ? acct_arg_size+0xe0/0xe0 [ 1711.686150] ? downgrade_write+0x3a0/0x3a0 [ 1711.687042] ? open_exec+0x70/0x70 [ 1711.687775] ? memcpy+0x39/0x60 [ 1711.688454] ? copy_string_kernel+0x3b6/0x450 [ 1711.689385] do_execveat_common+0x76d/0x8d0 [ 1711.690279] ? bprm_execve+0x1b00/0x1b00 [ 1711.691130] __x64_sys_execveat+0xed/0x140 [ 1711.692004] do_syscall_64+0x33/0x40 [ 1711.692769] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.693818] RIP: 0033:0x7f4478f33b19 [ 1711.694595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.698383] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1711.699946] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1711.701408] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1711.702883] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.704349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1711.705814] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:36:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 16) [ 1711.762734] FAULT_INJECTION: forcing a failure. [ 1711.762734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1711.765183] CPU: 0 PID: 11303 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1711.766759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1711.768450] Call Trace: [ 1711.769000] dump_stack+0x107/0x167 [ 1711.769755] should_fail.cold+0x5/0xa [ 1711.770556] _copy_from_user+0x2e/0x1b0 [ 1711.771374] __copy_msghdr_from_user+0x91/0x4b0 [ 1711.772334] ? __ia32_sys_shutdown+0x80/0x80 [ 1711.773236] ? __lock_acquire+0x1657/0x5b00 [ 1711.774146] ___sys_recvmsg+0xd5/0x200 [ 1711.774955] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1711.775957] ? __lockdep_reset_lock+0x180/0x180 [ 1711.776909] ? lock_downgrade+0x6d0/0x6d0 [ 1711.777771] ? find_held_lock+0x2c/0x110 [ 1711.778634] ? __might_fault+0xd3/0x180 [ 1711.779449] ? lock_downgrade+0x6d0/0x6d0 [ 1711.780302] do_recvmmsg+0x24c/0x6d0 [ 1711.781070] ? ___sys_recvmsg+0x200/0x200 [ 1711.781922] ? lock_downgrade+0x6d0/0x6d0 [ 1711.782798] ? ksys_write+0x12d/0x260 [ 1711.783599] ? wait_for_completion+0x270/0x270 [ 1711.784544] ? rcu_read_lock_any_held+0x75/0xa0 [ 1711.785497] ? vfs_write+0x354/0xa30 [ 1711.786289] __x64_sys_recvmmsg+0x20f/0x260 [ 1711.787172] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1711.788230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1711.789316] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1711.790366] do_syscall_64+0x33/0x40 [ 1711.791129] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1711.792179] RIP: 0033:0x7fd10da95b19 [ 1711.792949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1711.796792] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1711.798361] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1711.799815] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1711.801276] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.802758] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1711.804218] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 04:36:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:36:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 04:36:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40087602, &(0x7f0000000540)={0x0, 0x3}) 04:36:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x1000000}) [ 1723.248340] FAULT_INJECTION: forcing a failure. [ 1723.248340] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.249861] CPU: 1 PID: 11320 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1723.250604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 04:36:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 04:36:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 17) [ 1723.251698] Call Trace: [ 1723.252211] dump_stack+0x107/0x167 [ 1723.252730] should_fail.cold+0x5/0xa [ 1723.253239] ? prepare_creds+0x25/0x5f0 [ 1723.253766] should_failslab+0x5/0x20 [ 1723.254269] kmem_cache_alloc+0x5b/0x360 [ 1723.254825] ? __ia32_sys_unshare+0x40/0x40 [ 1723.255394] prepare_creds+0x25/0x5f0 [ 1723.255898] prepare_exec_creds+0xd/0x260 [ 1723.256449] bprm_execve+0x1e7/0x1b00 [ 1723.256955] ? acct_arg_size+0xe0/0xe0 [ 1723.257471] ? downgrade_write+0x3a0/0x3a0 [ 1723.258027] ? open_exec+0x70/0x70 [ 1723.258506] ? memcpy+0x39/0x60 [ 1723.258942] ? copy_string_kernel+0x3b6/0x450 [ 1723.259542] do_execveat_common+0x76d/0x8d0 [ 1723.260113] ? bprm_execve+0x1b00/0x1b00 [ 1723.260662] __x64_sys_execveat+0xed/0x140 [ 1723.261230] do_syscall_64+0x33/0x40 [ 1723.261723] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.262416] RIP: 0033:0x7f4478f33b19 [ 1723.262908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.265331] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.266176] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1723.266965] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.267752] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.268527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1723.269243] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:36:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 04:36:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 04:36:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xfdfdffff}) [ 1723.296244] FAULT_INJECTION: forcing a failure. [ 1723.296244] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.298621] CPU: 0 PID: 11319 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1723.300054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.301764] Call Trace: [ 1723.302329] dump_stack+0x107/0x167 [ 1723.303112] should_fail.cold+0x5/0xa [ 1723.303910] ? create_object.isra.0+0x3a/0xa20 [ 1723.304855] should_failslab+0x5/0x20 [ 1723.305639] kmem_cache_alloc+0x5b/0x360 [ 1723.306513] create_object.isra.0+0x3a/0xa20 [ 1723.307410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.308461] kmem_cache_alloc+0x159/0x360 [ 1723.309344] __alloc_file+0x21/0x320 [ 1723.310115] alloc_empty_file+0x6d/0x170 [ 1723.310995] path_openat+0xde/0x26d0 [ 1723.311773] ? stack_trace_save+0x8c/0xc0 [ 1723.312632] ? stack_trace_consume_entry+0x160/0x160 [ 1723.313680] ? path_lookupat+0x860/0x860 [ 1723.314551] ? kasan_save_stack+0x32/0x40 [ 1723.315025] FAULT_INJECTION: forcing a failure. [ 1723.315025] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.315405] ? kasan_save_stack+0x1b/0x40 [ 1723.317436] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.318475] ? security_prepare_creds+0x112/0x190 [ 1723.319449] ? prepare_creds+0x458/0x5f0 [ 1723.320267] ? prepare_exec_creds+0xd/0x260 [ 1723.321158] do_filp_open+0x17e/0x3d0 [ 1723.321930] ? may_open_dev+0xf0/0xf0 [ 1723.322723] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1723.323751] ? perf_trace_lock+0x2bd/0x490 [ 1723.324659] ? find_held_lock+0x2c/0x110 [ 1723.325502] do_open_execat+0x116/0x690 [ 1723.326318] ? __ia32_sys_uselib+0x40/0x40 [ 1723.327196] ? do_raw_spin_lock+0x121/0x260 [ 1723.328074] ? rwlock_bug.part.0+0x90/0x90 [ 1723.328976] bprm_execve+0x5b6/0x1b00 [ 1723.329895] ? open_exec+0x70/0x70 [ 1723.330737] ? memcpy+0x39/0x60 [ 1723.331520] ? copy_string_kernel+0x3b6/0x450 [ 1723.332595] do_execveat_common+0x76d/0x8d0 [ 1723.333620] ? bprm_execve+0x1b00/0x1b00 [ 1723.334623] __x64_sys_execveat+0xed/0x140 [ 1723.335639] do_syscall_64+0x33/0x40 [ 1723.336516] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.337717] RIP: 0033:0x7fe08a85eb19 [ 1723.338616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.342864] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.344629] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1723.346270] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.347921] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.349563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1723.351224] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1723.352922] CPU: 1 PID: 11331 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1723.353655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.354527] Call Trace: [ 1723.354815] dump_stack+0x107/0x167 [ 1723.355181] should_fail.cold+0x5/0xa [ 1723.355593] ? getname_flags.part.0+0x50/0x4f0 [ 1723.356094] should_failslab+0x5/0x20 [ 1723.356511] kmem_cache_alloc+0x5b/0x360 [ 1723.356962] getname_flags.part.0+0x50/0x4f0 [ 1723.357453] getname_flags+0x9a/0xe0 [ 1723.357854] __x64_sys_execveat+0xd6/0x140 [ 1723.358316] do_syscall_64+0x33/0x40 [ 1723.358733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.359290] RIP: 0033:0x7f21a736cb19 [ 1723.359699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.361658] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.362478] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1723.363232] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.364000] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.364715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1723.365432] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1723.367498] FAULT_INJECTION: forcing a failure. [ 1723.367498] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.368689] CPU: 1 PID: 11324 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1723.369431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.370332] Call Trace: [ 1723.370631] dump_stack+0x107/0x167 [ 1723.371028] should_fail.cold+0x5/0xa [ 1723.371447] ? create_object.isra.0+0x3a/0xa20 [ 1723.371939] should_failslab+0x5/0x20 [ 1723.372357] kmem_cache_alloc+0x5b/0x360 [ 1723.372811] create_object.isra.0+0x3a/0xa20 [ 1723.373288] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.373847] __kmalloc_node+0x1ae/0x4b0 [ 1723.374299] kvmalloc_node+0x119/0x170 [ 1723.374735] alloc_fdtable+0x13f/0x280 [ 1723.375161] dup_fd+0x722/0xcb0 [ 1723.375525] unshare_files+0x175/0x270 [ 1723.375960] ? __ia32_sys_unshare+0x40/0x40 [ 1723.376434] ? get_user_pages_remote+0x63/0x90 [ 1723.376925] ? get_user_pages_remote+0x6c/0x90 [ 1723.377425] bprm_execve+0x123/0x1b00 [ 1723.377845] ? acct_arg_size+0xe0/0xe0 [ 1723.378263] ? downgrade_write+0x3a0/0x3a0 [ 1723.378751] ? open_exec+0x70/0x70 [ 1723.379145] ? memcpy+0x39/0x60 [ 1723.379502] ? copy_string_kernel+0x3b6/0x450 [ 1723.380008] do_execveat_common+0x76d/0x8d0 [ 1723.380473] ? bprm_execve+0x1b00/0x1b00 [ 1723.380924] __x64_sys_execveat+0xed/0x140 [ 1723.381381] do_syscall_64+0x33/0x40 [ 1723.381795] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.382352] RIP: 0033:0x7fbe1f492b19 [ 1723.382763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.384725] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.385558] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1723.386319] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.387102] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.387881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1723.388650] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:36:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfdfdffff}) [ 1723.431513] FAULT_INJECTION: forcing a failure. [ 1723.431513] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1723.434131] CPU: 0 PID: 11339 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1723.435648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.437450] Call Trace: [ 1723.438028] dump_stack+0x107/0x167 [ 1723.438849] should_fail.cold+0x5/0xa [ 1723.439688] _copy_from_user+0x2e/0x1b0 [ 1723.440563] __copy_msghdr_from_user+0x91/0x4b0 [ 1723.441571] ? __ia32_sys_shutdown+0x80/0x80 [ 1723.442540] ? __lock_acquire+0x1657/0x5b00 [ 1723.443488] ___sys_recvmsg+0xd5/0x200 [ 1723.444326] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1723.445387] ? __lockdep_reset_lock+0x180/0x180 [ 1723.446397] ? lock_downgrade+0x6d0/0x6d0 [ 1723.447297] ? find_held_lock+0x2c/0x110 [ 1723.448174] ? __might_fault+0xd3/0x180 [ 1723.449016] ? lock_downgrade+0x6d0/0x6d0 [ 1723.449917] do_recvmmsg+0x24c/0x6d0 [ 1723.450735] ? ___sys_recvmsg+0x200/0x200 [ 1723.451621] ? lock_downgrade+0x6d0/0x6d0 [ 1723.452513] ? ksys_write+0x12d/0x260 [ 1723.453334] ? wait_for_completion+0x270/0x270 [ 1723.454306] ? rcu_read_lock_any_held+0x75/0xa0 [ 1723.455296] ? vfs_write+0x354/0xa30 [ 1723.456092] __x64_sys_recvmmsg+0x20f/0x260 [ 1723.457007] ? ksys_write+0x1a9/0x260 [ 1723.457820] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1723.458921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1723.460036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1723.461155] do_syscall_64+0x33/0x40 [ 1723.461943] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.463061] RIP: 0033:0x7fd10da95b19 [ 1723.463852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.467806] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1723.469426] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1723.470971] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1723.472492] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.474013] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1723.475554] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 [ 1723.514220] FAULT_INJECTION: forcing a failure. [ 1723.514220] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.515427] CPU: 1 PID: 11347 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1723.516113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.516934] Call Trace: [ 1723.517205] dump_stack+0x107/0x167 [ 1723.517576] should_fail.cold+0x5/0xa [ 1723.517962] ? create_object.isra.0+0x3a/0xa20 [ 1723.518436] should_failslab+0x5/0x20 [ 1723.518820] kmem_cache_alloc+0x5b/0x360 [ 1723.519230] create_object.isra.0+0x3a/0xa20 [ 1723.519675] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.520280] kmem_cache_alloc+0x159/0x360 [ 1723.520710] getname_flags.part.0+0x50/0x4f0 [ 1723.521190] getname_flags+0x9a/0xe0 [ 1723.521574] __x64_sys_execveat+0xd6/0x140 [ 1723.522047] do_syscall_64+0x33/0x40 [ 1723.522442] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.522955] RIP: 0033:0x7f21a736cb19 [ 1723.523363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.525257] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.526049] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1723.526815] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.527552] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 04:36:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 04:36:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xfffffdfd}) 04:36:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 1723.528294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1723.529320] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:36:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4020940d, &(0x7f0000000540)={0x0, 0x3}) 04:36:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) [ 1723.596619] FAULT_INJECTION: forcing a failure. [ 1723.596619] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.597900] CPU: 1 PID: 11351 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1723.598654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.599561] Call Trace: [ 1723.599857] dump_stack+0x107/0x167 [ 1723.600250] should_fail.cold+0x5/0xa [ 1723.600670] ? security_file_alloc+0x34/0x170 [ 1723.601149] should_failslab+0x5/0x20 [ 1723.601570] kmem_cache_alloc+0x5b/0x360 [ 1723.602017] security_file_alloc+0x34/0x170 [ 1723.602514] __alloc_file+0xb6/0x320 [ 1723.602919] alloc_empty_file+0x6d/0x170 [ 1723.603360] path_openat+0xde/0x26d0 [ 1723.603767] ? lock_chain_count+0x20/0x20 [ 1723.604212] ? stack_trace_save+0x8c/0xc0 [ 1723.604660] ? stack_trace_consume_entry+0x160/0x160 [ 1723.605203] ? path_lookupat+0x860/0x860 [ 1723.605651] ? kasan_save_stack+0x32/0x40 [ 1723.606100] ? kasan_save_stack+0x1b/0x40 [ 1723.606549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.607097] ? security_prepare_creds+0x112/0x190 [ 1723.607610] ? prepare_creds+0x458/0x5f0 [ 1723.608041] ? prepare_exec_creds+0xd/0x260 [ 1723.608512] ? bprm_execve+0x1e7/0x1b00 [ 1723.608940] do_filp_open+0x17e/0x3d0 [ 1723.609353] ? may_open_dev+0xf0/0xf0 [ 1723.609775] ? perf_trace_lock+0xac/0x490 [ 1723.610228] ? perf_trace_lock+0xac/0x490 [ 1723.610699] ? find_held_lock+0x2c/0x110 [ 1723.611146] do_open_execat+0x116/0x690 [ 1723.611582] ? __ia32_sys_uselib+0x40/0x40 [ 1723.612046] ? do_raw_spin_lock+0x121/0x260 [ 1723.612515] ? rwlock_bug.part.0+0x90/0x90 [ 1723.612976] bprm_execve+0x5b6/0x1b00 [ 1723.613415] ? open_exec+0x70/0x70 [ 1723.613796] ? memcpy+0x39/0x60 [ 1723.614156] ? copy_string_kernel+0x3b6/0x450 [ 1723.614660] do_execveat_common+0x76d/0x8d0 [ 1723.615123] ? bprm_execve+0x1b00/0x1b00 [ 1723.615579] __x64_sys_execveat+0xed/0x140 [ 1723.616040] do_syscall_64+0x33/0x40 [ 1723.616453] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.617023] RIP: 0033:0x7fe08a85eb19 [ 1723.617425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.619420] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.620266] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1723.621034] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.621799] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.622588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1723.623357] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1723.630580] FAULT_INJECTION: forcing a failure. [ 1723.630580] name failslab, interval 1, probability 0, space 0, times 0 [ 1723.633172] CPU: 0 PID: 11356 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1723.634701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.636507] Call Trace: [ 1723.637098] dump_stack+0x107/0x167 [ 1723.637909] should_fail.cold+0x5/0xa [ 1723.638769] ? create_object.isra.0+0x3a/0xa20 [ 1723.639777] should_failslab+0x5/0x20 [ 1723.640614] kmem_cache_alloc+0x5b/0x360 [ 1723.641530] create_object.isra.0+0x3a/0xa20 [ 1723.642503] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1723.643621] kmem_cache_alloc+0x159/0x360 [ 1723.644557] prepare_creds+0x25/0x5f0 [ 1723.645388] prepare_exec_creds+0xd/0x260 [ 1723.646310] bprm_execve+0x1e7/0x1b00 [ 1723.647154] ? acct_arg_size+0xe0/0xe0 [ 1723.648008] ? downgrade_write+0x3a0/0x3a0 [ 1723.648951] ? open_exec+0x70/0x70 [ 1723.649738] ? memcpy+0x39/0x60 [ 1723.650488] ? copy_string_kernel+0x3b6/0x450 [ 1723.651502] do_execveat_common+0x76d/0x8d0 [ 1723.652460] ? bprm_execve+0x1b00/0x1b00 [ 1723.653400] __x64_sys_execveat+0xed/0x140 [ 1723.654354] do_syscall_64+0x33/0x40 [ 1723.655187] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1723.656309] RIP: 0033:0x7f4478f33b19 [ 1723.657128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1723.661082] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1723.662753] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1723.664312] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1723.665871] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1723.667450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1723.669019] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:36:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 04:36:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) 04:36:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 3) 04:36:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 04:36:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 18) 04:36:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xffffff7f}) 04:36:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffdfd}) 04:36:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40305828, &(0x7f0000000540)={0x0, 0x3}) [ 1738.012331] FAULT_INJECTION: forcing a failure. [ 1738.012331] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1738.015059] CPU: 0 PID: 11371 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1738.016643] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.018544] Call Trace: [ 1738.019183] dump_stack+0x107/0x167 [ 1738.020036] should_fail.cold+0x5/0xa [ 1738.020926] strncpy_from_user+0x34/0x470 [ 1738.021894] getname_flags.part.0+0x95/0x4f0 [ 1738.022929] getname_flags+0x9a/0xe0 [ 1738.023800] __x64_sys_execveat+0xd6/0x140 [ 1738.024780] do_syscall_64+0x33/0x40 [ 1738.025639] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.025694] FAULT_INJECTION: forcing a failure. [ 1738.025694] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.026811] RIP: 0033:0x7f21a736cb19 [ 1738.026836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.026855] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.035698] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1738.037305] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.038933] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.040546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1738.042150] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1738.043840] CPU: 1 PID: 11376 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1738.045176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.046776] Call Trace: [ 1738.047283] dump_stack+0x107/0x167 [ 1738.047977] should_fail.cold+0x5/0xa [ 1738.048713] ? security_prepare_creds+0x112/0x190 [ 1738.049641] should_failslab+0x5/0x20 [ 1738.050370] __kmalloc+0x72/0x3f0 [ 1738.051055] security_prepare_creds+0x112/0x190 [ 1738.051945] prepare_creds+0x458/0x5f0 [ 1738.052687] prepare_exec_creds+0xd/0x260 [ 1738.053480] bprm_execve+0x1e7/0x1b00 [ 1738.054210] ? acct_arg_size+0xe0/0xe0 [ 1738.054984] ? downgrade_write+0x3a0/0x3a0 [ 1738.055791] ? open_exec+0x70/0x70 [ 1738.056474] ? memcpy+0x39/0x60 [ 1738.057102] ? copy_string_kernel+0x3b6/0x450 [ 1738.057984] do_execveat_common+0x76d/0x8d0 [ 1738.058823] ? bprm_execve+0x1b00/0x1b00 [ 1738.059621] __x64_sys_execveat+0xed/0x140 [ 1738.060433] do_syscall_64+0x33/0x40 [ 1738.061148] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.062122] RIP: 0033:0x7f4478f33b19 [ 1738.062857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.066371] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.067837] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1738.069199] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.070555] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.071917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.073272] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1738.090244] FAULT_INJECTION: forcing a failure. [ 1738.090244] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.092937] CPU: 0 PID: 11377 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1738.094487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.096350] Call Trace: [ 1738.096959] dump_stack+0x107/0x167 [ 1738.097789] should_fail.cold+0x5/0xa [ 1738.098680] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1738.099856] should_failslab+0x5/0x20 [ 1738.100708] __kmalloc_node+0x76/0x4b0 [ 1738.101584] ? lock_downgrade+0x6d0/0x6d0 [ 1738.102530] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1738.103679] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 1738.104805] ? trace_hardirqs_on+0x5b/0x180 [ 1738.105783] __kmalloc_node+0x1c6/0x4b0 [ 1738.106721] kvmalloc_node+0x119/0x170 [ 1738.107600] alloc_fdtable+0x13f/0x280 [ 1738.108481] dup_fd+0x722/0xcb0 [ 1738.109263] unshare_files+0x175/0x270 [ 1738.110139] ? __ia32_sys_unshare+0x40/0x40 [ 1738.111144] ? get_user_pages_remote+0x63/0x90 [ 1738.112164] ? get_user_pages_remote+0x6c/0x90 [ 1738.113198] bprm_execve+0x123/0x1b00 [ 1738.114059] ? acct_arg_size+0xe0/0xe0 [ 1738.114937] ? downgrade_write+0x3a0/0x3a0 [ 1738.115919] ? open_exec+0x70/0x70 [ 1738.116719] ? memcpy+0x39/0x60 [ 1738.117468] ? copy_string_kernel+0x3b6/0x450 [ 1738.118500] do_execveat_common+0x76d/0x8d0 [ 1738.119496] ? bprm_execve+0x1b00/0x1b00 [ 1738.120447] __x64_sys_execveat+0xed/0x140 [ 1738.121413] do_syscall_64+0x33/0x40 [ 1738.122251] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.123416] RIP: 0033:0x7fbe1f492b19 [ 1738.124259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.128322] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.130029] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1738.131629] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.133200] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.134789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.136364] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1738.148961] FAULT_INJECTION: forcing a failure. [ 1738.148961] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.151538] CPU: 0 PID: 11378 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1738.153074] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.154917] Call Trace: [ 1738.155513] dump_stack+0x107/0x167 [ 1738.156348] should_fail.cold+0x5/0xa [ 1738.157225] ? create_object.isra.0+0x3a/0xa20 [ 1738.158293] should_failslab+0x5/0x20 [ 1738.159186] kmem_cache_alloc+0x5b/0x360 [ 1738.160139] create_object.isra.0+0x3a/0xa20 [ 1738.161147] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 04:36:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xffffff7f}) [ 1738.162329] kmem_cache_alloc+0x159/0x360 [ 1738.163532] __alloc_file+0x21/0x320 [ 1738.164436] alloc_empty_file+0x6d/0x170 [ 1738.165404] path_openat+0xde/0x26d0 [ 1738.166299] ? stack_trace_save+0x8c/0xc0 [ 1738.167311] ? stack_trace_consume_entry+0x160/0x160 [ 1738.168508] ? path_lookupat+0x860/0x860 [ 1738.169494] ? kasan_save_stack+0x32/0x40 04:36:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 4) [ 1738.170489] ? kasan_save_stack+0x1b/0x40 [ 1738.171537] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1738.172761] ? security_prepare_creds+0x112/0x190 [ 1738.173950] ? prepare_creds+0x458/0x5f0 [ 1738.174981] ? prepare_exec_creds+0xd/0x260 [ 1738.176058] do_filp_open+0x17e/0x3d0 [ 1738.176997] ? may_open_dev+0xf0/0xf0 [ 1738.177947] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1738.179195] ? perf_trace_lock+0x2bd/0x490 [ 1738.180303] ? find_held_lock+0x2c/0x110 [ 1738.181307] do_open_execat+0x116/0x690 [ 1738.182270] ? __ia32_sys_uselib+0x40/0x40 [ 1738.183287] ? do_raw_spin_lock+0x121/0x260 [ 1738.184349] ? rwlock_bug.part.0+0x90/0x90 [ 1738.185401] bprm_execve+0x5b6/0x1b00 [ 1738.186356] ? open_exec+0x70/0x70 [ 1738.187260] ? memcpy+0x39/0x60 [ 1738.188069] ? copy_string_kernel+0x3b6/0x450 [ 1738.189165] do_execveat_common+0x76d/0x8d0 [ 1738.190225] ? bprm_execve+0x1b00/0x1b00 [ 1738.191271] __x64_sys_execveat+0xed/0x140 [ 1738.192255] do_syscall_64+0x33/0x40 [ 1738.193101] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.194257] RIP: 0033:0x7fe08a85eb19 [ 1738.195121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.199242] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.200951] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1738.202556] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.204169] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.205771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.207393] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:36:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 1738.216865] FAULT_INJECTION: forcing a failure. [ 1738.216865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1738.219567] CPU: 0 PID: 11382 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1738.221121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.222976] Call Trace: [ 1738.223567] dump_stack+0x107/0x167 [ 1738.224381] should_fail.cold+0x5/0xa [ 1738.225235] _copy_from_user+0x2e/0x1b0 [ 1738.226127] __copy_msghdr_from_user+0x91/0x4b0 [ 1738.227182] ? __ia32_sys_shutdown+0x80/0x80 [ 1738.228160] ? __lock_acquire+0x1657/0x5b00 [ 1738.229136] ___sys_recvmsg+0xd5/0x200 [ 1738.230001] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1738.231094] ? __lockdep_reset_lock+0x180/0x180 [ 1738.232130] ? lock_downgrade+0x6d0/0x6d0 [ 1738.233057] ? find_held_lock+0x2c/0x110 [ 1738.233964] ? __might_fault+0xd3/0x180 [ 1738.234852] ? lock_downgrade+0x6d0/0x6d0 [ 1738.235799] do_recvmmsg+0x24c/0x6d0 [ 1738.236629] ? ___sys_recvmsg+0x200/0x200 [ 1738.237549] ? lock_downgrade+0x6d0/0x6d0 [ 1738.238479] ? ksys_write+0x12d/0x260 [ 1738.239361] ? wait_for_completion+0x270/0x270 [ 1738.240378] ? rcu_read_lock_any_held+0x75/0xa0 [ 1738.241403] ? vfs_write+0x354/0xa30 [ 1738.242234] __x64_sys_recvmmsg+0x20f/0x260 [ 1738.243204] ? ksys_write+0x1a9/0x260 [ 1738.244049] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1738.245201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1738.246390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.247554] do_syscall_64+0x33/0x40 [ 1738.248392] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.249517] RIP: 0033:0x7fd10da95b19 [ 1738.250338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.254374] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1738.256059] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1738.257612] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1738.259176] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.260738] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1738.262300] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 [ 1738.279873] FAULT_INJECTION: forcing a failure. [ 1738.279873] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.282368] CPU: 0 PID: 11390 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1738.283880] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.285676] Call Trace: [ 1738.286260] dump_stack+0x107/0x167 [ 1738.287080] should_fail.cold+0x5/0xa [ 1738.287927] ? create_object.isra.0+0x3a/0xa20 [ 1738.288270] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1738.288927] should_failslab+0x5/0x20 [ 1738.288951] kmem_cache_alloc+0x5b/0x360 [ 1738.292042] create_object.isra.0+0x3a/0xa20 [ 1738.293007] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1738.294124] __kmalloc+0x16e/0x3f0 [ 1738.294937] security_prepare_creds+0x112/0x190 [ 1738.295968] prepare_creds+0x458/0x5f0 [ 1738.296834] prepare_exec_creds+0xd/0x260 [ 1738.297741] bprm_execve+0x1e7/0x1b00 [ 1738.298598] ? acct_arg_size+0xe0/0xe0 [ 1738.299452] ? downgrade_write+0x3a0/0x3a0 [ 1738.300384] ? open_exec+0x70/0x70 [ 1738.301163] ? memcpy+0x39/0x60 [ 1738.301892] ? copy_string_kernel+0x3b6/0x450 [ 1738.302899] do_execveat_common+0x76d/0x8d0 [ 1738.303852] ? bprm_execve+0x1b00/0x1b00 [ 1738.304785] __x64_sys_execveat+0xed/0x140 [ 1738.305723] do_syscall_64+0x33/0x40 [ 1738.306538] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.307666] RIP: 0033:0x7f4478f33b19 [ 1738.308507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.312573] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.314250] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1738.315822] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.317391] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.318979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.320553] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:36:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) [ 1738.347506] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1738.365873] FAULT_INJECTION: forcing a failure. [ 1738.365873] name failslab, interval 1, probability 0, space 0, times 0 04:36:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) [ 1738.368306] CPU: 0 PID: 11394 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1738.370035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.371901] Call Trace: [ 1738.372526] dump_stack+0x107/0x167 [ 1738.373363] should_fail.cold+0x5/0xa [ 1738.374247] ? alloc_bprm+0x51/0x8f0 [ 1738.375105] should_failslab+0x5/0x20 [ 1738.375984] kmem_cache_alloc_trace+0x55/0x360 [ 1738.376999] ? lock_downgrade+0x6d0/0x6d0 [ 1738.377929] alloc_bprm+0x51/0x8f0 [ 1738.378764] do_execveat_common+0x270/0x8d0 [ 1738.379726] ? strncpy_from_user+0x9e/0x470 [ 1738.380705] ? bprm_execve+0x1b00/0x1b00 [ 1738.381677] __x64_sys_execveat+0xed/0x140 [ 1738.382665] do_syscall_64+0x33/0x40 [ 1738.383508] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.384665] RIP: 0033:0x7f21a736cb19 [ 1738.385508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.389557] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.391155] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1738.392627] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.394179] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.395552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1738.396821] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:36:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 19) 04:36:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 04:36:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 04:36:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 5) 04:36:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40305829, &(0x7f0000000540)={0x0, 0x3}) 04:36:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) [ 1738.595010] FAULT_INJECTION: forcing a failure. [ 1738.595010] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.597649] CPU: 1 PID: 11413 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1738.599228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.601100] Call Trace: [ 1738.601704] dump_stack+0x107/0x167 [ 1738.602536] should_fail.cold+0x5/0xa [ 1738.603421] ? create_object.isra.0+0x3a/0xa20 [ 1738.604467] should_failslab+0x5/0x20 [ 1738.605330] kmem_cache_alloc+0x5b/0x360 [ 1738.606265] create_object.isra.0+0x3a/0xa20 [ 1738.607283] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1738.608441] kmem_cache_alloc_trace+0x151/0x360 [ 1738.609500] ? lock_downgrade+0x6d0/0x6d0 [ 1738.610466] alloc_bprm+0x51/0x8f0 [ 1738.611297] do_execveat_common+0x270/0x8d0 [ 1738.612290] ? strncpy_from_user+0x9e/0x470 [ 1738.613296] ? bprm_execve+0x1b00/0x1b00 [ 1738.614247] __x64_sys_execveat+0xed/0x140 [ 1738.615240] do_syscall_64+0x33/0x40 [ 1738.616098] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.617271] RIP: 0033:0x7f21a736cb19 [ 1738.618126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.622330] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.624078] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1738.625708] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.627371] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.628996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1738.630643] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1738.644821] FAULT_INJECTION: forcing a failure. [ 1738.644821] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.647402] CPU: 1 PID: 11414 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1738.648979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.650872] Call Trace: [ 1738.651483] dump_stack+0x107/0x167 [ 1738.652329] should_fail.cold+0x5/0xa [ 1738.653206] ? kvmalloc_node+0x119/0x170 [ 1738.654135] should_failslab+0x5/0x20 [ 1738.655024] __kmalloc_node+0x76/0x4b0 [ 1738.655924] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1738.657084] kvmalloc_node+0x119/0x170 [ 1738.657964] alloc_fdtable+0x13f/0x280 [ 1738.658861] dup_fd+0x722/0xcb0 [ 1738.659630] unshare_files+0x175/0x270 [ 1738.660507] ? __ia32_sys_unshare+0x40/0x40 [ 1738.661483] ? get_user_pages_remote+0x63/0x90 [ 1738.662508] ? get_user_pages_remote+0x6c/0x90 [ 1738.663559] bprm_execve+0x123/0x1b00 [ 1738.664423] ? acct_arg_size+0xe0/0xe0 [ 1738.665303] ? downgrade_write+0x3a0/0x3a0 [ 1738.666263] ? open_exec+0x70/0x70 [ 1738.667076] ? memcpy+0x39/0x60 [ 1738.667826] ? copy_string_kernel+0x3b6/0x450 [ 1738.668853] do_execveat_common+0x76d/0x8d0 [ 1738.669840] ? bprm_execve+0x1b00/0x1b00 [ 1738.670803] __x64_sys_execveat+0xed/0x140 [ 1738.671779] do_syscall_64+0x33/0x40 [ 1738.672633] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.673799] RIP: 0033:0x7fbe1f492b19 [ 1738.674657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.678868] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.680597] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1738.682222] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.683858] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.685481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.687108] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1738.691102] FAULT_INJECTION: forcing a failure. [ 1738.691102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1738.693819] CPU: 1 PID: 11422 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1738.695427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.697342] Call Trace: [ 1738.697955] dump_stack+0x107/0x167 [ 1738.698816] should_fail.cold+0x5/0xa [ 1738.699707] _copy_from_user+0x2e/0x1b0 [ 1738.700632] __copy_msghdr_from_user+0x91/0x4b0 [ 1738.701699] ? __ia32_sys_shutdown+0x80/0x80 [ 1738.702725] ? __lock_acquire+0x1657/0x5b00 [ 1738.703737] ___sys_recvmsg+0xd5/0x200 [ 1738.704511] FAULT_INJECTION: forcing a failure. [ 1738.704511] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.704627] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1738.707438] ? __lockdep_reset_lock+0x180/0x180 [ 1738.708500] ? lock_downgrade+0x6d0/0x6d0 [ 1738.709455] ? find_held_lock+0x2c/0x110 [ 1738.710389] ? __might_fault+0xd3/0x180 [ 1738.711315] ? lock_downgrade+0x6d0/0x6d0 [ 1738.712283] do_recvmmsg+0x24c/0x6d0 [ 1738.713139] ? ___sys_recvmsg+0x200/0x200 [ 1738.714085] ? lock_downgrade+0x6d0/0x6d0 [ 1738.715051] ? ksys_write+0x12d/0x260 [ 1738.715937] ? wait_for_completion+0x270/0x270 [ 1738.716988] ? rcu_read_lock_any_held+0x75/0xa0 [ 1738.718045] ? vfs_write+0x354/0xa30 [ 1738.718911] __x64_sys_recvmmsg+0x20f/0x260 [ 1738.719896] ? ksys_write+0x1a9/0x260 [ 1738.720768] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1738.721949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1738.723182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1738.724349] do_syscall_64+0x33/0x40 [ 1738.725207] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.726366] RIP: 0033:0x7fd10da95b19 [ 1738.727223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.731370] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1738.733086] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1738.734700] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1738.736308] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.737916] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1738.739532] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 [ 1738.741168] CPU: 0 PID: 11420 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1738.742075] FAULT_INJECTION: forcing a failure. [ 1738.742075] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.742222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.742228] Call Trace: [ 1738.742246] dump_stack+0x107/0x167 [ 1738.742270] should_fail.cold+0x5/0xa [ 1738.742288] ? create_object.isra.0+0x3a/0xa20 [ 1738.748368] should_failslab+0x5/0x20 [ 1738.748942] kmem_cache_alloc+0x5b/0x360 [ 1738.749570] create_object.isra.0+0x3a/0xa20 [ 1738.750233] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1738.751018] kmem_cache_alloc+0x159/0x360 [ 1738.751659] prepare_creds+0x25/0x5f0 [ 1738.752239] prepare_exec_creds+0xd/0x260 [ 1738.752864] bprm_execve+0x1e7/0x1b00 [ 1738.753445] ? acct_arg_size+0xe0/0xe0 [ 1738.754032] ? downgrade_write+0x3a0/0x3a0 [ 1738.754686] ? open_exec+0x70/0x70 [ 1738.755227] ? memcpy+0x39/0x60 [ 1738.755732] ? copy_string_kernel+0x3b6/0x450 [ 1738.756423] do_execveat_common+0x76d/0x8d0 [ 1738.757087] ? bprm_execve+0x1b00/0x1b00 [ 1738.757730] __x64_sys_execveat+0xed/0x140 [ 1738.758378] do_syscall_64+0x33/0x40 [ 1738.758951] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.759721] RIP: 0033:0x7f4478f33b19 [ 1738.760283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.763050] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.764196] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1738.765261] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.766313] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.767378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.768431] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1738.769532] CPU: 1 PID: 11418 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1738.771087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1738.772932] Call Trace: [ 1738.773541] dump_stack+0x107/0x167 [ 1738.774356] should_fail.cold+0x5/0xa [ 1738.775218] ? jbd2__journal_start+0x190/0x890 [ 1738.776240] should_failslab+0x5/0x20 [ 1738.777088] kmem_cache_alloc+0x5b/0x360 [ 1738.778006] jbd2__journal_start+0x190/0x890 [ 1738.779006] __ext4_journal_start_sb+0x214/0x430 [ 1738.780072] ext4_dirty_inode+0xbc/0x130 [ 1738.780977] ? ext4_setattr+0x22c0/0x22c0 [ 1738.781900] __mark_inode_dirty+0x492/0xf10 [ 1738.782892] touch_atime+0x5a4/0x6a0 [ 1738.783722] ? atime_needs_update+0x600/0x600 [ 1738.784715] ? pagecache_get_page+0x243/0xc80 [ 1738.785713] generic_file_buffered_read+0x18f3/0x28f0 [ 1738.786883] ? pagecache_get_page+0xc80/0xc80 [ 1738.787874] ? __lock_acquire+0xbb1/0x5b00 [ 1738.788818] generic_file_read_iter+0x33f/0x490 [ 1738.789854] ext4_file_read_iter+0x184/0x4c0 [ 1738.790850] __kernel_read+0x593/0xaa0 [ 1738.791712] ? __x64_sys_sendfile+0x220/0x220 [ 1738.792703] ? _cond_resched+0x12/0x80 [ 1738.793566] ? avc_policy_seqno+0x9/0x70 [ 1738.794463] ? selinux_file_permission+0x36/0x510 [ 1738.795544] ? lock_downgrade+0x6d0/0x6d0 [ 1738.796477] kernel_read+0x52/0x70 [ 1738.797265] bprm_execve+0x8da/0x1b00 [ 1738.798119] ? open_exec+0x70/0x70 [ 1738.798911] ? memcpy+0x39/0x60 [ 1738.799645] ? copy_string_kernel+0x3b6/0x450 [ 1738.800646] do_execveat_common+0x76d/0x8d0 [ 1738.801605] ? bprm_execve+0x1b00/0x1b00 [ 1738.802524] __x64_sys_execveat+0xed/0x140 [ 1738.803478] do_syscall_64+0x33/0x40 [ 1738.804292] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1738.805410] RIP: 0033:0x7fe08a85eb19 [ 1738.806224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1738.810255] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1738.811917] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1738.813470] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1738.815040] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1738.816596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1738.818145] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1750.261269] FAULT_INJECTION: forcing a failure. [ 1750.261269] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.263871] CPU: 0 PID: 11433 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1750.265396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.267230] Call Trace: [ 1750.267819] dump_stack+0x107/0x167 [ 1750.268630] should_fail.cold+0x5/0xa [ 1750.269489] ? mm_alloc+0x19/0xc0 [ 1750.270264] should_failslab+0x5/0x20 [ 1750.271123] kmem_cache_alloc+0x5b/0x360 [ 1750.272018] ? kasan_unpoison_shadow+0x33/0x50 [ 1750.273042] mm_alloc+0x19/0xc0 [ 1750.273776] alloc_bprm+0x1cb/0x8f0 [ 1750.274601] do_execveat_common+0x270/0x8d0 [ 1750.275565] ? strncpy_from_user+0x9e/0x470 [ 1750.276519] ? bprm_execve+0x1b00/0x1b00 [ 1750.277453] __x64_sys_execveat+0xed/0x140 [ 1750.278401] do_syscall_64+0x33/0x40 [ 1750.279232] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.280358] RIP: 0033:0x7f21a736cb19 [ 1750.281177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.285193] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.286870] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1750.288427] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.289983] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.291556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.293120] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:36:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x1000000}) 04:36:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 20) 04:36:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 6) 04:36:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 04:36:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x1000000}) 04:36:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4030582a, &(0x7f0000000540)={0x0, 0x3}) 04:36:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 04:36:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 1750.324540] FAULT_INJECTION: forcing a failure. [ 1750.324540] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.326886] CPU: 0 PID: 11443 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1750.328308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.330001] Call Trace: [ 1750.330559] dump_stack+0x107/0x167 [ 1750.331346] should_fail.cold+0x5/0xa [ 1750.332154] ? security_prepare_creds+0x112/0x190 [ 1750.333157] should_failslab+0x5/0x20 [ 1750.333944] __kmalloc+0x72/0x3f0 [ 1750.334689] security_prepare_creds+0x112/0x190 [ 1750.335678] prepare_creds+0x458/0x5f0 [ 1750.336485] prepare_exec_creds+0xd/0x260 [ 1750.337357] bprm_execve+0x1e7/0x1b00 [ 1750.338155] ? acct_arg_size+0xe0/0xe0 [ 1750.338193] FAULT_INJECTION: forcing a failure. [ 1750.338193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1750.338970] ? downgrade_write+0x3a0/0x3a0 [ 1750.339001] ? open_exec+0x70/0x70 [ 1750.339023] ? memcpy+0x39/0x60 [ 1750.339050] ? copy_string_kernel+0x3b6/0x450 [ 1750.344962] do_execveat_common+0x76d/0x8d0 [ 1750.345868] ? bprm_execve+0x1b00/0x1b00 [ 1750.346737] __x64_sys_execveat+0xed/0x140 [ 1750.347635] do_syscall_64+0x33/0x40 [ 1750.348451] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.349576] RIP: 0033:0x7fbe1f492b19 [ 1750.350407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.354432] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.356117] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1750.357661] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.359233] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.360792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1750.362353] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1750.363975] CPU: 1 PID: 11444 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1750.364747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.365671] Call Trace: [ 1750.365962] dump_stack+0x107/0x167 [ 1750.366374] should_fail.cold+0x5/0xa [ 1750.366809] _copy_from_user+0x2e/0x1b0 [ 1750.367276] __copy_msghdr_from_user+0x91/0x4b0 [ 1750.367801] ? __ia32_sys_shutdown+0x80/0x80 [ 1750.368289] ? __lock_acquire+0x1657/0x5b00 [ 1750.368780] ___sys_recvmsg+0xd5/0x200 [ 1750.369210] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1750.369755] ? __lockdep_reset_lock+0x180/0x180 [ 1750.370268] ? lock_downgrade+0x6d0/0x6d0 [ 1750.370747] ? find_held_lock+0x2c/0x110 [ 1750.371204] ? __might_fault+0xd3/0x180 [ 1750.371645] ? lock_downgrade+0x6d0/0x6d0 [ 1750.372118] do_recvmmsg+0x24c/0x6d0 [ 1750.372536] ? ___sys_recvmsg+0x200/0x200 [ 1750.372993] ? lock_downgrade+0x6d0/0x6d0 [ 1750.373454] ? ksys_write+0x12d/0x260 [ 1750.373880] ? wait_for_completion+0x270/0x270 [ 1750.374388] ? rcu_read_lock_any_held+0x75/0xa0 [ 1750.374905] ? vfs_write+0x354/0xa30 [ 1750.375320] __x64_sys_recvmmsg+0x20f/0x260 [ 1750.375805] ? ksys_write+0x1a9/0x260 [ 1750.376225] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1750.376801] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1750.377380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1750.377957] do_syscall_64+0x33/0x40 [ 1750.378370] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.378943] RIP: 0033:0x7fd10da95b19 [ 1750.379355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.381386] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1750.382242] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1750.383062] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1750.383852] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.384650] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1750.385440] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 [ 1750.386605] FAULT_INJECTION: forcing a failure. [ 1750.386605] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.387836] CPU: 1 PID: 11439 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1750.388082] FAULT_INJECTION: forcing a failure. [ 1750.388082] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.388615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.388619] Call Trace: [ 1750.388630] dump_stack+0x107/0x167 [ 1750.388644] should_fail.cold+0x5/0xa [ 1750.388654] ? create_object.isra.0+0x3a/0xa20 [ 1750.388667] should_failslab+0x5/0x20 [ 1750.388685] kmem_cache_alloc+0x5b/0x360 [ 1750.394456] create_object.isra.0+0x3a/0xa20 [ 1750.394969] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1750.395543] kmem_cache_alloc+0x159/0x360 [ 1750.396017] jbd2__journal_start+0x190/0x890 [ 1750.396510] __ext4_journal_start_sb+0x214/0x430 [ 1750.397054] ext4_dirty_inode+0xbc/0x130 [ 1750.397493] ? ext4_setattr+0x22c0/0x22c0 [ 1750.397952] __mark_inode_dirty+0x492/0xf10 [ 1750.398422] touch_atime+0x5a4/0x6a0 [ 1750.398854] ? atime_needs_update+0x600/0x600 [ 1750.399361] ? pagecache_get_page+0x243/0xc80 [ 1750.399864] generic_file_buffered_read+0x18f3/0x28f0 [ 1750.400443] ? pagecache_get_page+0xc80/0xc80 [ 1750.400949] ? __lock_acquire+0xbb1/0x5b00 [ 1750.401409] generic_file_read_iter+0x33f/0x490 [ 1750.401942] ext4_file_read_iter+0x184/0x4c0 [ 1750.402429] __kernel_read+0x593/0xaa0 [ 1750.402882] ? __x64_sys_sendfile+0x220/0x220 [ 1750.403388] ? _cond_resched+0x12/0x80 [ 1750.403828] ? avc_policy_seqno+0x9/0x70 [ 1750.404286] ? selinux_file_permission+0x36/0x510 [ 1750.404830] ? lock_downgrade+0x6d0/0x6d0 [ 1750.405304] kernel_read+0x52/0x70 [ 1750.405703] bprm_execve+0x8da/0x1b00 [ 1750.406126] ? open_exec+0x70/0x70 [ 1750.406521] ? memcpy+0x39/0x60 [ 1750.406899] ? copy_string_kernel+0x3b6/0x450 [ 1750.407409] do_execveat_common+0x76d/0x8d0 [ 1750.407886] ? bprm_execve+0x1b00/0x1b00 [ 1750.408353] __x64_sys_execveat+0xed/0x140 [ 1750.408834] do_syscall_64+0x33/0x40 [ 1750.409250] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.409824] RIP: 0033:0x7fe08a85eb19 [ 1750.410230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.412299] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.413122] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1750.413906] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.414678] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.415461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1750.416244] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1750.417044] CPU: 0 PID: 11450 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1750.418572] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.420416] Call Trace: [ 1750.421007] dump_stack+0x107/0x167 [ 1750.421828] should_fail.cold+0x5/0xa [ 1750.422681] ? create_object.isra.0+0x3a/0xa20 [ 1750.423706] should_failslab+0x5/0x20 [ 1750.424551] kmem_cache_alloc+0x5b/0x360 [ 1750.425472] create_object.isra.0+0x3a/0xa20 [ 1750.426458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1750.427588] kmem_cache_alloc+0x159/0x360 [ 1750.428528] __alloc_file+0x21/0x320 04:36:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) [ 1750.429360] alloc_empty_file+0x6d/0x170 [ 1750.430438] path_openat+0xde/0x26d0 [ 1750.431287] ? stack_trace_save+0x8c/0xc0 [ 1750.432208] ? stack_trace_consume_entry+0x160/0x160 [ 1750.433336] ? path_lookupat+0x860/0x860 [ 1750.434254] ? kasan_save_stack+0x32/0x40 [ 1750.435182] ? kasan_save_stack+0x1b/0x40 [ 1750.436102] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1750.437229] ? security_prepare_creds+0x112/0x190 [ 1750.438298] ? prepare_creds+0x458/0x5f0 [ 1750.439215] ? prepare_exec_creds+0xd/0x260 [ 1750.440186] do_filp_open+0x17e/0x3d0 [ 1750.441027] ? may_open_dev+0xf0/0xf0 [ 1750.441874] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1750.442997] ? perf_trace_lock+0x2bd/0x490 [ 1750.443980] ? find_held_lock+0x2c/0x110 [ 1750.444890] do_open_execat+0x116/0x690 [ 1750.445777] ? __ia32_sys_uselib+0x40/0x40 [ 1750.446709] ? do_raw_spin_lock+0x121/0x260 [ 1750.447677] ? rwlock_bug.part.0+0x90/0x90 [ 1750.448641] bprm_execve+0x5b6/0x1b00 [ 1750.449504] ? open_exec+0x70/0x70 [ 1750.450288] ? memcpy+0x39/0x60 [ 1750.451028] ? copy_string_kernel+0x3b6/0x450 [ 1750.452040] do_execveat_common+0x76d/0x8d0 [ 1750.453002] ? bprm_execve+0x1b00/0x1b00 [ 1750.453937] __x64_sys_execveat+0xed/0x140 [ 1750.454896] do_syscall_64+0x33/0x40 [ 1750.455720] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.456842] RIP: 0033:0x7f4478f33b19 [ 1750.457661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.461680] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.463356] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1750.464922] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.466489] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.468064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1750.469630] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:36:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 7) [ 1750.503103] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1750.524002] FAULT_INJECTION: forcing a failure. [ 1750.524002] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.525292] CPU: 1 PID: 11458 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1750.526051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.526820] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1750.526946] Call Trace: [ 1750.526969] dump_stack+0x107/0x167 [ 1750.529273] should_fail.cold+0x5/0xa [ 1750.529692] ? create_object.isra.0+0x3a/0xa20 [ 1750.530191] should_failslab+0x5/0x20 [ 1750.530602] kmem_cache_alloc+0x5b/0x360 [ 1750.531054] create_object.isra.0+0x3a/0xa20 [ 1750.531536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1750.532098] kmem_cache_alloc+0x159/0x360 [ 1750.532558] mm_alloc+0x19/0xc0 [ 1750.532917] alloc_bprm+0x1cb/0x8f0 [ 1750.533313] do_execveat_common+0x270/0x8d0 [ 1750.533788] ? strncpy_from_user+0x9e/0x470 [ 1750.534265] ? bprm_execve+0x1b00/0x1b00 [ 1750.534714] __x64_sys_execveat+0xed/0x140 [ 1750.535196] do_syscall_64+0x33/0x40 [ 1750.535598] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.536181] RIP: 0033:0x7f21a736cb19 [ 1750.536587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.538561] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.539420] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1750.540211] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.540984] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.541776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.542558] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:36:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 21) 04:36:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4030582b, &(0x7f0000000540)={0x0, 0x3}) [ 1750.551624] FAULT_INJECTION: forcing a failure. [ 1750.551624] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.554137] CPU: 0 PID: 11457 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1750.555671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.557499] Call Trace: [ 1750.558092] dump_stack+0x107/0x167 [ 1750.558936] should_fail.cold+0x5/0xa [ 1750.559800] should_failslab+0x5/0x20 [ 1750.560643] __kmalloc_track_caller+0x79/0x3c0 [ 1750.561652] ? bprm_change_interp+0x7c/0xf0 [ 1750.562627] kstrdup+0x36/0x70 [ 1750.563357] bprm_change_interp+0x7c/0xf0 [ 1750.564289] load_misc_binary+0x3a5/0xb70 [ 1750.565234] bprm_execve+0x9c1/0x1b00 [ 1750.566099] ? open_exec+0x70/0x70 [ 1750.566903] ? memcpy+0x39/0x60 [ 1750.567644] ? copy_string_kernel+0x3b6/0x450 [ 1750.568632] do_execveat_common+0x76d/0x8d0 [ 1750.569612] ? bprm_execve+0x1b00/0x1b00 [ 1750.570542] __x64_sys_execveat+0xed/0x140 [ 1750.571510] do_syscall_64+0x33/0x40 [ 1750.572335] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.573481] RIP: 0033:0x7fe08a85eb19 [ 1750.574319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:36:47 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xfdfdffff}) [ 1750.578548] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.580363] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1750.581928] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.583517] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.585078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1750.586660] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:36:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 8) [ 1750.661497] FAULT_INJECTION: forcing a failure. [ 1750.661497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1750.662835] CPU: 1 PID: 11470 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1750.663603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.664502] Call Trace: [ 1750.664805] dump_stack+0x107/0x167 [ 1750.665214] should_fail.cold+0x5/0xa [ 1750.665638] _copy_from_user+0x2e/0x1b0 [ 1750.666087] __copy_msghdr_from_user+0x91/0x4b0 [ 1750.666601] ? __ia32_sys_shutdown+0x80/0x80 [ 1750.667103] ? __lock_acquire+0x1657/0x5b00 [ 1750.667587] ___sys_recvmsg+0xd5/0x200 [ 1750.668015] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1750.668552] ? __lockdep_reset_lock+0x180/0x180 [ 1750.669060] ? lock_downgrade+0x6d0/0x6d0 [ 1750.669518] ? find_held_lock+0x2c/0x110 [ 1750.669963] ? __might_fault+0xd3/0x180 [ 1750.670406] ? lock_downgrade+0x6d0/0x6d0 [ 1750.670869] do_recvmmsg+0x24c/0x6d0 [ 1750.671276] ? ___sys_recvmsg+0x200/0x200 [ 1750.671723] ? lock_downgrade+0x6d0/0x6d0 [ 1750.672184] ? ksys_write+0x12d/0x260 [ 1750.672615] ? wait_for_completion+0x270/0x270 [ 1750.673122] ? rcu_read_lock_any_held+0x75/0xa0 [ 1750.673637] ? vfs_write+0x354/0xa30 [ 1750.674058] __x64_sys_recvmmsg+0x20f/0x260 [ 1750.674526] ? ksys_write+0x1a9/0x260 [ 1750.674960] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1750.675545] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1750.676132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1750.676712] do_syscall_64+0x33/0x40 [ 1750.677132] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.677701] RIP: 0033:0x7fd10da95b19 [ 1750.678120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.680145] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1750.680974] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1750.681747] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1750.682534] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.683334] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1750.684121] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 [ 1750.729187] FAULT_INJECTION: forcing a failure. [ 1750.729187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1750.730567] CPU: 1 PID: 11473 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1750.731312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.732232] Call Trace: [ 1750.732528] dump_stack+0x107/0x167 [ 1750.732933] should_fail.cold+0x5/0xa [ 1750.733348] __alloc_pages_nodemask+0x182/0x680 [ 1750.733879] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1750.734545] alloc_pages_current+0x187/0x280 [ 1750.735065] __get_free_pages+0xc/0xa0 [ 1750.735485] pgd_alloc+0x84/0x4e0 [ 1750.735865] ? pgd_page_get_mm+0x40/0x40 [ 1750.736304] ? lockdep_init_map_type+0x2c7/0x780 [ 1750.736827] ? lockdep_init_map_type+0x2c7/0x780 [ 1750.737344] mm_init+0x670/0xab0 [ 1750.737714] mm_alloc+0x99/0xc0 [ 1750.738073] alloc_bprm+0x1cb/0x8f0 [ 1750.738468] do_execveat_common+0x270/0x8d0 [ 1750.738954] ? strncpy_from_user+0x9e/0x470 [ 1750.739424] ? bprm_execve+0x1b00/0x1b00 [ 1750.739873] __x64_sys_execveat+0xed/0x140 [ 1750.740353] do_syscall_64+0x33/0x40 [ 1750.740769] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1750.741335] RIP: 0033:0x7f21a736cb19 [ 1750.741747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.743768] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1750.744613] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1750.745398] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1750.746176] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.746982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.747762] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:37:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xfdfdffff}) 04:37:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 04:37:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 9) 04:37:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 22) 04:37:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) 04:37:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xfffffdfd}) 04:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40305839, &(0x7f0000000540)={0x0, 0x3}) 04:37:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 1766.399206] FAULT_INJECTION: forcing a failure. [ 1766.399206] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.401690] CPU: 1 PID: 11488 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1766.403138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.404796] Call Trace: [ 1766.405343] dump_stack+0x107/0x167 [ 1766.406075] should_fail.cold+0x5/0xa [ 1766.406870] ? security_prepare_creds+0x112/0x190 [ 1766.407859] should_failslab+0x5/0x20 [ 1766.408638] __kmalloc+0x72/0x3f0 [ 1766.409350] security_prepare_creds+0x112/0x190 [ 1766.410314] prepare_creds+0x458/0x5f0 [ 1766.411122] prepare_exec_creds+0xd/0x260 [ 1766.411974] bprm_execve+0x1e7/0x1b00 [ 1766.412756] ? acct_arg_size+0xe0/0xe0 [ 1766.413552] ? downgrade_write+0x3a0/0x3a0 [ 1766.414422] ? open_exec+0x70/0x70 [ 1766.415165] ? memcpy+0x39/0x60 [ 1766.415845] ? copy_string_kernel+0x3b6/0x450 [ 1766.416780] do_execveat_common+0x76d/0x8d0 [ 1766.417673] ? bprm_execve+0x1b00/0x1b00 [ 1766.418539] __x64_sys_execveat+0xed/0x140 [ 1766.419422] do_syscall_64+0x33/0x40 [ 1766.420198] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.421261] RIP: 0033:0x7fbe1f492b19 [ 1766.422041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.425562] FAULT_INJECTION: forcing a failure. [ 1766.425562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1766.426541] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.426576] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1766.426595] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.426625] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.436420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.438248] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1766.440161] CPU: 0 PID: 11493 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1766.441633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.443409] Call Trace: [ 1766.443968] dump_stack+0x107/0x167 [ 1766.444740] should_fail.cold+0x5/0xa [ 1766.445556] __alloc_pages_nodemask+0x182/0x680 [ 1766.446518] ? perf_trace_lock+0x2bd/0x490 [ 1766.447445] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1766.448810] alloc_pages_current+0x187/0x280 [ 1766.449710] __get_free_pages+0xc/0xa0 [ 1766.450522] pgd_alloc+0x84/0x4e0 [ 1766.451258] ? pgd_page_get_mm+0x40/0x40 [ 1766.452115] ? lockdep_init_map_type+0x2c7/0x780 [ 1766.452138] FAULT_INJECTION: forcing a failure. [ 1766.452138] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.455478] ? lockdep_init_map_type+0x2c7/0x780 [ 1766.456463] mm_init+0x670/0xab0 [ 1766.457182] mm_alloc+0x99/0xc0 [ 1766.457903] alloc_bprm+0x1cb/0x8f0 [ 1766.458720] do_execveat_common+0x270/0x8d0 [ 1766.459629] ? strncpy_from_user+0x9e/0x470 [ 1766.460522] ? bprm_execve+0x1b00/0x1b00 [ 1766.461383] __x64_sys_execveat+0xed/0x140 [ 1766.462297] do_syscall_64+0x33/0x40 [ 1766.463084] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.464200] RIP: 0033:0x7f21a736cb19 [ 1766.464974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.468845] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.470513] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1766.472008] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.473477] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.475018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1766.476494] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1766.478038] CPU: 1 PID: 11489 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1766.479589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.481280] Call Trace: [ 1766.481832] dump_stack+0x107/0x167 [ 1766.482641] should_fail.cold+0x5/0xa [ 1766.483459] ? security_file_alloc+0x34/0x170 [ 1766.484392] should_failslab+0x5/0x20 [ 1766.485174] kmem_cache_alloc+0x5b/0x360 [ 1766.485993] security_file_alloc+0x34/0x170 [ 1766.486890] __alloc_file+0xb6/0x320 [ 1766.487711] alloc_empty_file+0x6d/0x170 [ 1766.488621] path_openat+0xde/0x26d0 [ 1766.489394] ? lock_chain_count+0x20/0x20 [ 1766.489664] FAULT_INJECTION: forcing a failure. [ 1766.489664] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.490257] ? stack_trace_save+0x8c/0xc0 [ 1766.490283] ? stack_trace_consume_entry+0x160/0x160 [ 1766.490313] ? path_lookupat+0x860/0x860 [ 1766.495291] ? kasan_save_stack+0x32/0x40 [ 1766.496139] ? kasan_save_stack+0x1b/0x40 [ 1766.497001] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.498026] ? security_prepare_creds+0x112/0x190 [ 1766.499025] ? prepare_creds+0x458/0x5f0 [ 1766.499844] ? prepare_exec_creds+0xd/0x260 [ 1766.500721] ? bprm_execve+0x1e7/0x1b00 [ 1766.501567] do_filp_open+0x17e/0x3d0 [ 1766.502369] ? may_open_dev+0xf0/0xf0 [ 1766.503212] ? perf_trace_lock+0xac/0x490 [ 1766.504062] ? perf_trace_lock+0xac/0x490 [ 1766.504927] ? find_held_lock+0x2c/0x110 [ 1766.505798] do_open_execat+0x116/0x690 [ 1766.506673] ? __ia32_sys_uselib+0x40/0x40 [ 1766.507551] ? do_raw_spin_lock+0x121/0x260 [ 1766.508437] ? rwlock_bug.part.0+0x90/0x90 [ 1766.509333] bprm_execve+0x5b6/0x1b00 [ 1766.510152] ? open_exec+0x70/0x70 [ 1766.510966] ? memcpy+0x39/0x60 [ 1766.511646] ? copy_string_kernel+0x3b6/0x450 [ 1766.512575] do_execveat_common+0x76d/0x8d0 [ 1766.513462] ? bprm_execve+0x1b00/0x1b00 [ 1766.514313] __x64_sys_execveat+0xed/0x140 [ 1766.515196] do_syscall_64+0x33/0x40 [ 1766.515962] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.517011] RIP: 0033:0x7f4478f33b19 [ 1766.517787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.521552] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.523216] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1766.524685] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.526178] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.527683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.529113] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1766.530598] CPU: 0 PID: 11494 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1766.532038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.533751] Call Trace: [ 1766.534307] dump_stack+0x107/0x167 [ 1766.535081] should_fail.cold+0x5/0xa [ 1766.535878] ? create_object.isra.0+0x3a/0xa20 [ 1766.536832] should_failslab+0x5/0x20 [ 1766.537625] kmem_cache_alloc+0x5b/0x360 [ 1766.538484] create_object.isra.0+0x3a/0xa20 [ 1766.539423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.540490] __kmalloc_track_caller+0x177/0x3c0 [ 1766.541454] ? bprm_change_interp+0x7c/0xf0 [ 1766.542384] kstrdup+0x36/0x70 [ 1766.543100] bprm_change_interp+0x7c/0xf0 [ 1766.544030] load_misc_binary+0x3a5/0xb70 [ 1766.544916] bprm_execve+0x9c1/0x1b00 [ 1766.545775] ? open_exec+0x70/0x70 [ 1766.546543] ? memcpy+0x39/0x60 [ 1766.547253] ? copy_string_kernel+0x3b6/0x450 [ 1766.548193] do_execveat_common+0x76d/0x8d0 [ 1766.549111] ? bprm_execve+0x1b00/0x1b00 [ 1766.550020] __x64_sys_execveat+0xed/0x140 [ 1766.550993] do_syscall_64+0x33/0x40 [ 1766.551761] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.552847] RIP: 0033:0x7fe08a85eb19 [ 1766.553661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.557511] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.559124] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1766.560649] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.562109] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.563686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.565146] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:03 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 1766.588001] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1766.596957] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1766.610751] FAULT_INJECTION: forcing a failure. [ 1766.610751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1766.613288] CPU: 1 PID: 11505 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1766.614762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.616499] Call Trace: [ 1766.617081] dump_stack+0x107/0x167 [ 1766.617879] should_fail.cold+0x5/0xa [ 1766.618665] _copy_from_user+0x2e/0x1b0 [ 1766.619515] __copy_msghdr_from_user+0x91/0x4b0 [ 1766.620483] ? __ia32_sys_shutdown+0x80/0x80 [ 1766.621425] ? __lock_acquire+0x1657/0x5b00 [ 1766.622381] ___sys_recvmsg+0xd5/0x200 [ 1766.623223] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1766.624235] ? __lockdep_reset_lock+0x180/0x180 [ 1766.625186] ? lock_downgrade+0x6d0/0x6d0 [ 1766.626064] ? find_held_lock+0x2c/0x110 [ 1766.626905] ? __might_fault+0xd3/0x180 [ 1766.627754] ? lock_downgrade+0x6d0/0x6d0 [ 1766.628633] do_recvmmsg+0x24c/0x6d0 [ 1766.629394] ? ___sys_recvmsg+0x200/0x200 [ 1766.630279] ? lock_downgrade+0x6d0/0x6d0 [ 1766.631192] ? ksys_write+0x12d/0x260 [ 1766.631984] ? wait_for_completion+0x270/0x270 [ 1766.632942] ? rcu_read_lock_any_held+0x75/0xa0 [ 1766.633912] ? vfs_write+0x354/0xa30 [ 1766.634672] __x64_sys_recvmmsg+0x20f/0x260 [ 1766.635576] ? ksys_write+0x1a9/0x260 [ 1766.636342] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1766.637411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1766.638482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1766.639559] do_syscall_64+0x33/0x40 [ 1766.640323] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.641371] RIP: 0033:0x7fd10da95b19 [ 1766.642171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.646047] RSP: 002b:00007fd10afea188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1766.647598] RAX: ffffffffffffffda RBX: 00007fd10dba9020 RCX: 00007fd10da95b19 [ 1766.649058] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1766.650565] RBP: 00007fd10afea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.652054] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1766.653512] R13: 00007ffc2169e44f R14: 00007fd10afea300 R15: 0000000000022000 04:37:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 04:37:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 10) [ 1766.694344] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1766.710234] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1766.726876] FAULT_INJECTION: forcing a failure. [ 1766.726876] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.729187] CPU: 0 PID: 11507 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1766.730600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.732264] Call Trace: [ 1766.732804] dump_stack+0x107/0x167 [ 1766.733541] should_fail.cold+0x5/0xa [ 1766.734313] ? create_object.isra.0+0x3a/0xa20 [ 1766.735247] should_failslab+0x5/0x20 [ 1766.736037] kmem_cache_alloc+0x5b/0x360 [ 1766.736865] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1766.738011] create_object.isra.0+0x3a/0xa20 [ 1766.738905] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.739979] kmem_cache_alloc+0x159/0x360 [ 1766.740856] security_file_alloc+0x34/0x170 [ 1766.741749] __alloc_file+0xb6/0x320 [ 1766.742522] alloc_empty_file+0x6d/0x170 [ 1766.743371] path_openat+0xde/0x26d0 [ 1766.744161] ? stack_trace_save+0x8c/0xc0 [ 1766.745012] ? stack_trace_consume_entry+0x160/0x160 [ 1766.746058] ? path_lookupat+0x860/0x860 [ 1766.746912] ? kasan_save_stack+0x32/0x40 [ 1766.747782] ? kasan_save_stack+0x1b/0x40 [ 1766.748635] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.749670] ? security_prepare_creds+0x112/0x190 [ 1766.750657] ? prepare_creds+0x458/0x5f0 [ 1766.751497] ? prepare_exec_creds+0xd/0x260 [ 1766.752403] do_filp_open+0x17e/0x3d0 [ 1766.753176] ? may_open_dev+0xf0/0xf0 [ 1766.753969] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1766.755029] ? perf_trace_lock+0x2bd/0x490 [ 1766.755947] ? find_held_lock+0x2c/0x110 [ 1766.756797] do_open_execat+0x116/0x690 [ 1766.757624] ? __ia32_sys_uselib+0x40/0x40 [ 1766.757807] FAULT_INJECTION: forcing a failure. [ 1766.757807] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.758490] ? do_raw_spin_lock+0x121/0x260 [ 1766.758517] ? rwlock_bug.part.0+0x90/0x90 [ 1766.758567] bprm_execve+0x5b6/0x1b00 [ 1766.763371] ? open_exec+0x70/0x70 [ 1766.764104] ? memcpy+0x39/0x60 [ 1766.764801] ? copy_string_kernel+0x3b6/0x450 [ 1766.765749] do_execveat_common+0x76d/0x8d0 [ 1766.766653] ? bprm_execve+0x1b00/0x1b00 [ 1766.767535] __x64_sys_execveat+0xed/0x140 [ 1766.768435] do_syscall_64+0x33/0x40 [ 1766.769208] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.770281] RIP: 0033:0x7f4478f33b19 [ 1766.771068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.774869] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.776443] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1766.777903] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.779411] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.780872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.782334] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1766.783861] CPU: 1 PID: 11510 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1766.785300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.787034] Call Trace: [ 1766.787587] dump_stack+0x107/0x167 [ 1766.788340] should_fail.cold+0x5/0xa [ 1766.789134] ? __alloc_file+0x21/0x320 [ 1766.789935] should_failslab+0x5/0x20 [ 1766.790719] kmem_cache_alloc+0x5b/0x360 [ 1766.791573] ? kernel_text_address+0xf2/0x120 [ 1766.792501] __alloc_file+0x21/0x320 [ 1766.793270] alloc_empty_file+0x6d/0x170 [ 1766.794094] path_openat+0xde/0x26d0 [ 1766.794863] ? lock_chain_count+0x20/0x20 [ 1766.795721] ? stack_trace_save+0x8c/0xc0 [ 1766.796570] ? stack_trace_consume_entry+0x160/0x160 [ 1766.797611] ? path_lookupat+0x860/0x860 [ 1766.798451] ? kasan_save_stack+0x32/0x40 [ 1766.799313] ? kasan_save_stack+0x1b/0x40 [ 1766.800161] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.801198] ? security_prepare_creds+0x112/0x190 [ 1766.802185] ? prepare_creds+0x458/0x5f0 [ 1766.803020] ? prepare_exec_creds+0xd/0x260 [ 1766.803899] ? bprm_execve+0x1e7/0x1b00 [ 1766.804716] do_filp_open+0x17e/0x3d0 [ 1766.805497] ? may_open_dev+0xf0/0xf0 [ 1766.806292] ? perf_trace_lock+0xac/0x490 [ 1766.807154] ? perf_trace_lock+0xac/0x490 [ 1766.808022] ? find_held_lock+0x2c/0x110 [ 1766.808862] do_open_execat+0x116/0x690 [ 1766.809682] ? __ia32_sys_uselib+0x40/0x40 [ 1766.810547] ? do_raw_spin_lock+0x121/0x260 [ 1766.811442] ? rwlock_bug.part.0+0x90/0x90 [ 1766.812321] bprm_execve+0x5b6/0x1b00 [ 1766.813114] ? open_exec+0x70/0x70 [ 1766.813845] ? memcpy+0x39/0x60 [ 1766.814523] ? copy_string_kernel+0x3b6/0x450 [ 1766.815465] do_execveat_common+0x76d/0x8d0 [ 1766.816351] ? bprm_execve+0x1b00/0x1b00 [ 1766.817203] __x64_sys_execveat+0xed/0x140 [ 1766.818082] do_syscall_64+0x33/0x40 [ 1766.818849] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.819903] RIP: 0033:0x7fbe1f492b19 [ 1766.820668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.824442] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.826023] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1766.827499] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.828972] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.830425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.831919] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 04:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80086601, &(0x7f0000000540)={0x0, 0x3}) 04:37:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xfffffdfd}) 04:37:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0xffffff7f}) [ 1766.875347] FAULT_INJECTION: forcing a failure. [ 1766.875347] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.877712] CPU: 0 PID: 11513 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1766.879142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.880837] Call Trace: [ 1766.881397] dump_stack+0x107/0x167 [ 1766.882169] should_fail.cold+0x5/0xa [ 1766.882979] ? create_object.isra.0+0x3a/0xa20 [ 1766.883942] should_failslab+0x5/0x20 [ 1766.884736] kmem_cache_alloc+0x5b/0x360 [ 1766.885597] create_object.isra.0+0x3a/0xa20 [ 1766.886518] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1766.887612] kmem_cache_alloc+0x159/0x360 [ 1766.888487] vm_area_alloc+0x1c/0x110 [ 1766.889276] alloc_bprm+0x337/0x8f0 [ 1766.890051] do_execveat_common+0x270/0x8d0 [ 1766.890957] ? strncpy_from_user+0x9e/0x470 [ 1766.891849] ? bprm_execve+0x1b00/0x1b00 [ 1766.892732] __x64_sys_execveat+0xed/0x140 [ 1766.893621] do_syscall_64+0x33/0x40 [ 1766.894393] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.895456] RIP: 0033:0x7f21a736cb19 [ 1766.896285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.900070] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.901632] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1766.903102] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.904568] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.906030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.907511] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1766.946906] FAULT_INJECTION: forcing a failure. [ 1766.946906] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.949220] CPU: 0 PID: 11515 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1766.950622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1766.952316] Call Trace: [ 1766.952867] dump_stack+0x107/0x167 [ 1766.953616] should_fail.cold+0x5/0xa [ 1766.954409] ? getname_kernel+0x4e/0x370 [ 1766.955299] should_failslab+0x5/0x20 [ 1766.956086] kmem_cache_alloc+0x5b/0x360 [ 1766.956936] getname_kernel+0x4e/0x370 [ 1766.957748] open_exec+0x13/0x70 [ 1766.958453] load_misc_binary+0x973/0xb70 [ 1766.959344] bprm_execve+0x9c1/0x1b00 [ 1766.960156] ? open_exec+0x70/0x70 [ 1766.960896] ? memcpy+0x39/0x60 [ 1766.961582] ? copy_string_kernel+0x3b6/0x450 [ 1766.962523] do_execveat_common+0x76d/0x8d0 [ 1766.963438] ? bprm_execve+0x1b00/0x1b00 [ 1766.964313] __x64_sys_execveat+0xed/0x140 [ 1766.965193] do_syscall_64+0x33/0x40 [ 1766.965963] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1766.967019] RIP: 0033:0x7fe08a85eb19 [ 1766.967784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1766.971539] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1766.973100] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1766.974564] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1766.976033] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1766.977492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.978978] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 04:37:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 23) 04:37:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) [ 1767.075370] FAULT_INJECTION: forcing a failure. [ 1767.075370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1767.077923] CPU: 1 PID: 11528 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1767.079359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.081081] Call Trace: [ 1767.081621] dump_stack+0x107/0x167 [ 1767.082366] should_fail.cold+0x5/0xa [ 1767.083148] _copy_from_user+0x2e/0x1b0 [ 1767.083983] __copy_msghdr_from_user+0x91/0x4b0 [ 1767.084932] ? __ia32_sys_shutdown+0x80/0x80 [ 1767.085828] ? __lock_acquire+0x1657/0x5b00 [ 1767.086719] ___sys_recvmsg+0xd5/0x200 [ 1767.087549] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1767.088550] ? __lockdep_reset_lock+0x180/0x180 [ 1767.089504] ? lock_downgrade+0x6d0/0x6d0 [ 1767.090360] ? find_held_lock+0x2c/0x110 [ 1767.091209] ? __might_fault+0xd3/0x180 [ 1767.092025] ? lock_downgrade+0x6d0/0x6d0 [ 1767.092897] do_recvmmsg+0x24c/0x6d0 [ 1767.093665] ? ___sys_recvmsg+0x200/0x200 [ 1767.094516] ? lock_downgrade+0x6d0/0x6d0 [ 1767.095384] ? ksys_write+0x12d/0x260 [ 1767.096178] ? wait_for_completion+0x270/0x270 [ 1767.097117] ? rcu_read_lock_any_held+0x75/0xa0 [ 1767.098064] ? vfs_write+0x354/0xa30 [ 1767.098832] __x64_sys_recvmmsg+0x20f/0x260 [ 1767.099742] ? ksys_write+0x1a9/0x260 [ 1767.100525] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1767.101583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1767.102654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1767.103721] do_syscall_64+0x33/0x40 [ 1767.104486] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1767.105531] RIP: 0033:0x7fd10da95b19 [ 1767.106292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.110053] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1767.111613] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1767.113065] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1767.114522] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.115996] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1767.117449] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 [ 1767.134633] FAULT_INJECTION: forcing a failure. [ 1767.134633] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.137026] CPU: 1 PID: 11530 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1767.138469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.140187] Call Trace: [ 1767.140724] dump_stack+0x107/0x167 [ 1767.141479] should_fail.cold+0x5/0xa [ 1767.142251] ? jbd2__journal_start+0x190/0x890 [ 1767.143238] should_failslab+0x5/0x20 [ 1767.144037] kmem_cache_alloc+0x5b/0x360 [ 1767.144883] jbd2__journal_start+0x190/0x890 [ 1767.145794] __ext4_journal_start_sb+0x214/0x430 [ 1767.146796] ext4_dirty_inode+0xbc/0x130 [ 1767.147056] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1767.147624] ? ext4_setattr+0x22c0/0x22c0 [ 1767.147645] __mark_inode_dirty+0x492/0xf10 [ 1767.147671] touch_atime+0x5a4/0x6a0 [ 1767.147697] ? atime_needs_update+0x600/0x600 [ 1767.152790] ? pagecache_get_page+0x243/0xc80 [ 1767.153718] generic_file_buffered_read+0x18f3/0x28f0 [ 1767.154811] ? pagecache_get_page+0xc80/0xc80 [ 1767.155752] ? __lock_acquire+0xbb1/0x5b00 [ 1767.156645] generic_file_read_iter+0x33f/0x490 [ 1767.157613] ext4_file_read_iter+0x184/0x4c0 [ 1767.158513] __kernel_read+0x593/0xaa0 [ 1767.159325] ? __x64_sys_sendfile+0x220/0x220 [ 1767.160253] ? _cond_resched+0x12/0x80 [ 1767.161064] ? avc_policy_seqno+0x9/0x70 [ 1767.161895] ? selinux_file_permission+0x36/0x510 [ 1767.162884] ? lock_downgrade+0x6d0/0x6d0 [ 1767.163757] kernel_read+0x52/0x70 [ 1767.164494] bprm_execve+0x8da/0x1b00 [ 1767.165298] ? open_exec+0x70/0x70 [ 1767.166034] ? memcpy+0x39/0x60 [ 1767.166719] ? copy_string_kernel+0x3b6/0x450 [ 1767.167675] do_execveat_common+0x76d/0x8d0 [ 1767.168562] ? bprm_execve+0x1b00/0x1b00 [ 1767.169419] __x64_sys_execveat+0xed/0x140 [ 1767.170291] do_syscall_64+0x33/0x40 [ 1767.171069] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1767.172116] RIP: 0033:0x7f4478f33b19 [ 1767.172883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.176652] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1767.178208] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1767.179692] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1767.181156] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.182623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.184104] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1767.187847] FAULT_INJECTION: forcing a failure. [ 1767.187847] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.190554] CPU: 0 PID: 11529 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1767.192186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.194124] Call Trace: [ 1767.194762] dump_stack+0x107/0x167 [ 1767.195656] should_fail.cold+0x5/0xa [ 1767.196562] ? create_object.isra.0+0x3a/0xa20 [ 1767.197642] should_failslab+0x5/0x20 [ 1767.198541] kmem_cache_alloc+0x5b/0x360 [ 1767.199528] create_object.isra.0+0x3a/0xa20 [ 1767.200563] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.201772] kmem_cache_alloc+0x159/0x360 [ 1767.202767] __alloc_file+0x21/0x320 [ 1767.203665] alloc_empty_file+0x6d/0x170 [ 1767.204636] path_openat+0xde/0x26d0 [ 1767.205531] ? stack_trace_save+0x8c/0xc0 [ 1767.206502] ? stack_trace_consume_entry+0x160/0x160 [ 1767.207714] ? path_lookupat+0x860/0x860 [ 1767.208688] ? kasan_save_stack+0x32/0x40 [ 1767.209658] ? kasan_save_stack+0x1b/0x40 [ 1767.210630] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.211836] ? security_prepare_creds+0x112/0x190 [ 1767.212963] ? prepare_creds+0x458/0x5f0 [ 1767.213915] ? prepare_exec_creds+0xd/0x260 [ 1767.214951] do_filp_open+0x17e/0x3d0 [ 1767.215851] ? may_open_dev+0xf0/0xf0 [ 1767.216759] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1767.217949] ? perf_trace_lock+0x2bd/0x490 [ 1767.219014] ? find_held_lock+0x2c/0x110 [ 1767.219988] do_open_execat+0x116/0x690 [ 1767.220926] ? __ia32_sys_uselib+0x40/0x40 [ 1767.221912] ? do_raw_spin_lock+0x121/0x260 [ 1767.222917] ? rwlock_bug.part.0+0x90/0x90 [ 1767.223937] bprm_execve+0x5b6/0x1b00 [ 1767.224847] ? open_exec+0x70/0x70 [ 1767.225679] ? memcpy+0x39/0x60 [ 1767.226454] ? copy_string_kernel+0x3b6/0x450 [ 1767.227535] do_execveat_common+0x76d/0x8d0 [ 1767.228548] ? bprm_execve+0x1b00/0x1b00 [ 1767.229535] __x64_sys_execveat+0xed/0x140 [ 1767.230538] do_syscall_64+0x33/0x40 [ 1767.231420] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1767.232604] RIP: 0033:0x7fbe1f492b19 [ 1767.233475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.237728] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1767.239563] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1767.241207] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1767.242860] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.244535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.246128] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1767.277271] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1767.288923] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1767.324351] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:37:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 11) 04:37:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x80087601, &(0x7f0000000540)={0x0, 0x3}) 04:37:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xffffff7f}) 04:37:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 24) 04:37:17 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:37:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) 04:37:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 04:37:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) [ 1780.019092] FAULT_INJECTION: forcing a failure. [ 1780.019092] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1780.021528] CPU: 0 PID: 11549 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1780.022916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.024587] Call Trace: [ 1780.025129] dump_stack+0x107/0x167 [ 1780.025874] should_fail.cold+0x5/0xa [ 1780.026660] __alloc_pages_nodemask+0x182/0x680 [ 1780.027607] ? __lockdep_reset_lock+0x180/0x180 [ 1780.028553] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1780.029754] ? fault_dirty_shared_page+0x3f0/0x3f0 [ 1780.030762] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1780.031846] alloc_pages_current+0x187/0x280 [ 1780.032739] get_zeroed_page+0x14/0xb0 [ 1780.033517] __pud_alloc+0x33/0x270 [ 1780.034273] handle_mm_fault+0x1a8f/0x3520 [ 1780.035140] ? perf_trace_lock+0x2bd/0x490 [ 1780.035994] ? __lockdep_reset_lock+0x180/0x180 [ 1780.036934] ? __pmd_alloc+0x5e0/0x5e0 [ 1780.037777] __get_user_pages+0x61b/0x1390 [ 1780.038647] ? follow_page_mask+0x1860/0x1860 [ 1780.039569] ? __lockdep_reset_lock+0x180/0x180 [ 1780.040501] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1780.041476] __get_user_pages_remote+0x1d5/0x870 [ 1780.042435] ? lock_downgrade+0x6d0/0x6d0 [ 1780.043324] get_user_pages_remote+0x63/0x90 [ 1780.044232] get_arg_page+0xba/0x200 [ 1780.044986] ? acct_arg_size+0xe0/0xe0 [ 1780.045773] ? downgrade_write+0x3a0/0x3a0 [ 1780.046629] ? count.constprop.0+0x1b3/0x290 [ 1780.047563] copy_string_kernel+0x1b4/0x450 [ 1780.048476] do_execveat_common+0x520/0x8d0 [ 1780.049376] ? bprm_execve+0x1b00/0x1b00 [ 1780.050267] __x64_sys_execveat+0xed/0x140 [ 1780.051173] do_syscall_64+0x33/0x40 [ 1780.051955] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.053025] RIP: 0033:0x7f21a736cb19 [ 1780.053806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.057624] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.059211] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1780.060684] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.062155] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.063634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.065104] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1780.080591] FAULT_INJECTION: forcing a failure. [ 1780.080591] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.083014] CPU: 0 PID: 11560 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1780.084461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.086181] Call Trace: [ 1780.086742] dump_stack+0x107/0x167 [ 1780.087535] should_fail.cold+0x5/0xa [ 1780.088334] ? security_file_alloc+0x34/0x170 [ 1780.089282] should_failslab+0x5/0x20 [ 1780.090088] kmem_cache_alloc+0x5b/0x360 [ 1780.090959] security_file_alloc+0x34/0x170 [ 1780.091888] __alloc_file+0xb6/0x320 [ 1780.092671] alloc_empty_file+0x6d/0x170 [ 1780.092871] FAULT_INJECTION: forcing a failure. [ 1780.092871] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.093521] path_openat+0xde/0x26d0 [ 1780.093557] ? stack_trace_save+0x8c/0xc0 [ 1780.097407] ? stack_trace_consume_entry+0x160/0x160 [ 1780.098463] ? path_lookupat+0x860/0x860 [ 1780.099328] ? kasan_save_stack+0x32/0x40 [ 1780.100183] ? kasan_save_stack+0x1b/0x40 [ 1780.101040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1780.102089] ? security_prepare_creds+0x112/0x190 [ 1780.103081] ? prepare_creds+0x458/0x5f0 [ 1780.103932] ? prepare_exec_creds+0xd/0x260 [ 1780.104839] do_filp_open+0x17e/0x3d0 [ 1780.105626] ? may_open_dev+0xf0/0xf0 [ 1780.106425] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1780.107495] ? perf_trace_lock+0x2bd/0x490 [ 1780.108422] ? find_held_lock+0x2c/0x110 [ 1780.109276] do_open_execat+0x116/0x690 [ 1780.110105] ? __ia32_sys_uselib+0x40/0x40 [ 1780.110983] ? do_raw_spin_lock+0x121/0x260 [ 1780.111889] ? rwlock_bug.part.0+0x90/0x90 [ 1780.112791] bprm_execve+0x5b6/0x1b00 [ 1780.113603] ? open_exec+0x70/0x70 [ 1780.114341] ? memcpy+0x39/0x60 [ 1780.115030] ? copy_string_kernel+0x3b6/0x450 [ 1780.116106] do_execveat_common+0x76d/0x8d0 [ 1780.117174] ? bprm_execve+0x1b00/0x1b00 [ 1780.118104] __x64_sys_execveat+0xed/0x140 [ 1780.119006] do_syscall_64+0x33/0x40 [ 1780.119797] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.120855] RIP: 0033:0x7fbe1f492b19 [ 1780.121630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.125439] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.126978] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1780.128469] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.129955] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.131468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.132963] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1780.134510] CPU: 1 PID: 11561 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1780.135982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.137689] Call Trace: [ 1780.138244] dump_stack+0x107/0x167 [ 1780.139008] should_fail.cold+0x5/0xa [ 1780.139820] ? create_object.isra.0+0x3a/0xa20 [ 1780.140773] should_failslab+0x5/0x20 [ 1780.141563] kmem_cache_alloc+0x5b/0x360 [ 1780.142449] create_object.isra.0+0x3a/0xa20 [ 1780.143369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1780.144453] kmem_cache_alloc+0x159/0x360 [ 1780.145320] __alloc_file+0x21/0x320 [ 1780.146097] alloc_empty_file+0x6d/0x170 [ 1780.146944] path_openat+0xde/0x26d0 [ 1780.147752] ? path_lookupat+0x860/0x860 [ 1780.148609] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.149713] do_filp_open+0x17e/0x3d0 [ 1780.150388] perf: interrupt took too long (9890 > 9878), lowering kernel.perf_event_max_sample_rate to 20000 [ 1780.150499] ? may_open_dev+0xf0/0xf0 [ 1780.153289] ? lock_chain_count+0x20/0x20 [ 1780.154155] ? __lockdep_reset_lock+0x180/0x180 [ 1780.155124] ? lock_acquire+0x197/0x490 [ 1780.155938] ? find_held_lock+0x2c/0x110 [ 1780.156777] ? kmem_cache_alloc+0x159/0x360 [ 1780.157649] ? mark_held_locks+0x9e/0xe0 [ 1780.158637] do_open_execat+0x116/0x690 [ 1780.159459] ? __ia32_sys_uselib+0x40/0x40 [ 1780.160494] ? memcpy+0x39/0x60 [ 1780.161300] open_exec+0x42/0x70 [ 1780.162120] load_misc_binary+0x973/0xb70 [ 1780.163001] bprm_execve+0x9c1/0x1b00 [ 1780.163818] ? open_exec+0x70/0x70 [ 1780.164555] ? memcpy+0x39/0x60 [ 1780.165242] ? copy_string_kernel+0x3b6/0x450 [ 1780.166179] do_execveat_common+0x76d/0x8d0 [ 1780.167071] ? bprm_execve+0x1b00/0x1b00 [ 1780.167946] __x64_sys_execveat+0xed/0x140 [ 1780.168835] do_syscall_64+0x33/0x40 [ 1780.169609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.170675] RIP: 0033:0x7fe08a85eb19 [ 1780.171450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.175229] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.176795] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1780.178258] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.179725] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.181185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.182649] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1780.193052] FAULT_INJECTION: forcing a failure. [ 1780.193052] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.195458] CPU: 1 PID: 11559 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1780.196879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.198577] Call Trace: [ 1780.199159] dump_stack+0x107/0x167 04:37:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 12) [ 1780.199922] should_fail.cold+0x5/0xa [ 1780.201029] ? create_object.isra.0+0x3a/0xa20 [ 1780.202156] should_failslab+0x5/0x20 [ 1780.203092] kmem_cache_alloc+0x5b/0x360 [ 1780.203140] FAULT_INJECTION: forcing a failure. [ 1780.203140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1780.204105] create_object.isra.0+0x3a/0xa20 [ 1780.204128] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1780.204157] kmem_cache_alloc+0x159/0x360 [ 1780.209763] jbd2__journal_start+0x190/0x890 [ 1780.210852] __ext4_journal_start_sb+0x214/0x430 [ 1780.212044] ext4_dirty_inode+0xbc/0x130 [ 1780.212892] ? ext4_setattr+0x22c0/0x22c0 [ 1780.213748] __mark_inode_dirty+0x492/0xf10 [ 1780.214648] touch_atime+0x5a4/0x6a0 [ 1780.215432] ? atime_needs_update+0x600/0x600 [ 1780.216360] ? pagecache_get_page+0x243/0xc80 [ 1780.217295] generic_file_buffered_read+0x18f3/0x28f0 [ 1780.218384] ? pagecache_get_page+0xc80/0xc80 [ 1780.219349] ? __lock_acquire+0xbb1/0x5b00 [ 1780.220241] generic_file_read_iter+0x33f/0x490 [ 1780.221249] ext4_file_read_iter+0x184/0x4c0 [ 1780.222140] __kernel_read+0x593/0xaa0 [ 1780.222927] ? __x64_sys_sendfile+0x220/0x220 [ 1780.223844] ? _cond_resched+0x12/0x80 [ 1780.224632] ? avc_policy_seqno+0x9/0x70 [ 1780.225454] ? selinux_file_permission+0x36/0x510 [ 1780.226424] ? lock_downgrade+0x6d0/0x6d0 [ 1780.227305] kernel_read+0x52/0x70 [ 1780.228024] bprm_execve+0x8da/0x1b00 [ 1780.228803] ? open_exec+0x70/0x70 [ 1780.229524] ? memcpy+0x39/0x60 [ 1780.230199] ? copy_string_kernel+0x3b6/0x450 [ 1780.231144] do_execveat_common+0x76d/0x8d0 [ 1780.232029] ? bprm_execve+0x1b00/0x1b00 [ 1780.232870] __x64_sys_execveat+0xed/0x140 [ 1780.233725] do_syscall_64+0x33/0x40 [ 1780.234498] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.235542] RIP: 0033:0x7f4478f33b19 [ 1780.236301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.240033] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.241571] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1780.243005] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.244457] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.245895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.247354] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1780.248826] CPU: 0 PID: 11556 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 1780.250248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.251957] Call Trace: [ 1780.252499] dump_stack+0x107/0x167 [ 1780.253253] should_fail.cold+0x5/0xa [ 1780.254032] _copy_from_user+0x2e/0x1b0 [ 1780.254849] __copy_msghdr_from_user+0x91/0x4b0 [ 1780.255805] ? __ia32_sys_shutdown+0x80/0x80 [ 1780.256704] ? __lock_acquire+0x1657/0x5b00 [ 1780.257601] ___sys_recvmsg+0xd5/0x200 [ 1780.258393] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1780.259396] ? __lockdep_reset_lock+0x180/0x180 [ 1780.260344] ? lock_downgrade+0x6d0/0x6d0 [ 1780.261201] ? find_held_lock+0x2c/0x110 [ 1780.262032] ? __might_fault+0xd3/0x180 [ 1780.262840] ? lock_downgrade+0x6d0/0x6d0 [ 1780.263707] FAULT_INJECTION: forcing a failure. [ 1780.263707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1780.263749] do_recvmmsg+0x24c/0x6d0 [ 1780.266818] ? ___sys_recvmsg+0x200/0x200 [ 1780.267675] ? lock_downgrade+0x6d0/0x6d0 [ 1780.268534] ? ksys_write+0x12d/0x260 [ 1780.269320] ? wait_for_completion+0x270/0x270 [ 1780.270250] ? rcu_read_lock_any_held+0x75/0xa0 [ 1780.271198] ? vfs_write+0x354/0xa30 [ 1780.271956] __x64_sys_recvmmsg+0x20f/0x260 [ 1780.272827] ? ksys_write+0x1a9/0x260 [ 1780.273597] ? __ia32_sys_recvmmsg_time32+0x260/0x260 [ 1780.274646] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1780.275731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1780.276777] do_syscall_64+0x33/0x40 [ 1780.277536] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.278582] RIP: 0033:0x7fd10da95b19 [ 1780.279340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.283059] RSP: 002b:00007fd10b00b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1780.284600] RAX: ffffffffffffffda RBX: 00007fd10dba8f60 RCX: 00007fd10da95b19 [ 1780.286039] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000005 [ 1780.287509] RBP: 00007fd10b00b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.288948] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 1780.290387] R13: 00007ffc2169e44f R14: 00007fd10b00b300 R15: 0000000000022000 [ 1780.291875] CPU: 1 PID: 11572 Comm: syz-executor.0 Not tainted 5.10.153 #1 04:37:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 1780.293293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.295098] Call Trace: [ 1780.295653] dump_stack+0x107/0x167 [ 1780.296394] should_fail.cold+0x5/0xa [ 1780.297173] __alloc_pages_nodemask+0x182/0x680 [ 1780.298120] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1780.299412] ? lock_downgrade+0x6d0/0x6d0 [ 1780.300251] ? do_raw_spin_lock+0x121/0x260 [ 1780.301133] alloc_pages_current+0x187/0x280 [ 1780.302023] __pmd_alloc+0x37/0x5e0 [ 1780.302765] handle_mm_fault+0x1ae0/0x3520 [ 1780.303631] ? register_lock_class+0xbb/0x17b0 [ 1780.304560] ? perf_trace_lock+0xac/0x490 [ 1780.305396] ? __lockdep_reset_lock+0x180/0x180 [ 1780.306338] ? __pmd_alloc+0x5e0/0x5e0 [ 1780.307158] __get_user_pages+0x61b/0x1390 [ 1780.308024] ? follow_page_mask+0x1860/0x1860 [ 1780.308932] ? __lockdep_reset_lock+0x180/0x180 [ 1780.309866] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1780.310819] __get_user_pages_remote+0x1d5/0x870 [ 1780.311794] ? lock_downgrade+0x6d0/0x6d0 [ 1780.312635] get_user_pages_remote+0x63/0x90 [ 1780.313523] get_arg_page+0xba/0x200 [ 1780.314274] ? acct_arg_size+0xe0/0xe0 [ 1780.315053] ? downgrade_write+0x3a0/0x3a0 [ 1780.315923] ? count.constprop.0+0x1b3/0x290 [ 1780.316819] copy_string_kernel+0x1b4/0x450 [ 1780.317699] do_execveat_common+0x520/0x8d0 [ 1780.318570] ? bprm_execve+0x1b00/0x1b00 [ 1780.319434] __x64_sys_execveat+0xed/0x140 [ 1780.320288] do_syscall_64+0x33/0x40 [ 1780.321037] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.322064] RIP: 0033:0x7f21a736cb19 [ 1780.322811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.326515] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.328073] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1780.329520] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.330960] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.332407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.333841] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:37:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 25) [ 1780.356657] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1780.360346] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1780.364321] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1780.398871] FAULT_INJECTION: forcing a failure. [ 1780.398871] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.401264] CPU: 0 PID: 11577 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1780.402702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.404409] Call Trace: [ 1780.404966] dump_stack+0x107/0x167 [ 1780.405729] should_fail.cold+0x5/0xa [ 1780.406524] ? create_object.isra.0+0x3a/0xa20 [ 1780.407479] should_failslab+0x5/0x20 [ 1780.408269] kmem_cache_alloc+0x5b/0x360 [ 1780.409109] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1780.410250] create_object.isra.0+0x3a/0xa20 [ 1780.411172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1780.412234] kmem_cache_alloc+0x159/0x360 [ 1780.412302] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1780.413098] security_file_alloc+0x34/0x170 [ 1780.413130] __alloc_file+0xb6/0x320 [ 1780.415138] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1780.415502] alloc_empty_file+0x6d/0x170 [ 1780.415533] path_openat+0xde/0x26d0 [ 1780.419335] ? stack_trace_save+0x8c/0xc0 [ 1780.420189] ? stack_trace_consume_entry+0x160/0x160 [ 1780.421234] ? path_lookupat+0x860/0x860 [ 1780.422092] ? kasan_save_stack+0x32/0x40 [ 1780.422949] ? kasan_save_stack+0x1b/0x40 [ 1780.423810] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1780.424845] ? security_prepare_creds+0x112/0x190 [ 1780.425831] ? prepare_creds+0x458/0x5f0 [ 1780.426661] ? prepare_exec_creds+0xd/0x260 [ 1780.427563] do_filp_open+0x17e/0x3d0 [ 1780.428345] ? may_open_dev+0xf0/0xf0 [ 1780.429133] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1780.430191] ? perf_trace_lock+0x2bd/0x490 [ 1780.431095] ? find_held_lock+0x2c/0x110 [ 1780.431970] do_open_execat+0x116/0x690 [ 1780.432789] ? __ia32_sys_uselib+0x40/0x40 [ 1780.433651] ? do_raw_spin_lock+0x121/0x260 [ 1780.434538] ? rwlock_bug.part.0+0x90/0x90 [ 1780.435437] bprm_execve+0x5b6/0x1b00 [ 1780.436254] ? open_exec+0x70/0x70 [ 1780.436984] ? memcpy+0x39/0x60 [ 1780.437666] ? copy_string_kernel+0x3b6/0x450 [ 1780.438605] do_execveat_common+0x76d/0x8d0 [ 1780.439511] ? bprm_execve+0x1b00/0x1b00 [ 1780.440381] __x64_sys_execveat+0xed/0x140 [ 1780.441255] do_syscall_64+0x33/0x40 [ 1780.442019] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.443056] RIP: 0033:0x7fbe1f492b19 [ 1780.443825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.447534] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.449104] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1780.450547] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.452013] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.453455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.454908] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) [ 1780.545801] FAULT_INJECTION: forcing a failure. [ 1780.545801] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.548157] CPU: 0 PID: 11582 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1780.549560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1780.551263] Call Trace: [ 1780.551813] dump_stack+0x107/0x167 [ 1780.552575] should_fail.cold+0x5/0xa [ 1780.553368] should_failslab+0x5/0x20 [ 1780.554157] __kmalloc_track_caller+0x79/0x3c0 [ 1780.555090] ? bprm_change_interp+0x7c/0xf0 [ 1780.555999] kstrdup+0x36/0x70 [ 1780.556662] bprm_change_interp+0x7c/0xf0 [ 1780.557518] load_misc_binary+0x3a5/0xb70 [ 1780.558385] bprm_execve+0x9c1/0x1b00 [ 1780.559206] ? open_exec+0x70/0x70 [ 1780.559934] ? memcpy+0x39/0x60 [ 1780.560609] ? copy_string_kernel+0x3b6/0x450 [ 1780.561542] do_execveat_common+0x76d/0x8d0 [ 1780.562437] ? bprm_execve+0x1b00/0x1b00 [ 1780.563312] __x64_sys_execveat+0xed/0x140 [ 1780.564191] do_syscall_64+0x33/0x40 [ 1780.564953] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1780.565996] RIP: 0033:0x7f4478f33b19 [ 1780.566762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1780.570497] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1780.572054] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1780.573496] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1780.574940] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1780.576398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.577852] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:37:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 13) 04:37:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 04:37:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 04:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) 04:37:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) 04:37:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x1000000}) 04:37:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x95}}, './file2\x00'}) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x12002, 0x20) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)) 04:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000540)={0x0, 0x3}) [ 1791.254674] FAULT_INJECTION: forcing a failure. [ 1791.254674] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.257326] CPU: 1 PID: 11592 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1791.258886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.260774] Call Trace: [ 1791.261384] dump_stack+0x107/0x167 [ 1791.262217] should_fail.cold+0x5/0xa [ 1791.263088] ? __alloc_file+0x21/0x320 [ 1791.264005] should_failslab+0x5/0x20 [ 1791.264877] kmem_cache_alloc+0x5b/0x360 [ 1791.265810] __alloc_file+0x21/0x320 [ 1791.266661] alloc_empty_file+0x6d/0x170 [ 1791.267608] path_openat+0xde/0x26d0 [ 1791.268471] ? path_lookupat+0x860/0x860 [ 1791.269409] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.270617] do_filp_open+0x17e/0x3d0 [ 1791.271484] ? may_open_dev+0xf0/0xf0 [ 1791.272351] ? lock_chain_count+0x20/0x20 [ 1791.273296] ? __lockdep_reset_lock+0x180/0x180 [ 1791.274345] ? lock_acquire+0x197/0x490 [ 1791.275277] ? find_held_lock+0x2c/0x110 [ 1791.276198] ? kmem_cache_alloc+0x159/0x360 [ 1791.277169] ? mark_held_locks+0x9e/0xe0 [ 1791.278084] do_open_execat+0x116/0x690 [ 1791.278976] ? __ia32_sys_uselib+0x40/0x40 [ 1791.279940] ? memcpy+0x39/0x60 [ 1791.280694] open_exec+0x42/0x70 [ 1791.281459] load_misc_binary+0x973/0xb70 [ 1791.282399] bprm_execve+0x9c1/0x1b00 [ 1791.283277] ? open_exec+0x70/0x70 [ 1791.284077] ? memcpy+0x39/0x60 [ 1791.284823] ? copy_string_kernel+0x3b6/0x450 [ 1791.285839] do_execveat_common+0x76d/0x8d0 [ 1791.286807] ? bprm_execve+0x1b00/0x1b00 [ 1791.287757] __x64_sys_execveat+0xed/0x140 [ 1791.288726] do_syscall_64+0x33/0x40 [ 1791.289562] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.290112] FAULT_INJECTION: forcing a failure. [ 1791.290112] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.290708] RIP: 0033:0x7fe08a85eb19 [ 1791.290733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.290745] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.290768] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1791.290781] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.290804] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.305193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.306813] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1791.308486] CPU: 0 PID: 11602 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1791.310073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.311991] Call Trace: [ 1791.312608] dump_stack+0x107/0x167 [ 1791.313452] should_fail.cold+0x5/0xa [ 1791.314328] ? __pmd_alloc+0x94/0x5e0 [ 1791.315204] should_failslab+0x5/0x20 [ 1791.316088] kmem_cache_alloc+0x5b/0x360 [ 1791.317024] __pmd_alloc+0x94/0x5e0 [ 1791.317219] FAULT_INJECTION: forcing a failure. [ 1791.317219] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.317854] handle_mm_fault+0x1ae0/0x3520 [ 1791.317887] ? perf_trace_lock+0x2bd/0x490 [ 1791.322224] ? __lockdep_reset_lock+0x180/0x180 [ 1791.323268] ? __pmd_alloc+0x5e0/0x5e0 [ 1791.324209] __get_user_pages+0x61b/0x1390 [ 1791.325171] ? follow_page_mask+0x1860/0x1860 [ 1791.326190] ? __lockdep_reset_lock+0x180/0x180 [ 1791.327219] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1791.328316] __get_user_pages_remote+0x1d5/0x870 [ 1791.329400] ? lock_downgrade+0x6d0/0x6d0 [ 1791.330366] get_user_pages_remote+0x63/0x90 [ 1791.331472] get_arg_page+0xba/0x200 [ 1791.332325] ? acct_arg_size+0xe0/0xe0 [ 1791.333179] ? downgrade_write+0x3a0/0x3a0 [ 1791.334137] ? count.constprop.0+0x1b3/0x290 [ 1791.335129] copy_string_kernel+0x1b4/0x450 [ 1791.336136] do_execveat_common+0x520/0x8d0 [ 1791.337105] ? bprm_execve+0x1b00/0x1b00 [ 1791.338050] __x64_sys_execveat+0xed/0x140 [ 1791.338992] do_syscall_64+0x33/0x40 [ 1791.339839] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.340948] RIP: 0033:0x7f21a736cb19 [ 1791.341784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.345776] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.347672] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1791.349222] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.351123] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.352696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.354609] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1791.356241] CPU: 1 PID: 11598 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1791.357800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.359618] Call Trace: [ 1791.360318] dump_stack+0x107/0x167 [ 1791.361275] should_fail.cold+0x5/0xa [ 1791.362275] ? create_object.isra.0+0x3a/0xa20 [ 1791.363490] should_failslab+0x5/0x20 [ 1791.364505] kmem_cache_alloc+0x5b/0x360 [ 1791.365582] create_object.isra.0+0x3a/0xa20 [ 1791.366734] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1791.367854] __kmalloc_track_caller+0x177/0x3c0 [ 1791.369065] ? bprm_change_interp+0x7c/0xf0 [ 1791.370209] kstrdup+0x36/0x70 [ 1791.371054] bprm_change_interp+0x7c/0xf0 [ 1791.372159] load_misc_binary+0x3a5/0xb70 [ 1791.373259] bprm_execve+0x9c1/0x1b00 [ 1791.374276] ? open_exec+0x70/0x70 [ 1791.375207] ? memcpy+0x39/0x60 [ 1791.376106] ? copy_string_kernel+0x3b6/0x450 [ 1791.377097] do_execveat_common+0x76d/0x8d0 [ 1791.378225] ? bprm_execve+0x1b00/0x1b00 [ 1791.379313] __x64_sys_execveat+0xed/0x140 [ 1791.380233] do_syscall_64+0x33/0x40 [ 1791.381202] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.382531] RIP: 0033:0x7f4478f33b19 [ 1791.383507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.388275] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.390248] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1791.392103] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.393943] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.395810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.397635] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1791.426081] FAULT_INJECTION: forcing a failure. [ 1791.426081] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.428551] CPU: 0 PID: 11606 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1791.430305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.432056] Call Trace: [ 1791.432710] dump_stack+0x107/0x167 [ 1791.433493] should_fail.cold+0x5/0xa [ 1791.434324] ? jbd2__journal_start+0x190/0x890 [ 1791.435324] should_failslab+0x5/0x20 [ 1791.436132] kmem_cache_alloc+0x5b/0x360 [ 1791.437014] jbd2__journal_start+0x190/0x890 [ 1791.437966] __ext4_journal_start_sb+0x214/0x430 [ 1791.438995] ext4_dirty_inode+0xbc/0x130 [ 1791.439863] ? ext4_setattr+0x22c0/0x22c0 [ 1791.440727] __mark_inode_dirty+0x492/0xf10 [ 1791.441655] touch_atime+0x5a4/0x6a0 [ 1791.442552] ? atime_needs_update+0x600/0x600 [ 1791.443546] ? pagecache_get_page+0x243/0xc80 [ 1791.444702] generic_file_buffered_read+0x18f3/0x28f0 [ 1791.446061] ? pagecache_get_page+0xc80/0xc80 [ 1791.447059] generic_file_read_iter+0x33f/0x490 [ 1791.448277] ext4_file_read_iter+0x184/0x4c0 [ 1791.449223] __kernel_read+0x593/0xaa0 [ 1791.450213] ? __x64_sys_sendfile+0x220/0x220 [ 1791.451347] ? _cond_resched+0x12/0x80 [ 1791.452176] ? avc_policy_seqno+0x9/0x70 [ 1791.453075] ? selinux_file_permission+0x36/0x510 [ 1791.454114] ? lock_downgrade+0x6d0/0x6d0 [ 1791.454994] kernel_read+0x52/0x70 [ 1791.455764] bprm_execve+0x8da/0x1b00 [ 1791.456585] ? open_exec+0x70/0x70 [ 1791.457327] ? memcpy+0x39/0x60 [ 1791.458029] ? copy_string_kernel+0x3b6/0x450 [ 1791.458989] do_execveat_common+0x76d/0x8d0 [ 1791.459901] ? bprm_execve+0x1b00/0x1b00 [ 1791.460792] __x64_sys_execveat+0xed/0x140 [ 1791.461672] do_syscall_64+0x33/0x40 [ 1791.462596] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.463671] RIP: 0033:0x7fbe1f492b19 [ 1791.464603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.469139] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.470894] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1791.472382] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.473835] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.475299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.476765] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 14) 04:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f0000000540)={0x0, 0x3}) [ 1791.499572] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1791.502908] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1791.534651] FAULT_INJECTION: forcing a failure. [ 1791.534651] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.537471] CPU: 1 PID: 11616 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1791.539068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.540995] Call Trace: [ 1791.541614] dump_stack+0x107/0x167 [ 1791.542469] should_fail.cold+0x5/0xa [ 1791.543374] ? __pmd_alloc+0x94/0x5e0 [ 1791.544257] should_failslab+0x5/0x20 [ 1791.545138] kmem_cache_alloc+0x5b/0x360 [ 1791.546083] __pmd_alloc+0x94/0x5e0 [ 1791.546931] handle_mm_fault+0x1ae0/0x3520 [ 1791.547908] ? register_lock_class+0xbb/0x17b0 [ 1791.548953] ? perf_trace_lock+0xac/0x490 [ 1791.549900] ? __lockdep_reset_lock+0x180/0x180 [ 1791.550960] ? __pmd_alloc+0x5e0/0x5e0 [ 1791.551901] __get_user_pages+0x61b/0x1390 [ 1791.552885] ? follow_page_mask+0x1860/0x1860 [ 1791.553914] ? __lockdep_reset_lock+0x180/0x180 [ 1791.554976] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1791.556077] __get_user_pages_remote+0x1d5/0x870 [ 1791.557196] ? lock_downgrade+0x6d0/0x6d0 [ 1791.558177] get_user_pages_remote+0x63/0x90 [ 1791.559213] get_arg_page+0xba/0x200 [ 1791.560098] ? acct_arg_size+0xe0/0xe0 [ 1791.560991] ? downgrade_write+0x3a0/0x3a0 [ 1791.561961] ? count.constprop.0+0x1b3/0x290 [ 1791.562971] copy_string_kernel+0x1b4/0x450 [ 1791.563978] do_execveat_common+0x520/0x8d0 [ 1791.564969] ? bprm_execve+0x1b00/0x1b00 [ 1791.565968] __x64_sys_execveat+0xed/0x140 [ 1791.567014] do_syscall_64+0x33/0x40 [ 1791.567930] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.569152] RIP: 0033:0x7f21a736cb19 [ 1791.570027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.574268] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.576037] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1791.577675] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.579335] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.580977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.582614] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:37:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 04:37:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) [ 1791.621805] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1791.624254] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1791.673580] FAULT_INJECTION: forcing a failure. [ 1791.673580] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.676200] CPU: 1 PID: 11626 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1791.677695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.679498] Call Trace: [ 1791.680077] dump_stack+0x107/0x167 [ 1791.680877] should_fail.cold+0x5/0xa [ 1791.681708] ? create_object.isra.0+0x3a/0xa20 [ 1791.682708] should_failslab+0x5/0x20 [ 1791.683545] kmem_cache_alloc+0x5b/0x360 [ 1791.684436] create_object.isra.0+0x3a/0xa20 [ 1791.685388] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1791.686480] kmem_cache_alloc+0x159/0x360 [ 1791.687407] __alloc_file+0x21/0x320 [ 1791.688206] alloc_empty_file+0x6d/0x170 [ 1791.689094] path_openat+0xde/0x26d0 [ 1791.689916] ? path_lookupat+0x860/0x860 [ 1791.690810] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.691964] do_filp_open+0x17e/0x3d0 [ 1791.692777] ? may_open_dev+0xf0/0xf0 [ 1791.693596] ? lock_chain_count+0x20/0x20 [ 1791.694492] ? __lockdep_reset_lock+0x180/0x180 [ 1791.695495] ? lock_acquire+0x197/0x490 [ 1791.696357] ? find_held_lock+0x2c/0x110 [ 1791.697233] ? kmem_cache_alloc+0x159/0x360 [ 1791.698167] ? mark_held_locks+0x9e/0xe0 [ 1791.699058] do_open_execat+0x116/0x690 [ 1791.699928] ? __ia32_sys_uselib+0x40/0x40 [ 1791.700839] ? memcpy+0x39/0x60 [ 1791.701561] open_exec+0x42/0x70 [ 1791.702292] load_misc_binary+0x973/0xb70 [ 1791.703191] bprm_execve+0x9c1/0x1b00 [ 1791.704023] ? open_exec+0x70/0x70 [ 1791.704785] ? memcpy+0x39/0x60 [ 1791.705496] ? copy_string_kernel+0x3b6/0x450 [ 1791.706465] do_execveat_common+0x76d/0x8d0 [ 1791.707410] ? bprm_execve+0x1b00/0x1b00 [ 1791.708304] __x64_sys_execveat+0xed/0x140 [ 1791.709375] do_syscall_64+0x33/0x40 [ 1791.710175] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.711282] RIP: 0033:0x7fe08a85eb19 [ 1791.712211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.716107] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.717994] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1791.719498] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.720992] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.722462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.723997] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) 04:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0189436, &(0x7f0000000540)={0x0, 0x3}) 04:37:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xfdfdffff}) 04:37:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 15) 04:37:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300)="75120a7a3917b19cc34518d950fca8ea354cc726c095080964c131d5312f01af97c6fd0e985e6cdbf329a6b99eae7bd64179d1b01fc7be896b4f3492e98313c7677ac8e064cccf14", 0x48, 0x10000}], 0x1000000, &(0x7f0000000380)={[{@sbsector={'sbsector', 0x3d, 0x101}}, {@nojoliet}], [{@audit}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd/4\x00'}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@smackfshat={'smackfshat', 0x3d, '[\\&}^('}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) readlinkat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=""/64, 0x40) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f0000000480)='./file2\x00', 0xc0000, 0xa) openat(r1, &(0x7f00000004c0)='./file1\x00', 0xa8000, 0x11) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) [ 1791.812793] FAULT_INJECTION: forcing a failure. [ 1791.812793] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.815457] CPU: 1 PID: 11628 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1791.817006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.818913] Call Trace: [ 1791.819525] dump_stack+0x107/0x167 [ 1791.820350] should_fail.cold+0x5/0xa [ 1791.821213] ? getname_kernel+0x4e/0x370 [ 1791.822138] should_failslab+0x5/0x20 [ 1791.822992] kmem_cache_alloc+0x5b/0x360 [ 1791.823929] getname_kernel+0x4e/0x370 [ 1791.824802] open_exec+0x13/0x70 [ 1791.825566] load_misc_binary+0x973/0xb70 [ 1791.826506] bprm_execve+0x9c1/0x1b00 [ 1791.827381] ? open_exec+0x70/0x70 [ 1791.828175] ? memcpy+0x39/0x60 [ 1791.828916] ? copy_string_kernel+0x3b6/0x450 [ 1791.829931] do_execveat_common+0x76d/0x8d0 [ 1791.830900] ? bprm_execve+0x1b00/0x1b00 [ 1791.831840] __x64_sys_execveat+0xed/0x140 [ 1791.832790] do_syscall_64+0x33/0x40 [ 1791.833619] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.834761] RIP: 0033:0x7f4478f33b19 [ 1791.835605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.839706] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.841389] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1791.842965] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.844568] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.846135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.847743] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:37:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 1791.878178] FAULT_INJECTION: forcing a failure. [ 1791.878178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1791.880839] CPU: 1 PID: 11640 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1791.881438] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value [ 1791.882342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.882350] Call Trace: [ 1791.882377] dump_stack+0x107/0x167 [ 1791.882408] should_fail.cold+0x5/0xa [ 1791.887991] __alloc_pages_nodemask+0x182/0x680 [ 1791.889006] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1791.890296] ? find_held_lock+0x2c/0x110 [ 1791.891185] ? __pmd_alloc+0x2db/0x5e0 [ 1791.892038] ? lock_downgrade+0x6d0/0x6d0 [ 1791.892929] ? do_raw_spin_lock+0x121/0x260 [ 1791.893861] alloc_pages_current+0x187/0x280 [ 1791.894839] pte_alloc_one+0x16/0x1a0 [ 1791.895668] __pte_alloc+0x1d/0x330 [ 1791.896453] handle_mm_fault+0x289e/0x3520 [ 1791.897367] ? perf_trace_lock+0xac/0x490 [ 1791.898263] ? __lockdep_reset_lock+0x180/0x180 [ 1791.899268] ? __pmd_alloc+0x5e0/0x5e0 [ 1791.900150] __get_user_pages+0x61b/0x1390 [ 1791.901067] ? follow_page_mask+0x1860/0x1860 [ 1791.902022] ? __lockdep_reset_lock+0x180/0x180 [ 1791.903008] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1791.904052] __get_user_pages_remote+0x1d5/0x870 [ 1791.905066] ? lock_downgrade+0x6d0/0x6d0 [ 1791.905969] get_user_pages_remote+0x63/0x90 [ 1791.906916] get_arg_page+0xba/0x200 [ 1791.907723] ? acct_arg_size+0xe0/0xe0 [ 1791.908550] ? downgrade_write+0x3a0/0x3a0 [ 1791.909462] ? count.constprop.0+0x1b3/0x290 [ 1791.910400] copy_string_kernel+0x1b4/0x450 [ 1791.911356] do_execveat_common+0x520/0x8d0 [ 1791.912272] ? bprm_execve+0x1b00/0x1b00 [ 1791.913161] __x64_sys_execveat+0xed/0x140 [ 1791.914070] do_syscall_64+0x33/0x40 [ 1791.914884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.915977] RIP: 0033:0x7f21a736cb19 [ 1791.916767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.920633] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1791.922216] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1791.923707] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1791.925179] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.926660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.928138] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1792.035244] FAULT_INJECTION: forcing a failure. [ 1792.035244] name failslab, interval 1, probability 0, space 0, times 0 [ 1792.038197] CPU: 1 PID: 11648 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1792.039756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1792.041581] Call Trace: [ 1792.042177] dump_stack+0x107/0x167 [ 1792.042993] should_fail.cold+0x5/0xa [ 1792.043844] ? create_object.isra.0+0x3a/0xa20 [ 1792.044852] should_failslab+0x5/0x20 [ 1792.045695] kmem_cache_alloc+0x5b/0x360 [ 1792.046599] create_object.isra.0+0x3a/0xa20 [ 1792.047574] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1792.048698] kmem_cache_alloc+0x159/0x360 [ 1792.049625] jbd2__journal_start+0x190/0x890 [ 1792.050605] __ext4_journal_start_sb+0x214/0x430 [ 1792.051677] ext4_dirty_inode+0xbc/0x130 [ 1792.052594] ? ext4_setattr+0x22c0/0x22c0 [ 1792.053509] __mark_inode_dirty+0x492/0xf10 [ 1792.054468] touch_atime+0x5a4/0x6a0 [ 1792.055301] ? atime_needs_update+0x600/0x600 [ 1792.056297] ? pagecache_get_page+0x243/0xc80 [ 1792.057301] generic_file_buffered_read+0x18f3/0x28f0 [ 1792.058470] ? pagecache_get_page+0xc80/0xc80 [ 1792.059487] ? __lock_acquire+0xbb1/0x5b00 [ 1792.060432] generic_file_read_iter+0x33f/0x490 [ 1792.061471] ext4_file_read_iter+0x184/0x4c0 [ 1792.062446] __kernel_read+0x593/0xaa0 [ 1792.063317] ? __x64_sys_sendfile+0x220/0x220 [ 1792.064309] ? _cond_resched+0x12/0x80 [ 1792.065174] ? avc_policy_seqno+0x9/0x70 [ 1792.066074] ? selinux_file_permission+0x36/0x510 [ 1792.067145] ? lock_downgrade+0x6d0/0x6d0 [ 1792.068090] kernel_read+0x52/0x70 [ 1792.068885] bprm_execve+0x8da/0x1b00 [ 1792.069734] ? open_exec+0x70/0x70 [ 1792.070526] ? memcpy+0x39/0x60 [ 1792.071280] ? copy_string_kernel+0x3b6/0x450 [ 1792.072286] do_execveat_common+0x76d/0x8d0 [ 1792.073243] ? bprm_execve+0x1b00/0x1b00 [ 1792.074175] __x64_sys_execveat+0xed/0x140 [ 1792.075119] do_syscall_64+0x33/0x40 [ 1792.075955] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1792.077088] RIP: 0033:0x7fbe1f492b19 [ 1792.077914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1792.081963] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1792.083649] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1792.085220] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1792.086805] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1792.088371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1792.089924] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) 04:37:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 04:37:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x4, 0x0}}], 0x500, 0x20000022, 0x0) 04:37:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 04:37:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xfffffdfd}) 04:37:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f0000000540)={0x0, 0x3}) 04:37:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 16) 04:37:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="746d615a19764d375b3a85646e6f3d03690f5ef0926e1f8a417da5c5c1273e356eb7754fbfce8361580ec4742d3c256a316a30485cc0aac402aa18f4079e55eda416c95d4581e342fa3b4fdca58575ffc85bae41d9fad9f58a3fa65c59093285e787", @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d9c243da07534f90f8cb3769f0279f67dcd2b172f81e99f42a9c9b14f527a5b6161a9ea73c774f7c678e26e2dc60dded91f3d107abe789e9529388e02529727797e02fb64e133c9c83061ad067b5d06e3757351e53a7e9693dfece4dd2d92bb", @ANYRES16=r0, @ANYBLOB=',\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801393d999240", 0x1c}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYBLOB="16386f0e5d152cbf0d614d173c8b76737d181c3ce53fe100fa03a263326e882bef9b29a47451cc0a60488eb83cd1a3832862af720426c4e3e1e30c06cabd6db4baa45ca938ee5551561a946463472b09d1747695378b1a28bc324f889f2f4d075c81c543c934bc95160e3907f3ad93479cc1317c2b10d10394afd2f9a51979507cfee564f046a91688588b4da56731fd014e3c3ce4387d7a350f098ae163113d2459666288e80a6f216750f5a1f24e0b4d1870b233098b4604d19583cf475b0a05cb28fe3e388ee1b70d2153302c6f1901b10f8f1473f18c9f057936def67992bc0f484a34a149b20c", @ANYRESOCT=r2, @ANYRESDEC=r3]) chdir(&(0x7f0000000040)='./file0\x00') r4 = perf_event_open$cgroup(&(0x7f0000000300)={0x3, 0x80, 0x8, 0x5, 0x8, 0xfc, 0x0, 0x44, 0x80040, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x10, 0x7, 0xe23, 0x2, 0x4, 0x20, 0x0, 0x0, 0x2, 0x0, 0x1ff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x9) write$binfmt_script(r4, &(0x7f0000000380)={'#! ', './file2', [{0x20, 'vfat\x00'}, {0x20, '*):'}, {0x20, 'fd/4\x00'}, {}, {0x20, '#]-'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}], 0xa, "58894fd2f0a25eb85bc60af81515d45996ceb185cd212b393748b261af165e1e290bd0c70fa2b05cc081aff85f2da2f3067b62054dce1ce304000d3eda96ec25488f5c15732a20ce18ae56627d61837358073972f6698b7143a6a85fbd47d372b67a534e108bcbda1844a733d3c97bb217bd41f41e99dab7ba49bcbddd4586477f6cee7ffbae9995c30c33"}, 0xb7) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r6, 0x1, &(0x7f0000000540)) ioctl$EVIOCGSND(r5, 0x8040451a, &(0x7f00000000c0)=""/15) [ 1807.120484] FAULT_INJECTION: forcing a failure. [ 1807.120484] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.122787] CPU: 1 PID: 11663 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1807.124177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.125832] Call Trace: [ 1807.126366] dump_stack+0x107/0x167 [ 1807.127100] should_fail.cold+0x5/0xa [ 1807.127893] should_failslab+0x5/0x20 [ 1807.128677] __kmalloc_track_caller+0x79/0x3c0 [ 1807.129627] ? bprm_change_interp+0x7c/0xf0 [ 1807.130524] kstrdup+0x36/0x70 [ 1807.131189] bprm_change_interp+0x7c/0xf0 [ 1807.132057] load_misc_binary+0x3a5/0xb70 [ 1807.132925] bprm_execve+0x9c1/0x1b00 [ 1807.133721] ? open_exec+0x70/0x70 [ 1807.134454] ? memcpy+0x39/0x60 [ 1807.135140] ? copy_string_kernel+0x3b6/0x450 [ 1807.136094] do_execveat_common+0x76d/0x8d0 [ 1807.136988] ? bprm_execve+0x1b00/0x1b00 [ 1807.137845] __x64_sys_execveat+0xed/0x140 [ 1807.138719] do_syscall_64+0x33/0x40 [ 1807.139492] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.140537] RIP: 0033:0x7fbe1f492b19 [ 1807.141298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.145079] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.146643] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1807.148142] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.149614] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.151078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.152558] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1807.160518] FAULT_INJECTION: forcing a failure. [ 1807.160518] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.162877] CPU: 1 PID: 11666 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1807.164311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.166003] Call Trace: [ 1807.166549] dump_stack+0x107/0x167 [ 1807.167308] should_fail.cold+0x5/0xa [ 1807.168119] ? ptlock_alloc+0x1d/0x70 [ 1807.168906] should_failslab+0x5/0x20 [ 1807.169690] kmem_cache_alloc+0x5b/0x360 [ 1807.170538] ptlock_alloc+0x1d/0x70 [ 1807.171287] pte_alloc_one+0x68/0x1a0 [ 1807.172102] __pte_alloc+0x1d/0x330 [ 1807.172856] handle_mm_fault+0x289e/0x3520 [ 1807.173732] ? perf_trace_lock+0xac/0x490 [ 1807.174594] ? __lockdep_reset_lock+0x180/0x180 [ 1807.175563] ? __pmd_alloc+0x5e0/0x5e0 [ 1807.176403] __get_user_pages+0x61b/0x1390 [ 1807.177287] ? follow_page_mask+0x1860/0x1860 [ 1807.178216] ? __lockdep_reset_lock+0x180/0x180 [ 1807.179176] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1807.180176] __get_user_pages_remote+0x1d5/0x870 [ 1807.181146] ? lock_downgrade+0x6d0/0x6d0 [ 1807.182010] get_user_pages_remote+0x63/0x90 [ 1807.182922] get_arg_page+0xba/0x200 [ 1807.183702] ? acct_arg_size+0xe0/0xe0 [ 1807.184508] ? downgrade_write+0x3a0/0x3a0 [ 1807.185376] ? count.constprop.0+0x1b3/0x290 [ 1807.186281] copy_string_kernel+0x1b4/0x450 [ 1807.187178] do_execveat_common+0x520/0x8d0 [ 1807.188081] ? bprm_execve+0x1b00/0x1b00 [ 1807.188925] __x64_sys_execveat+0xed/0x140 [ 1807.189789] do_syscall_64+0x33/0x40 [ 1807.190551] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.191610] RIP: 0033:0x7f21a736cb19 [ 1807.192370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.196101] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.197634] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1807.199049] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.200499] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.201922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.203349] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1807.209910] FAULT_INJECTION: forcing a failure. [ 1807.209910] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.212562] CPU: 0 PID: 11672 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1807.213971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.215664] Call Trace: [ 1807.216209] dump_stack+0x107/0x167 [ 1807.216958] should_fail.cold+0x5/0xa [ 1807.217739] ? create_object.isra.0+0x3a/0xa20 [ 1807.218669] should_failslab+0x5/0x20 [ 1807.219465] kmem_cache_alloc+0x5b/0x360 [ 1807.220319] create_object.isra.0+0x3a/0xa20 [ 1807.221225] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1807.222266] kmem_cache_alloc+0x159/0x360 [ 1807.223133] getname_kernel+0x4e/0x370 [ 1807.223958] open_exec+0x13/0x70 [ 1807.224671] load_misc_binary+0x973/0xb70 [ 1807.225555] bprm_execve+0x9c1/0x1b00 [ 1807.226354] ? open_exec+0x70/0x70 [ 1807.227090] ? memcpy+0x39/0x60 [ 1807.227778] ? copy_string_kernel+0x3b6/0x450 [ 1807.228728] do_execveat_common+0x76d/0x8d0 [ 1807.229612] ? bprm_execve+0x1b00/0x1b00 [ 1807.230490] __x64_sys_execveat+0xed/0x140 [ 1807.231376] do_syscall_64+0x33/0x40 [ 1807.232163] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.233229] RIP: 0033:0x7f4478f33b19 [ 1807.233983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.237734] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.239283] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1807.240741] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.242190] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.243661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.245108] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1807.255670] FAULT_INJECTION: forcing a failure. [ 1807.255670] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.258023] CPU: 0 PID: 11665 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1807.259431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.261125] Call Trace: [ 1807.261670] dump_stack+0x107/0x167 [ 1807.262439] should_fail.cold+0x5/0xa [ 1807.263228] ? security_file_alloc+0x34/0x170 [ 1807.264185] should_failslab+0x5/0x20 [ 1807.264963] kmem_cache_alloc+0x5b/0x360 [ 1807.265836] security_file_alloc+0x34/0x170 [ 1807.266728] __alloc_file+0xb6/0x320 [ 1807.267532] alloc_empty_file+0x6d/0x170 [ 1807.268369] path_openat+0xde/0x26d0 [ 1807.269165] ? path_lookupat+0x860/0x860 [ 1807.270018] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1807.271040] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1807.272086] do_filp_open+0x17e/0x3d0 [ 1807.272868] ? may_open_dev+0xf0/0xf0 [ 1807.273651] ? lock_chain_count+0x20/0x20 [ 1807.274507] ? __lockdep_reset_lock+0x180/0x180 [ 1807.275474] ? lock_acquire+0x197/0x490 [ 1807.276307] ? find_held_lock+0x2c/0x110 [ 1807.277149] ? kmem_cache_alloc+0x159/0x360 [ 1807.278043] ? mark_held_locks+0x9e/0xe0 [ 1807.278886] do_open_execat+0x116/0x690 [ 1807.279719] ? __ia32_sys_uselib+0x40/0x40 [ 1807.280731] ? memcpy+0x39/0x60 [ 1807.281423] open_exec+0x42/0x70 [ 1807.282120] load_misc_binary+0x973/0xb70 [ 1807.282998] bprm_execve+0x9c1/0x1b00 [ 1807.283812] ? open_exec+0x70/0x70 [ 1807.284545] ? memcpy+0x39/0x60 [ 1807.285223] ? copy_string_kernel+0x3b6/0x450 [ 1807.286156] do_execveat_common+0x76d/0x8d0 [ 1807.287039] ? bprm_execve+0x1b00/0x1b00 [ 1807.287923] __x64_sys_execveat+0xed/0x140 [ 1807.288820] do_syscall_64+0x33/0x40 [ 1807.289584] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.290646] RIP: 0033:0x7fe08a85eb19 [ 1807.291401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.295281] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.296874] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1807.298357] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.299852] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.301339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.302771] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) [ 1807.345325] FAT-fs (loop1): Unrecognized mount option "ÿÿ8o]" or missing value 04:37:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x2000, 0x0}}], 0x500, 0x20000022, 0x0) 04:37:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 17) 04:37:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) [ 1807.396183] FAULT_INJECTION: forcing a failure. [ 1807.396183] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.398670] CPU: 0 PID: 11685 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1807.400086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.401777] Call Trace: [ 1807.402334] dump_stack+0x107/0x167 [ 1807.403091] should_fail.cold+0x5/0xa [ 1807.403882] ? create_object.isra.0+0x3a/0xa20 [ 1807.404846] should_failslab+0x5/0x20 [ 1807.405638] kmem_cache_alloc+0x5b/0x360 [ 1807.406475] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1807.407715] create_object.isra.0+0x3a/0xa20 [ 1807.408610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1807.409643] kmem_cache_alloc+0x159/0x360 [ 1807.410512] ptlock_alloc+0x1d/0x70 [ 1807.411257] pte_alloc_one+0x68/0x1a0 [ 1807.412047] __pte_alloc+0x1d/0x330 [ 1807.412805] handle_mm_fault+0x289e/0x3520 [ 1807.413678] ? perf_trace_lock+0x2bd/0x490 [ 1807.414544] ? __lockdep_reset_lock+0x180/0x180 [ 1807.415510] ? __pmd_alloc+0x5e0/0x5e0 [ 1807.416346] __get_user_pages+0x61b/0x1390 [ 1807.417233] ? follow_page_mask+0x1860/0x1860 [ 1807.418140] ? __lockdep_reset_lock+0x180/0x180 [ 1807.419081] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1807.420058] __get_user_pages_remote+0x1d5/0x870 [ 1807.421037] ? lock_downgrade+0x6d0/0x6d0 [ 1807.421893] get_user_pages_remote+0x63/0x90 [ 1807.422804] get_arg_page+0xba/0x200 [ 1807.423586] ? acct_arg_size+0xe0/0xe0 [ 1807.424384] ? downgrade_write+0x3a0/0x3a0 [ 1807.425238] ? count.constprop.0+0x1b3/0x290 [ 1807.426146] copy_string_kernel+0x1b4/0x450 [ 1807.427034] do_execveat_common+0x520/0x8d0 [ 1807.427930] ? bprm_execve+0x1b00/0x1b00 [ 1807.428799] __x64_sys_execveat+0xed/0x140 [ 1807.429675] do_syscall_64+0x33/0x40 [ 1807.430430] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.431483] RIP: 0033:0x7f21a736cb19 [ 1807.432233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.435948] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.437491] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1807.438935] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.440409] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.441856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.443296] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1807.449353] 9pnet: Insufficient options for proto=fd 04:37:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) 04:37:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) [ 1807.479065] FAULT_INJECTION: forcing a failure. [ 1807.479065] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.481519] CPU: 1 PID: 11693 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1807.482939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.484708] Call Trace: [ 1807.485268] dump_stack+0x107/0x167 [ 1807.486071] should_fail.cold+0x5/0xa [ 1807.486875] ? create_object.isra.0+0x3a/0xa20 [ 1807.487842] should_failslab+0x5/0x20 [ 1807.488643] kmem_cache_alloc+0x5b/0x360 [ 1807.489514] create_object.isra.0+0x3a/0xa20 [ 1807.490449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1807.491505] __kmalloc_track_caller+0x177/0x3c0 [ 1807.492509] ? bprm_change_interp+0x7c/0xf0 [ 1807.493404] kstrdup+0x36/0x70 [ 1807.494087] bprm_change_interp+0x7c/0xf0 [ 1807.494945] load_misc_binary+0x3a5/0xb70 [ 1807.495845] bprm_execve+0x9c1/0x1b00 [ 1807.496649] ? open_exec+0x70/0x70 [ 1807.497412] ? memcpy+0x39/0x60 [ 1807.498096] ? copy_string_kernel+0x3b6/0x450 [ 1807.499028] do_execveat_common+0x76d/0x8d0 [ 1807.499944] ? bprm_execve+0x1b00/0x1b00 [ 1807.500809] __x64_sys_execveat+0xed/0x140 [ 1807.501686] do_syscall_64+0x33/0x40 [ 1807.502455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.503518] RIP: 0033:0x7fbe1f492b19 [ 1807.504293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.508209] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.509782] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1807.511307] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.512842] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.514339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.515839] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1807.524355] FAT-fs (loop1): Unrecognized mount option "ÿÿ8o]" or missing value [ 1807.541825] FAULT_INJECTION: forcing a failure. [ 1807.541825] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.544299] CPU: 1 PID: 11698 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1807.545755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.547489] Call Trace: [ 1807.548047] dump_stack+0x107/0x167 [ 1807.548811] should_fail.cold+0x5/0xa [ 1807.549616] ? create_object.isra.0+0x3a/0xa20 04:37:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x0, 0xffffff7f}) [ 1807.550571] should_failslab+0x5/0x20 [ 1807.551603] kmem_cache_alloc+0x5b/0x360 [ 1807.552436] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1807.553536] create_object.isra.0+0x3a/0xa20 [ 1807.554429] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1807.555473] kmem_cache_alloc+0x159/0x360 [ 1807.556334] security_file_alloc+0x34/0x170 [ 1807.557208] __alloc_file+0xb6/0x320 [ 1807.557952] alloc_empty_file+0x6d/0x170 [ 1807.558778] path_openat+0xde/0x26d0 [ 1807.559559] ? path_lookupat+0x860/0x860 [ 1807.560421] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.561497] do_filp_open+0x17e/0x3d0 [ 1807.562270] ? may_open_dev+0xf0/0xf0 [ 1807.563049] ? lock_chain_count+0x20/0x20 [ 1807.563908] ? __lockdep_reset_lock+0x180/0x180 [ 1807.564854] ? lock_acquire+0x197/0x490 [ 1807.565682] ? find_held_lock+0x2c/0x110 [ 1807.566519] ? kmem_cache_alloc+0x159/0x360 [ 1807.567406] ? mark_held_locks+0x9e/0xe0 [ 1807.568265] do_open_execat+0x116/0x690 [ 1807.569088] ? __ia32_sys_uselib+0x40/0x40 [ 1807.569965] ? memcpy+0x39/0x60 [ 1807.570651] open_exec+0x42/0x70 [ 1807.571341] load_misc_binary+0x973/0xb70 [ 1807.572207] bprm_execve+0x9c1/0x1b00 [ 1807.573000] ? open_exec+0x70/0x70 [ 1807.573725] ? memcpy+0x39/0x60 [ 1807.574387] ? copy_string_kernel+0x3b6/0x450 [ 1807.575320] do_execveat_common+0x76d/0x8d0 [ 1807.576224] ? bprm_execve+0x1b00/0x1b00 [ 1807.577074] __x64_sys_execveat+0xed/0x140 [ 1807.577942] do_syscall_64+0x33/0x40 [ 1807.578704] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.579760] RIP: 0033:0x7fe08a85eb19 [ 1807.580521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.584300] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.585862] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1807.587329] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.588809] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.590268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.591738] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1807.621851] FAULT_INJECTION: forcing a failure. [ 1807.621851] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.624280] CPU: 1 PID: 11699 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1807.625713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1807.627409] Call Trace: [ 1807.627978] dump_stack+0x107/0x167 [ 1807.628733] should_fail.cold+0x5/0xa [ 1807.629520] ? __alloc_file+0x21/0x320 [ 1807.630324] should_failslab+0x5/0x20 04:37:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x2, 0x3}) [ 1807.631112] kmem_cache_alloc+0x5b/0x360 [ 1807.632232] __alloc_file+0x21/0x320 [ 1807.632999] alloc_empty_file+0x6d/0x170 [ 1807.633839] path_openat+0xde/0x26d0 [ 1807.634616] ? path_lookupat+0x860/0x860 [ 1807.635491] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.636591] do_filp_open+0x17e/0x3d0 [ 1807.637372] ? may_open_dev+0xf0/0xf0 [ 1807.638153] ? lock_chain_count+0x20/0x20 [ 1807.639010] ? __lockdep_reset_lock+0x180/0x180 [ 1807.639971] ? lock_acquire+0x197/0x490 [ 1807.640803] ? find_held_lock+0x2c/0x110 [ 1807.641648] ? kmem_cache_alloc+0x159/0x360 [ 1807.642538] ? mark_held_locks+0x9e/0xe0 [ 1807.643371] do_open_execat+0x116/0x690 [ 1807.644202] ? __ia32_sys_uselib+0x40/0x40 [ 1807.645078] ? memcpy+0x39/0x60 [ 1807.645767] open_exec+0x42/0x70 [ 1807.646472] load_misc_binary+0x973/0xb70 [ 1807.647334] bprm_execve+0x9c1/0x1b00 [ 1807.648153] ? open_exec+0x70/0x70 [ 1807.648863] ? memcpy+0x39/0x60 [ 1807.649543] ? copy_string_kernel+0x3b6/0x450 [ 1807.650477] do_execveat_common+0x76d/0x8d0 [ 1807.651362] ? bprm_execve+0x1b00/0x1b00 [ 1807.652254] __x64_sys_execveat+0xed/0x140 [ 1807.653127] do_syscall_64+0x33/0x40 [ 1807.653893] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1807.654944] RIP: 0033:0x7f4478f33b19 [ 1807.655722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1807.659531] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1807.661159] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1807.662637] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1807.664134] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1807.665594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1807.667051] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:37:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 18) 04:37:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 04:37:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x5, 0x3}) 04:37:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) openat(r0, &(0x7f0000000240)='./file0\x00', 0x40a042, 0xc0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) openat(r2, &(0x7f0000000180)='./file0\x00', 0x200b00, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x80) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r6, @ANYBLOB=',\x00']) r7 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f0000000000)=ANY=[@ANYRES16=r6]) 04:37:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x4000, 0x0}}], 0x500, 0x20000022, 0x0) 04:37:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file3\x00', 0x8) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:37:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 04:37:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) [ 1820.142237] FAULT_INJECTION: forcing a failure. [ 1820.142237] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.144297] CPU: 1 PID: 11731 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1820.145485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.146875] Call Trace: [ 1820.147320] dump_stack+0x107/0x167 [ 1820.147945] should_fail.cold+0x5/0xa [ 1820.148591] ? jbd2__journal_start+0x190/0x890 [ 1820.149366] should_failslab+0x5/0x20 [ 1820.150003] kmem_cache_alloc+0x5b/0x360 [ 1820.150701] jbd2__journal_start+0x190/0x890 [ 1820.151456] __ext4_journal_start_sb+0x214/0x430 [ 1820.152273] ext4_dirty_inode+0xbc/0x130 [ 1820.152996] ? ext4_setattr+0x22c0/0x22c0 [ 1820.153742] __mark_inode_dirty+0x492/0xf10 [ 1820.154539] touch_atime+0x5a4/0x6a0 [ 1820.155203] ? atime_needs_update+0x600/0x600 [ 1820.156026] ? pagecache_get_page+0x243/0xc80 [ 1820.156862] generic_file_buffered_read+0x18f3/0x28f0 [ 1820.157818] ? pagecache_get_page+0xc80/0xc80 [ 1820.158634] ? perf_trace_lock+0xac/0x490 [ 1820.159401] ? __lock_acquire+0x1657/0x5b00 [ 1820.160194] generic_file_read_iter+0x33f/0x490 [ 1820.161050] ext4_file_read_iter+0x184/0x4c0 [ 1820.161859] __kernel_read+0x593/0xaa0 [ 1820.162562] ? __x64_sys_sendfile+0x220/0x220 [ 1820.163380] ? _cond_resched+0x12/0x80 [ 1820.164103] ? avc_policy_seqno+0x9/0x70 [ 1820.164846] ? selinux_file_permission+0x36/0x510 [ 1820.165730] ? pidfd_get_pid+0x1c0/0x1c0 [ 1820.166489] kernel_read+0x52/0x70 [ 1820.167125] bprm_execve+0x8da/0x1b00 [ 1820.167828] ? open_exec+0x70/0x70 [ 1820.168480] ? memcpy+0x39/0x60 [ 1820.169084] ? copy_string_kernel+0x3b6/0x450 [ 1820.169910] do_execveat_common+0x76d/0x8d0 [ 1820.170705] ? bprm_execve+0x1b00/0x1b00 [ 1820.171454] __x64_sys_execveat+0xed/0x140 [ 1820.172240] do_syscall_64+0x33/0x40 [ 1820.172913] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.173842] RIP: 0033:0x7fe08a85eb19 [ 1820.174533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.177911] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.179315] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1820.180629] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.181911] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.183198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.184503] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x500, 0x3}) [ 1820.200573] FAULT_INJECTION: forcing a failure. [ 1820.200573] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.201372] 9pnet: Insufficient options for proto=fd [ 1820.202643] CPU: 1 PID: 11724 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1820.204967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.206378] Call Trace: [ 1820.206835] dump_stack+0x107/0x167 [ 1820.207462] should_fail.cold+0x5/0xa [ 1820.208127] ? getname_kernel+0x4e/0x370 [ 1820.208832] should_failslab+0x5/0x20 [ 1820.209487] kmem_cache_alloc+0x5b/0x360 [ 1820.210195] getname_kernel+0x4e/0x370 [ 1820.210867] open_exec+0x13/0x70 [ 1820.211453] load_misc_binary+0x973/0xb70 [ 1820.212218] bprm_execve+0x9c1/0x1b00 [ 1820.212892] ? open_exec+0x70/0x70 [ 1820.213537] ? memcpy+0x39/0x60 [ 1820.214098] ? copy_string_kernel+0x3b6/0x450 [ 1820.214914] do_execveat_common+0x76d/0x8d0 [ 1820.215668] ? bprm_execve+0x1b00/0x1b00 [ 1820.216384] __x64_sys_execveat+0xed/0x140 [ 1820.217135] do_syscall_64+0x33/0x40 [ 1820.217775] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.218689] RIP: 0033:0x7f4478f33b19 [ 1820.219329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.222692] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.224012] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1820.225239] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.226462] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.227695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.228919] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1820.233369] FAULT_INJECTION: forcing a failure. [ 1820.233369] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.236282] CPU: 1 PID: 11734 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1820.237933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.239918] Call Trace: [ 1820.240556] dump_stack+0x107/0x167 [ 1820.241433] should_fail.cold+0x5/0xa [ 1820.242347] ? __anon_vma_prepare+0x62/0x500 [ 1820.243399] should_failslab+0x5/0x20 [ 1820.244315] kmem_cache_alloc+0x5b/0x360 [ 1820.245292] __anon_vma_prepare+0x62/0x500 [ 1820.246296] ? __pte_alloc+0x194/0x330 [ 1820.247233] handle_mm_fault+0x2b4c/0x3520 [ 1820.248275] ? perf_trace_lock+0xac/0x490 [ 1820.249148] ? __lockdep_reset_lock+0x180/0x180 [ 1820.250082] ? __pmd_alloc+0x5e0/0x5e0 [ 1820.250889] __get_user_pages+0x61b/0x1390 [ 1820.251764] ? follow_page_mask+0x1860/0x1860 [ 1820.252665] ? __lockdep_reset_lock+0x180/0x180 [ 1820.253596] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1820.254545] __get_user_pages_remote+0x1d5/0x870 [ 1820.255496] ? lock_downgrade+0x6d0/0x6d0 [ 1820.256356] get_user_pages_remote+0x63/0x90 [ 1820.257247] get_arg_page+0xba/0x200 [ 1820.258002] ? acct_arg_size+0xe0/0xe0 [ 1820.258780] ? downgrade_write+0x3a0/0x3a0 [ 1820.259636] ? count.constprop.0+0x1b3/0x290 [ 1820.260528] copy_string_kernel+0x1b4/0x450 [ 1820.261405] do_execveat_common+0x520/0x8d0 [ 1820.262275] ? bprm_execve+0x1b00/0x1b00 [ 1820.263115] __x64_sys_execveat+0xed/0x140 [ 1820.263982] do_syscall_64+0x33/0x40 [ 1820.264733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.265765] RIP: 0033:0x7f21a736cb19 [ 1820.266518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.270225] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.271762] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1820.273191] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.274638] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.276074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.277500] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1820.287951] 9pnet: Insufficient options for proto=fd [ 1820.290350] FAULT_INJECTION: forcing a failure. [ 1820.290350] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.292974] CPU: 0 PID: 11733 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1820.294563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.296421] Call Trace: [ 1820.297026] dump_stack+0x107/0x167 [ 1820.297853] should_fail.cold+0x5/0xa [ 1820.298714] ? getname_kernel+0x4e/0x370 [ 1820.299649] should_failslab+0x5/0x20 [ 1820.300502] kmem_cache_alloc+0x5b/0x360 [ 1820.301446] getname_kernel+0x4e/0x370 [ 1820.302339] open_exec+0x13/0x70 [ 1820.303109] load_misc_binary+0x973/0xb70 [ 1820.304074] bprm_execve+0x9c1/0x1b00 [ 1820.304963] ? open_exec+0x70/0x70 [ 1820.305771] ? memcpy+0x39/0x60 [ 1820.306532] ? copy_string_kernel+0x3b6/0x450 [ 1820.307580] do_execveat_common+0x76d/0x8d0 [ 1820.308589] ? bprm_execve+0x1b00/0x1b00 [ 1820.309559] __x64_sys_execveat+0xed/0x140 [ 1820.310543] do_syscall_64+0x33/0x40 [ 1820.311411] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.312603] RIP: 0033:0x7fbe1f492b19 [ 1820.313466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.317678] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.319446] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1820.321107] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.322767] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.324449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.326115] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) [ 1820.354793] 9pnet: Insufficient options for proto=fd [ 1820.367952] 9pnet: Insufficient options for proto=fd [ 1820.379017] 9pnet: Insufficient options for proto=fd 04:37:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x40000, 0x0}}], 0x500, 0x20000022, 0x0) [ 1820.396370] 9pnet: Insufficient options for proto=fd 04:37:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f0000000300)=""/143, 0x8f}, {&(0x7f0000000000)=""/34, 0x22}, {&(0x7f00000000c0)}], 0x3) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x44080, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f00000003c0)) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendfile(r1, r3, &(0x7f00000000c0)=0xfffffffffffffffc, 0x3) [ 1820.453414] FAULT_INJECTION: forcing a failure. [ 1820.453414] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.455915] CPU: 0 PID: 11744 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1820.457336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.459041] Call Trace: [ 1820.459594] dump_stack+0x107/0x167 [ 1820.460377] should_fail.cold+0x5/0xa [ 1820.461164] ? create_object.isra.0+0x3a/0xa20 [ 1820.462111] should_failslab+0x5/0x20 [ 1820.462899] kmem_cache_alloc+0x5b/0x360 [ 1820.463764] create_object.isra.0+0x3a/0xa20 [ 1820.464678] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1820.465736] kmem_cache_alloc+0x159/0x360 [ 1820.466614] jbd2__journal_start+0x190/0x890 [ 1820.467547] __ext4_journal_start_sb+0x214/0x430 [ 1820.468549] ext4_dirty_inode+0xbc/0x130 [ 1820.469384] ? ext4_setattr+0x22c0/0x22c0 [ 1820.470241] __mark_inode_dirty+0x492/0xf10 [ 1820.471147] touch_atime+0x5a4/0x6a0 [ 1820.471944] ? atime_needs_update+0x600/0x600 [ 1820.472884] ? pagecache_get_page+0x243/0xc80 [ 1820.473830] generic_file_buffered_read+0x18f3/0x28f0 [ 1820.474951] ? pagecache_get_page+0xc80/0xc80 [ 1820.475903] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1820.476947] generic_file_read_iter+0x33f/0x490 [ 1820.477932] ext4_file_read_iter+0x184/0x4c0 [ 1820.478853] __kernel_read+0x593/0xaa0 [ 1820.479753] ? __x64_sys_sendfile+0x220/0x220 [ 1820.480767] ? _cond_resched+0x12/0x80 [ 1820.481587] ? avc_policy_seqno+0x9/0x70 [ 1820.482431] ? selinux_file_permission+0x36/0x510 [ 1820.483451] ? pidfd_get_pid+0x1c0/0x1c0 [ 1820.484327] kernel_read+0x52/0x70 [ 1820.485077] bprm_execve+0x8da/0x1b00 [ 1820.485889] ? open_exec+0x70/0x70 [ 1820.486631] ? memcpy+0x39/0x60 [ 1820.487318] ? copy_string_kernel+0x3b6/0x450 [ 1820.488279] do_execveat_common+0x76d/0x8d0 04:37:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) [ 1820.489181] ? bprm_execve+0x1b00/0x1b00 [ 1820.490214] __x64_sys_execveat+0xed/0x140 [ 1820.491096] do_syscall_64+0x33/0x40 [ 1820.491876] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.492927] RIP: 0033:0x7fe08a85eb19 [ 1820.493697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.497399] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.498969] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1820.500434] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.501910] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.503351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.504814] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:37:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 19) [ 1820.539964] FAULT_INJECTION: forcing a failure. [ 1820.539964] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.542307] CPU: 0 PID: 11753 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1820.543739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.545446] Call Trace: [ 1820.545998] dump_stack+0x107/0x167 [ 1820.546793] should_fail.cold+0x5/0xa [ 1820.547596] ? create_object.isra.0+0x3a/0xa20 [ 1820.548550] should_failslab+0x5/0x20 [ 1820.549340] kmem_cache_alloc+0x5b/0x360 [ 1820.550197] create_object.isra.0+0x3a/0xa20 [ 1820.551112] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1820.552192] kmem_cache_alloc+0x159/0x360 [ 1820.553079] getname_kernel+0x4e/0x370 [ 1820.553909] open_exec+0x13/0x70 [ 1820.554611] load_misc_binary+0x973/0xb70 [ 1820.555488] bprm_execve+0x9c1/0x1b00 [ 1820.556310] ? open_exec+0x70/0x70 [ 1820.557045] ? memcpy+0x39/0x60 [ 1820.557736] ? copy_string_kernel+0x3b6/0x450 [ 1820.558682] do_execveat_common+0x76d/0x8d0 [ 1820.559577] ? bprm_execve+0x1b00/0x1b00 [ 1820.560476] __x64_sys_execveat+0xed/0x140 [ 1820.561366] do_syscall_64+0x33/0x40 [ 1820.562135] entry_SYSCALL_64_after_hwframe+0x61/0xc6 04:37:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x80c00, 0x0) r1 = eventfd2(0xba2, 0x80801) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file2\x00'}) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000300)={0x6c, 0x0, 0x0, "8f08882a8c1dae94c78f3a578324b82800a9a4777ceab1259c2cfa8b9ccbd03832931b0f4b0796b894b97155e5e1a74c457d03182ebc1d83ffbb100bab2c1040012e178aff520efca0bd5d1b38630e569059dfaf10b2feb565b5f5a2e7b1035d7dfdad464fadaab6f008e62a"}) [ 1820.563191] RIP: 0033:0x7fbe1f492b19 [ 1820.564115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.567918] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.569490] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1820.570957] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.572432] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.573907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.575377] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:37:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x1000000, 0x3}) 04:37:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_io_uring_setup(0x25, &(0x7f0000000080), &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r4 = eventfd(0x0) dup2(r4, r3) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r4, 0x0, &(0x7f00000001c0)=""/46, 0x2e}, 0x0) syz_io_uring_setup(0x6cec, &(0x7f0000000300)={0x0, 0x438d, 0x4, 0x3, 0x397, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000), &(0x7f00000000c0)=0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000240)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r6, 0x100000000, 0x0, 0x9, 0x0, 0x1}, 0x8001) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:37:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) [ 1820.632407] FAULT_INJECTION: forcing a failure. [ 1820.632407] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.634934] CPU: 0 PID: 11755 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1820.636360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.638078] Call Trace: [ 1820.638636] dump_stack+0x107/0x167 [ 1820.639398] should_fail.cold+0x5/0xa [ 1820.640214] ? create_object.isra.0+0x3a/0xa20 [ 1820.641159] should_failslab+0x5/0x20 [ 1820.641946] kmem_cache_alloc+0x5b/0x360 [ 1820.642799] create_object.isra.0+0x3a/0xa20 [ 1820.643712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1820.644766] kmem_cache_alloc+0x159/0x360 [ 1820.645637] __anon_vma_prepare+0x62/0x500 [ 1820.646511] ? __pte_alloc+0x194/0x330 [ 1820.647319] handle_mm_fault+0x2b4c/0x3520 [ 1820.648214] ? perf_trace_lock+0x2bd/0x490 [ 1820.649091] ? __lockdep_reset_lock+0x180/0x180 [ 1820.650048] ? __pmd_alloc+0x5e0/0x5e0 [ 1820.650897] __get_user_pages+0x61b/0x1390 [ 1820.651815] ? follow_page_mask+0x1860/0x1860 [ 1820.652746] ? __lockdep_reset_lock+0x180/0x180 [ 1820.653693] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1820.654687] __get_user_pages_remote+0x1d5/0x870 [ 1820.655656] ? lock_downgrade+0x6d0/0x6d0 [ 1820.656536] get_user_pages_remote+0x63/0x90 [ 1820.657454] get_arg_page+0xba/0x200 [ 1820.658231] ? acct_arg_size+0xe0/0xe0 [ 1820.659013] ? downgrade_write+0x3a0/0x3a0 [ 1820.659901] ? count.constprop.0+0x1b3/0x290 [ 1820.660805] copy_string_kernel+0x1b4/0x450 [ 1820.661731] do_execveat_common+0x520/0x8d0 [ 1820.662633] ? bprm_execve+0x1b00/0x1b00 [ 1820.663509] __x64_sys_execveat+0xed/0x140 [ 1820.664409] do_syscall_64+0x33/0x40 [ 1820.665177] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.666234] RIP: 0033:0x7f21a736cb19 [ 1820.667004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.670791] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.672377] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1820.673847] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.675311] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.676787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.678249] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:37:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 04:37:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) [ 1820.725289] FAULT_INJECTION: forcing a failure. [ 1820.725289] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.727843] CPU: 1 PID: 11765 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1820.729266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.730954] Call Trace: [ 1820.731504] dump_stack+0x107/0x167 [ 1820.732263] should_fail.cold+0x5/0xa [ 1820.733042] ? create_object.isra.0+0x3a/0xa20 [ 1820.733974] should_failslab+0x5/0x20 [ 1820.734756] kmem_cache_alloc+0x5b/0x360 [ 1820.735581] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1820.736722] create_object.isra.0+0x3a/0xa20 [ 1820.737613] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1820.738642] kmem_cache_alloc+0x159/0x360 [ 1820.739495] security_file_alloc+0x34/0x170 [ 1820.740380] __alloc_file+0xb6/0x320 [ 1820.741138] alloc_empty_file+0x6d/0x170 [ 1820.741970] path_openat+0xde/0x26d0 [ 1820.742743] ? path_lookupat+0x860/0x860 [ 1820.743585] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.744685] do_filp_open+0x17e/0x3d0 [ 1820.745456] ? may_open_dev+0xf0/0xf0 [ 1820.746235] ? lock_chain_count+0x20/0x20 [ 1820.747076] ? __lockdep_reset_lock+0x180/0x180 [ 1820.748022] ? lock_acquire+0x197/0x490 [ 1820.748839] ? find_held_lock+0x2c/0x110 [ 1820.749667] ? kmem_cache_alloc+0x159/0x360 [ 1820.750549] ? mark_held_locks+0x9e/0xe0 [ 1820.751386] do_open_execat+0x116/0x690 [ 1820.752203] ? __ia32_sys_uselib+0x40/0x40 [ 1820.753069] ? memcpy+0x39/0x60 [ 1820.753743] open_exec+0x42/0x70 [ 1820.754433] load_misc_binary+0x973/0xb70 [ 1820.755290] bprm_execve+0x9c1/0x1b00 [ 1820.756071] ? open_exec+0x70/0x70 [ 1820.756792] ? memcpy+0x39/0x60 [ 1820.757463] ? copy_string_kernel+0x3b6/0x450 [ 1820.758378] do_execveat_common+0x76d/0x8d0 [ 1820.759255] ? bprm_execve+0x1b00/0x1b00 [ 1820.760105] __x64_sys_execveat+0xed/0x140 [ 1820.760965] do_syscall_64+0x33/0x40 [ 1820.761722] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.762762] RIP: 0033:0x7fe08a85eb19 [ 1820.763515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.767221] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.768754] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1820.770188] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.771645] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.773082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.774521] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1820.819920] FAULT_INJECTION: forcing a failure. [ 1820.819920] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.822437] CPU: 0 PID: 11774 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1820.823881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.825591] Call Trace: [ 1820.826150] dump_stack+0x107/0x167 [ 1820.826921] should_fail.cold+0x5/0xa [ 1820.827731] ? security_file_alloc+0x34/0x170 [ 1820.828669] should_failslab+0x5/0x20 [ 1820.829448] kmem_cache_alloc+0x5b/0x360 [ 1820.830310] security_file_alloc+0x34/0x170 [ 1820.831200] __alloc_file+0xb6/0x320 [ 1820.831995] alloc_empty_file+0x6d/0x170 [ 1820.832831] path_openat+0xde/0x26d0 [ 1820.833633] ? path_lookupat+0x860/0x860 [ 1820.834476] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1820.835525] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1820.836568] do_filp_open+0x17e/0x3d0 [ 1820.837364] ? may_open_dev+0xf0/0xf0 [ 1820.838154] ? lock_chain_count+0x20/0x20 [ 1820.839020] ? __lockdep_reset_lock+0x180/0x180 [ 1820.839991] ? lock_acquire+0x197/0x490 [ 1820.840833] ? find_held_lock+0x2c/0x110 [ 1820.841698] ? kmem_cache_alloc+0x159/0x360 [ 1820.842603] ? mark_held_locks+0x9e/0xe0 [ 1820.843457] do_open_execat+0x116/0x690 [ 1820.844304] ? __ia32_sys_uselib+0x40/0x40 [ 1820.845193] ? memcpy+0x39/0x60 [ 1820.845889] open_exec+0x42/0x70 [ 1820.846589] load_misc_binary+0x973/0xb70 [ 1820.847466] bprm_execve+0x9c1/0x1b00 [ 1820.848283] ? open_exec+0x70/0x70 [ 1820.849023] ? memcpy+0x39/0x60 [ 1820.849715] ? copy_string_kernel+0x3b6/0x450 [ 1820.850660] do_execveat_common+0x76d/0x8d0 [ 1820.851556] ? bprm_execve+0x1b00/0x1b00 [ 1820.852435] __x64_sys_execveat+0xed/0x140 [ 1820.853319] do_syscall_64+0x33/0x40 [ 1820.854090] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.855141] RIP: 0033:0x7f4478f33b19 [ 1820.855927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.859675] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.861233] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1820.862688] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.864167] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.865625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.867079] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1820.884222] FAULT_INJECTION: forcing a failure. [ 1820.884222] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.886600] CPU: 1 PID: 11776 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1820.888010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1820.889995] Call Trace: [ 1820.890663] dump_stack+0x107/0x167 [ 1820.891579] should_fail.cold+0x5/0xa [ 1820.892547] ? __alloc_file+0x21/0x320 [ 1820.893509] should_failslab+0x5/0x20 [ 1820.894450] kmem_cache_alloc+0x5b/0x360 [ 1820.895448] __alloc_file+0x21/0x320 [ 1820.896393] alloc_empty_file+0x6d/0x170 [ 1820.897391] path_openat+0xde/0x26d0 [ 1820.898323] ? path_lookupat+0x860/0x860 [ 1820.899330] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.900681] do_filp_open+0x17e/0x3d0 [ 1820.901482] ? may_open_dev+0xf0/0xf0 [ 1820.902279] ? lock_chain_count+0x20/0x20 [ 1820.903131] ? __lockdep_reset_lock+0x180/0x180 [ 1820.904101] ? lock_acquire+0x197/0x490 [ 1820.904945] ? find_held_lock+0x2c/0x110 [ 1820.905791] ? kmem_cache_alloc+0x159/0x360 [ 1820.906686] ? mark_held_locks+0x9e/0xe0 [ 1820.907527] do_open_execat+0x116/0x690 [ 1820.908385] ? __ia32_sys_uselib+0x40/0x40 [ 1820.909258] ? memcpy+0x39/0x60 [ 1820.909970] open_exec+0x42/0x70 [ 1820.910847] load_misc_binary+0x973/0xb70 [ 1820.911938] bprm_execve+0x9c1/0x1b00 [ 1820.912949] ? open_exec+0x70/0x70 [ 1820.913869] ? memcpy+0x39/0x60 [ 1820.914727] ? copy_string_kernel+0x3b6/0x450 [ 1820.915933] do_execveat_common+0x76d/0x8d0 [ 1820.917018] ? bprm_execve+0x1b00/0x1b00 [ 1820.917884] __x64_sys_execveat+0xed/0x140 [ 1820.918789] do_syscall_64+0x33/0x40 [ 1820.919561] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.920634] RIP: 0033:0x7fbe1f492b19 [ 1820.921403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.925172] RSP: 002b:00007fbe1c9e7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1820.926721] RAX: ffffffffffffffda RBX: 00007fbe1f5a6020 RCX: 00007fbe1f492b19 [ 1820.928225] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1820.929677] RBP: 00007fbe1c9e71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.931132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1820.932622] R13: 00007ffccf8a34ef R14: 00007fbe1c9e7300 R15: 0000000000022000 04:38:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 20) 04:38:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="000078e7adfab0cb8df0c1f106eb0ae3436f645301109b45cd66271242436a1a48f2193887c930a71923ad032ca59daccf65822e2852"]) sendfile(r1, r2, &(0x7f00000000c0)=0x1, 0x1ff) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') 04:38:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) 04:38:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:38:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x2000000, 0x3}) 04:38:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 04:38:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) [ 1834.387471] FAULT_INJECTION: forcing a failure. [ 1834.387471] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.389896] CPU: 1 PID: 11787 Comm: syz-executor.4 Not tainted 5.10.153 #1 04:38:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) [ 1834.391304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.393089] Call Trace: [ 1834.393694] dump_stack+0x107/0x167 [ 1834.394444] should_fail.cold+0x5/0xa [ 1834.395227] ? create_object.isra.0+0x3a/0xa20 [ 1834.396173] should_failslab+0x5/0x20 [ 1834.396952] kmem_cache_alloc+0x5b/0x360 [ 1834.397787] create_object.isra.0+0x3a/0xa20 [ 1834.398688] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.399726] kmem_cache_alloc+0x159/0x360 [ 1834.400594] jbd2__journal_start+0x190/0x890 [ 1834.401506] __ext4_journal_start_sb+0x214/0x430 [ 1834.402481] ext4_dirty_inode+0xbc/0x130 [ 1834.403310] ? ext4_setattr+0x22c0/0x22c0 [ 1834.404173] __mark_inode_dirty+0x492/0xf10 [ 1834.405060] touch_atime+0x5a4/0x6a0 [ 1834.405820] ? atime_needs_update+0x600/0x600 [ 1834.406736] ? pagecache_get_page+0x243/0xc80 [ 1834.407657] generic_file_buffered_read+0x18f3/0x28f0 [ 1834.408740] ? pagecache_get_page+0xc80/0xc80 [ 1834.409653] ? perf_trace_lock+0xac/0x490 [ 1834.410503] ? __lock_acquire+0x1657/0x5b00 [ 1834.411390] generic_file_read_iter+0x33f/0x490 [ 1834.412364] ext4_file_read_iter+0x184/0x4c0 [ 1834.413268] __kernel_read+0x593/0xaa0 [ 1834.414069] ? __x64_sys_sendfile+0x220/0x220 [ 1834.414988] ? _cond_resched+0x12/0x80 [ 1834.415794] ? avc_policy_seqno+0x9/0x70 [ 1834.416626] ? selinux_file_permission+0x36/0x510 [ 1834.417619] ? pidfd_get_pid+0x1c0/0x1c0 [ 1834.418397] FAULT_INJECTION: forcing a failure. [ 1834.418397] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.420680] kernel_read+0x52/0x70 [ 1834.420705] bprm_execve+0x8da/0x1b00 [ 1834.420740] ? open_exec+0x70/0x70 [ 1834.422991] ? memcpy+0x39/0x60 [ 1834.423668] ? copy_string_kernel+0x3b6/0x450 [ 1834.424602] do_execveat_common+0x76d/0x8d0 [ 1834.425485] ? bprm_execve+0x1b00/0x1b00 [ 1834.426334] __x64_sys_execveat+0xed/0x140 [ 1834.427201] do_syscall_64+0x33/0x40 [ 1834.427979] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.429023] RIP: 0033:0x7fe08a85eb19 [ 1834.429792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.433511] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.435057] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1834.436510] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.437949] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.439387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.440850] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 [ 1834.442330] CPU: 0 PID: 11800 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1834.443834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.445613] Call Trace: [ 1834.446199] dump_stack+0x107/0x167 [ 1834.446999] should_fail.cold+0x5/0xa [ 1834.447846] ? create_object.isra.0+0x3a/0xa20 [ 1834.448837] should_failslab+0x5/0x20 [ 1834.449663] kmem_cache_alloc+0x5b/0x360 [ 1834.450562] create_object.isra.0+0x3a/0xa20 [ 1834.451511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.452624] kmem_cache_alloc+0x159/0x360 [ 1834.453544] __anon_vma_prepare+0x62/0x500 [ 1834.454464] ? __pte_alloc+0x194/0x330 [ 1834.455323] handle_mm_fault+0x2b4c/0x3520 [ 1834.456271] ? perf_trace_lock+0x2bd/0x490 [ 1834.457194] ? __lockdep_reset_lock+0x180/0x180 [ 1834.458206] ? __pmd_alloc+0x5e0/0x5e0 [ 1834.459108] __get_user_pages+0x61b/0x1390 [ 1834.460061] ? follow_page_mask+0x1860/0x1860 [ 1834.461002] ? __lockdep_reset_lock+0x180/0x180 [ 1834.461942] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1834.462919] __get_user_pages_remote+0x1d5/0x870 [ 1834.463891] ? lock_downgrade+0x6d0/0x6d0 [ 1834.464767] get_user_pages_remote+0x63/0x90 [ 1834.465674] get_arg_page+0xba/0x200 [ 1834.466437] ? acct_arg_size+0xe0/0xe0 [ 1834.467223] ? downgrade_write+0x3a0/0x3a0 [ 1834.468101] ? count.constprop.0+0x1b3/0x290 [ 1834.469007] copy_string_kernel+0x1b4/0x450 [ 1834.469954] do_execveat_common+0x520/0x8d0 [ 1834.470913] ? bprm_execve+0x1b00/0x1b00 [ 1834.471860] __x64_sys_execveat+0xed/0x140 [ 1834.472817] do_syscall_64+0x33/0x40 [ 1834.473646] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.474775] RIP: 0033:0x7f21a736cb19 [ 1834.475598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.479628] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.481318] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1834.482898] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.484495] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.486073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.487653] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:38:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) [ 1834.531643] FAULT_INJECTION: forcing a failure. [ 1834.531643] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.533986] CPU: 1 PID: 11798 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1834.535422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.537156] Call Trace: [ 1834.537706] dump_stack+0x107/0x167 [ 1834.538467] should_fail.cold+0x5/0xa [ 1834.539257] ? create_object.isra.0+0x3a/0xa20 [ 1834.540216] should_failslab+0x5/0x20 [ 1834.541001] kmem_cache_alloc+0x5b/0x360 [ 1834.541845] create_object.isra.0+0x3a/0xa20 [ 1834.542749] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.543816] kmem_cache_alloc+0x159/0x360 [ 1834.544670] __alloc_file+0x21/0x320 [ 1834.545427] alloc_empty_file+0x6d/0x170 [ 1834.546256] path_openat+0xde/0x26d0 [ 1834.547032] ? path_lookupat+0x860/0x860 [ 1834.547882] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.548967] do_filp_open+0x17e/0x3d0 [ 1834.549743] ? may_open_dev+0xf0/0xf0 [ 1834.550520] ? lock_chain_count+0x20/0x20 [ 1834.551362] ? __lockdep_reset_lock+0x180/0x180 [ 1834.552314] ? lock_acquire+0x197/0x490 [ 1834.553131] ? find_held_lock+0x2c/0x110 [ 1834.553963] ? kmem_cache_alloc+0x159/0x360 [ 1834.554845] ? mark_held_locks+0x9e/0xe0 [ 1834.555676] do_open_execat+0x116/0x690 [ 1834.556503] ? __ia32_sys_uselib+0x40/0x40 [ 1834.557373] ? memcpy+0x39/0x60 [ 1834.558054] open_exec+0x42/0x70 [ 1834.558745] load_misc_binary+0x973/0xb70 [ 1834.559610] bprm_execve+0x9c1/0x1b00 [ 1834.560399] ? open_exec+0x70/0x70 [ 1834.561125] ? memcpy+0x39/0x60 [ 1834.561804] ? copy_string_kernel+0x3b6/0x450 [ 1834.562724] do_execveat_common+0x76d/0x8d0 [ 1834.563603] ? bprm_execve+0x1b00/0x1b00 [ 1834.564465] __x64_sys_execveat+0xed/0x140 [ 1834.565329] do_syscall_64+0x33/0x40 [ 1834.566086] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.567122] RIP: 0033:0x7fbe1f492b19 [ 1834.567889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.571606] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.573152] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1834.574598] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.576081] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.577522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.578960] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:38:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 21) [ 1834.589902] FAULT_INJECTION: forcing a failure. [ 1834.589902] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.592464] CPU: 1 PID: 11796 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1834.593901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.595630] Call Trace: [ 1834.596199] dump_stack+0x107/0x167 [ 1834.596958] should_fail.cold+0x5/0xa [ 1834.597735] ? create_object.isra.0+0x3a/0xa20 [ 1834.598669] should_failslab+0x5/0x20 [ 1834.599444] kmem_cache_alloc+0x5b/0x360 [ 1834.600284] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1834.601407] create_object.isra.0+0x3a/0xa20 [ 1834.602303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.603346] kmem_cache_alloc+0x159/0x360 [ 1834.604212] security_file_alloc+0x34/0x170 [ 1834.605094] __alloc_file+0xb6/0x320 [ 1834.605859] alloc_empty_file+0x6d/0x170 [ 1834.606692] path_openat+0xde/0x26d0 [ 1834.607469] ? path_lookupat+0x860/0x860 [ 1834.608330] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.609419] do_filp_open+0x17e/0x3d0 [ 1834.610196] ? may_open_dev+0xf0/0xf0 [ 1834.610975] ? lock_chain_count+0x20/0x20 [ 1834.611828] ? __lockdep_reset_lock+0x180/0x180 [ 1834.612778] ? lock_acquire+0x197/0x490 [ 1834.613599] ? find_held_lock+0x2c/0x110 [ 1834.614433] ? kmem_cache_alloc+0x159/0x360 [ 1834.615319] ? mark_held_locks+0x9e/0xe0 [ 1834.616160] do_open_execat+0x116/0x690 [ 1834.616971] ? __ia32_sys_uselib+0x40/0x40 [ 1834.617842] ? memcpy+0x39/0x60 [ 1834.618524] open_exec+0x42/0x70 [ 1834.619219] load_misc_binary+0x973/0xb70 [ 1834.620092] bprm_execve+0x9c1/0x1b00 [ 1834.620881] ? open_exec+0x70/0x70 [ 1834.621606] ? memcpy+0x39/0x60 [ 1834.622287] ? copy_string_kernel+0x3b6/0x450 [ 1834.623215] do_execveat_common+0x76d/0x8d0 [ 1834.624105] ? bprm_execve+0x1b00/0x1b00 [ 1834.624959] __x64_sys_execveat+0xed/0x140 [ 1834.625829] do_syscall_64+0x33/0x40 [ 1834.626589] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.627632] RIP: 0033:0x7f4478f33b19 [ 1834.628405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.632152] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.633706] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1834.635157] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.636618] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.638070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.639521] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:38:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x5000000, 0x3}) [ 1834.726171] FAULT_INJECTION: forcing a failure. [ 1834.726171] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.728554] CPU: 1 PID: 11814 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1834.729983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.731698] Call Trace: [ 1834.732267] dump_stack+0x107/0x167 [ 1834.733033] should_fail.cold+0x5/0xa [ 1834.733810] ? create_object.isra.0+0x3a/0xa20 [ 1834.734739] should_failslab+0x5/0x20 [ 1834.735511] kmem_cache_alloc+0x5b/0x360 [ 1834.736355] create_object.isra.0+0x3a/0xa20 [ 1834.737254] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1834.738293] kmem_cache_alloc+0x159/0x360 [ 1834.739143] __anon_vma_prepare+0x270/0x500 [ 1834.740027] ? __pte_alloc+0x194/0x330 [ 1834.740823] handle_mm_fault+0x2b4c/0x3520 [ 1834.741689] ? perf_trace_lock+0xac/0x490 [ 1834.742530] ? __lockdep_reset_lock+0x180/0x180 [ 1834.743473] ? __pmd_alloc+0x5e0/0x5e0 [ 1834.744305] __get_user_pages+0x61b/0x1390 [ 1834.745180] ? follow_page_mask+0x1860/0x1860 [ 1834.746090] ? __lockdep_reset_lock+0x180/0x180 [ 1834.747033] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1834.748002] __get_user_pages_remote+0x1d5/0x870 [ 1834.748972] ? lock_downgrade+0x6d0/0x6d0 [ 1834.749822] get_user_pages_remote+0x63/0x90 [ 1834.750720] get_arg_page+0xba/0x200 [ 1834.751481] ? acct_arg_size+0xe0/0xe0 [ 1834.752285] ? downgrade_write+0x3a0/0x3a0 [ 1834.753148] ? count.constprop.0+0x1b3/0x290 [ 1834.754049] copy_string_kernel+0x1b4/0x450 [ 1834.754940] do_execveat_common+0x520/0x8d0 [ 1834.755830] ? bprm_execve+0x1b00/0x1b00 [ 1834.756675] __x64_sys_execveat+0xed/0x140 [ 1834.757541] do_syscall_64+0x33/0x40 [ 1834.758301] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.759342] RIP: 0033:0x7f21a736cb19 [ 1834.760109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.763855] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.765402] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1834.766852] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.768310] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.769758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.771209] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1834.793372] FAULT_INJECTION: forcing a failure. [ 1834.793372] name failslab, interval 1, probability 0, space 0, times 0 04:38:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfffffff7}}, './file2\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) [ 1834.795825] CPU: 1 PID: 11817 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1834.797447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1834.799170] Call Trace: [ 1834.799728] dump_stack+0x107/0x167 [ 1834.800489] should_fail.cold+0x5/0xa [ 1834.801285] ? load_elf_binary+0x404/0x5730 [ 1834.802171] should_failslab+0x5/0x20 [ 1834.802956] __kmalloc+0x72/0x3f0 [ 1834.803689] load_elf_binary+0x404/0x5730 [ 1834.804564] ? find_held_lock+0x2c/0x110 [ 1834.805406] ? bprm_execve+0x9a0/0x1b00 [ 1834.806233] ? elf_core_dump+0x3b30/0x3b30 [ 1834.807111] ? do_raw_read_unlock+0x3b/0x70 [ 1834.808017] ? _raw_read_unlock+0x1a/0x30 [ 1834.808870] ? load_misc_binary+0x605/0xb70 [ 1834.809770] bprm_execve+0x9c1/0x1b00 [ 1834.810561] ? open_exec+0x70/0x70 [ 1834.811292] ? memcpy+0x39/0x60 [ 1834.811976] ? copy_string_kernel+0x3b6/0x450 [ 1834.812910] do_execveat_common+0x76d/0x8d0 [ 1834.813797] ? bprm_execve+0x1b00/0x1b00 [ 1834.814654] __x64_sys_execveat+0xed/0x140 [ 1834.815529] do_syscall_64+0x33/0x40 [ 1834.816308] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1834.817353] RIP: 0033:0x7fe08a85eb19 [ 1834.818125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1834.821895] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1834.823459] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1834.824925] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1834.826375] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1834.827847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1834.829304] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 04:38:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x1000000, 0x0}}], 0x500, 0x20000022, 0x0) 04:38:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 04:38:24 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f0000000000)='./file3\x00', 0x402080, 0x12) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:38:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 22) 04:38:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xf4ffffff, 0x3}) 04:38:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 04:38:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 04:38:24 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000036c0)=ANY=[@ANYBLOB="7472426e733d66642c72668b33306730cba24d8df8b60b3e95e0646e6f3d", @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',\x00']) r7 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003780), 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}}) [ 1847.076844] FAULT_INJECTION: forcing a failure. [ 1847.076844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1847.079573] CPU: 1 PID: 11834 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1847.080951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.082569] Call Trace: [ 1847.083103] dump_stack+0x107/0x167 [ 1847.083825] should_fail.cold+0x5/0xa [ 1847.084612] __alloc_pages_nodemask+0x182/0x680 [ 1847.085542] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1847.086742] ? up_write+0x191/0x550 [ 1847.087472] ? rwlock_bug.part.0+0x90/0x90 [ 1847.088341] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1847.089287] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1847.090366] alloc_pages_vma+0xbb/0x410 [ 1847.091161] handle_mm_fault+0x154b/0x3520 [ 1847.092012] ? perf_trace_lock+0xac/0x490 [ 1847.092831] ? __lockdep_reset_lock+0x180/0x180 [ 1847.093755] ? __pmd_alloc+0x5e0/0x5e0 [ 1847.094549] __get_user_pages+0x61b/0x1390 [ 1847.095404] ? follow_page_mask+0x1860/0x1860 [ 1847.096301] ? __lockdep_reset_lock+0x180/0x180 [ 1847.097214] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1847.098144] __get_user_pages_remote+0x1d5/0x870 [ 1847.099088] ? lock_downgrade+0x6d0/0x6d0 [ 1847.099916] get_user_pages_remote+0x63/0x90 [ 1847.100811] get_arg_page+0xba/0x200 [ 1847.101556] ? acct_arg_size+0xe0/0xe0 [ 1847.102321] ? downgrade_write+0x3a0/0x3a0 [ 1847.103163] ? count.constprop.0+0x1b3/0x290 [ 1847.104059] copy_string_kernel+0x1b4/0x450 [ 1847.104917] do_execveat_common+0x520/0x8d0 [ 1847.105783] ? bprm_execve+0x1b00/0x1b00 [ 1847.106596] __x64_sys_execveat+0xed/0x140 [ 1847.107439] do_syscall_64+0x33/0x40 [ 1847.108183] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.109201] RIP: 0033:0x7f21a736cb19 [ 1847.109935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.113575] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.115083] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1847.116505] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.117900] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.119297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.120704] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1847.136503] FAULT_INJECTION: forcing a failure. [ 1847.136503] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.138893] CPU: 0 PID: 11843 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1847.140282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.141940] Call Trace: [ 1847.142474] dump_stack+0x107/0x167 [ 1847.143221] should_fail.cold+0x5/0xa [ 1847.143997] ? jbd2__journal_start+0x190/0x890 [ 1847.144916] should_failslab+0x5/0x20 [ 1847.145680] kmem_cache_alloc+0x5b/0x360 [ 1847.146516] jbd2__journal_start+0x190/0x890 [ 1847.147405] __ext4_journal_start_sb+0x214/0x430 [ 1847.148391] ext4_dirty_inode+0xbc/0x130 [ 1847.149199] ? ext4_setattr+0x22c0/0x22c0 [ 1847.150033] __mark_inode_dirty+0x492/0xf10 [ 1847.150914] touch_atime+0x5a4/0x6a0 [ 1847.151674] ? atime_needs_update+0x600/0x600 [ 1847.152590] ? pagecache_get_page+0x243/0xc80 [ 1847.153517] generic_file_buffered_read+0x18f3/0x28f0 [ 1847.154597] ? pagecache_get_page+0xc80/0xc80 [ 1847.155521] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.156549] generic_file_read_iter+0x33f/0x490 [ 1847.157516] ext4_file_read_iter+0x184/0x4c0 [ 1847.158411] __kernel_read+0x593/0xaa0 [ 1847.159207] ? __x64_sys_sendfile+0x220/0x220 [ 1847.160127] ? _cond_resched+0x12/0x80 [ 1847.160916] ? avc_policy_seqno+0x9/0x70 [ 1847.161724] ? selinux_file_permission+0x36/0x510 [ 1847.162703] ? pidfd_get_pid+0x1c0/0x1c0 [ 1847.163536] kernel_read+0x52/0x70 [ 1847.164284] bprm_execve+0x8da/0x1b00 [ 1847.165089] ? open_exec+0x70/0x70 [ 1847.165822] ? memcpy+0x39/0x60 [ 1847.166506] ? copy_string_kernel+0x3b6/0x450 [ 1847.167448] do_execveat_common+0x76d/0x8d0 [ 1847.168353] ? bprm_execve+0x1b00/0x1b00 [ 1847.169225] __x64_sys_execveat+0xed/0x140 [ 1847.170105] do_syscall_64+0x33/0x40 [ 1847.170851] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.171895] RIP: 0033:0x7f4478f33b19 [ 1847.172670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.176432] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.177932] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1847.179384] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.180842] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.182290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.183741] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1847.203249] FAULT_INJECTION: forcing a failure. [ 1847.203249] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.205184] FAULT_INJECTION: forcing a failure. [ 1847.205184] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.205910] CPU: 1 PID: 11841 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1847.209463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.211144] Call Trace: [ 1847.211692] dump_stack+0x107/0x167 [ 1847.212449] should_fail.cold+0x5/0xa [ 1847.213226] ? __d_alloc+0x2a/0x990 [ 1847.213966] should_failslab+0x5/0x20 [ 1847.214736] kmem_cache_alloc+0x5b/0x360 [ 1847.215566] __d_alloc+0x2a/0x990 [ 1847.216304] d_alloc_parallel+0x111/0x1aa0 [ 1847.217171] ? __d_lookup+0x3bf/0x710 [ 1847.217947] ? lock_downgrade+0x6d0/0x6d0 [ 1847.218784] ? find_held_lock+0x2c/0x110 [ 1847.219615] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1847.220468] ? __d_lookup+0x3e8/0x710 [ 1847.221246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1847.222319] lookup_open.isra.0+0x926/0x1230 [ 1847.223221] ? hashlen_string+0xf0/0xf0 [ 1847.224096] path_openat+0x961/0x26d0 [ 1847.224892] ? path_lookupat+0x860/0x860 [ 1847.225723] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.226737] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.227751] do_filp_open+0x17e/0x3d0 [ 1847.228532] ? may_open_dev+0xf0/0xf0 [ 1847.229327] ? find_held_lock+0x2c/0x110 [ 1847.230160] ? kmem_cache_alloc+0x159/0x360 [ 1847.231041] ? mark_held_locks+0x9e/0xe0 [ 1847.231870] do_open_execat+0x116/0x690 [ 1847.232700] ? __ia32_sys_uselib+0x40/0x40 [ 1847.233564] ? memcpy+0x39/0x60 [ 1847.234241] open_exec+0x42/0x70 [ 1847.234930] load_misc_binary+0x973/0xb70 [ 1847.235782] bprm_execve+0x9c1/0x1b00 [ 1847.236573] ? open_exec+0x70/0x70 [ 1847.237294] ? memcpy+0x39/0x60 [ 1847.237965] ? copy_string_kernel+0x3b6/0x450 [ 1847.238885] do_execveat_common+0x76d/0x8d0 [ 1847.239763] ? bprm_execve+0x1b00/0x1b00 [ 1847.240614] __x64_sys_execveat+0xed/0x140 [ 1847.241478] do_syscall_64+0x33/0x40 [ 1847.242233] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.243269] RIP: 0033:0x7fbe1f492b19 [ 1847.244044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.247751] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.249299] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1847.250742] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.252192] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.253629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.255067] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1847.256556] CPU: 0 PID: 11844 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 1847.257973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.259898] Call Trace: [ 1847.260454] dump_stack+0x107/0x167 [ 1847.261214] should_fail.cold+0x5/0xa [ 1847.261998] ? create_object.isra.0+0x3a/0xa20 [ 1847.262939] should_failslab+0x5/0x20 [ 1847.263720] kmem_cache_alloc+0x5b/0x360 [ 1847.264576] create_object.isra.0+0x3a/0xa20 [ 1847.265475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1847.266520] __kmalloc+0x16e/0x3f0 [ 1847.267268] load_elf_binary+0x404/0x5730 [ 1847.268168] ? find_held_lock+0x2c/0x110 [ 1847.269011] ? bprm_execve+0x9a0/0x1b00 [ 1847.269828] ? elf_core_dump+0x3b30/0x3b30 [ 1847.270692] ? do_raw_read_unlock+0x3b/0x70 [ 1847.271570] ? _raw_read_unlock+0x1a/0x30 [ 1847.272422] ? load_misc_binary+0x605/0xb70 [ 1847.273324] bprm_execve+0x9c1/0x1b00 [ 1847.274124] ? open_exec+0x70/0x70 [ 1847.274857] ? memcpy+0x39/0x60 [ 1847.275537] ? copy_string_kernel+0x3b6/0x450 [ 1847.276482] do_execveat_common+0x76d/0x8d0 [ 1847.277372] ? bprm_execve+0x1b00/0x1b00 [ 1847.278240] __x64_sys_execveat+0xed/0x140 [ 1847.279117] do_syscall_64+0x33/0x40 [ 1847.279880] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.280936] RIP: 0033:0x7fe08a85eb19 [ 1847.281693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.285404] RSP: 002b:00007fe087dd4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.286949] RAX: ffffffffffffffda RBX: 00007fe08a971f60 RCX: 00007fe08a85eb19 [ 1847.288411] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.289853] RBP: 00007fe087dd41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.291293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.292743] R13: 00007ffc771db1df R14: 00007fe087dd4300 R15: 0000000000022000 sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f00000000c0)="785dd978dd25bf943488203c4e01563febb16a27a69eb249e5d9ebcc4344", 0x1e}, {&(0x7f0000000180)}, {&(0x7f0000000300)="2f370026152b0ff21137386f3575bc6dda85979188d61feea9c21b9e87865483918b367d15083053474cd98da255e7fbf5a6aa5ef6c65019eb1df6a5f244b7556c1e6e511edd84c8c79ac49b0ba1a999101d6764af", 0x55}, {&(0x7f0000000380)="e467a74bac65617cb749560db3f06cc7bb4832715e9d14139d4b6fa4ebbc426e1d84b98dcad1cca6178494e19e7d9f0ab863572e304cea11c021bccb7839e26ce0677d4ca0c92b06d3d43f22db10203f9432ea0349a1da86a29bc1ed497884673b2d38db53582192afad0f4a8f5d1af99bf4bbf198625b108d8968e1945261c227c4178e580431c6e413bf8dc3508bd8399f79e7dc11ca08e198a278ccf5b61fbef472092b73fa27d20b3b09c8209a1e1ac01648b03f70e8275fb920c48279c2bb070ea77bfeac8f1dbd011ce80aa710948b0b631ae08217a0abe8f71c4ec580084c5cf499f8cd9c52d969809223e036f31564766a1a1c9ecea3ed16a9e60cd0a459d45bdda2f092c715bbbefe0b7fb279853e2b4e890ee4c0acd70e31100c28a78c7cb72bf6632a97eece0f600db9e818f93cae3ade31f939c09ecb4c50d8d454e4d483f9e3b9ee9cf79daa8718a6ed907e72320b3d2b6cedd6621844667e0ce430762e66231d3f6dbe7d2e4f03e31f68d2e88783cb3fcf8c5f789c3b504e21e4a5d7ff60fcb55c2129ce363bbb64a30691de5f81713db98f15bbd9b17154b87dd64c494c5f3ff35a6001ff48679af7cb0ec609c59c4249dc178978df35573a961e1e429f2e326831c044fedf3e12e5d84b401a050e7ee53d584fa3f6a3fdf76bbaaa84c0f3585f3c5f3f1d7f3d8a13815e8b47a5041f743a05224f597df0237bf55ad709556f4bd5cec90342b9d81d07dcc80ad19a10cb175fa744951efa28749523c6b2a30ca06ff72aec166264547480191e0d13f258d1424dc4d5b027a4060e9f2ef3f1339d18a812bda9d0189f6e187fe024a27cca0b035c4dab923c8a5538ca1f986cbae2b543e31609b02d395417a2d5cb7b36ba8bdc6269eb927100a3225fb3594f7257532140171ada5b07853cd4084b4b0e757edef4476f1d27440b83de7f29ac78108dce3897ead1b1e8ea67da96eb26e6e18e1c4d4a78ccced52503e91962e72ff1f6eb6218d5fa2ef32e5210b7a4fa3fc0f29aa2d950410039aaefd9981e37d463f9fde613f3817b3697e5a187958bfc3af8ded80b13365c4908f468b7baa02cf280750eeb6ff39b0ae3923d0a16793e96ab8fef8d86bb7b9424168344087d292e88187b8f4f3d2e8eb480f83ea634baad4b58ee463bdce26ca0d174b316dbaf44323ac2dfe8b5e71ab96b8409480f8f014106bfbca3b5a1bcf843745d83143444dfc7c25a582a44b60f936318a8a7507a8f8c52152616d9d4c5d1cfcecc2fa5cea959ebc277a47b89f9dfd09a918a49ac18f1ed8d67f2aeafeb5abfcdec053aaa6d1c887c5f150ab7c37db6e9bd551966e6efe77cfd68de9619619541b9096653a00c4a9d4d5bec36a80e8b6ce5a2b7bc516f879d69241c1398065170b45a5760e9c1d0dd94b5e406cb894f5b0a5cf06378b4d797844839f80de32feee6d57e579bf9dd2073ad2d2858cefe2d54fce9080a09eeee20c62e322902d4dd3949e26f57f08ececb98a153e06430895286636686d7bb71324c349a485e04b831ff94f60c8b756e83c6f064cb2c181ab73650ea4a558a1c5dd8d8621014428d5fb75b65d00a0901757cd2a899c14d45f793df4ba4860c57785252b94b325915bcb547bf72b97968788b6a4e55dfefdce1be887710f61ec0739e498297990dc48bc52861542aaf965e7f921dc86b3ae46f69cf46aec969330e9ca05ff08d9d4f557738ceaaca05f12d2aa133adbb3661bcf0c4f22f02763630bf5b8f5907c1e4bc57fa0ade9186a278c42ba1506d0f9cbcc2cfd63fde0840fbbbf9ef8aa9087908826c7d32b04cc16835302460e77a1b15ccb70c73e84456ed4183532b41e8601583eee0f46c22c3e84fba5d8439b979d77809d409f9c9df0fccd24b43bafd4fc027e95c646cebaff3ad83cb80eae59a432e398cd5e49788a4e00ff95833e3d2bae428d05f5841f90ff8e3bcf44e1e59079d4e06f5bf9890bcf011f7be1c0556c320c168641f165b94a7e106394370004a766293186100b4455bf80a1fc99206b79103bbb1d3d607755ab903ed1ca356d31bc6696713e6524bff3b8b603cc8bdf9a4aeaf0e7023c25d5252aff354a645f6a6f2c75afce02c0706ff67047c8a039162bf6d4b1ac5eddbab48556f29a2536f050412fccb1fed94277417fc0f3afba2f66d3df3c75a67560673bc6d4193c6ce21e8536d192d492946cb4a85f52833247b1f5719be8692b1d9782b61b7aecd03cd3f3f4f7c0a8ce705635363d5aa6dd42fd9f296dad75d94f4d29ed4931508abb18b62113b036ff82ca690afafd8cc70c285d486b3050a36d20867c7576137cfa4ec33d94d4761c03e2b0dbfc92b58a2ea0da5f6848e64285d44f25cefa658dd2687483f209149a7c9412a653dfca2ffdf6d6f1e8ed0847a35bfc33738e4493c077b4d103cef33e04ebdc9182faa020d2f80967371155bcf1ea7d54cae82c051d9ef52361ac89c14b00b9ee24c6a62fb3e656581d46558b871555446f4586bc119d9cf646adb398c242de0ee7dee2d189866593cab617d6d27443c8236f4aa65713c1b065dfb6803f666644a0a90e93e06ef921e730a5a74cb797806bc57e524e86e4f5a90f4b6510c68d132229c6b25fdd71dd1d61e835013a6b3c073726630a40618d19e1ad2198ee45c48dd0c1d8a182ebd135dfc6ba52951067829caed9827cef9bdcb09f24bb92534a9afb877bbbd84e19ffb1130b07a9baf46784303d1abbf179fbf639d30fba988ac5a3e677fc683ebb42bd084f72b95c2144bd840d1396c4254b61675648a2e18f71a0b9e2e65d8dba55235ff2cc30bb2173789b1a05c3576560c01d14ce11566f1520445e0134153714c755d43f6b744e1534db4d85ed17ec68188aab3b07c751ed9fa10fcc4d58ba23b71519345281afd91d3c249de01ce6c23fead7ca9b2a5794bf4ed4e13204a8c2a1f58bb56a559b8f050868f30cd4a8efe9f126173337ef590c0e847e356ba6a1f7dcf629a61d8fbd5760b70290fd4e9f0c4b2aac42ba3c2fa6f145c9de1f9e02b0670d98d4a519ddba3da3e736c9cd740a725b27173d7fca15dee69b87fe8b8445dbacbc4e487eb587dbb44fbfdd45daa87f93513cdfe85f1e61732aa9e55f1761df89202997d1bc162e9180b299426b89ac8b19dbc4571ed174802570df2f559c04d476df2f66f5852da431a98b129edb3f53d57d1ca7c438f2b9cae022cfae4702a2f91d3725598aae16c685b817303951d2685201c82def64c9446cdf00c960503e07273b3ad022237187812e6c7916e51a0510f404aa794e0f1ca75753f817fcecc247eff53fb0b46c63d65566455c73409c7f487a622534cc5f5964e1ef3565783b6c779724dfc810220b3bb2445580af4907b5055e9028ea3d7824c804a6d31daee01aedab7a4d48699b9e856db940a663ff1955c2ec4e2e02e068a0fe29a1bf12cea7a93548682d7d808da78acfbafc7349517a987c3a2b81c19ceaa7b2dd80ddbc78d72f75717bc39c370f40b493786765fe15b27dfec0147c83cf2222440f102a4356e3cdbb06fd151cbbdff4c0c066da29ca627d00e98c7fb38ad3a1d6470d8071843bf4660d75bc5a1ec5d81a025d81a7fcc93ff29a8ef530fac43878c49bc4735685a1fc785008822a6230c6a8e0f8a6bceb8a1509cf053b838fc919b15ab042777d459353d2740cb824053ccb0e18b70515841ec590791d7a3dab20b2ac00cd6dbf3d72caa96735cd0a79e0908002be5536c5ef946d7ac56f69697ec501dab78e228ab4b6ca5a5ef6f7ef8eada8c937af9cea4f3e7a6e44613753450600b99aa86adb55412ae799588aff4fc8e24aadf0a543cce652d9272faf67c5d4a290d91ec1f9334cbc7f002be6e2ed79d387f8a88e10cb4b49d32a39bfa7b22c4d1c8fdbdff021e606de3a07c9948d6b165d9a0d6cc2b4569efba09101bb917d0eaf48df523e31409959c59e3353452783dd78c092ad7790b76b0b7180a5614a3bf5635412e7d1834d1847ac8470c392a0501b92380a2221e93f37e7b677053d78106fac32092e46b35a27ca5ebf2cef2e675806a0700f5e33f543aaff26a835d8354e108fb39ae55b48805da38f8d9904bdd8eb5d1406b7278877ff3d5ab7e7c7cb3d9e775a3767158bd73e765e7373e5f5ef51f77099d15e21be471ef4dc40f588be77605146a304dfc499bdaa93d17549340ccd9fa7a49a8fd9889df0778b3559e1c2d07d53fef19e9b6b8530071edc579627aefae370c4e14704c2ca008c69ee659412db5924e6e86887e3004e161b666252b81e1e34d66f8f28217b439029cdf6df45d4e021d71c932b50bcb814c66019e15b8c69b30226346d4100d412e3fcb4984614194b2cee6a4c26141dd8a03a0b25d211b7e5ffd0e769dec87fd3bce3a6ff5ff3112f46f5fb17dc77376c17a1eac22932f2bac676d4fb7c25062a6f9feb940b167d750a9e140983193905b770320750825e29da9c4354962c54195d88145e9d498c56cfb9a2da2ff403a8e07e7819189c64067c510f6707900fde24287d5c979ac46c456ae9d25c4bbfda69bc8dc3fb8f26d71c2249f234ee5d4fe232a6e33a406a511bc05cd4027e90f78de3bf1898b001c179b6fdf4c4f40508e983e5c8a263b1bddb13d83ef45167a945a19e027e5209d3832b499feb28065edfb60ecd3e0d6f491c6fb81a17714435dac7beac1312bb430afe4c429326915aa59f8eebea9ed9163212421b502e8ab7aadc9532a9016f531e471829f3e8305ae53005db15f3f7bec429e8b10e5c23962156f103c20449a02ae796fcd37df4461b60713d005a838c048c15184eb14c9a07d8608e3182a724e0060f94bee45374fb2ad454ff2205ab421238c7c559bef469691a4c68cf7b7595f791694125318bb9401aaa2246d32750941b5e16247f3e458c3f2dcc96e908618905d8f90471981fa7cd0d879664722fac7ffd81b27761fdbb2df3f7410781d983cf9a3eba6658b2cb823672d027275d50e574434877eb0ec8e5ed394c350fdf896af733d0926d220418fe63c4f51ea357b4f74a8f098b9803b2dc6cd5b1f9d8f5f8460a9efc799fbc9a8f197701acd19669c1729a356db23bb72dd6ce0f9e07792714e550aae4961060a80e0226464b86df0b3a420e5bc15782cdf92438ce1e43520a3c51fc5d54283646e8a23620ccce12e7a98b82cab63541dcb96a1d95a248f9561912d42086bc70a6924acdd4134a5235a8cccd03af0640b666a707f58c298c1780453d7be800687a3f79feb27b811f7de08891592d941243ed14f1a9ae358f87832c5edede21103a344a1be396759298f2320a391841bf2d8fd5b04f1e63011619e5dbd4ea1219bb4d83a7c74b8c6def9e426346c72ad49ac2d6d693785cb7ed0453169c137c258d780da88a7ab95bc732e3aafc19afc8148d8aac1130fd59f9e5a7ceebbe4ef6ed2cd726cdca25c9fab49b868a6d4ec5234f1b488b53cf9b2ec577a31ef1a8046991887beab1dfb82b765cf9f0863412eefa17d5b9718526ca333090de01d024c0cb586d453dd65d798b7087c72502c45959a3e5311f0900a60e3ae6285a35113c7b92804fa7f464498493ca7f0d2bef29a7f1adec2b2b74461de927a233a4d156ba5e65cc2f64da9a63b3db6ed2d9142a7e891a19aa027de2ebd4deacb9aed1129e60a10625b34dce48cfb656b73ebf41bceb7efbf9a60a418d55a70563fca6ae4f85710261473ac67fd8ea353e045e728ab9093dcedcf5bf14dfce1c86e1d506e1a60e373783bace1173916c284299f", 0x1000}, {&(0x7f0000000240)="61a13709254cbb47bca93e6bd5faaf20", 0x10}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="388158a48e744203c7f7044c6e6241bf627a14", 0x13}], 0x7, 0x0, 0x0, 0x40000}}, {{&(0x7f0000002440)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003640)=[{&(0x7f00000024c0)="b7272d1d443b7b16c04d2545de71d21dcdb386bb120f60f9940e705cea9b815ecc", 0x21}, {&(0x7f0000002500)="e70db51c0fe0549861a9bf88082036ce17fde885fb655bf567d7b7f33b823d95e7a37de60177c0d52c55b662935f5b615bcbaba18a4dd2136ce4440be3c9680c13a89c4943c864537449e3312b", 0x4d}, {&(0x7f0000002580)="bfd7cc7948a8e8427ee47962a005d313c75f15129fe67ad7550b67efe55d1d120f3d40d0b7b2b7b9439bcb4be9912571ba2a9b86cf1026f258e09f45d23051d195a2e6083d75ff8d300fb1c42ba22e3c07b6fd455dea43eb56c5dc03db8e94da03af6d97ccd16e7e60780a630ad681f98e39dcd234d3c03fa457aa7c5ea62dc3cdb3afe2ad20d991ddc4f9161b0bba2357cde046f129abd3cc62667fb0609d1c9be056c2eece5ee64b2ef22a2128cf25c071fd07590d55dbb27615ce26aa73ae5badb5925ee06e93fe062fac78b96fbb085ae043094093f44357f5be0af1b441b045e13f9ee603b69555444121a24c81a7b7e97188c761682b2a371ede865dec8572e9b5302c7927c26f312e071e33183e0ab26b511a22ea22bce98355f536b582f76c68dbdd57c41425c5366a84535257e3b9982bd9c48828f7800b690e6498ced7d5c56481498feb54ed3deb91af4d8d0adc0fd2125a6145ab4b49987b3d853436d49beecb5e1fbca06553dc94db44e231ca8d2793670f5256711d72dd56036cce2bd131e56510ab527416a247f9e9726dd1f6d773c590c7a2d82e74046017c7ae25012e7b95847f095f05e0b3cdd58aaa8b3b84ef9f2009b54c143d59aa27c94ee63f0b21055a2820d8568d88248883eba69e424ca9a34cc92da00cbb3ed5913770c6d2cbfb328d8f78ade5380ff87d2c5ca18cc42ce227677212f4a75e5e9107b17e80f8234b04ad88040f27d345f93b8ff89685c5dad181f83a4e3eec4a15268faed1ad108ac2d9af2406938a1e58ffdd6ee09bb2831aca875895c5e6af1e028544e5fdec316c6d0264d5d21a77416a20198dc8d5bdd8cf8619748fb96f24598325b7ba54d946be0eeb4f6b8f05e54949738169a3b42b23904ab1f9a7eb8123018140df4cabaa1ea15baf984f102d0854fae258d8bef14a974646f4188e8c58760e6cd600f5a0796703d0a34167cec4f383eb7166eb495b0c3a94748ed085f842570cf26d0099131856eabe523961a5211b13cb60aab2d29d37fcbb4cf23b33ce53bf1bde866846e048acc7de95a2717e62f07d9fc794f30f290d8254abd8d3ee4b6febaa77101991933bc4cc1ecf8e0f0b8bd6d4d6c1197baeae83d52ff3aeceeed80419c3e1002d71f3bef9f4a5f56a99ee65a153e1b897ba16bad43b64393e7c54e35147d85f0ca8fbe2478d6707740d0b4766185ba48ce1ea33bf9fe92a1f504507f0972d0afd8d37a8a8f87ad7c5d53fdaa576962f4263e0862011fd52b12450d82db7d9f059fbcf044cfece3abb2d5b056775a22a2a0b6913301de702cdb87c2be8c313df8883d8f641a59968684821c63846a1ebc3ff7f0e28759ea260e24e4a90228cafaee8cf6fb970024f856aeb7402c0560b318b3341c1bf088d77520079dc0bfc26e93f7ff6a4be5f0d29a5c784aca5294074554d0ddea544c773acdd85021ed1f4f9efdcda58df56630e723a0e0bb32c5c2ecfede6ec966db6ce1a2c9030fcf79a6f0837d30b581b9a4d103b81a8658d0ea1392c31938a2c16bc3c65e9972fe259657df226b25167c1dbcb4080c579af4b7100505940d8951885f4062f936ac5e4a89b08be79b8db7923b6d50be1c21825444ccb23f3bd1f0a8597824f646750465448f66ba57911dac091c0035c47826048efc0b6b46a01537ea12b4836d4e3a58fffde838a7187081b5b8151e9c19399f8fd13926665ff1d8e1f0376a07e04afd6126b0f140ebfe815e14bf2ffbc461cfa5fe2765a3a9303d1c649371facdef866e0238251eec85c885aabd838ce56936d2f3397853017d51c967cc77a4c1e904445f88f74ac6a374b5e1d44714b7ade2f8d646aabddd799bb1b65a80fa5c745b2198d401f4d3c8ed1e2e68d3ae3ce94d26cc484c5478be9ee0c2b190810ac6d574d010ac736fcab78acba04b12c22f283720047d18b25550c4ab6eaf8d69241dfacc51d771066a42311cada0554834093571edeed6c67a967fbbaeecec3c24697380bc51898b389a373fc24a2451fe8006a02cba60ab350561575124b35a68e0943d107431b7276608ae8916092786f8779339d23749ca758616272e916cc902630a5bb8ae03dc5f2cdfaa9ed37ae4713b7998c211160710d66ba79aad8aca017ca642f7528754e312dcbb1adc2d70904d0f353a039f196150485939c4baddf164526743d1e997f1e3d5cb50e1c38e18fc4542105134eca1a9aa9ae66fdfb29c6fefc1ddbad2d5d03a68f676865b0f8d0e65a4f0027dab3e1d15cc399370ab8d4516269422555b58eb591d8be315121c3a45bdfb00bfe6f575532bc2382201be2604c592628ee34c84659c29e2532c111cd92b1b3e5c635bf4fa2fbd6fceff349ca2b2a360807b5b9a27d62545bd16480c3699e5045ae6fc6085d9453859f8466f391b51d0dcb8e1c97963b8bfb80188f599c12e0d934f86b67b97bfc2676200a8f37ac56feedbf5d2e6d4434013c10ddf2539979a9eac25c741d5e103d7d028f0a223e0532ec2003cd6a16c12c39f590d880199a767cf4f05c75028590686609e2537ec428410df196566e542fe5a6dd2ad78cda3d3b279f22b3fd3312cc0ff4fbd4692fc4fb64ac668ca86aad1af588a97556586eb1ff234ddeaf14475e17d9f369ac3dc884620d8caa9491efca77e708e9e8995afb714b0b7d0c25ddc29666bc33cf8b1b4349ce7599a3089d6050a946cbf736fec1aa4f2dee6868666ae5db9e0db2feef749718a5dcdddfa591c25f0e4ef172c2f1f5c1e5bb867300c929b281cd31d54cf0261c800d0ec1757722f7663a62404263d7d9d3828e111e3d5fc454761423467d57093641bfd080670978286e2519bda754bb181d3c07f748d349e8b76c312c338e365998c0a430267e6d92d5c948b883433678dfb54b68bb423861e0c4350ceddc7ed9eed694fdffefdf3c7f77f360d09a6f54093f8520c00bd683e5626c17022df599cba034e25adfc68e87f57a8f3508ca67e03681174d32bfedd9ea7fcdbde22ceffe8b72eb5062e7cd470ae62f5f9967932047e03ecfe1bd0e7d260633da19aea8c08b285dbf525bbbdd38e3dae55ee3772400a103c6274ea564a6a5645bc451df9557ce185f3bcc36ed0edad9a3556974687514e95d6513c2779116c77880ab53bd7ab8c5218dcd0d617d3cd3bb487c4e3d3091e291598244bf618b2f762b1e339621b343e04e2c57062afae97c3da6ab3118bbc073b0d4a353a52e217261f7397a7197d95bc997b28708b2e09cf99793edeb4543b58c71ff48f3d714479fdaccb36bb1cb804a9cd574c09d690458443854ebfc0a1e0a7f17e9d575e0202ec9dc983d41c2319efe2a1c5e0b57da5ea212f8dcdeb2e5eaeae9cc8c2867b038d6347da163ba0cdd0b3f067361fbc1ae3fa1f1831cda515a443b4b0c32283c5130bd027476c5e5ac0b959a5763425b793b62a6f49ef46cb44d2f240dfdde3e92c470208faebcf94fd1c4fcbd1556637f112f8fa99f2c30382e36e32bd75e3cb0e21408fa65df61456efcab10ec1238c48b295fe2587a5c884901ddec98801c89be16f246cef1323ba04d3bf6604cdac6590d9cfe871e29bbed3a0905196e8194e3838911bd4d82d3be2394c56720173447b2bfed7261020e4a64e45c54a306b87aa4a2af61bd66adf3ac6189353aeb21735c5ac489ef2b459f12ea97071bc00e8e86f7256b63149633ed3d03931d35db46e618a03489967a86b6964d8b3ee511b83bd29c0c0430537dc0b31545abaae6b1b6eac90a1ffc453fec043c7f4ed840872e7785801bca3197c4b23f6d02c3aca539fc889537d1bb2ff1f7076f667050130703dbd6f8d43342d4259f9c33e709f9a4a7a1a6fbeeb83daaae7c8ad239906e0fbb0295f08f18067640c95b36f8a344025be83935c01f53eb23b144c62be66d4cb5884017cdb743273ac0c77ede0001e2169449951981e005f4e15bbc102ba6ef646a17e659f6f1db49e4debcc4eb084bf99dfa1bb3969635b4ab8ce0a0c287042d77b393efd01bace2212f10eb8307b7d53391f317e8f1b20eedb9ac660a54097e0e08693d589ca53ce481845867bac09eb3e6df14e83986926b24067e2c14c058b07a90532d2d0ebe482d27387da5a52718dfc290a252c5b38a2a8d4b84b264219c958a69981ab3ada1a584a61c78db1974909e264949809a281f8d318c883e763d4ac6d5cfe54b4f025e4ac412630be3e18dbbe3bf1d0f614d064d6bbe3d77460a5bb3d9faf8441d0f784c8178315f92d8dde64ad353528273f2988728604677d2ad1ee1ccb4ee4386f49f4067491340537cadcc1ae76834379f0611a2702171c55042e5ea45ddc20937be3c225b36990397471f882cd40620431a6da6ff11465f7c5c6121924146a1bdc4a42cece7e785f20f1c38d2f8987ba14c99aa99fafda425c32eb7362da96f399373bf17f007052c32252a93a6aa565202183beb43d15c0068b3d30cce4bfa8c3b3ac5dfd4aecb127d9e9d92116a13eb34dfb222485589d5456f834eb44fe9c516aebee10d29ab8bc0cf09ab054bb5bd659334a3700185d8a435593786832d4555687773a1dfabc7e1415c857c99db41445c7d4e36a7f0e6bd0e607fd025a7f8b0331d742840502958f819e7fc809d5d508d08a7a9e513f4a717e1980691ef75b5442d615dce0c097eda11bdabf5b3ed64f0546f4cee164c51e00eef0c07d06b870f0b4717c318c13ffb2295f35a4ddc704eaa3217382ef3265f25fe6c9e61573bbeb2a85af97f943d7bb40cb6f38b67e9ab1278a16f289dbfc75f600cb960fa7f4c9b8cb08e47393f440fbd2a0e042b4abf19ae7c5b1eec86281705dc8b891317ed2187e4e1cc78b4fe4909c179d8db2cfec2ca0c4b615f014db94975329923d7b7e769f77ce67ded2e60365da108952b2002c75f1c3215c9196caee8e9cc3916cd4df44223e765ec8d6fdfcaf2a833c4827d38cc515a3b1a0f6e6a44c5c70279c20122764e87b2775f6025325a4f344435e68296c4d5da93f113cd949e2522036d06e4c11e75b21af16161322eb17da741cc6cd89a19d3df4ec05d0dae54fdb2775360522d7cd22f10fd1d51590d1ed6454d828d221fcb9a3af367b203d29a5de9800ac5ef15153efab37781df90fadf631ef8202ca79d76092fa2503de72aa751f425b8f5ecd569daaec8944459660c22bdbdfe75df8a1e298aed7f3445c3676c1b4f4880f2660b0e54ec0cfdcea481bded32cd435d28d9d5918b5062379d8059eaa9b2913e717b3a20b2e2f1d4e6bd8150e1679ba2aaaba4658de0ccda9c08ea38f3cf6549643bf4ad13593f3cce5251b890c59f245018c09a3d2bc57ee36e8a6151e79764d7dab8a280d457b1fce22be44a78ff24cd22fbae15741c2065e30217f4ab425096aa9c9c18184a5b8bb5381176e546f61ae77328e8e55f7406e51eb56e4c8362fb143cd43cf7e8ef995a2fc58908421439e08f90ce42f852be52f4ba75c3dd4b77c4b421f0e75060232765902af0d8e3bd2d1f93b9097055463e0dc57bc72c35267787c6db98032a4c1afcc04014cf413eb577c9bbcf65afe075186ad48017361e8541bf7d47cd10b612129f3388767419c6310dc18b6e5509623366472c4cd79aa48ee2487fdbc9204992d18b19da2efe38db9a2c6c43ec5432580e0070aed5e1eebb62909ce5f8245c2299b44eee51cf8c52fa8a9ee25253bc74d99d729217d94f62c95bb704a0abe131556e9d49f66525940218b36e7a88b3c995dcc65e7c11fc83320bb67db14b85e6ca7710de5819af174b8502e4837159", 0x1000}, {&(0x7f0000003580)="9acdace2a85653f3da8d933989635781bfa6bf7c0b83a61802beea695b5c523cd88ff58b9941b5c329922d96f33876513a98b8df68d881b58e0d7364902e495248668bfeae8e81c5e8baeefc870b799d16e1ff", 0x53}, {&(0x7f0000003600)="e4d489ed01dcc36e5c126e90a1714eb3951a15dd838626c29bf7f79fe2d15879a8718019676da0931d64239d8bb21479a98ea11b68346d", 0x37}], 0x5, &(0x7f00000037c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r0, r3]}}, @rights={{0x24, 0x1, 0x1, [r5, r0, r7, r8, r0]}}], 0xc8, 0x4c800}}, {{&(0x7f00000038c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000006e00)=[{&(0x7f0000003940)="09fcfc843fd0de8cf1b4823d81e63f0b8bbb680bff791b30444e03d68d1ee7f921f81e0a520ea979a107f7506a6e93d340a26e51e41107eeac941f0703caba49c238d03a3bd88c5bfbeac2c3b3f180b7f9243c401df076a50b07f243e4638bffe8efcc", 0x63}, {&(0x7f00000039c0)="58afc2ef0b820797cbe8dc186a8aa4c92b25df29448b95ae2a9a1de53455d23ed69874d84efb325db8314abf2a89ec1ad0d24de655881a7be2627ab0947a5a92730451b2b66ffcd9cef453c2dd0114d015fd31d15793386531bc0b12e349bd126b6886ace964aaaeabefd887e6ce64a4d0058a4222669abf8e5d34c6c467aa3d68e6929f046323d6f015e2b0d62f2aa9183e8c6295031b2306ab5130222d478d1be600525a3567935fd0ad3a72e0bc6806ba34f82e3e68e607dfcea47c341e40e2", 0xc1}, {&(0x7f0000003ac0)="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", 0x1000}, {&(0x7f0000004ac0)}, {&(0x7f0000004b00)="f61a9c53f89adcf9c29c0d17b66d8ada6c1bb1207cb363027a317db252d669359508bd038757511fc4e6e9ee83b5af57873b08cc5e613c6f2fd2475085695665f76a066ef7a9896a2280e643fc8451ca7d99df4425a8bec3cfc5a4804ac0690c13dc702bb160f9aeea8905a801e5a831ac8aa6c46b590af80998c2ac73f19aeac02c198d1316f7408766bb069081ee659c52495daaa4c99441b4790452e25c24af40affd64be25cdde38c8a2cc885e6d9c33fae490174cbdf0dbd26e24a47152a25e0427363f03d40e7e64122a02e01d6753c4cf328d3bafae29b2576b", 0xdd}, {&(0x7f0000004c00)="07e366e8d77a6fa9caada51485b92e0d4bc792517c7498dff69445772cdc1529c3f4f8a641de66d0ef85cf086c12cd40c5a01d92e94c570a9328afb62868d6bf139b088d8c31fa6ea74d5e57f2af7af459edacd6583767c8e400653bd7b66006fbf2c0da0871271f3935886fc4324767cb068741a09a0ea84c44eff496a61f02ea1ec3b73b6ec8add49ba2202c681c153902e1fa794a72560c133cf6508c9e57a492ba543fbb1162c3c7845db0e490169ca1476617039eb127230f5f3c0293948e08bf8bf7804a713a8400f226136ce83ba3b673bc06df7190", 0xd9}, {&(0x7f0000004d00)="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", 0x1000}, {&(0x7f0000005d00)="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", 0x1000}, {&(0x7f0000006d00)="8f80e0b37a38d6bc115541cf46a2a002ab08ab143d6c923434c2daade19d1072882495596bacba93e1e7e264eb53b337d66f2ee33948f33e58f57ae17c1d6032c7df4a37a4d06de75b2e8709982d66fe8d135136b1", 0x55}, {&(0x7f0000006d80)="d3ae38548331fd8e6b4e1d0e221325becadf1c2d80b13245cb099165e74b596aea50a1a15306429db64a15a36028ed01cc0e6a4e228a824edc4a54b5e6f3db52f4d44f3f1fb7d9cc9f3bc4e1040afc5ea3f8d86d26461b59678535", 0x5b}], 0xa, 0x0, 0x0, 0x200000c0}}, {{&(0x7f0000006ec0)=@file={0x0, './file2\x00'}, 0x6e, &(0x7f0000008300)=[{&(0x7f0000006f40)="f1c25d04f5f6fcbe3b4a9d69e915ce4e3a19557916604ad9d1706b2c2c96a0a221770b04239fc403aa95a7dd303a5084fe485833233de16f32b941c18c99fc50ee0fe172421d962b5f2fa2d51e17c2026c39cd9f291eaead8147a2d527b43f99119980a48c3ff63056c82bdb249e72df329b511e8d484f6f51d271163d53b1d42a544fca", 0x84}, {&(0x7f0000007000)="26011112db0a680f192bbb8c666269a2641be93ee67f405f50de437d9444bbc0e6c417777d17a293b6915250273796f4e46c809571d9fd0a36b885bef1b920dc9a02e85d19e8f8962789e10d720ea14550be3add2c88b3da75aa04acf8d0e0d54eb1eb06d8b20de9682366328ab48d73c6ba1e5985723d5919a15484a60720040f99f53658453c1ce530025196f7a3d7cccca2c58be5905b2d3d49e3155e1f4e58b8187d0e6ef7243d88b49ca6304ce8b257caceab8c6320a174d8fdf35663aa00a681b8a669a5ba3fc53e6e40bf7caf9e08f501d5b6eb44487c7ed5", 0xdc}, {&(0x7f0000007100)="5c7e279e0552ac6b970605023ed0b2e3912b697bf13416ba1de9620d8635c4f8a407849c64b104f81b0763aa340345729998385652e122ac0811c43366a0a3cffbd798dec3ebc81c51d1d803d9d6fff17654c7acfadc696a55ca8c008133617f8a323c61fb76eef75d3cfe98cff6958a8dc3f5306f66b1165f94b59c334423bd3aa1246d7232afb9b168e0f921bb1be406931990083459643f2e342df79771ffe7ddb00bc0fbd97880f7d0eb692806300d06dca760857bd0bf6ac27b57067ceb7f2ac1a0f104ab9d6a28cd790ec419681cadfbb0f1eb35b4137ea50ee91f51085e36c9b7ce6df99801d8c9c5f6e9", 0xee}, {&(0x7f0000007200)="c06632e027851c2aab0223436436bb3beae9a55eeaeb84397f62d2f8ec661bc82def93ca31e94d0db87e1106627077e63cc11058216e673f1b32ba40aa72a568d7c1c65ef14b01490917441d7620db9df8c8db2b71f9e5af744b91d390bf527d7c1e3ab3eba007b6636a59a76515f621cc1df2871e7adb4a8766de1f0e7cb1efdb04ae7838c9a0cb88904d6209b972b08ed4070c7acfc12f8a50410396adc621568a6353f1720f0a8fac5d8d6577dbcacbab900d1fd6ec1ad18184542e2e66e3535e457d99f8e3af387c8e", 0xcb}, {&(0x7f0000007300)="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", 0x1000}], 0x5, 0x0, 0x0, 0x20000000}}], 0x4, 0x20000000) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r10, 0x1, &(0x7f0000000000)={0x4, 0x0, 0x0, "05000000"}) [ 1847.320545] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:38:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 04:38:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 04:38:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfdfdffff, 0x3}) 04:38:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 23) [ 1847.379541] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1847.393237] 9pnet: Insufficient options for proto=fd [ 1847.398773] 9pnet: Insufficient options for proto=fd [ 1847.409186] 9pnet: Insufficient options for proto=fd [ 1847.431347] FAULT_INJECTION: forcing a failure. [ 1847.431347] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.433686] CPU: 1 PID: 11855 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1847.435096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.436816] Call Trace: [ 1847.437362] dump_stack+0x107/0x167 [ 1847.438130] should_fail.cold+0x5/0xa [ 1847.438903] ? create_object.isra.0+0x3a/0xa20 [ 1847.439849] should_failslab+0x5/0x20 [ 1847.440659] kmem_cache_alloc+0x5b/0x360 [ 1847.441487] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1847.442614] create_object.isra.0+0x3a/0xa20 [ 1847.443510] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1847.444558] kmem_cache_alloc+0x159/0x360 [ 1847.445418] security_file_alloc+0x34/0x170 [ 1847.446307] __alloc_file+0xb6/0x320 [ 1847.447070] alloc_empty_file+0x6d/0x170 [ 1847.447902] path_openat+0xde/0x26d0 [ 1847.448685] ? path_lookupat+0x860/0x860 [ 1847.449531] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.450623] do_filp_open+0x17e/0x3d0 [ 1847.451410] ? may_open_dev+0xf0/0xf0 [ 1847.452208] ? lock_chain_count+0x20/0x20 [ 1847.453054] ? __lockdep_reset_lock+0x180/0x180 [ 1847.453999] ? lock_acquire+0x197/0x490 [ 1847.454817] ? find_held_lock+0x2c/0x110 [ 1847.455652] ? kmem_cache_alloc+0x159/0x360 [ 1847.456545] ? mark_held_locks+0x9e/0xe0 [ 1847.457384] do_open_execat+0x116/0x690 [ 1847.458196] ? __ia32_sys_uselib+0x40/0x40 [ 1847.459066] ? memcpy+0x39/0x60 [ 1847.459746] open_exec+0x42/0x70 [ 1847.460450] load_misc_binary+0x973/0xb70 [ 1847.461303] bprm_execve+0x9c1/0x1b00 [ 1847.462090] ? open_exec+0x70/0x70 [ 1847.462813] ? memcpy+0x39/0x60 [ 1847.463487] ? copy_string_kernel+0x3b6/0x450 [ 1847.464434] do_execveat_common+0x76d/0x8d0 [ 1847.465316] ? bprm_execve+0x1b00/0x1b00 [ 1847.466165] __x64_sys_execveat+0xed/0x140 [ 1847.467032] do_syscall_64+0x33/0x40 [ 1847.467796] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.468877] RIP: 0033:0x7fbe1f492b19 [ 1847.469639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.473386] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.474948] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1847.476410] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.477858] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.479323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.480783] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1847.497016] FAULT_INJECTION: forcing a failure. [ 1847.497016] name failslab, interval 1, probability 0, space 0, times 0 04:38:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) recvmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000300), 0x6e, &(0x7f0000001700)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/128, 0x80}, {&(0x7f0000000180)=""/19, 0x13}, {&(0x7f0000001600)=""/211, 0xd3}], 0x8, &(0x7f0000001780)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}, 0x60) r3 = syz_open_procfs(r1, &(0x7f0000001840)='fd/4\x00') openat(r2, &(0x7f0000000280)='./file0\x00', 0x80000, 0x40) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 1847.499315] CPU: 0 PID: 11860 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1847.500881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.502584] Call Trace: [ 1847.503129] dump_stack+0x107/0x167 [ 1847.503889] should_fail.cold+0x5/0xa [ 1847.504683] ? create_object.isra.0+0x3a/0xa20 [ 1847.505617] should_failslab+0x5/0x20 [ 1847.506392] kmem_cache_alloc+0x5b/0x360 [ 1847.507239] create_object.isra.0+0x3a/0xa20 [ 1847.508143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1847.509195] kmem_cache_alloc+0x159/0x360 [ 1847.510068] jbd2__journal_start+0x190/0x890 [ 1847.510988] __ext4_journal_start_sb+0x214/0x430 [ 1847.512001] ext4_dirty_inode+0xbc/0x130 [ 1847.512843] ? ext4_setattr+0x22c0/0x22c0 [ 1847.513690] __mark_inode_dirty+0x492/0xf10 [ 1847.514595] touch_atime+0x5a4/0x6a0 [ 1847.515365] ? atime_needs_update+0x600/0x600 [ 1847.516307] ? pagecache_get_page+0x243/0xc80 [ 1847.517254] generic_file_buffered_read+0x18f3/0x28f0 [ 1847.518364] ? pagecache_get_page+0xc80/0xc80 [ 1847.519303] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.520345] generic_file_read_iter+0x33f/0x490 [ 1847.521321] ext4_file_read_iter+0x184/0x4c0 [ 1847.522233] __kernel_read+0x593/0xaa0 [ 1847.523039] ? __x64_sys_sendfile+0x220/0x220 [ 1847.523977] ? _cond_resched+0x12/0x80 [ 1847.524780] ? avc_policy_seqno+0x9/0x70 [ 1847.525614] ? selinux_file_permission+0x36/0x510 [ 1847.526610] ? pidfd_get_pid+0x1c0/0x1c0 [ 1847.527470] kernel_read+0x52/0x70 [ 1847.528225] bprm_execve+0x8da/0x1b00 [ 1847.529037] ? open_exec+0x70/0x70 [ 1847.529781] ? memcpy+0x39/0x60 [ 1847.530465] ? copy_string_kernel+0x3b6/0x450 [ 1847.531413] do_execveat_common+0x76d/0x8d0 [ 1847.532321] ? bprm_execve+0x1b00/0x1b00 [ 1847.533196] __x64_sys_execveat+0xed/0x140 [ 1847.534084] do_syscall_64+0x33/0x40 [ 1847.534847] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.535889] RIP: 0033:0x7f4478f33b19 [ 1847.536671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.540386] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.541936] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1847.543379] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.544837] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.546279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.547722] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:38:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) [ 1847.572965] FAULT_INJECTION: forcing a failure. [ 1847.572965] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.575326] CPU: 1 PID: 11865 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1847.576752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.578446] Call Trace: [ 1847.578985] dump_stack+0x107/0x167 [ 1847.579726] should_fail.cold+0x5/0xa [ 1847.580528] ? dup_fd+0x89/0xcb0 [ 1847.581217] should_failslab+0x5/0x20 [ 1847.581993] kmem_cache_alloc+0x5b/0x360 [ 1847.582814] ? __lockdep_reset_lock+0x180/0x180 [ 1847.583753] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1847.584706] dup_fd+0x89/0xcb0 [ 1847.585378] unshare_files+0x175/0x270 [ 1847.586167] ? __ia32_sys_unshare+0x40/0x40 [ 1847.587046] ? get_user_pages_remote+0x63/0x90 [ 1847.587988] ? get_user_pages_remote+0x6c/0x90 [ 1847.588928] bprm_execve+0x123/0x1b00 [ 1847.589716] ? acct_arg_size+0xe0/0xe0 [ 1847.590519] ? downgrade_write+0x3a0/0x3a0 [ 1847.591392] ? open_exec+0x70/0x70 [ 1847.592102] ? memcpy+0x39/0x60 [ 1847.592774] ? copy_string_kernel+0x3b6/0x450 [ 1847.593693] do_execveat_common+0x76d/0x8d0 [ 1847.594622] ? bprm_execve+0x1b00/0x1b00 [ 1847.595462] __x64_sys_execveat+0xed/0x140 [ 1847.596358] do_syscall_64+0x33/0x40 [ 1847.597106] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.598165] RIP: 0033:0x7f21a736cb19 [ 1847.598930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.602704] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.604266] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1847.605719] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.607171] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.608651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.610098] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:38:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 04:38:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f0000000180)='./file2\x00', 0x400800, 0x104) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) fcntl$lock(r1, 0x6, &(0x7f00000000c0)={0x2, 0x3, 0x100000000, 0x1, 0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000240), 0xfff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x1}, 0x23) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000001e6e454f9955884f8bf40000"]) [ 1847.709999] FAULT_INJECTION: forcing a failure. [ 1847.709999] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.712557] CPU: 0 PID: 11872 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1847.713981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.715691] Call Trace: [ 1847.716258] dump_stack+0x107/0x167 [ 1847.717030] should_fail.cold+0x5/0xa [ 1847.717816] ? __d_alloc+0x2a/0x990 [ 1847.718583] should_failslab+0x5/0x20 [ 1847.719363] kmem_cache_alloc+0x5b/0x360 [ 1847.720278] __d_alloc+0x2a/0x990 [ 1847.721011] d_alloc_parallel+0x111/0x1aa0 [ 1847.721907] ? __d_lookup+0x3bf/0x710 [ 1847.722694] ? lock_downgrade+0x6d0/0x6d0 [ 1847.723558] ? find_held_lock+0x2c/0x110 [ 1847.724415] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1847.725285] ? __d_lookup+0x3e8/0x710 [ 1847.726078] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1847.727194] lookup_open.isra.0+0x926/0x1230 [ 1847.728128] ? hashlen_string+0xf0/0xf0 [ 1847.729049] path_openat+0x961/0x26d0 [ 1847.729870] ? path_lookupat+0x860/0x860 [ 1847.730733] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.731764] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1847.732833] do_filp_open+0x17e/0x3d0 [ 1847.733614] ? may_open_dev+0xf0/0xf0 [ 1847.734457] ? find_held_lock+0x2c/0x110 [ 1847.735314] ? kmem_cache_alloc+0x159/0x360 [ 1847.736231] ? mark_held_locks+0x9e/0xe0 [ 1847.737082] do_open_execat+0x116/0x690 [ 1847.737906] ? __ia32_sys_uselib+0x40/0x40 [ 1847.738790] ? memcpy+0x39/0x60 [ 1847.739496] open_exec+0x42/0x70 [ 1847.740206] load_misc_binary+0x973/0xb70 [ 1847.741096] bprm_execve+0x9c1/0x1b00 [ 1847.741895] ? open_exec+0x70/0x70 [ 1847.742638] ? memcpy+0x39/0x60 [ 1847.743320] ? copy_string_kernel+0x3b6/0x450 [ 1847.744299] do_execveat_common+0x76d/0x8d0 [ 1847.745192] ? bprm_execve+0x1b00/0x1b00 [ 1847.746081] __x64_sys_execveat+0xed/0x140 [ 1847.746969] do_syscall_64+0x33/0x40 [ 1847.747746] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.748805] RIP: 0033:0x7fbe1f492b19 [ 1847.749581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.753343] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.754915] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1847.756413] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.757886] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.759365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.760846] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 04:38:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x40000000, 0x0}}], 0x500, 0x20000022, 0x0) 04:38:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 04:38:24 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8002}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = signalfd(r0, &(0x7f0000000000)={[0x2]}, 0x8) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x840, 0xe0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="00400000020000000000000021e9867e4736d2c7784bdba8dbc60a8b9393f3f96950459a71ca458e86f2469b2413bb678e91baab5e720839f126ded1b478360926dc5286a6fa9af2c666ea7969c146eba58461644c3ce634bf2c9270d85f90aeea92a79e3cae1524121f48e3269e58271c7a77b523376b0d719f"]) 04:38:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 24) [ 1847.942213] FAULT_INJECTION: forcing a failure. [ 1847.942213] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.944930] CPU: 0 PID: 11887 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1847.946553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1847.948492] Call Trace: [ 1847.949124] dump_stack+0x107/0x167 [ 1847.949977] should_fail.cold+0x5/0xa [ 1847.950870] ? create_object.isra.0+0x3a/0xa20 [ 1847.951927] should_failslab+0x5/0x20 [ 1847.952832] kmem_cache_alloc+0x5b/0x360 [ 1847.953788] create_object.isra.0+0x3a/0xa20 [ 1847.954824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1847.956015] kmem_cache_alloc+0x159/0x360 [ 1847.956984] ? __lockdep_reset_lock+0x180/0x180 [ 1847.958073] dup_fd+0x89/0xcb0 [ 1847.958866] unshare_files+0x175/0x270 [ 1847.959772] ? __ia32_sys_unshare+0x40/0x40 [ 1847.960815] ? get_user_pages_remote+0x63/0x90 [ 1847.961868] ? get_user_pages_remote+0x6c/0x90 [ 1847.962958] bprm_execve+0x123/0x1b00 [ 1847.963848] ? acct_arg_size+0xe0/0xe0 [ 1847.964754] ? downgrade_write+0x3a0/0x3a0 [ 1847.965747] ? open_exec+0x70/0x70 [ 1847.966574] ? memcpy+0x39/0x60 [ 1847.967346] ? copy_string_kernel+0x3b6/0x450 [ 1847.968420] do_execveat_common+0x76d/0x8d0 [ 1847.969429] ? bprm_execve+0x1b00/0x1b00 [ 1847.970406] __x64_sys_execveat+0xed/0x140 [ 1847.971393] do_syscall_64+0x33/0x40 [ 1847.972273] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1847.973443] RIP: 0033:0x7f21a736cb19 [ 1847.974302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1847.978501] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1847.980251] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1847.981882] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1847.983516] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.985165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1847.986793] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1848.081417] FAULT_INJECTION: forcing a failure. [ 1848.081417] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.084209] CPU: 0 PID: 11892 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1848.085776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1848.087661] Call Trace: [ 1848.088303] dump_stack+0x107/0x167 [ 1848.089145] should_fail.cold+0x5/0xa [ 1848.090021] ? load_elf_phdrs+0x10c/0x230 [ 1848.090974] should_failslab+0x5/0x20 [ 1848.091841] __kmalloc+0x72/0x3f0 [ 1848.092664] load_elf_phdrs+0x10c/0x230 [ 1848.093571] ? set_brk+0x180/0x180 [ 1848.094415] load_elf_binary+0x1ff/0x5730 [ 1848.095363] ? __lockdep_reset_lock+0x180/0x180 [ 1848.096452] ? find_held_lock+0x2c/0x110 [ 1848.097391] ? bprm_execve+0x9a0/0x1b00 [ 1848.098300] ? elf_core_dump+0x3b30/0x3b30 [ 1848.099256] ? do_raw_read_unlock+0x3b/0x70 [ 1848.100242] ? _raw_read_unlock+0x1a/0x30 [ 1848.101172] ? load_misc_binary+0x605/0xb70 [ 1848.102165] bprm_execve+0x9c1/0x1b00 [ 1848.103045] ? open_exec+0x70/0x70 [ 1848.103845] ? memcpy+0x39/0x60 [ 1848.104601] ? copy_string_kernel+0x3b6/0x450 [ 1848.105631] do_execveat_common+0x76d/0x8d0 [ 1848.106607] ? bprm_execve+0x1b00/0x1b00 [ 1848.107561] __x64_sys_execveat+0xed/0x140 [ 1848.108543] do_syscall_64+0x33/0x40 [ 1848.109388] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1848.110536] RIP: 0033:0x7f4478f33b19 [ 1848.111374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1848.115459] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1848.117164] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1848.118750] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1848.120343] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1848.121912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1848.123480] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:38:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 04:38:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfeffffff, 0x3}) 04:38:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 25) 04:38:38 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000004c0), 0x20001, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000240)={r0, 0x16, 0x405, 0x5}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000100)=@dstopts, 0x8) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000000)=@routing, 0x8) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@newspdinfo={0x24, 0x24, 0x10, 0x70bd2d, 0x25dfdbfb, 0xf6, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x44880) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) getpeername$packet(r3, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) setxattr$security_capability(&(0x7f0000000000)='./file2\x00', &(0x7f00000000c0), &(0x7f0000000180)=@v1={0x1000000, [{0x5, 0x1}]}, 0xc, 0x2) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB]) 04:38:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x56d3, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) open$dir(&(0x7f0000000000)='./file1\x00', 0x2680, 0x100) chdir(&(0x7f0000000300)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') fcntl$dupfd(r1, 0x406, r0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000240)=ANY=[]) 04:38:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:38:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 04:38:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0xffffff7f, 0x0}}], 0x500, 0x20000022, 0x0) [ 1861.144491] FAULT_INJECTION: forcing a failure. [ 1861.144491] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.145763] CPU: 1 PID: 11902 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1861.146679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.147759] Call Trace: [ 1861.148107] dump_stack+0x107/0x167 [ 1861.148598] should_fail.cold+0x5/0xa [ 1861.149100] ? create_object.isra.0+0x3a/0xa20 [ 1861.149700] should_failslab+0x5/0x20 [ 1861.150199] kmem_cache_alloc+0x5b/0x360 [ 1861.150740] create_object.isra.0+0x3a/0xa20 [ 1861.151308] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.151970] kmem_cache_alloc+0x159/0x360 [ 1861.152411] __d_alloc+0x2a/0x990 [ 1861.152871] d_alloc_parallel+0x111/0x1aa0 [ 1861.153422] ? __d_lookup+0x3bf/0x710 [ 1861.153922] ? lock_downgrade+0x6d0/0x6d0 [ 1861.154458] ? find_held_lock+0x2c/0x110 [ 1861.155000] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1861.155540] ? __d_lookup+0x3e8/0x710 [ 1861.155932] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.156627] lookup_open.isra.0+0x926/0x1230 [ 1861.157212] ? hashlen_string+0xf0/0xf0 [ 1861.157755] path_openat+0x961/0x26d0 [ 1861.158260] ? path_lookupat+0x860/0x860 [ 1861.158799] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.159494] do_filp_open+0x17e/0x3d0 [ 1861.159987] ? may_open_dev+0xf0/0xf0 [ 1861.160500] ? find_held_lock+0x2c/0x110 [ 1861.160917] ? kmem_cache_alloc+0x159/0x360 [ 1861.161481] ? mark_held_locks+0x9e/0xe0 [ 1861.162010] do_open_execat+0x116/0x690 [ 1861.162530] ? __ia32_sys_uselib+0x40/0x40 [ 1861.163081] ? memcpy+0x39/0x60 [ 1861.163515] open_exec+0x42/0x70 [ 1861.163951] load_misc_binary+0x973/0xb70 [ 1861.164385] bprm_execve+0x9c1/0x1b00 [ 1861.164777] ? open_exec+0x70/0x70 [ 1861.165134] ? memcpy+0x39/0x60 [ 1861.165469] ? copy_string_kernel+0x3b6/0x450 [ 1861.165927] do_execveat_common+0x76d/0x8d0 [ 1861.166362] ? bprm_execve+0x1b00/0x1b00 [ 1861.166787] __x64_sys_execveat+0xed/0x140 [ 1861.167217] do_syscall_64+0x33/0x40 [ 1861.167596] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.168111] RIP: 0033:0x7fbe1f492b19 [ 1861.168494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.170402] RSP: 002b:00007fbe1ca08188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1861.171225] RAX: ffffffffffffffda RBX: 00007fbe1f5a5f60 RCX: 00007fbe1f492b19 [ 1861.171996] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1861.172770] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1861.173547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.174321] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1861.203623] FAULT_INJECTION: forcing a failure. [ 1861.203623] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.206596] CPU: 0 PID: 11914 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1861.208306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.210305] Call Trace: [ 1861.210963] dump_stack+0x107/0x167 [ 1861.211860] should_fail.cold+0x5/0xa [ 1861.212864] ? alloc_fdtable+0x84/0x280 [ 1861.213844] should_failslab+0x5/0x20 [ 1861.214775] kmem_cache_alloc_trace+0x55/0x360 [ 1861.215890] ? rwlock_bug.part.0+0x90/0x90 [ 1861.216947] alloc_fdtable+0x84/0x280 [ 1861.217788] dup_fd+0x722/0xcb0 [ 1861.218545] unshare_files+0x175/0x270 [ 1861.219396] ? __ia32_sys_unshare+0x40/0x40 [ 1861.220356] ? get_user_pages_remote+0x63/0x90 [ 1861.221346] ? get_user_pages_remote+0x6c/0x90 [ 1861.222356] bprm_execve+0x123/0x1b00 [ 1861.223194] ? acct_arg_size+0xe0/0xe0 [ 1861.224041] ? downgrade_write+0x3a0/0x3a0 [ 1861.224981] ? open_exec+0x70/0x70 [ 1861.225757] ? memcpy+0x39/0x60 [ 1861.226483] ? copy_string_kernel+0x3b6/0x450 [ 1861.226925] FAULT_INJECTION: forcing a failure. [ 1861.226925] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.227479] do_execveat_common+0x76d/0x8d0 [ 1861.229626] ? bprm_execve+0x1b00/0x1b00 [ 1861.230552] __x64_sys_execveat+0xed/0x140 [ 1861.231493] do_syscall_64+0x33/0x40 [ 1861.232317] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.233434] RIP: 0033:0x7f21a736cb19 [ 1861.234253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.238241] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1861.239906] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1861.241476] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1861.243020] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1861.244575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.246127] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1861.247729] CPU: 1 PID: 11917 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1861.248468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.249343] Call Trace: [ 1861.249620] dump_stack+0x107/0x167 [ 1861.250075] should_fail.cold+0x5/0xa [ 1861.250469] ? create_object.isra.0+0x3a/0xa20 [ 1861.250943] should_failslab+0x5/0x20 [ 1861.251338] kmem_cache_alloc+0x5b/0x360 [ 1861.251758] create_object.isra.0+0x3a/0xa20 [ 1861.252218] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.252742] kmem_cache_alloc+0x159/0x360 [ 1861.253193] jbd2__journal_start+0x190/0x890 [ 1861.253679] __ext4_journal_start_sb+0x214/0x430 [ 1861.254189] ext4_dirty_inode+0xbc/0x130 [ 1861.254632] ? ext4_setattr+0x22c0/0x22c0 [ 1861.255072] __mark_inode_dirty+0x492/0xf10 [ 1861.255547] touch_atime+0x5a4/0x6a0 [ 1861.255947] ? atime_needs_update+0x600/0x600 [ 1861.256447] ? pagecache_get_page+0x243/0xc80 [ 1861.256928] generic_file_buffered_read+0x18f3/0x28f0 [ 1861.257512] ? pagecache_get_page+0xc80/0xc80 [ 1861.257990] ? perf_trace_lock+0xac/0x490 [ 1861.258454] ? __lock_acquire+0x1657/0x5b00 [ 1861.258921] generic_file_read_iter+0x33f/0x490 [ 1861.259439] ext4_file_read_iter+0x184/0x4c0 [ 1861.259912] __kernel_read+0x593/0xaa0 [ 1861.260345] ? __x64_sys_sendfile+0x220/0x220 [ 1861.260829] ? _cond_resched+0x12/0x80 [ 1861.261260] ? avc_policy_seqno+0x9/0x70 [ 1861.261703] ? selinux_file_permission+0x36/0x510 [ 1861.262238] ? pidfd_get_pid+0x1c0/0x1c0 [ 1861.262684] kernel_read+0x52/0x70 [ 1861.263071] bprm_execve+0x8da/0x1b00 [ 1861.263491] ? open_exec+0x70/0x70 [ 1861.263878] ? memcpy+0x39/0x60 [ 1861.264241] ? copy_string_kernel+0x3b6/0x450 [ 1861.264729] do_execveat_common+0x76d/0x8d0 [ 1861.265201] ? bprm_execve+0x1b00/0x1b00 [ 1861.265649] __x64_sys_execveat+0xed/0x140 [ 1861.266117] do_syscall_64+0x33/0x40 [ 1861.266519] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.267078] RIP: 0033:0x7f4478f33b19 [ 1861.267482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.269461] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1861.270286] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1861.271048] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1861.271819] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1861.272608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.273397] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1861.314437] FAULT_INJECTION: forcing a failure. [ 1861.314437] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.315702] CPU: 1 PID: 11924 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1861.316484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 04:38:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 26) [ 1861.317567] Call Trace: [ 1861.317881] dump_stack+0x107/0x167 [ 1861.318280] should_fail.cold+0x5/0xa [ 1861.318710] ? create_object.isra.0+0x3a/0xa20 [ 1861.319222] should_failslab+0x5/0x20 [ 1861.319641] kmem_cache_alloc+0x5b/0x360 [ 1861.320105] create_object.isra.0+0x3a/0xa20 [ 1861.320598] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.321179] kmem_cache_alloc_trace+0x151/0x360 [ 1861.321694] ? rwlock_bug.part.0+0x90/0x90 [ 1861.322173] alloc_fdtable+0x84/0x280 [ 1861.322596] dup_fd+0x722/0xcb0 [ 1861.322979] unshare_files+0x175/0x270 [ 1861.323404] ? __ia32_sys_unshare+0x40/0x40 [ 1861.323894] ? get_user_pages_remote+0x63/0x90 [ 1861.324404] ? get_user_pages_remote+0x6c/0x90 [ 1861.324921] bprm_execve+0x123/0x1b00 [ 1861.325347] ? acct_arg_size+0xe0/0xe0 [ 1861.325785] ? downgrade_write+0x3a0/0x3a0 [ 1861.326252] ? open_exec+0x70/0x70 [ 1861.326657] ? memcpy+0x39/0x60 [ 1861.327028] ? copy_string_kernel+0x3b6/0x450 [ 1861.327543] do_execveat_common+0x76d/0x8d0 [ 1861.328022] ? bprm_execve+0x1b00/0x1b00 [ 1861.328508] __x64_sys_execveat+0xed/0x140 [ 1861.328987] do_syscall_64+0x33/0x40 [ 1861.329416] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.329974] RIP: 0033:0x7f21a736cb19 [ 1861.330396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.332425] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1861.333279] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1861.334081] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1861.334870] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1861.335660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.336464] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1861.342163] 9pnet: Insufficient options for proto=fd [ 1861.410041] 9pnet: Insufficient options for proto=fd 04:38:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) 04:38:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 04:38:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 27) 04:38:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) r2 = dup(r0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@reiserfs_4={0x10, 0x4, {0x4, 0x0, 0x5, 0x401}}, &(0x7f0000000240), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x7}}, './file1\x00'}) 04:38:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffdfd, 0x3}) 04:38:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2) 04:38:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:38:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 53) [ 1874.952209] FAULT_INJECTION: forcing a failure. [ 1874.952209] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.953417] CPU: 1 PID: 11937 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1874.954139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.955001] Call Trace: [ 1874.955277] dump_stack+0x107/0x167 [ 1874.955666] should_fail.cold+0x5/0xa [ 1874.956078] ? kvmalloc_node+0x119/0x170 [ 1874.956517] should_failslab+0x5/0x20 [ 1874.956924] __kmalloc_node+0x76/0x4b0 [ 1874.957338] kvmalloc_node+0x119/0x170 [ 1874.957755] alloc_fdtable+0xd3/0x280 [ 1874.958159] dup_fd+0x722/0xcb0 [ 1874.958502] unshare_files+0x175/0x270 [ 1874.958917] ? __ia32_sys_unshare+0x40/0x40 [ 1874.959369] ? get_user_pages_remote+0x63/0x90 [ 1874.959845] ? get_user_pages_remote+0x6c/0x90 [ 1874.960341] bprm_execve+0x123/0x1b00 [ 1874.960740] ? acct_arg_size+0xe0/0xe0 [ 1874.961157] ? downgrade_write+0x3a0/0x3a0 [ 1874.961608] ? open_exec+0x70/0x70 [ 1874.961983] ? memcpy+0x39/0x60 [ 1874.962341] ? copy_string_kernel+0x3b6/0x450 [ 1874.962802] do_execveat_common+0x76d/0x8d0 [ 1874.963258] ? bprm_execve+0x1b00/0x1b00 [ 1874.963694] __x64_sys_execveat+0xed/0x140 [ 1874.964140] do_syscall_64+0x33/0x40 [ 1874.964536] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1874.965076] RIP: 0033:0x7f21a736cb19 [ 1874.965471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.967407] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1874.968205] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1874.968967] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1874.969684] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.970446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1874.971198] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1875.018810] FAULT_INJECTION: forcing a failure. [ 1875.018810] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.021292] CPU: 0 PID: 11951 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1875.022715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.024456] Call Trace: [ 1875.025014] dump_stack+0x107/0x167 [ 1875.025793] should_fail.cold+0x5/0xa [ 1875.026602] ? __alloc_file+0x21/0x320 [ 1875.027431] should_failslab+0x5/0x20 [ 1875.028223] kmem_cache_alloc+0x5b/0x360 [ 1875.029124] __alloc_file+0x21/0x320 [ 1875.029914] alloc_empty_file+0x6d/0x170 [ 1875.030773] path_openat+0xde/0x26d0 [ 1875.031606] ? path_lookupat+0x860/0x860 [ 1875.032492] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1875.033557] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1875.034611] do_filp_open+0x17e/0x3d0 [ 1875.035417] ? may_open_dev+0xf0/0xf0 [ 1875.036206] ? lock_chain_count+0x20/0x20 [ 1875.037114] ? __lockdep_reset_lock+0x180/0x180 [ 1875.038095] ? lock_acquire+0x197/0x490 04:38:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) [ 1875.038945] ? find_held_lock+0x2c/0x110 [ 1875.039892] ? kmem_cache_alloc+0x159/0x360 [ 1875.040820] ? mark_held_locks+0x9e/0xe0 [ 1875.041689] do_open_execat+0x116/0x690 [ 1875.042526] ? __ia32_sys_uselib+0x40/0x40 [ 1875.043424] ? memcpy+0x39/0x60 [ 1875.044123] open_exec+0x42/0x70 [ 1875.044861] load_elf_binary+0x15f0/0x5730 [ 1875.045777] ? find_held_lock+0x2c/0x110 [ 1875.046647] ? bprm_execve+0x9a0/0x1b00 [ 1875.047487] ? elf_core_dump+0x3b30/0x3b30 [ 1875.048386] ? do_raw_read_unlock+0x3b/0x70 [ 1875.049283] ? _raw_read_unlock+0x1a/0x30 [ 1875.050134] ? load_misc_binary+0x605/0xb70 [ 1875.051063] bprm_execve+0x9c1/0x1b00 [ 1875.051882] ? open_exec+0x70/0x70 [ 1875.052655] ? memcpy+0x39/0x60 [ 1875.053351] ? copy_string_kernel+0x3b6/0x450 [ 1875.054306] do_execveat_common+0x76d/0x8d0 [ 1875.055203] ? bprm_execve+0x1b00/0x1b00 [ 1875.056099] __x64_sys_execveat+0xed/0x140 [ 1875.057012] do_syscall_64+0x33/0x40 [ 1875.057795] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.058858] RIP: 0033:0x7f4478f33b19 [ 1875.059638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1875.063440] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1875.065037] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1875.066526] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1875.067998] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.069486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1875.070962] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:38:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3) [ 1875.085028] FAULT_INJECTION: forcing a failure. [ 1875.085028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1875.087620] CPU: 0 PID: 11952 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 1875.089081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.090803] Call Trace: [ 1875.091371] dump_stack+0x107/0x167 [ 1875.092127] should_fail.cold+0x5/0xa [ 1875.092953] _copy_from_user+0x2e/0x1b0 [ 1875.093824] kstrtouint_from_user+0xbd/0x220 [ 1875.094751] ? kstrtou8_from_user+0x210/0x210 [ 1875.095717] ? lock_acquire+0x197/0x490 [ 1875.096584] ? ksys_write+0x12d/0x260 [ 1875.097398] proc_fail_nth_write+0x78/0x220 [ 1875.098337] ? proc_task_getattr+0x1f0/0x1f0 [ 1875.099266] ? __fget_files+0x296/0x480 [ 1875.100145] ? proc_task_getattr+0x1f0/0x1f0 [ 1875.101146] vfs_write+0x29a/0xa30 [ 1875.101936] ksys_write+0x12d/0x260 [ 1875.102701] ? __ia32_sys_read+0xb0/0xb0 [ 1875.103569] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1875.104667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1875.105767] do_syscall_64+0x33/0x40 [ 1875.106579] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.107669] RIP: 0033:0x7fbe1f4455ff [ 1875.108478] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1875.112310] RSP: 002b:00007fbe1ca08170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1875.113916] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbe1f4455ff [ 1875.115424] RDX: 0000000000000001 RSI: 00007fbe1ca081e0 RDI: 0000000000000004 [ 1875.116923] RBP: 00007fbe1ca081d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.118429] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1875.119920] R13: 00007ffccf8a34ef R14: 00007fbe1ca08300 R15: 0000000000022000 [ 1875.142301] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1875.158143] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:38:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) [ 1875.209020] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1875.227658] FAULT_INJECTION: forcing a failure. [ 1875.227658] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.230271] CPU: 1 PID: 11966 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1875.231833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.231974] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1875.233759] Call Trace: [ 1875.233790] dump_stack+0x107/0x167 [ 1875.233821] should_fail.cold+0x5/0xa [ 1875.237859] ? create_object.isra.0+0x3a/0xa20 [ 1875.238904] should_failslab+0x5/0x20 [ 1875.239775] kmem_cache_alloc+0x5b/0x360 [ 1875.240725] create_object.isra.0+0x3a/0xa20 [ 1875.241727] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1875.242887] __kmalloc_node+0x1ae/0x4b0 [ 1875.243807] kvmalloc_node+0x119/0x170 [ 1875.244726] alloc_fdtable+0xd3/0x280 [ 1875.245600] dup_fd+0x722/0xcb0 [ 1875.246380] unshare_files+0x175/0x270 [ 1875.247275] ? __ia32_sys_unshare+0x40/0x40 [ 1875.248268] ? get_user_pages_remote+0x63/0x90 [ 1875.249316] ? get_user_pages_remote+0x6c/0x90 [ 1875.250367] bprm_execve+0x123/0x1b00 [ 1875.251234] ? acct_arg_size+0xe0/0xe0 [ 1875.252120] ? downgrade_write+0x3a0/0x3a0 [ 1875.253179] ? open_exec+0x70/0x70 [ 1875.254039] ? memcpy+0x39/0x60 [ 1875.254847] ? copy_string_kernel+0x3b6/0x450 [ 1875.255942] do_execveat_common+0x76d/0x8d0 [ 1875.256991] ? bprm_execve+0x1b00/0x1b00 [ 1875.257989] __x64_sys_execveat+0xed/0x140 [ 1875.259014] do_syscall_64+0x33/0x40 [ 1875.259917] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.261180] RIP: 0033:0x7f21a736cb19 [ 1875.262079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1875.266477] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1875.268285] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1875.270007] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1875.271714] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.273445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1875.275164] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:38:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 54) 04:38:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:38:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4) 04:38:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xffffff7f, 0x3}) 04:38:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) 04:38:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) [ 1875.395066] FAULT_INJECTION: forcing a failure. [ 1875.395066] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.398054] CPU: 1 PID: 11975 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1875.399739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.401733] Call Trace: [ 1875.402374] dump_stack+0x107/0x167 [ 1875.403259] should_fail.cold+0x5/0xa [ 1875.404181] ? create_object.isra.0+0x3a/0xa20 [ 1875.405304] should_failslab+0x5/0x20 [ 1875.406220] kmem_cache_alloc+0x5b/0x360 [ 1875.407200] create_object.isra.0+0x3a/0xa20 [ 1875.408251] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1875.409482] __kmalloc+0x16e/0x3f0 [ 1875.410347] load_elf_binary+0x404/0x5730 [ 1875.411361] ? find_held_lock+0x2c/0x110 [ 1875.412365] ? bprm_execve+0x9a0/0x1b00 [ 1875.413328] ? elf_core_dump+0x3b30/0x3b30 [ 1875.414346] ? do_raw_read_unlock+0x3b/0x70 [ 1875.415382] ? _raw_read_unlock+0x1a/0x30 [ 1875.416391] ? load_misc_binary+0x605/0xb70 [ 1875.417432] bprm_execve+0x9c1/0x1b00 [ 1875.418354] ? open_exec+0x70/0x70 [ 1875.419202] ? memcpy+0x39/0x60 [ 1875.419999] ? copy_string_kernel+0x3b6/0x450 [ 1875.421114] do_execveat_common+0x76d/0x8d0 [ 1875.422156] ? bprm_execve+0x1b00/0x1b00 [ 1875.423151] __x64_sys_execveat+0xed/0x140 [ 1875.424173] do_syscall_64+0x33/0x40 [ 1875.425085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.426313] RIP: 0033:0x7f4478f33b19 [ 1875.427214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1875.431620] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1875.433471] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1875.435179] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1875.436903] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.438615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1875.440339] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:38:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) mount$bind(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x200000, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:38:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) [ 1875.560819] FAULT_INJECTION: forcing a failure. [ 1875.560819] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.563399] CPU: 1 PID: 11993 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1875.564893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.566654] Call Trace: [ 1875.567227] dump_stack+0x107/0x167 [ 1875.568001] should_fail.cold+0x5/0xa [ 1875.568850] ? kvmalloc_node+0x119/0x170 [ 1875.569707] should_failslab+0x5/0x20 [ 1875.570527] __kmalloc_node+0x76/0x4b0 [ 1875.571364] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1875.572472] kvmalloc_node+0x119/0x170 [ 1875.573312] alloc_fdtable+0x13f/0x280 [ 1875.574154] dup_fd+0x722/0xcb0 [ 1875.574887] unshare_files+0x175/0x270 [ 1875.575733] ? __ia32_sys_unshare+0x40/0x40 [ 1875.576684] ? get_user_pages_remote+0x63/0x90 [ 1875.577672] ? get_user_pages_remote+0x6c/0x90 [ 1875.578669] bprm_execve+0x123/0x1b00 [ 1875.579496] ? acct_arg_size+0xe0/0xe0 [ 1875.580357] ? downgrade_write+0x3a0/0x3a0 [ 1875.581319] ? open_exec+0x70/0x70 [ 1875.582158] ? memcpy+0x39/0x60 [ 1875.582941] ? copy_string_kernel+0x3b6/0x450 [ 1875.584005] do_execveat_common+0x76d/0x8d0 [ 1875.585043] ? bprm_execve+0x1b00/0x1b00 [ 1875.586017] __x64_sys_execveat+0xed/0x140 [ 1875.587029] do_syscall_64+0x33/0x40 [ 1875.587916] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.589152] RIP: 0033:0x7f21a736cb19 [ 1875.590037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1875.594408] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1875.596226] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1875.597957] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1875.599658] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.601388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1875.603105] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1887.512608] FAULT_INJECTION: forcing a failure. [ 1887.512608] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.513966] CPU: 0 PID: 12010 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1887.514714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.515626] Call Trace: [ 1887.515938] dump_stack+0x107/0x167 04:39:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffff4, 0x3}) 04:39:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5) 04:39:04 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:39:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 55) 04:39:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) [ 1887.516342] should_fail.cold+0x5/0xa [ 1887.516976] ? create_object.isra.0+0x3a/0xa20 [ 1887.517473] should_failslab+0x5/0x20 [ 1887.517884] kmem_cache_alloc+0x5b/0x360 [ 1887.518344] create_object.isra.0+0x3a/0xa20 [ 1887.518823] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1887.519378] __kmalloc_node+0x1ae/0x4b0 [ 1887.519844] kvmalloc_node+0x119/0x170 [ 1887.520288] alloc_fdtable+0x13f/0x280 [ 1887.520758] dup_fd+0x722/0xcb0 [ 1887.521149] unshare_files+0x175/0x270 [ 1887.521597] ? __ia32_sys_unshare+0x40/0x40 [ 1887.522089] ? get_user_pages_remote+0x63/0x90 [ 1887.522611] ? get_user_pages_remote+0x6c/0x90 [ 1887.523130] bprm_execve+0x123/0x1b00 [ 1887.523559] ? acct_arg_size+0xe0/0xe0 [ 1887.524001] ? downgrade_write+0x3a0/0x3a0 [ 1887.524495] ? open_exec+0x70/0x70 [ 1887.524899] ? memcpy+0x39/0x60 [ 1887.525272] ? copy_string_kernel+0x3b6/0x450 [ 1887.525794] do_execveat_common+0x76d/0x8d0 [ 1887.526302] ? bprm_execve+0x1b00/0x1b00 [ 1887.526782] __x64_sys_execveat+0xed/0x140 [ 1887.527265] do_syscall_64+0x33/0x40 [ 1887.527399] FAULT_INJECTION: forcing a failure. [ 1887.527399] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.527699] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.530681] RIP: 0033:0x7f21a736cb19 [ 1887.531101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.533199] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1887.534049] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1887.534855] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1887.535657] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.536469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.537272] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1887.538110] CPU: 1 PID: 12009 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1887.539628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.541481] Call Trace: [ 1887.542062] dump_stack+0x107/0x167 [ 1887.542864] should_fail.cold+0x5/0xa [ 1887.543704] ? getname_kernel+0x4e/0x370 [ 1887.544607] should_failslab+0x5/0x20 [ 1887.545437] kmem_cache_alloc+0x5b/0x360 [ 1887.546336] getname_kernel+0x4e/0x370 [ 1887.547188] open_exec+0x13/0x70 [ 1887.547933] load_elf_binary+0x15f0/0x5730 [ 1887.548902] ? find_held_lock+0x2c/0x110 [ 1887.549795] ? bprm_execve+0x9a0/0x1b00 [ 1887.550666] ? elf_core_dump+0x3b30/0x3b30 [ 1887.551587] ? do_raw_read_unlock+0x3b/0x70 [ 1887.552540] ? _raw_read_unlock+0x1a/0x30 [ 1887.553442] ? load_misc_binary+0x605/0xb70 [ 1887.554397] bprm_execve+0x9c1/0x1b00 [ 1887.555237] ? open_exec+0x70/0x70 [ 1887.556013] ? memcpy+0x39/0x60 [ 1887.556754] ? copy_string_kernel+0x3b6/0x450 [ 1887.557748] do_execveat_common+0x76d/0x8d0 [ 1887.558696] ? bprm_execve+0x1b00/0x1b00 [ 1887.559605] __x64_sys_execveat+0xed/0x140 [ 1887.560545] do_syscall_64+0x33/0x40 [ 1887.561360] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.562478] RIP: 0033:0x7f4478f33b19 04:39:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) 04:39:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 04:39:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2) [ 1887.563292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.567462] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1887.569136] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1887.570696] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1887.572244] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.573803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.575361] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 04:39:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffffe, 0x3}) 04:39:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 56) [ 1887.650778] FAULT_INJECTION: forcing a failure. [ 1887.650778] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.653303] CPU: 1 PID: 12028 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1887.654818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.656643] Call Trace: [ 1887.657227] dump_stack+0x107/0x167 [ 1887.658034] should_fail.cold+0x5/0xa [ 1887.658875] ? prepare_creds+0x25/0x5f0 [ 1887.659749] should_failslab+0x5/0x20 [ 1887.660594] kmem_cache_alloc+0x5b/0x360 [ 1887.661485] ? __ia32_sys_unshare+0x40/0x40 [ 1887.662436] prepare_creds+0x25/0x5f0 [ 1887.663272] prepare_exec_creds+0xd/0x260 [ 1887.664130] FAULT_INJECTION: forcing a failure. [ 1887.664130] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.664182] bprm_execve+0x1e7/0x1b00 [ 1887.666264] ? acct_arg_size+0xe0/0xe0 [ 1887.667115] ? downgrade_write+0x3a0/0x3a0 [ 1887.668046] ? open_exec+0x70/0x70 [ 1887.668842] ? memcpy+0x39/0x60 [ 1887.669566] ? copy_string_kernel+0x3b6/0x450 [ 1887.670560] do_execveat_common+0x76d/0x8d0 [ 1887.671511] ? bprm_execve+0x1b00/0x1b00 [ 1887.672421] __x64_sys_execveat+0xed/0x140 [ 1887.673365] do_syscall_64+0x33/0x40 [ 1887.674180] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.675299] RIP: 0033:0x7f21a736cb19 [ 1887.676117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.680143] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1887.681813] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1887.683312] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1887.685099] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.686707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.688244] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1887.689775] CPU: 0 PID: 12034 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1887.690626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.691583] Call Trace: [ 1887.691933] dump_stack+0x107/0x167 [ 1887.692352] should_fail.cold+0x5/0xa [ 1887.692785] ? create_object.isra.0+0x3a/0xa20 [ 1887.693317] should_failslab+0x5/0x20 [ 1887.693754] kmem_cache_alloc+0x5b/0x360 [ 1887.694220] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1887.694891] create_object.isra.0+0x3a/0xa20 [ 1887.695379] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1887.695954] kmem_cache_alloc+0x159/0x360 [ 1887.696417] security_file_alloc+0x34/0x170 [ 1887.696986] __alloc_file+0xb6/0x320 [ 1887.697416] alloc_empty_file+0x6d/0x170 [ 1887.697856] path_openat+0xde/0x26d0 [ 1887.698292] ? path_lookupat+0x860/0x860 [ 1887.698744] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1887.699246] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1887.699751] do_filp_open+0x17e/0x3d0 [ 1887.700128] ? may_open_dev+0xf0/0xf0 [ 1887.700516] ? lock_chain_count+0x20/0x20 [ 1887.700991] ? __lockdep_reset_lock+0x180/0x180 [ 1887.701520] ? lock_acquire+0x197/0x490 [ 1887.701967] ? find_held_lock+0x2c/0x110 [ 1887.702431] ? kmem_cache_alloc+0x159/0x360 [ 1887.702914] ? mark_held_locks+0x9e/0xe0 [ 1887.703364] do_open_execat+0x116/0x690 [ 1887.703806] ? __ia32_sys_uselib+0x40/0x40 [ 1887.704283] ? memcpy+0x39/0x60 [ 1887.704664] open_exec+0x42/0x70 [ 1887.705047] load_elf_binary+0x15f0/0x5730 [ 1887.705527] ? find_held_lock+0x2c/0x110 [ 1887.705980] ? bprm_execve+0x9a0/0x1b00 [ 1887.706419] ? elf_core_dump+0x3b30/0x3b30 [ 1887.706892] ? do_raw_read_unlock+0x3b/0x70 [ 1887.707370] ? _raw_read_unlock+0x1a/0x30 [ 1887.707818] ? load_misc_binary+0x605/0xb70 [ 1887.708306] bprm_execve+0x9c1/0x1b00 [ 1887.708753] ? open_exec+0x70/0x70 [ 1887.709145] ? memcpy+0x39/0x60 [ 1887.709515] ? copy_string_kernel+0x3b6/0x450 [ 1887.710032] do_execveat_common+0x76d/0x8d0 [ 1887.710513] ? bprm_execve+0x1b00/0x1b00 [ 1887.710981] __x64_sys_execveat+0xed/0x140 [ 1887.711460] do_syscall_64+0x33/0x40 [ 1887.711875] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.712436] RIP: 0033:0x7f4478f33b19 [ 1887.712856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.714863] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1887.715698] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1887.716499] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1887.717273] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.718076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.718853] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3) 04:39:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f0000000000)='./file2\x00', 0x801c0, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:39:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6) 04:39:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 04:39:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) 04:39:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='system_u:object_r:devicekit_var_lib_t:s0\x00', 0x29, 0x3) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x50d2c3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) fcntl$lock(r0, 0x26, &(0x7f0000000240)={0x0, 0x2, 0x0, 0x1, r2}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) openat(r1, &(0x7f0000000000)='./file2\x00', 0x4483, 0x184) 04:39:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) [ 1887.889554] FAULT_INJECTION: forcing a failure. [ 1887.889554] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.890950] CPU: 0 PID: 12054 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1887.891744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1887.892671] Call Trace: [ 1887.892992] dump_stack+0x107/0x167 [ 1887.893403] should_fail.cold+0x5/0xa [ 1887.893857] ? create_object.isra.0+0x3a/0xa20 [ 1887.894396] should_failslab+0x5/0x20 [ 1887.894813] kmem_cache_alloc+0x5b/0x360 [ 1887.895264] create_object.isra.0+0x3a/0xa20 [ 1887.895737] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1887.896299] kmem_cache_alloc+0x159/0x360 [ 1887.896770] prepare_creds+0x25/0x5f0 [ 1887.897192] prepare_exec_creds+0xd/0x260 [ 1887.897641] bprm_execve+0x1e7/0x1b00 [ 1887.898063] ? acct_arg_size+0xe0/0xe0 [ 1887.898486] ? downgrade_write+0x3a0/0x3a0 [ 1887.898968] ? open_exec+0x70/0x70 [ 1887.899377] ? memcpy+0x39/0x60 [ 1887.899746] ? copy_string_kernel+0x3b6/0x450 [ 1887.900239] do_execveat_common+0x76d/0x8d0 [ 1887.900727] ? bprm_execve+0x1b00/0x1b00 [ 1887.901184] __x64_sys_execveat+0xed/0x140 [ 1887.901646] do_syscall_64+0x33/0x40 [ 1887.902048] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1887.902617] RIP: 0033:0x7f21a736cb19 [ 1887.903024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.905107] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1887.905964] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1887.906786] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1887.907602] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.908407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.909186] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:39:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7) 04:39:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x1000000}}], 0x500, 0x20000022, 0x0) 04:39:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4) 04:39:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 57) 04:39:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 33) 04:39:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}, {&(0x7f0000000300)="80cba0cbf24bbe4d25f2cf772f7e68d242a29706ff3e7c460ac3a73715d156b96099eaef4f663b62df0f02f6b3339e29a1cb753753bb035c06dfe0988aa839c0c9481f62387f883289467fd165d62ae67c85ea81d1db96b452b400a00f0b354d3b4e33dc9d9af50ef262968c789a67720a99493d8f831d13a961dda8aa9140682f3578dfbbbcb8ecded8b325ba8f8eb91318467525336245f46bc41a1a0fa05029c8ae982113141ddb2230af0d9f0a9e59e97d26cddcd3878b17c3abb393d3", 0xbf, 0xc}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x3f19ead49249e618, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x90002010}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="0000f6ffffffffffff47890040311bd9598f736c3aaa7082e217d0d0ad2d118e7157e09ede70e852079810af30513891c8bf5def812b0f55c8e1fb0273c72e03e9dceec59378c9afd3c97300eaff001f000000a51aa8a8188d331f2e879d28aebea05532a1ee167d580d28a0c4c4831496bfed4a04751fb56674275637a730628145dc52bcd7dbe247d9a4769fb6acd99ae9f749417c9c3e8f9a04cd929337797d47"]) 04:39:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) 04:39:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) readv(r1, &(0x7f0000001880)=[{&(0x7f00000003c0)=""/131, 0x83}, {&(0x7f0000000000)=""/57, 0x39}, {&(0x7f0000000480)=""/204, 0xcc}, {&(0x7f0000000580)=""/118, 0x76}, {&(0x7f00000000c0)}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/95, 0x5f}, {&(0x7f0000001680)=""/93, 0x5d}, {&(0x7f0000001700)=""/186, 0xba}, {&(0x7f00000017c0)=""/148, 0x94}], 0xa) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1c1182, 0x30) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)={0xa8, 0xfffffffc, 0xfffffffd, "2e8c02def476a24068f8de811913b6f670fd3b490e548163f817fdbd01cf63d2f6ab0c01d680777b58d6a1f8c0cebb762f2b08d0f317bacb5a22b5abdae6e9f20d1f7c3e34d49d40c4d1c2ab398ca6e65cf368a471ef1215f960621e9d4d2b2389d44a6510909b77e4c45655ed9e0dc1bcce2cc17d6ea8af6c217f0ac318267248bbcd82ab66ba95777bec06fc65c1e5542133eb45c50fbf64b209b5f1b18049d9821edaa6defbe6"}) 04:39:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8) 04:39:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5) 04:39:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x2}) [ 1899.811129] FAULT_INJECTION: forcing a failure. [ 1899.811129] name failslab, interval 1, probability 0, space 0, times 0 [ 1899.813095] CPU: 0 PID: 12093 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1899.814242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1899.815579] Call Trace: [ 1899.816040] dump_stack+0x107/0x167 [ 1899.816693] should_fail.cold+0x5/0xa [ 1899.817326] ? security_prepare_creds+0x112/0x190 [ 1899.818165] should_failslab+0x5/0x20 [ 1899.818809] __kmalloc+0x72/0x3f0 [ 1899.819393] security_prepare_creds+0x112/0x190 [ 1899.820166] prepare_creds+0x458/0x5f0 [ 1899.820828] prepare_exec_creds+0xd/0x260 [ 1899.821556] bprm_execve+0x1e7/0x1b00 [ 1899.822214] ? acct_arg_size+0xe0/0xe0 [ 1899.822840] ? downgrade_write+0x3a0/0x3a0 [ 1899.823542] ? open_exec+0x70/0x70 [ 1899.824165] ? memcpy+0x39/0x60 [ 1899.824717] ? copy_string_kernel+0x3b6/0x450 [ 1899.825451] do_execveat_common+0x76d/0x8d0 [ 1899.826165] ? bprm_execve+0x1b00/0x1b00 [ 1899.826864] __x64_sys_execveat+0xed/0x140 [ 1899.827579] do_syscall_64+0x33/0x40 [ 1899.828193] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1899.829135] RIP: 0033:0x7f21a736cb19 [ 1899.829893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1899.833569] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1899.835112] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1899.836558] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1899.838016] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1899.839460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1899.840913] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1899.848177] FAT-fs (loop1): invalid media value (0xf2) [ 1899.849329] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1899.870599] 9pnet: Insufficient options for proto=fd [ 1899.875305] FAULT_INJECTION: forcing a failure. [ 1899.875305] name failslab, interval 1, probability 0, space 0, times 0 [ 1899.878336] CPU: 1 PID: 12096 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1899.878928] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value [ 1899.880061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1899.880069] Call Trace: [ 1899.880096] dump_stack+0x107/0x167 [ 1899.880124] should_fail.cold+0x5/0xa [ 1899.885767] ? __alloc_file+0x21/0x320 [ 1899.886737] should_failslab+0x5/0x20 [ 1899.887817] kmem_cache_alloc+0x5b/0x360 [ 1899.888849] __alloc_file+0x21/0x320 [ 1899.889921] alloc_empty_file+0x6d/0x170 [ 1899.890954] path_openat+0xde/0x26d0 [ 1899.892039] ? path_lookupat+0x860/0x860 [ 1899.893094] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1899.894622] do_filp_open+0x17e/0x3d0 [ 1899.895576] ? may_open_dev+0xf0/0xf0 [ 1899.896681] ? lock_chain_count+0x20/0x20 [ 1899.897871] ? __lockdep_reset_lock+0x180/0x180 [ 1899.899039] ? lock_acquire+0x197/0x490 [ 1899.900184] ? find_held_lock+0x2c/0x110 [ 1899.901224] ? kmem_cache_alloc+0x159/0x360 [ 1899.902462] ? mark_held_locks+0x9e/0xe0 [ 1899.903484] do_open_execat+0x116/0x690 [ 1899.904646] ? __ia32_sys_uselib+0x40/0x40 [ 1899.905665] ? memcpy+0x39/0x60 [ 1899.906616] open_exec+0x42/0x70 [ 1899.907470] load_elf_binary+0x15f0/0x5730 [ 1899.908708] ? find_held_lock+0x2c/0x110 [ 1899.909740] ? bprm_execve+0x9a0/0x1b00 [ 1899.910879] ? elf_core_dump+0x3b30/0x3b30 [ 1899.911943] ? do_raw_read_unlock+0x3b/0x70 [ 1899.913186] ? _raw_read_unlock+0x1a/0x30 [ 1899.914229] ? load_misc_binary+0x605/0xb70 [ 1899.915425] bprm_execve+0x9c1/0x1b00 [ 1899.916386] ? open_exec+0x70/0x70 [ 1899.917296] ? memcpy+0x39/0x60 [ 1899.918122] ? copy_string_kernel+0x3b6/0x450 [ 1899.919255] do_execveat_common+0x76d/0x8d0 [ 1899.920329] ? bprm_execve+0x1b00/0x1b00 [ 1899.921385] __x64_sys_execveat+0xed/0x140 [ 1899.922449] do_syscall_64+0x33/0x40 [ 1899.923379] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1899.924673] RIP: 0033:0x7f4478f33b19 [ 1899.925600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1899.929695] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1899.931344] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1899.932900] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1899.934442] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1899.936038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1899.937853] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 34) [ 1899.970130] 9pnet: Insufficient options for proto=fd [ 1899.995580] FAULT_INJECTION: forcing a failure. [ 1899.995580] name failslab, interval 1, probability 0, space 0, times 0 [ 1899.998142] CPU: 0 PID: 12109 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1899.999434] 9pnet: Insufficient options for proto=fd [ 1899.999637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1900.002441] Call Trace: [ 1900.003005] dump_stack+0x107/0x167 [ 1900.003777] should_fail.cold+0x5/0xa [ 1900.004576] ? create_object.isra.0+0x3a/0xa20 [ 1900.005537] should_failslab+0x5/0x20 [ 1900.006328] kmem_cache_alloc+0x5b/0x360 [ 1900.007185] create_object.isra.0+0x3a/0xa20 [ 1900.008092] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1900.009377] __kmalloc+0x16e/0x3f0 [ 1900.010154] security_prepare_creds+0x112/0x190 [ 1900.011180] prepare_creds+0x458/0x5f0 [ 1900.012034] prepare_exec_creds+0xd/0x260 [ 1900.012963] bprm_execve+0x1e7/0x1b00 [ 1900.013804] ? acct_arg_size+0xe0/0xe0 [ 1900.014650] ? downgrade_write+0x3a0/0x3a0 [ 1900.015583] ? open_exec+0x70/0x70 [ 1900.016367] ? memcpy+0x39/0x60 [ 1900.017117] ? copy_string_kernel+0x3b6/0x450 [ 1900.018122] do_execveat_common+0x76d/0x8d0 [ 1900.019073] ? bprm_execve+0x1b00/0x1b00 [ 1900.019999] __x64_sys_execveat+0xed/0x140 [ 1900.020947] do_syscall_64+0x33/0x40 [ 1900.021767] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1900.022874] RIP: 0033:0x7f21a736cb19 [ 1900.023687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1900.027651] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1900.029326] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1900.030889] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1900.032454] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1900.034024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1900.035583] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:39:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x5}) 04:39:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0xe5}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x40000, 0x80) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:39:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x500}) 04:39:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 58) 04:39:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc) 04:39:29 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = dup2(r0, r0) write$P9_RREADLINK(r2, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)) syz_open_dev$sg(&(0x7f0000000240), 0xfffffffffffffffb, 0x40000) syz_open_dev$sg(&(0x7f0000000400), 0x1, 0x2) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffe, 0x48, 0x2, @buffer={0x0, 0x27, &(0x7f0000000000)=""/39}, &(0x7f0000000300)="cbf730954f50bf3f8fa54e4b01a35ab323ae2dd2b0a7189c52e6d32c3fa96bf41b3405e49b6a22298bf44e3287839f5e9fa544c95d2374051fd75b9b9f53fd440cf73c7f3d00fe13", &(0x7f00000000c0)=""/56, 0xffffffff, 0x31, 0x0, &(0x7f0000000180)}) 04:39:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0xffffff7f}}], 0x500, 0x20000022, 0x0) 04:39:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 35) 04:39:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6) [ 1912.280289] FAULT_INJECTION: forcing a failure. [ 1912.280289] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.281606] CPU: 0 PID: 12143 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1912.282364] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.283268] Call Trace: [ 1912.283573] dump_stack+0x107/0x167 [ 1912.283986] should_fail.cold+0x5/0xa [ 1912.284428] ? __alloc_file+0x21/0x320 [ 1912.284872] should_failslab+0x5/0x20 [ 1912.285298] kmem_cache_alloc+0x5b/0x360 [ 1912.285757] __alloc_file+0x21/0x320 [ 1912.286189] alloc_empty_file+0x6d/0x170 [ 1912.286647] path_openat+0xde/0x26d0 [ 1912.287074] ? stack_trace_save+0x8c/0xc0 [ 1912.287538] ? stack_trace_consume_entry+0x160/0x160 [ 1912.288098] ? path_lookupat+0x860/0x860 [ 1912.288553] ? kasan_save_stack+0x32/0x40 [ 1912.289017] ? kasan_save_stack+0x1b/0x40 [ 1912.289481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1912.290050] ? security_prepare_creds+0x112/0x190 [ 1912.290594] ? prepare_creds+0x458/0x5f0 [ 1912.291054] ? prepare_exec_creds+0xd/0x260 [ 1912.291538] do_filp_open+0x17e/0x3d0 [ 1912.291970] ? may_open_dev+0xf0/0xf0 [ 1912.292397] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1912.292991] ? perf_trace_lock+0x2bd/0x490 [ 1912.293475] ? find_held_lock+0x2c/0x110 [ 1912.293936] do_open_execat+0x116/0x690 [ 1912.294379] ? __ia32_sys_uselib+0x40/0x40 [ 1912.294846] ? do_raw_spin_lock+0x121/0x260 [ 1912.295314] ? rwlock_bug.part.0+0x90/0x90 [ 1912.295792] bprm_execve+0x5b6/0x1b00 [ 1912.296221] ? open_exec+0x70/0x70 [ 1912.296607] ? memcpy+0x39/0x60 [ 1912.296982] ? copy_string_kernel+0x3b6/0x450 [ 1912.297482] do_execveat_common+0x76d/0x8d0 [ 1912.297956] ? bprm_execve+0x1b00/0x1b00 [ 1912.298419] __x64_sys_execveat+0xed/0x140 [ 1912.298898] do_syscall_64+0x33/0x40 [ 1912.299304] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.299863] RIP: 0033:0x7f21a736cb19 [ 1912.300269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.302285] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1912.303117] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1912.303892] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1912.304655] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.305445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.306206] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:39:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7) [ 1912.316249] FAT-fs (loop7): bogus number of reserved sectors [ 1912.316955] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1912.325085] FAULT_INJECTION: forcing a failure. [ 1912.325085] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.326333] CPU: 1 PID: 12133 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1912.327037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.327877] Call Trace: [ 1912.328175] dump_stack+0x107/0x167 [ 1912.328550] should_fail.cold+0x5/0xa [ 1912.328992] ? create_object.isra.0+0x3a/0xa20 [ 1912.329457] should_failslab+0x5/0x20 [ 1912.329882] kmem_cache_alloc+0x5b/0x360 [ 1912.330299] create_object.isra.0+0x3a/0xa20 [ 1912.330742] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1912.331258] kmem_cache_alloc+0x159/0x360 [ 1912.331684] __alloc_file+0x21/0x320 [ 1912.332060] alloc_empty_file+0x6d/0x170 [ 1912.332505] path_openat+0xde/0x26d0 [ 1912.332906] ? path_lookupat+0x860/0x860 [ 1912.333328] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.333873] do_filp_open+0x17e/0x3d0 [ 1912.334295] ? may_open_dev+0xf0/0xf0 [ 1912.334690] ? lock_chain_count+0x20/0x20 [ 1912.335112] ? __lockdep_reset_lock+0x180/0x180 [ 1912.335583] ? lock_acquire+0x197/0x490 [ 1912.335991] ? find_held_lock+0x2c/0x110 [ 1912.336407] ? kmem_cache_alloc+0x159/0x360 [ 1912.336871] ? mark_held_locks+0x9e/0xe0 [ 1912.337299] do_open_execat+0x116/0x690 [ 1912.337709] ? __ia32_sys_uselib+0x40/0x40 [ 1912.338155] ? memcpy+0x39/0x60 [ 1912.338517] open_exec+0x42/0x70 [ 1912.338877] load_elf_binary+0x15f0/0x5730 [ 1912.339324] ? find_held_lock+0x2c/0x110 [ 1912.339751] ? bprm_execve+0x9a0/0x1b00 [ 1912.340163] ? elf_core_dump+0x3b30/0x3b30 [ 1912.340606] ? do_raw_read_unlock+0x3b/0x70 [ 1912.341075] ? _raw_read_unlock+0x1a/0x30 [ 1912.341505] ? load_misc_binary+0x605/0xb70 [ 1912.341976] bprm_execve+0x9c1/0x1b00 [ 1912.342381] ? open_exec+0x70/0x70 [ 1912.342742] ? memcpy+0x39/0x60 [ 1912.343100] ? copy_string_kernel+0x3b6/0x450 [ 1912.343561] do_execveat_common+0x76d/0x8d0 [ 1912.343997] ? bprm_execve+0x1b00/0x1b00 [ 1912.344444] __x64_sys_execveat+0xed/0x140 [ 1912.344891] do_syscall_64+0x33/0x40 [ 1912.345297] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.345818] RIP: 0033:0x7f4478f33b19 [ 1912.346221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.348054] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1912.348833] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1912.349614] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1912.350376] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.351136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.351903] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 36) 04:39:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10) 04:39:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 59) 04:39:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x1000000}) 04:39:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x4000000000000}}], 0x500, 0x20000022, 0x0) [ 1912.430477] FAULT_INJECTION: forcing a failure. [ 1912.430477] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.431827] CPU: 0 PID: 12162 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1912.432585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.433509] Call Trace: [ 1912.433817] dump_stack+0x107/0x167 [ 1912.434226] should_fail.cold+0x5/0xa [ 1912.434647] ? security_file_alloc+0x34/0x170 [ 1912.435135] should_failslab+0x5/0x20 [ 1912.435549] kmem_cache_alloc+0x5b/0x360 [ 1912.435995] security_file_alloc+0x34/0x170 [ 1912.436475] __alloc_file+0xb6/0x320 [ 1912.436888] alloc_empty_file+0x6d/0x170 [ 1912.437340] path_openat+0xde/0x26d0 [ 1912.437769] ? path_lookupat+0x860/0x860 [ 1912.438221] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1912.438772] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1912.439325] do_filp_open+0x17e/0x3d0 [ 1912.439741] ? may_open_dev+0xf0/0xf0 [ 1912.440160] ? lock_chain_count+0x20/0x20 [ 1912.440627] ? __lockdep_reset_lock+0x180/0x180 [ 1912.441143] ? lock_acquire+0x197/0x490 [ 1912.441599] ? find_held_lock+0x2c/0x110 [ 1912.442055] ? kmem_cache_alloc+0x159/0x360 [ 1912.442549] ? mark_held_locks+0x9e/0xe0 [ 1912.442995] do_open_execat+0x116/0x690 [ 1912.443454] ? __ia32_sys_uselib+0x40/0x40 [ 1912.443935] ? memcpy+0x39/0x60 [ 1912.444298] open_exec+0x42/0x70 [ 1912.444667] load_elf_binary+0x15f0/0x5730 [ 1912.445161] ? find_held_lock+0x2c/0x110 [ 1912.445613] ? bprm_execve+0x9a0/0x1b00 [ 1912.446046] ? elf_core_dump+0x3b30/0x3b30 [ 1912.446507] ? do_raw_read_unlock+0x3b/0x70 [ 1912.446975] ? _raw_read_unlock+0x1a/0x30 [ 1912.447428] ? load_misc_binary+0x605/0xb70 [ 1912.447910] bprm_execve+0x9c1/0x1b00 [ 1912.448333] ? open_exec+0x70/0x70 [ 1912.448726] ? memcpy+0x39/0x60 [ 1912.449101] ? copy_string_kernel+0x3b6/0x450 [ 1912.449596] do_execveat_common+0x76d/0x8d0 [ 1912.450073] ? bprm_execve+0x1b00/0x1b00 [ 1912.450534] __x64_sys_execveat+0xed/0x140 [ 1912.451000] do_syscall_64+0x33/0x40 [ 1912.451413] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.451974] RIP: 0033:0x7f4478f33b19 [ 1912.452382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.454362] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1912.455179] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1912.455953] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1912.456718] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.457513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.458292] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x12) 04:39:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8) [ 1912.470339] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 04:39:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x2aa80, 0x100) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') 04:39:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x2000000}) 04:39:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f00000004c0)='./file2\x00') chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) execve(&(0x7f00000008c0)='./file2\x00', &(0x7f0000000b40)=[&(0x7f0000000900)=',\x00', &(0x7f0000000940)='\x00', &(0x7f0000000980)='\x00', &(0x7f00000009c0)='(}\x00', &(0x7f0000000a00)='trans=fd,', &(0x7f0000000a40)='+\x00', &(0x7f0000000a80)='\x00', &(0x7f0000000ac0)='$,[+\x00', &(0x7f0000000b00)='rfdno'], &(0x7f0000000c00)=[&(0x7f0000000bc0)='\\.+[[\x00']) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@fowner_eq={'fowner', 0x3d, r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'wfdno'}}]}}) execveat(r0, &(0x7f0000000000)='./file2\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='fd/4\x00'], &(0x7f0000000440)=[&(0x7f0000000240)='\x00', &(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='--([{\x00', &(0x7f00000003c0)='vfat\x00', &(0x7f0000000400)='(}\x00'], 0x400) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/12, 0xc}, {&(0x7f0000000600)=""/63, 0x3f}, {&(0x7f0000000640)=""/27, 0x1b}, {&(0x7f0000000680)=""/244, 0xf4}, {&(0x7f0000000780)=""/185, 0xb9}], 0x5) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000540)) r5 = getpgrp(0x0) tgkill(r5, r5, 0x21) fcntl$setown(0xffffffffffffffff, 0x8, r5) [ 1912.538819] FAULT_INJECTION: forcing a failure. [ 1912.538819] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.540183] CPU: 1 PID: 12176 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1912.540950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1912.542038] Call Trace: [ 1912.542395] dump_stack+0x107/0x167 [ 1912.542882] should_fail.cold+0x5/0xa [ 1912.543390] ? create_object.isra.0+0x3a/0xa20 [ 1912.543990] should_failslab+0x5/0x20 [ 1912.544490] kmem_cache_alloc+0x5b/0x360 [ 1912.545059] create_object.isra.0+0x3a/0xa20 [ 1912.545636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1912.546303] kmem_cache_alloc+0x159/0x360 [ 1912.546853] __alloc_file+0x21/0x320 [ 1912.547341] alloc_empty_file+0x6d/0x170 [ 1912.547874] path_openat+0xde/0x26d0 [ 1912.548364] ? lock_chain_count+0x20/0x20 [ 1912.548910] ? stack_trace_save+0x8c/0xc0 [ 1912.549451] ? stack_trace_consume_entry+0x160/0x160 [ 1912.550116] ? path_lookupat+0x860/0x860 [ 1912.550654] ? kasan_save_stack+0x32/0x40 [ 1912.551199] ? kasan_save_stack+0x1b/0x40 [ 1912.551741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1912.552406] ? security_prepare_creds+0x112/0x190 [ 1912.553039] ? prepare_creds+0x458/0x5f0 [ 1912.553572] ? prepare_exec_creds+0xd/0x260 [ 1912.554128] ? bprm_execve+0x1e7/0x1b00 [ 1912.554657] do_filp_open+0x17e/0x3d0 [ 1912.555156] ? may_open_dev+0xf0/0xf0 [ 1912.555667] ? perf_trace_lock+0xac/0x490 [ 1912.556203] ? perf_trace_lock+0xac/0x490 [ 1912.556763] ? find_held_lock+0x2c/0x110 [ 1912.557315] do_open_execat+0x116/0x690 [ 1912.557834] ? __ia32_sys_uselib+0x40/0x40 [ 1912.558380] ? do_raw_spin_lock+0x121/0x260 [ 1912.558943] ? rwlock_bug.part.0+0x90/0x90 [ 1912.559499] bprm_execve+0x5b6/0x1b00 [ 1912.560007] ? open_exec+0x70/0x70 [ 1912.560472] ? memcpy+0x39/0x60 [ 1912.560914] ? copy_string_kernel+0x3b6/0x450 [ 1912.561504] do_execveat_common+0x76d/0x8d0 [ 1912.562072] ? bprm_execve+0x1b00/0x1b00 [ 1912.562613] __x64_sys_execveat+0xed/0x140 [ 1912.563169] do_syscall_64+0x33/0x40 [ 1912.563657] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1912.564226] RIP: 0033:0x7f21a736cb19 [ 1912.564714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1912.566713] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1912.567710] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1912.568480] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1912.569261] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1912.570040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1912.570826] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:39:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10) 04:39:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000180), 0x1, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:39:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 37) 04:39:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x5000000}) 04:39:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x58) 04:39:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 60) 04:39:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_mount_image$nfs4(&(0x7f00000003c0), &(0x7f0000000180)='./file3\x00', 0xef, 0x8, &(0x7f0000001600)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000240)="146219f8f6d580a1161598fb8cf4397300a2c3d316d105971b518d9a47312c898a6a55dfcf52920a345da92991", 0x2d, 0x2}, {&(0x7f0000000300)="a4cabdf00615e844108a2161bafbbfbac61f79eddd4a3e90c6ea3eaa6d0947fc01c1a05c92df90cb69e7b0887e1f40fa63cd1a6b4fbdeac210e19f1f072e2389bc2278a437de12409c76ab3cbeb56d6d22c820bc726dc53ef82c85d0cf7800cf133c3fcab08c4d419e7e19e117323ad081a763433ee244cc8a0d544b4487b2e1086ec38aeba8428d17f0bf894f8dbcb71b3a1ce3ef171fd23a78b8", 0x9b, 0x9}, {&(0x7f0000001780)="b8b45725e17d99b304fabc06000000ceccc4ee9fb7b538498a74afe8b3a0caf3f8d45d6582a6c44671143431c407361d35581f1cc5e3984424b63f4e6e684a1d5f0c0cca2d3416affa2cb72c80e79d734233e9275b51e26eb4a1bd2ca136c47d960b9e2f2d7b7516142bc0c6ecdb358e5564b4dbc324452f52561de3ef7dc6bcfa9aff596963482a429b08bd819d4a6963ba45a47d72690b9f2225b6fe6fb4242e2e295cb86e60a75be55cbf8bb409ca93e780c969153f6e1b2228c87951363584dca8c83c141e512f3324f024a2c0542bfe952f0c893cc72a2517a4daa8807062d7b6fac3adfd85d87fddfd2ee7e000"/254, 0xfe}, {&(0x7f00000004c0)="de92735fdcb4e5633fc1fbafde5ffdc20568d51aec4e6ce7d985ec0e7e337b103bc4fb1a0b0dfd2a4f6fcd0c67b6aae9d570295998a4b2", 0x37, 0xd232}, {&(0x7f0000000500)="8b762005b144574d9680dab0e5", 0xd, 0xfffffffffffffff9}, {&(0x7f0000001880)="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", 0x14d, 0x100}, {&(0x7f00000015c0)="2c7f38a5d227bfe33f4ff6a369704289763989413976bb973e9a30", 0x1b, 0x15b}], 0x840, &(0x7f00000016c0)=ANY=[@ANYBLOB="40287ba15e2f5d7b5e2c7b5d404028272a46285d2c663d522f242c00"]) openat(r1, &(0x7f0000001700)='./file2\x00', 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000001740)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000800020200002e2f66696c653100"]) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000540)) 04:39:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x20000000000000}}], 0x500, 0x20000022, 0x0) [ 1928.325100] FAULT_INJECTION: forcing a failure. [ 1928.325100] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.327495] CPU: 1 PID: 12206 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1928.328871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1928.330530] Call Trace: [ 1928.331058] dump_stack+0x107/0x167 [ 1928.331797] should_fail.cold+0x5/0xa [ 1928.332575] ? create_object.isra.0+0x3a/0xa20 [ 1928.333503] should_failslab+0x5/0x20 [ 1928.334270] kmem_cache_alloc+0x5b/0x360 [ 1928.335080] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1928.336192] create_object.isra.0+0x3a/0xa20 [ 1928.337101] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1928.338137] kmem_cache_alloc+0x159/0x360 [ 1928.338990] security_file_alloc+0x34/0x170 [ 1928.339871] __alloc_file+0xb6/0x320 [ 1928.340631] alloc_empty_file+0x6d/0x170 [ 1928.341491] path_openat+0xde/0x26d0 [ 1928.342271] ? path_lookupat+0x860/0x860 [ 1928.343116] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.344205] do_filp_open+0x17e/0x3d0 [ 1928.344987] ? may_open_dev+0xf0/0xf0 [ 1928.345765] ? lock_chain_count+0x20/0x20 [ 1928.346612] ? __lockdep_reset_lock+0x180/0x180 [ 1928.347563] ? lock_acquire+0x197/0x490 [ 1928.348380] ? find_held_lock+0x2c/0x110 [ 1928.349229] ? kmem_cache_alloc+0x159/0x360 [ 1928.350122] ? mark_held_locks+0x9e/0xe0 [ 1928.350963] do_open_execat+0x116/0x690 [ 1928.351771] ? __ia32_sys_uselib+0x40/0x40 [ 1928.352639] ? memcpy+0x39/0x60 [ 1928.353330] open_exec+0x42/0x70 [ 1928.353987] FAULT_INJECTION: forcing a failure. [ 1928.353987] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.354032] load_elf_binary+0x15f0/0x5730 [ 1928.357110] ? find_held_lock+0x2c/0x110 [ 1928.357942] ? bprm_execve+0x9a0/0x1b00 [ 1928.358751] ? elf_core_dump+0x3b30/0x3b30 [ 1928.359611] ? do_raw_read_unlock+0x3b/0x70 [ 1928.360494] ? _raw_read_unlock+0x1a/0x30 [ 1928.361363] ? load_misc_binary+0x605/0xb70 [ 1928.362248] bprm_execve+0x9c1/0x1b00 [ 1928.363041] ? open_exec+0x70/0x70 [ 1928.363761] ? memcpy+0x39/0x60 [ 1928.364441] ? copy_string_kernel+0x3b6/0x450 [ 1928.365374] do_execveat_common+0x76d/0x8d0 [ 1928.366255] ? bprm_execve+0x1b00/0x1b00 [ 1928.367096] __x64_sys_execveat+0xed/0x140 [ 1928.367981] do_syscall_64+0x33/0x40 [ 1928.368751] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.369807] RIP: 0033:0x7f4478f33b19 [ 1928.370572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.374321] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1928.375870] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1928.377339] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1928.378797] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1928.380255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1928.381725] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 [ 1928.383213] CPU: 0 PID: 12216 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1928.384635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1928.386336] Call Trace: [ 1928.386885] dump_stack+0x107/0x167 [ 1928.387642] should_fail.cold+0x5/0xa [ 1928.388427] ? security_file_alloc+0x34/0x170 [ 1928.389352] should_failslab+0x5/0x20 [ 1928.390136] kmem_cache_alloc+0x5b/0x360 [ 1928.390990] security_file_alloc+0x34/0x170 [ 1928.391882] __alloc_file+0xb6/0x320 [ 1928.392651] alloc_empty_file+0x6d/0x170 [ 1928.393516] path_openat+0xde/0x26d0 [ 1928.394294] ? stack_trace_save+0x8c/0xc0 [ 1928.395144] ? stack_trace_consume_entry+0x160/0x160 [ 1928.396195] ? path_lookupat+0x860/0x860 [ 1928.397053] ? kasan_save_stack+0x32/0x40 [ 1928.397903] ? kasan_save_stack+0x1b/0x40 [ 1928.398755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1928.399801] ? security_prepare_creds+0x112/0x190 [ 1928.400791] ? prepare_creds+0x458/0x5f0 [ 1928.401639] ? prepare_exec_creds+0xd/0x260 [ 1928.402539] do_filp_open+0x17e/0x3d0 [ 1928.403331] ? may_open_dev+0xf0/0xf0 [ 1928.404118] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1928.405167] ? perf_trace_lock+0x2bd/0x490 [ 1928.406089] ? find_held_lock+0x2c/0x110 [ 1928.406938] do_open_execat+0x116/0x690 [ 1928.407759] ? __ia32_sys_uselib+0x40/0x40 [ 1928.408629] ? do_raw_spin_lock+0x121/0x260 [ 1928.409529] ? rwlock_bug.part.0+0x90/0x90 [ 1928.410427] bprm_execve+0x5b6/0x1b00 [ 1928.411236] ? open_exec+0x70/0x70 [ 1928.411974] ? memcpy+0x39/0x60 [ 1928.412659] ? copy_string_kernel+0x3b6/0x450 [ 1928.413606] do_execveat_common+0x76d/0x8d0 [ 1928.414503] ? bprm_execve+0x1b00/0x1b00 [ 1928.415370] __x64_sys_execveat+0xed/0x140 [ 1928.416249] do_syscall_64+0x33/0x40 [ 1928.417044] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.418099] RIP: 0033:0x7f21a736cb19 [ 1928.418864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.422603] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1928.424151] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1928.425636] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1928.427095] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1928.428545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1928.430006] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1928.472365] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:39:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 38) [ 1928.519574] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1928.553482] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:39:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 61) [ 1928.574014] FAULT_INJECTION: forcing a failure. [ 1928.574014] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.576364] CPU: 1 PID: 12229 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1928.577785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1928.579475] Call Trace: [ 1928.580023] dump_stack+0x107/0x167 [ 1928.580769] should_fail.cold+0x5/0xa [ 1928.581557] ? create_object.isra.0+0x3a/0xa20 [ 1928.582502] should_failslab+0x5/0x20 [ 1928.583281] kmem_cache_alloc+0x5b/0x360 [ 1928.584108] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1928.585248] create_object.isra.0+0x3a/0xa20 [ 1928.586141] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1928.587188] kmem_cache_alloc+0x159/0x360 [ 1928.588041] security_file_alloc+0x34/0x170 [ 1928.588923] __alloc_file+0xb6/0x320 [ 1928.589699] alloc_empty_file+0x6d/0x170 [ 1928.590537] path_openat+0xde/0x26d0 [ 1928.591302] ? lock_chain_count+0x20/0x20 [ 1928.592145] ? stack_trace_save+0x8c/0xc0 [ 1928.593001] ? stack_trace_consume_entry+0x160/0x160 [ 1928.594044] ? path_lookupat+0x860/0x860 [ 1928.594893] ? kasan_save_stack+0x32/0x40 [ 1928.595734] ? kasan_save_stack+0x1b/0x40 [ 1928.596576] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1928.597621] ? security_prepare_creds+0x112/0x190 [ 1928.598600] ? prepare_creds+0x458/0x5f0 [ 1928.599430] ? prepare_exec_creds+0xd/0x260 [ 1928.600317] ? bprm_execve+0x1e7/0x1b00 [ 1928.601142] do_filp_open+0x17e/0x3d0 [ 1928.601917] ? may_open_dev+0xf0/0xf0 [ 1928.602707] ? perf_trace_lock+0xac/0x490 [ 1928.603561] ? perf_trace_lock+0xac/0x490 [ 1928.604426] ? find_held_lock+0x2c/0x110 [ 1928.605277] do_open_execat+0x116/0x690 [ 1928.606094] ? __ia32_sys_uselib+0x40/0x40 [ 1928.606963] ? do_raw_spin_lock+0x121/0x260 [ 1928.607847] ? rwlock_bug.part.0+0x90/0x90 [ 1928.608723] bprm_execve+0x5b6/0x1b00 [ 1928.609514] ? open_exec+0x70/0x70 [ 1928.610247] ? memcpy+0x39/0x60 [ 1928.610928] ? copy_string_kernel+0x3b6/0x450 [ 1928.611851] do_execveat_common+0x76d/0x8d0 [ 1928.612729] ? bprm_execve+0x1b00/0x1b00 [ 1928.613591] __x64_sys_execveat+0xed/0x140 [ 1928.614461] do_syscall_64+0x33/0x40 [ 1928.615224] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.616268] RIP: 0033:0x7f21a736cb19 [ 1928.617045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.620772] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1928.622326] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1928.623780] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1928.625237] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1928.626684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1928.628135] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:39:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x100000000000000}}], 0x500, 0x20000022, 0x0) 04:39:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xf4ffffff}) 04:39:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0) 04:39:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0) [ 1928.673874] FAULT_INJECTION: forcing a failure. [ 1928.673874] name failslab, interval 1, probability 0, space 0, times 0 [ 1928.676333] CPU: 1 PID: 12237 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1928.677760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1928.679440] Call Trace: [ 1928.679993] dump_stack+0x107/0x167 [ 1928.680736] should_fail.cold+0x5/0xa [ 1928.681527] ? __d_alloc+0x2a/0x990 [ 1928.682271] should_failslab+0x5/0x20 [ 1928.683046] kmem_cache_alloc+0x5b/0x360 [ 1928.683881] __d_alloc+0x2a/0x990 [ 1928.684599] d_alloc_parallel+0x111/0x1aa0 [ 1928.685477] ? __d_lookup+0x3bf/0x710 [ 1928.686262] ? lock_downgrade+0x6d0/0x6d0 [ 1928.687108] ? find_held_lock+0x2c/0x110 [ 1928.687944] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1928.688800] ? __d_lookup+0x3e8/0x710 [ 1928.689602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1928.690679] lookup_open.isra.0+0x926/0x1230 [ 1928.691593] ? hashlen_string+0xf0/0xf0 [ 1928.692450] path_openat+0x961/0x26d0 [ 1928.693271] ? path_lookupat+0x860/0x860 [ 1928.694116] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.695200] do_filp_open+0x17e/0x3d0 [ 1928.695972] ? may_open_dev+0xf0/0xf0 [ 1928.696773] ? find_held_lock+0x2c/0x110 [ 1928.697617] ? kmem_cache_alloc+0x159/0x360 [ 1928.698503] ? mark_held_locks+0x9e/0xe0 [ 1928.699332] do_open_execat+0x116/0x690 [ 1928.700143] ? __ia32_sys_uselib+0x40/0x40 [ 1928.701041] ? memcpy+0x39/0x60 [ 1928.701727] open_exec+0x42/0x70 [ 1928.702423] load_elf_binary+0x15f0/0x5730 [ 1928.703298] ? find_held_lock+0x2c/0x110 [ 1928.704136] ? bprm_execve+0x9a0/0x1b00 [ 1928.704947] ? elf_core_dump+0x3b30/0x3b30 [ 1928.705810] ? do_raw_read_unlock+0x3b/0x70 [ 1928.706685] ? _raw_read_unlock+0x1a/0x30 [ 1928.707536] ? load_misc_binary+0x605/0xb70 [ 1928.708425] bprm_execve+0x9c1/0x1b00 [ 1928.709217] ? open_exec+0x70/0x70 [ 1928.709939] ? memcpy+0x39/0x60 [ 1928.710617] ? copy_string_kernel+0x3b6/0x450 [ 1928.711537] do_execveat_common+0x76d/0x8d0 [ 1928.712424] ? bprm_execve+0x1b00/0x1b00 [ 1928.713286] __x64_sys_execveat+0xed/0x140 [ 1928.714155] do_syscall_64+0x33/0x40 [ 1928.714912] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1928.715951] RIP: 0033:0x7f4478f33b19 [ 1928.716711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1928.720445] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1928.722008] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1928.723456] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1928.724907] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1928.726355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1928.727798] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:39:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2f0) 04:39:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x4000000000000000}}], 0x500, 0x20000022, 0x0) 04:39:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c0053e7f114b57390bb7d8097fd856c736ead8b3e59ea822f17f14edf9897747e730416e94aeae4d1af9a25061c88533dd766e1479a0977755848b3249f0adb632c1501dc9dd43d5304e01e780aca7adde8b27bdb6f3f2369ae4e1916337caec1993561b3b9f1b01b26000000000000000000"]) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000580)="0b3d966d6b66732e561b6665590000140300000000000000000000000000000066087b1fda3c87b6df9a36a9959fd5eac60d5f208b002d84a569708f9d450a8945a96466adaeb31e761f8af637b9bce8ab3077999a4c6a6ab5f25efb618fc91a3bf59d685ccfe70d7bbe6c483bdebe6b14519efc05ad11a8f2d131e12f21c976318aa15680c11fa94e52acd1481d3a7c1ca23132f7f47a25dc4f241182858e1296fb9892fd7d432a1c07c5082cfcd33051c99414051e4761c5dafd66f8e7eb2545687ce7b201d5468d610850dbb6183a927ddfa58a8ba749a660993b5dc16c637bb01a6f563e27140478", 0xea, 0xffffffffffffffff}, {0x0, 0x0, 0x4000000000008002}], 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0, @ANYRESHEX=r2, @ANYRESOCT=r2, @ANYRESOCT=r0]) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000008c0)={0x0, 0x1, 0x20, 0x100000000}) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000540)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000401}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)={0x180, r8, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x15c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x144, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '9p\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '9p\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '9p\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ':*@]\xbe^%%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe0b}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%!(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '#*+!{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/,%}:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5a}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x8}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x4}]}, 0x180}, 0x1, 0x0, 0x0, 0x2000c000}, 0x891) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x1c, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x24000004) sendmsg$NL80211_CMD_RELOAD_REGDB(r4, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r6, 0x800, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x30000000) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x1, &(0x7f0000000540)) [ 1928.863120] FAT-fs (loop1): Unrecognized mount option "0x00000000000000000x00000000000000040000000000000000000000401777777777777777777777" or missing value [ 1929.107088] 9pnet: Insufficient options for proto=fd 04:40:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 39) 04:40:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) copy_file_range(r3, 0x0, r0, &(0x7f0000000000)=0x1, 0x8, 0x0) 04:40:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2f0) 04:40:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x400, 0x128) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x80000, 0x2) 04:40:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 62) 04:40:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x300) 04:40:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x500, 0x20000022, 0x0) 04:40:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xfdfdffff}) [ 1947.031775] FAULT_INJECTION: forcing a failure. [ 1947.031775] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.034375] CPU: 1 PID: 12280 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1947.035937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1947.037847] Call Trace: [ 1947.038449] dump_stack+0x107/0x167 [ 1947.039274] should_fail.cold+0x5/0xa [ 1947.040136] ? jbd2__journal_start+0x190/0x890 [ 1947.041164] should_failslab+0x5/0x20 [ 1947.042036] kmem_cache_alloc+0x5b/0x360 [ 1947.042960] jbd2__journal_start+0x190/0x890 [ 1947.043963] __ext4_journal_start_sb+0x214/0x430 [ 1947.045036] ext4_dirty_inode+0xbc/0x130 [ 1947.045956] ? ext4_setattr+0x22c0/0x22c0 [ 1947.046890] __mark_inode_dirty+0x492/0xf10 [ 1947.047865] touch_atime+0x5a4/0x6a0 [ 1947.048706] ? atime_needs_update+0x600/0x600 [ 1947.049727] ? pagecache_get_page+0x243/0xc80 [ 1947.050747] generic_file_buffered_read+0x18f3/0x28f0 [ 1947.051932] ? pagecache_get_page+0xc80/0xc80 [ 1947.052957] ? __lock_acquire+0xbb1/0x5b00 [ 1947.053933] generic_file_read_iter+0x33f/0x490 [ 1947.055015] ext4_file_read_iter+0x184/0x4c0 [ 1947.056025] __kernel_read+0x593/0xaa0 [ 1947.056915] ? __x64_sys_sendfile+0x220/0x220 [ 1947.057945] ? _cond_resched+0x12/0x80 [ 1947.058832] ? avc_policy_seqno+0x9/0x70 [ 1947.059761] ? selinux_file_permission+0x36/0x510 [ 1947.060876] ? lock_downgrade+0x6d0/0x6d0 [ 1947.061845] kernel_read+0x52/0x70 [ 1947.062661] bprm_execve+0x8da/0x1b00 [ 1947.063537] ? open_exec+0x70/0x70 [ 1947.064347] ? memcpy+0x39/0x60 [ 1947.065101] ? copy_string_kernel+0x3b6/0x450 [ 1947.066139] do_execveat_common+0x76d/0x8d0 [ 1947.067125] ? bprm_execve+0x1b00/0x1b00 [ 1947.068070] __x64_sys_execveat+0xed/0x140 [ 1947.069034] do_syscall_64+0x33/0x40 [ 1947.069904] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1947.071063] RIP: 0033:0x7f21a736cb19 [ 1947.071908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1947.076054] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1947.077796] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1947.079425] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1947.081033] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1947.082649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1947.084266] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1947.087115] FAULT_INJECTION: forcing a failure. [ 1947.087115] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.089745] CPU: 1 PID: 12281 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1947.091308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1947.093181] Call Trace: [ 1947.093798] dump_stack+0x107/0x167 [ 1947.094632] should_fail.cold+0x5/0xa [ 1947.095501] ? create_object.isra.0+0x3a/0xa20 [ 1947.096542] should_failslab+0x5/0x20 [ 1947.097431] kmem_cache_alloc+0x5b/0x360 [ 1947.098363] create_object.isra.0+0x3a/0xa20 [ 1947.099363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1947.100521] kmem_cache_alloc+0x159/0x360 [ 1947.101481] __d_alloc+0x2a/0x990 [ 1947.102297] d_alloc_parallel+0x111/0x1aa0 [ 1947.103266] ? __d_lookup+0x3bf/0x710 [ 1947.104134] ? lock_downgrade+0x6d0/0x6d0 [ 1947.105079] ? find_held_lock+0x2c/0x110 [ 1947.106028] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1947.106980] ? __d_lookup+0x3e8/0x710 [ 1947.107858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1947.109070] lookup_open.isra.0+0x926/0x1230 [ 1947.110095] ? hashlen_string+0xf0/0xf0 [ 1947.111063] path_openat+0x961/0x26d0 [ 1947.111957] ? path_lookupat+0x860/0x860 [ 1947.112912] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1947.114145] do_filp_open+0x17e/0x3d0 [ 1947.115017] ? may_open_dev+0xf0/0xf0 [ 1947.115917] ? find_held_lock+0x2c/0x110 [ 1947.116870] ? kmem_cache_alloc+0x159/0x360 [ 1947.117887] ? mark_held_locks+0x9e/0xe0 [ 1947.118815] do_open_execat+0x116/0x690 [ 1947.119628] ? __ia32_sys_uselib+0x40/0x40 [ 1947.120605] ? memcpy+0x39/0x60 [ 1947.121394] open_exec+0x42/0x70 [ 1947.122174] load_elf_binary+0x15f0/0x5730 [ 1947.123163] ? find_held_lock+0x2c/0x110 [ 1947.124059] ? bprm_execve+0x9a0/0x1b00 [ 1947.124903] ? elf_core_dump+0x3b30/0x3b30 [ 1947.125901] ? do_raw_read_unlock+0x3b/0x70 [ 1947.126904] ? _raw_read_unlock+0x1a/0x30 [ 1947.127864] ? load_misc_binary+0x605/0xb70 [ 1947.128874] bprm_execve+0x9c1/0x1b00 [ 1947.129770] ? open_exec+0x70/0x70 [ 1947.130493] ? memcpy+0x39/0x60 [ 1947.131171] ? copy_string_kernel+0x3b6/0x450 [ 1947.132095] do_execveat_common+0x76d/0x8d0 [ 1947.132984] ? bprm_execve+0x1b00/0x1b00 [ 1947.133842] __x64_sys_execveat+0xed/0x140 [ 1947.134721] do_syscall_64+0x33/0x40 [ 1947.135481] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1947.136528] RIP: 0033:0x7f4478f33b19 [ 1947.137309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1947.141070] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1947.142634] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1947.144075] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1947.145546] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1947.146999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1947.148449] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:40:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 40) [ 1947.184302] FAT-fs (loop1): bogus number of reserved sectors [ 1947.185610] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1947.208300] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1947.236026] FAULT_INJECTION: forcing a failure. [ 1947.236026] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.238430] CPU: 1 PID: 12298 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1947.239852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1947.241565] Call Trace: [ 1947.242108] dump_stack+0x107/0x167 [ 1947.242852] should_fail.cold+0x5/0xa [ 1947.243631] ? create_object.isra.0+0x3a/0xa20 [ 1947.244557] should_failslab+0x5/0x20 [ 1947.245350] kmem_cache_alloc+0x5b/0x360 [ 1947.246191] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1947.247308] create_object.isra.0+0x3a/0xa20 [ 1947.248208] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1947.249274] kmem_cache_alloc+0x159/0x360 [ 1947.250126] security_file_alloc+0x34/0x170 [ 1947.251008] __alloc_file+0xb6/0x320 [ 1947.251774] alloc_empty_file+0x6d/0x170 [ 1947.252619] path_openat+0xde/0x26d0 [ 1947.253394] ? lock_chain_count+0x20/0x20 [ 1947.254251] ? stack_trace_save+0x8c/0xc0 [ 1947.255102] ? stack_trace_consume_entry+0x160/0x160 [ 1947.256148] ? path_lookupat+0x860/0x860 [ 1947.256994] ? kasan_save_stack+0x32/0x40 [ 1947.257851] ? kasan_save_stack+0x1b/0x40 [ 1947.258702] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1947.259742] ? security_prepare_creds+0x112/0x190 [ 1947.260727] ? prepare_creds+0x458/0x5f0 [ 1947.261568] ? prepare_exec_creds+0xd/0x260 [ 1947.262451] ? bprm_execve+0x1e7/0x1b00 [ 1947.263270] do_filp_open+0x17e/0x3d0 [ 1947.264043] ? may_open_dev+0xf0/0xf0 [ 1947.264834] ? perf_trace_lock+0xac/0x490 [ 1947.265694] ? perf_trace_lock+0xac/0x490 [ 1947.266566] ? find_held_lock+0x2c/0x110 [ 1947.267408] do_open_execat+0x116/0x690 [ 1947.268232] ? __ia32_sys_uselib+0x40/0x40 [ 1947.269090] ? do_raw_spin_lock+0x121/0x260 [ 1947.269980] ? rwlock_bug.part.0+0x90/0x90 [ 1947.270857] bprm_execve+0x5b6/0x1b00 [ 1947.271644] ? open_exec+0x70/0x70 [ 1947.272368] ? memcpy+0x39/0x60 [ 1947.273052] ? copy_string_kernel+0x3b6/0x450 [ 1947.273995] do_execveat_common+0x76d/0x8d0 [ 1947.274884] ? bprm_execve+0x1b00/0x1b00 [ 1947.275736] __x64_sys_execveat+0xed/0x140 [ 1947.276601] do_syscall_64+0x33/0x40 [ 1947.277371] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1947.278422] RIP: 0033:0x7f21a736cb19 [ 1947.279177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1947.282908] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1947.284453] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1947.285918] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1947.287371] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1947.288818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1947.290273] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 1947.876341] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 1962.593357] FAULT_INJECTION: forcing a failure. [ 1962.593357] name failslab, interval 1, probability 0, space 0, times 0 04:40:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) syz_io_uring_setup(0x5a75, &(0x7f0000000300)={0x0, 0xf685, 0x10, 0x0, 0x280, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000180)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x1000, 0x0, 0x8001, 0x2}, 0x8ac6) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000000)={0x0, 0x0, 0xfcc}) 04:40:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xfeffffff}) 04:40:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 41) 04:40:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 63) 04:40:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x480) 04:40:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x500, 0x20000022, 0x0) [ 1962.594966] CPU: 1 PID: 12316 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1962.595867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1962.596830] Call Trace: [ 1962.597146] dump_stack+0x107/0x167 [ 1962.597573] should_fail.cold+0x5/0xa [ 1962.598027] should_failslab+0x5/0x20 [ 1962.598474] __kmalloc_track_caller+0x79/0x3c0 [ 1962.599008] ? bprm_change_interp+0x7c/0xf0 [ 1962.599507] kstrdup+0x36/0x70 [ 1962.599877] bprm_change_interp+0x7c/0xf0 [ 1962.600350] load_misc_binary+0x3a5/0xb70 [ 1962.600798] bprm_execve+0x9c1/0x1b00 [ 1962.601257] ? open_exec+0x70/0x70 [ 1962.601651] ? memcpy+0x39/0x60 [ 1962.602042] ? copy_string_kernel+0x3b6/0x450 [ 1962.602571] do_execveat_common+0x76d/0x8d0 [ 1962.603075] ? bprm_execve+0x1b00/0x1b00 [ 1962.603560] __x64_sys_execveat+0xed/0x140 [ 1962.604053] do_syscall_64+0x33/0x40 [ 1962.604486] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1962.605090] RIP: 0033:0x7f21a736cb19 [ 1962.605512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1962.607652] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1962.608469] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1962.609308] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1962.610153] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1962.610986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1962.611817] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) mkdirat(r0, &(0x7f0000000000)='./file2\x00', 0x1) 04:40:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x300) [ 1962.666653] FAULT_INJECTION: forcing a failure. [ 1962.666653] name failslab, interval 1, probability 0, space 0, times 0 [ 1962.669057] CPU: 0 PID: 12310 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1962.670488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1962.672165] Call Trace: [ 1962.672714] dump_stack+0x107/0x167 [ 1962.673477] should_fail.cold+0x5/0xa [ 1962.674262] ? create_object.isra.0+0x3a/0xa20 [ 1962.675200] should_failslab+0x5/0x20 [ 1962.675975] kmem_cache_alloc+0x5b/0x360 [ 1962.676803] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1962.677943] create_object.isra.0+0x3a/0xa20 [ 1962.678838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1962.679880] kmem_cache_alloc+0x159/0x360 [ 1962.680752] security_file_alloc+0x34/0x170 [ 1962.681656] __alloc_file+0xb6/0x320 [ 1962.682423] alloc_empty_file+0x6d/0x170 [ 1962.683267] path_openat+0xde/0x26d0 [ 1962.684059] ? path_lookupat+0x860/0x860 [ 1962.684904] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1962.685943] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1962.686972] do_filp_open+0x17e/0x3d0 [ 1962.687768] ? may_open_dev+0xf0/0xf0 [ 1962.688555] ? lock_chain_count+0x20/0x20 [ 1962.689438] ? __lockdep_reset_lock+0x180/0x180 [ 1962.690389] ? lock_acquire+0x197/0x490 [ 1962.691240] ? find_held_lock+0x2c/0x110 [ 1962.692087] ? kmem_cache_alloc+0x159/0x360 [ 1962.692982] ? mark_held_locks+0x9e/0xe0 [ 1962.693841] do_open_execat+0x116/0x690 [ 1962.694706] ? __ia32_sys_uselib+0x40/0x40 [ 1962.695656] ? memcpy+0x39/0x60 [ 1962.696403] open_exec+0x42/0x70 [ 1962.697156] load_elf_binary+0x15f0/0x5730 [ 1962.698131] ? find_held_lock+0x2c/0x110 [ 1962.699043] ? bprm_execve+0x9a0/0x1b00 [ 1962.699921] ? elf_core_dump+0x3b30/0x3b30 [ 1962.700852] ? do_raw_read_unlock+0x3b/0x70 [ 1962.701805] ? _raw_read_unlock+0x1a/0x30 [ 1962.702712] ? load_misc_binary+0x605/0xb70 [ 1962.703673] bprm_execve+0x9c1/0x1b00 [ 1962.704533] ? open_exec+0x70/0x70 [ 1962.705309] ? memcpy+0x39/0x60 [ 1962.706048] ? copy_string_kernel+0x3b6/0x450 [ 1962.707049] do_execveat_common+0x76d/0x8d0 [ 1962.708003] ? bprm_execve+0x1b00/0x1b00 [ 1962.708930] __x64_sys_execveat+0xed/0x140 [ 1962.709880] do_syscall_64+0x33/0x40 [ 1962.710693] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1962.711804] RIP: 0033:0x7f4478f33b19 [ 1962.712616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1962.716615] RSP: 002b:00007f44764a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1962.718271] RAX: ffffffffffffffda RBX: 00007f4479046f60 RCX: 00007f4478f33b19 [ 1962.719810] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1962.721349] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1962.722892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1962.724432] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:40:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x500) 04:40:19 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x305840, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000028528196f6e0b8450b6d4701002e2f66696c6532000000000000"]) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x3ff}}, './file2\x00'}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x101000, 0x0) accept4(r4, 0x0, &(0x7f0000000240), 0x80000) io_setup(0x619, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="2c0090f9681be76ec7ce58d057c95643b3af55"]) r8 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}}) io_submit(r5, 0x1, &(0x7f0000000440)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x8, 0x80, r6, &(0x7f0000000340)="72244c6fcc90bb619e55d447daa22b10eea0179e42173790ad52c9e9d70be27d1fb7eda9291ab2f97b7d6aeade4457db02abe53a05a4eb20c911d1899f4d3946be2131d58f1bad85d79e1b409be4b3fe6f5c2d8e004325c8ae0477e46fdd14643725473d0dbb327453ecd89c8836f6d6af0c7696834fbf01616fe6ef939f4c5232515b32a1bf4f", 0x87, 0x100000001, 0x0, 0x1, r8}]) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) 04:40:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 42) 04:40:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x480) 04:40:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) 04:40:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xfffffdfd}) 04:40:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:40:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x600) [ 1962.924338] FAULT_INJECTION: forcing a failure. [ 1962.924338] name failslab, interval 1, probability 0, space 0, times 0 [ 1962.926818] CPU: 0 PID: 12348 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1962.928311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1962.930123] Call Trace: [ 1962.930708] dump_stack+0x107/0x167 [ 1962.931512] should_fail.cold+0x5/0xa [ 1962.932346] ? create_object.isra.0+0x3a/0xa20 [ 1962.933354] should_failslab+0x5/0x20 [ 1962.934188] kmem_cache_alloc+0x5b/0x360 [ 1962.935099] create_object.isra.0+0x3a/0xa20 04:40:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x500) [ 1962.936054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1962.937317] __kmalloc_track_caller+0x177/0x3c0 [ 1962.938365] ? bprm_change_interp+0x7c/0xf0 [ 1962.939325] kstrdup+0x36/0x70 [ 1962.940031] bprm_change_interp+0x7c/0xf0 [ 1962.940941] load_misc_binary+0x3a5/0xb70 [ 1962.941875] bprm_execve+0x9c1/0x1b00 [ 1962.942727] ? open_exec+0x70/0x70 [ 1962.943503] ? memcpy+0x39/0x60 [ 1962.944231] ? copy_string_kernel+0x3b6/0x450 [ 1962.945238] do_execveat_common+0x76d/0x8d0 [ 1962.946194] ? bprm_execve+0x1b00/0x1b00 [ 1962.947119] __x64_sys_execveat+0xed/0x140 [ 1962.948065] do_syscall_64+0x33/0x40 [ 1962.948879] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1962.950002] RIP: 0033:0x7f21a736cb19 [ 1962.950815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1962.954772] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1962.956419] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1962.957974] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1962.959517] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1962.961060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1962.962624] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x700) 04:40:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x8001, 0x140) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) close(r1) 04:40:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 64) 04:40:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) 04:40:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x600) 04:40:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1d30) [ 1963.189346] FAULT_INJECTION: forcing a failure. [ 1963.189346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1963.190661] CPU: 1 PID: 12385 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1963.191410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1963.192242] Call Trace: [ 1963.192543] dump_stack+0x107/0x167 [ 1963.192912] should_fail.cold+0x5/0xa [ 1963.193330] _copy_to_user+0x2e/0x180 [ 1963.193728] simple_read_from_buffer+0xcc/0x160 [ 1963.194236] proc_fail_nth_read+0x198/0x230 [ 1963.194674] ? proc_sessionid_read+0x230/0x230 [ 1963.195179] ? security_file_permission+0x24e/0x570 [ 1963.195683] ? perf_trace_initcall_start+0x101/0x380 [ 1963.196237] ? proc_sessionid_read+0x230/0x230 [ 1963.196699] vfs_read+0x228/0x580 [ 1963.197077] ksys_read+0x12d/0x260 [ 1963.197443] ? __ia32_sys_pwrite64+0x230/0x230 [ 1963.197941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1963.198471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1963.199067] do_syscall_64+0x33/0x40 [ 1963.199497] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1963.200072] RIP: 0033:0x7f4478ee669c [ 1963.200495] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1963.202593] RSP: 002b:00007f44764a9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1963.203451] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4478ee669c [ 1963.204255] RDX: 000000000000000f RSI: 00007f44764a91e0 RDI: 0000000000000004 [ 1963.205052] RBP: 00007f44764a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1963.205858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1963.206672] R13: 00007ffeaa1721bf R14: 00007f44764a9300 R15: 0000000000022000 04:40:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:40:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) 04:40:34 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x4c62a2, 0x24) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000000200038dbc3b20e4403ae85b6bffd922e49d0d9b893036f2e35c748e8ef5eebfbb5252a64c68b9c1371bdb9431c88f30d51e800155e9896bb98b89f83ced374d2fddcb9da732483c7d6e3bd5e5797c78ad488e7b240e9a852463eaf0b1a44b71e672320640d9405fd76e64c49fbc865a1513b58034a91c1f2e6d51d34d4cd8413b6aa46c6dc31a8748d3a529e7e8672d4e023ce124de17158479ebc38b3e95ce6d982401e25a07f8e0e59b5ea3b5bcb56b5b88b6ee7ef5fb02a56f308a319e43ff23ee905508cad7ed57be5610b"]) r2 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x0) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xa8aa6f59d7b466a9, 0x2) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000180)=""/3, 0x3}, {&(0x7f0000000300)=""/200, 0xc8}, {&(0x7f0000000400)=""/153, 0x99}, {&(0x7f0000000240)=""/62, 0x3e}, {&(0x7f00000004c0)=""/108, 0x6c}], 0x5, 0x6, 0x9) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000640), 0x802, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600), r3) 04:40:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 43) 04:40:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xffffff7f}) 04:40:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000) 04:40:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x700) 04:40:34 executing program 1: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xffffffffffffffff}}, './file1\x00'}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x5, &(0x7f00000000c0)=[r0, r1, 0xee00, 0xee00, 0xffffffffffffffff]) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) 04:40:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xfffffff4}) 04:40:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc00) [ 1977.339371] FAULT_INJECTION: forcing a failure. [ 1977.339371] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.341897] CPU: 0 PID: 12411 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1977.343393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1977.345202] Call Trace: [ 1977.345795] dump_stack+0x107/0x167 [ 1977.346615] should_fail.cold+0x5/0xa [ 1977.347467] ? getname_kernel+0x4e/0x370 [ 1977.348357] should_failslab+0x5/0x20 [ 1977.349199] kmem_cache_alloc+0x5b/0x360 [ 1977.350131] getname_kernel+0x4e/0x370 [ 1977.350990] open_exec+0x13/0x70 [ 1977.351736] load_misc_binary+0x973/0xb70 [ 1977.352668] bprm_execve+0x9c1/0x1b00 [ 1977.353529] ? open_exec+0x70/0x70 [ 1977.354318] ? memcpy+0x39/0x60 [ 1977.355049] ? copy_string_kernel+0x3b6/0x450 [ 1977.356055] do_execveat_common+0x76d/0x8d0 [ 1977.357008] ? bprm_execve+0x1b00/0x1b00 [ 1977.357947] __x64_sys_execveat+0xed/0x140 [ 1977.358887] do_syscall_64+0x33/0x40 [ 1977.359707] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1977.360826] RIP: 0033:0x7f21a736cb19 [ 1977.361661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.365647] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1977.367304] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1977.368855] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1977.370411] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.371960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1977.373507] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x301d) 04:40:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3, 0xfffffffe}) 04:40:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 44) [ 1977.542140] FAULT_INJECTION: forcing a failure. [ 1977.542140] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.543503] CPU: 1 PID: 12432 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1977.544268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1977.545185] Call Trace: [ 1977.545522] dump_stack+0x107/0x167 [ 1977.545945] should_fail.cold+0x5/0xa [ 1977.546386] ? create_object.isra.0+0x3a/0xa20 [ 1977.546896] should_failslab+0x5/0x20 [ 1977.547321] kmem_cache_alloc+0x5b/0x360 [ 1977.547773] create_object.isra.0+0x3a/0xa20 [ 1977.548260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1977.548815] kmem_cache_alloc+0x159/0x360 [ 1977.549294] getname_kernel+0x4e/0x370 [ 1977.549737] open_exec+0x13/0x70 [ 1977.550109] load_misc_binary+0x973/0xb70 [ 1977.550572] bprm_execve+0x9c1/0x1b00 [ 1977.550993] ? open_exec+0x70/0x70 [ 1977.551384] ? memcpy+0x39/0x60 [ 1977.551747] ? copy_string_kernel+0x3b6/0x450 [ 1977.552235] do_execveat_common+0x76d/0x8d0 [ 1977.552709] ? bprm_execve+0x1b00/0x1b00 [ 1977.553164] __x64_sys_execveat+0xed/0x140 [ 1977.553649] do_syscall_64+0x33/0x40 [ 1977.554064] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1977.554632] RIP: 0033:0x7f21a736cb19 [ 1977.555047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.557070] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1977.557918] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1977.558707] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1977.559496] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.560284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1977.561057] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2) 04:40:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000b73768d77d1afaafe9e0b137d6c41160e58516aab6f154709ca21bd02c4fe2ed78f8c0d8b4067813a659de61cf37f10fdc8bc9b896c14b0e3f14f98d6153921ce72bd0ecc5624051b9fc92d16e79587703bc9085be8f0b1cf491c58a08ee57f4c952d949d2264083879ecd967c7296b5729d20f3945755160ea5197d6110455291285f9cacc5fbb1500f3fa2cbc4ed4a9ebc5d95716aeb264f04972f519217f4e01d2936bfdb7cfc8afa29c68753838d40cc16d40b9b5c09e852237b424469e59a65834a2e95a6260ddd0d690bab09f7952e4b6e5e19e062847685e517736a60757e23a787800f57"]) 04:40:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b6684732e66617400020001000470000000f8", 0x17, 0x3}, {0x0, 0x0, 0x7ffb}], 0x112a02c, &(0x7f00000001c0)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x0, 0xfffffeff, 0x7, 0x9, 0x79}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) faccessat(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x40) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x200661, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:40:48 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ftruncate(r0, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000b95e57dacc"]) 04:40:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1200) 04:40:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000) 04:40:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 45) 04:40:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) [ 1991.289158] FAT-fs (loop1): bogus number of reserved sectors [ 1991.289847] FAULT_INJECTION: forcing a failure. [ 1991.289847] name failslab, interval 1, probability 0, space 0, times 0 [ 1991.290611] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1991.292853] CPU: 0 PID: 12454 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1991.292874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1991.297247] Call Trace: [ 1991.297823] dump_stack+0x107/0x167 [ 1991.298587] should_fail.cold+0x5/0xa [ 1991.299378] ? __alloc_file+0x21/0x320 [ 1991.300182] should_failslab+0x5/0x20 [ 1991.300964] kmem_cache_alloc+0x5b/0x360 04:40:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3) [ 1991.301842] __alloc_file+0x21/0x320 [ 1991.302751] alloc_empty_file+0x6d/0x170 [ 1991.303592] path_openat+0xde/0x26d0 [ 1991.304392] ? path_lookupat+0x860/0x860 [ 1991.305258] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1991.306304] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1991.307341] do_filp_open+0x17e/0x3d0 [ 1991.308125] ? may_open_dev+0xf0/0xf0 [ 1991.308913] ? lock_chain_count+0x20/0x20 [ 1991.309779] ? __lockdep_reset_lock+0x180/0x180 [ 1991.310738] ? lock_acquire+0x197/0x490 [ 1991.311573] ? find_held_lock+0x2c/0x110 [ 1991.312418] ? kmem_cache_alloc+0x159/0x360 [ 1991.313321] ? mark_held_locks+0x9e/0xe0 [ 1991.314185] do_open_execat+0x116/0x690 [ 1991.315002] ? __ia32_sys_uselib+0x40/0x40 [ 1991.315919] ? memcpy+0x39/0x60 [ 1991.316616] open_exec+0x42/0x70 [ 1991.317326] load_misc_binary+0x973/0xb70 [ 1991.318205] bprm_execve+0x9c1/0x1b00 [ 1991.319016] ? open_exec+0x70/0x70 [ 1991.319749] ? memcpy+0x39/0x60 [ 1991.320433] ? copy_string_kernel+0x3b6/0x450 [ 1991.321381] do_execveat_common+0x76d/0x8d0 [ 1991.322300] ? bprm_execve+0x1b00/0x1b00 [ 1991.323191] __x64_sys_execveat+0xed/0x140 [ 1991.324075] do_syscall_64+0x33/0x40 [ 1991.324855] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1991.325911] RIP: 0033:0x7f21a736cb19 [ 1991.326688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1991.330436] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1991.332009] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1991.333475] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1991.334966] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1991.336436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1991.337992] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000) 04:40:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8004) 04:40:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 46) [ 1991.388533] 9pnet: Insufficient options for proto=fd [ 1991.399798] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:40:48 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f0000000000)='./file2\x00', 0x10000, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000070000000096cbc55e5466639b9a0d417d1ea03e4af9ea77aac9b0e473a794ae2fc316619880154c564e4e31b61a80182eb80235b996f7de"]) [ 1991.458870] FAULT_INJECTION: forcing a failure. [ 1991.458870] name failslab, interval 1, probability 0, space 0, times 0 [ 1991.461239] CPU: 0 PID: 12482 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1991.462689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1991.464388] Call Trace: [ 1991.464945] dump_stack+0x107/0x167 [ 1991.465707] should_fail.cold+0x5/0xa [ 1991.466510] ? __alloc_file+0x21/0x320 [ 1991.467319] should_failslab+0x5/0x20 [ 1991.468106] kmem_cache_alloc+0x5b/0x360 [ 1991.468977] __alloc_file+0x21/0x320 [ 1991.469751] alloc_empty_file+0x6d/0x170 [ 1991.470614] path_openat+0xde/0x26d0 [ 1991.471439] ? path_lookupat+0x860/0x860 [ 1991.472303] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1991.473350] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 1991.474411] do_filp_open+0x17e/0x3d0 [ 1991.475201] ? may_open_dev+0xf0/0xf0 [ 1991.475991] ? lock_chain_count+0x20/0x20 [ 1991.476848] ? __lockdep_reset_lock+0x180/0x180 [ 1991.477813] ? lock_acquire+0x197/0x490 [ 1991.478654] ? find_held_lock+0x2c/0x110 [ 1991.479505] ? kmem_cache_alloc+0x159/0x360 [ 1991.480406] ? mark_held_locks+0x9e/0xe0 [ 1991.481254] do_open_execat+0x116/0x690 [ 1991.482096] ? __ia32_sys_uselib+0x40/0x40 [ 1991.482982] ? memcpy+0x39/0x60 [ 1991.483684] open_exec+0x42/0x70 [ 1991.484386] load_misc_binary+0x973/0xb70 [ 1991.485262] bprm_execve+0x9c1/0x1b00 [ 1991.486081] ? open_exec+0x70/0x70 [ 1991.486815] ? memcpy+0x39/0x60 [ 1991.487512] ? copy_string_kernel+0x3b6/0x450 [ 1991.488456] do_execveat_common+0x76d/0x8d0 [ 1991.489351] ? bprm_execve+0x1b00/0x1b00 [ 1991.490244] __x64_sys_execveat+0xed/0x140 [ 1991.491130] do_syscall_64+0x33/0x40 [ 1991.491898] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1991.492958] RIP: 0033:0x7f21a736cb19 [ 1991.493731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1991.497469] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1991.499035] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 1991.500491] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 1991.501962] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1991.503412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1991.504862] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:40:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0x1}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=0x0]) chdir(&(0x7f0000000040)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000540)={0x0, 0x3}) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) openat(r5, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0) r7 = fcntl$dupfd(r3, 0x406, r2) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0d0000000200000009dc4ed8016db1941b41af25b17fd5e6f1"]) 04:40:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x4280404, &(0x7f00000001c0)=ANY=[]) rmdir(&(0x7f0000000240)='./file2\x00') chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x10000) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0xfffffdfd}) [ 1991.620930] FAT-fs (loop5): Unrecognized mount option "1844674407370955161500000000000000000000000" or missing value [ 1991.663786] 9pnet: Insufficient options for proto=fd [ 1991.672065] 9pnet: Insufficient options for proto=fd [ 1991.682124] 9pnet: Insufficient options for proto=fd [ 1991.697251] FAT-fs (loop5): Unrecognized mount option "1844674407370955161500000000000000000000000" or missing value 04:41:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4) 04:41:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf000) 04:41:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8002, 0x70) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x408000, 0xa0) 04:41:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0xffffffffffffffff}, {0x0, 0x0, 0x3f}], 0x2044000, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:41:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) 04:41:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 47) 04:41:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="2000000040000000030000b588e0d3000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1716414148076c5f4655f0000000000000000010c0000000000000b0000000002", 0x61, 0x400}], 0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x42) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:41:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2230) [ 2003.818324] FAULT_INJECTION: forcing a failure. [ 2003.818324] name failslab, interval 1, probability 0, space 0, times 0 [ 2003.820663] CPU: 0 PID: 12515 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2003.822084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2003.823772] Call Trace: [ 2003.824326] dump_stack+0x107/0x167 [ 2003.825085] should_fail.cold+0x5/0xa [ 2003.825876] ? security_file_alloc+0x34/0x170 [ 2003.826810] should_failslab+0x5/0x20 [ 2003.827594] kmem_cache_alloc+0x5b/0x360 [ 2003.828445] security_file_alloc+0x34/0x170 [ 2003.829339] __alloc_file+0xb6/0x320 [ 2003.830139] alloc_empty_file+0x6d/0x170 [ 2003.830997] path_openat+0xde/0x26d0 [ 2003.831814] ? path_lookupat+0x860/0x860 [ 2003.832662] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2003.833692] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2003.834742] do_filp_open+0x17e/0x3d0 [ 2003.835539] ? may_open_dev+0xf0/0xf0 [ 2003.836341] ? lock_chain_count+0x20/0x20 [ 2003.837200] ? __lockdep_reset_lock+0x180/0x180 [ 2003.838176] ? lock_acquire+0x197/0x490 [ 2003.839018] ? find_held_lock+0x2c/0x110 [ 2003.839868] ? kmem_cache_alloc+0x159/0x360 [ 2003.840763] ? mark_held_locks+0x9e/0xe0 [ 2003.841622] do_open_execat+0x116/0x690 [ 2003.842456] ? __ia32_sys_uselib+0x40/0x40 [ 2003.843338] ? memcpy+0x39/0x60 [ 2003.844035] open_exec+0x42/0x70 [ 2003.844734] load_misc_binary+0x973/0xb70 [ 2003.845607] bprm_execve+0x9c1/0x1b00 [ 2003.846427] ? open_exec+0x70/0x70 [ 2003.847157] ? memcpy+0x39/0x60 [ 2003.847855] ? copy_string_kernel+0x3b6/0x450 04:41:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf002) 04:41:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3022) [ 2003.848801] do_execveat_common+0x76d/0x8d0 [ 2003.849804] ? bprm_execve+0x1b00/0x1b00 [ 2003.850687] __x64_sys_execveat+0xed/0x140 [ 2003.851568] do_syscall_64+0x33/0x40 [ 2003.852333] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2003.853379] RIP: 0033:0x7f21a736cb19 [ 2003.854152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2003.857886] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2003.859453] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 2003.860911] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 2003.862374] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2003.863840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2003.865291] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:41:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x101000, 0x18) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_matches\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1189005, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="7fed"]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000240), 0x230002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000300)=ANY=[@ANYRESOCT=r5]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fallocate(r7, 0xc, 0x30, 0xffffffffffff1b5b) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r6, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r8, {0x5}}, './file0\x00'}) 04:41:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 48) 04:41:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3f00) 04:41:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5) 04:41:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80000) [ 2004.078549] FAULT_INJECTION: forcing a failure. [ 2004.078549] name failslab, interval 1, probability 0, space 0, times 0 [ 2004.079766] CPU: 1 PID: 12547 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2004.080506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2004.081408] Call Trace: [ 2004.081691] dump_stack+0x107/0x167 [ 2004.082090] should_fail.cold+0x5/0xa [ 2004.082512] ? security_file_alloc+0x34/0x170 [ 2004.083014] should_failslab+0x5/0x20 [ 2004.083447] kmem_cache_alloc+0x5b/0x360 [ 2004.083895] security_file_alloc+0x34/0x170 [ 2004.084373] __alloc_file+0xb6/0x320 [ 2004.084784] alloc_empty_file+0x6d/0x170 [ 2004.085198] path_openat+0xde/0x26d0 [ 2004.085620] ? path_lookupat+0x860/0x860 [ 2004.086073] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2004.086653] do_filp_open+0x17e/0x3d0 [ 2004.087072] ? may_open_dev+0xf0/0xf0 [ 2004.087467] ? lock_chain_count+0x20/0x20 [ 2004.087920] ? __lockdep_reset_lock+0x180/0x180 [ 2004.088423] ? lock_acquire+0x197/0x490 [ 2004.088854] ? find_held_lock+0x2c/0x110 [ 2004.089289] ? kmem_cache_alloc+0x159/0x360 [ 2004.089752] ? mark_held_locks+0x9e/0xe0 [ 2004.090177] do_open_execat+0x116/0x690 [ 2004.090601] ? __ia32_sys_uselib+0x40/0x40 [ 2004.091056] ? memcpy+0x39/0x60 [ 2004.091415] open_exec+0x42/0x70 [ 2004.091778] load_misc_binary+0x973/0xb70 [ 2004.092233] bprm_execve+0x9c1/0x1b00 [ 2004.092649] ? open_exec+0x70/0x70 [ 2004.093031] ? memcpy+0x39/0x60 [ 2004.093389] ? copy_string_kernel+0x3b6/0x450 [ 2004.093872] do_execveat_common+0x76d/0x8d0 [ 2004.094321] ? bprm_execve+0x1b00/0x1b00 [ 2004.094766] __x64_sys_execveat+0xed/0x140 [ 2004.095227] do_syscall_64+0x33/0x40 [ 2004.095632] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2004.096182] RIP: 0033:0x7f21a736cb19 [ 2004.096587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2004.098441] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2004.099200] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 2004.099911] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 2004.100626] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2004.101336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2004.102050] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:41:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) lseek(r1, 0x9, 0x1) 04:41:01 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) openat(r0, &(0x7f0000000180)='./file0\x00', 0x400040, 0xd9) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file2\x00', 0x40080, 0x88) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000540)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) bind(r1, &(0x7f0000000240)=@xdp={0x2c, 0x4, 0x0, 0x31}, 0x80) mkdir(&(0x7f00000000c0)='./file1\x00', 0x180) 04:41:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x500, 0x20000022, 0x0) 04:41:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000) 04:41:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6) 04:41:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x100000) [ 2004.982906] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value 04:41:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 49) 04:41:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) openat(r1, &(0x7f0000000000)='./file1\x00', 0x100, 0x105) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:41:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x200000) 04:41:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="000000000000800000000000"]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000300)={0x8b, 0x8d, 0xff, "4878020ba6266492efb44fe577f7e1cac57dfabbc20ce0fd2826bdaa20083670cc0ff04560a3d841adae44e1e7b87553966bc9fac089faa88827078508df300a7e9ee294ae0d37d9875d8098bd1d2c4ea1089200847c312015d94c44568a82f0e8e97adad7f6a8db091e0bbd30bb70259a88badcbb00cbc038eb2c60d5517e2322e5421d1d2c4e45f6fd07"}) 04:41:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7) 04:41:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5800) 04:41:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) 04:41:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/12]) [ 2019.083701] FAULT_INJECTION: forcing a failure. [ 2019.083701] name failslab, interval 1, probability 0, space 0, times 0 [ 2019.086082] CPU: 0 PID: 12606 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2019.087559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2019.089331] Call Trace: [ 2019.089902] dump_stack+0x107/0x167 [ 2019.090692] should_fail.cold+0x5/0xa [ 2019.091521] ? __d_alloc+0x2a/0x990 [ 2019.092307] should_failslab+0x5/0x20 [ 2019.093112] kmem_cache_alloc+0x5b/0x360 [ 2019.093980] __d_alloc+0x2a/0x990 [ 2019.094729] d_alloc_parallel+0x111/0x1aa0 [ 2019.095598] ? __d_lookup+0x3bf/0x710 [ 2019.096375] ? lock_downgrade+0x6d0/0x6d0 [ 2019.097217] ? find_held_lock+0x2c/0x110 [ 2019.098069] ? __d_lookup_rcu+0x6b0/0x6b0 [ 2019.098949] ? __d_lookup+0x3e8/0x710 [ 2019.099746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2019.100851] lookup_open.isra.0+0x926/0x1230 [ 2019.101769] ? hashlen_string+0xf0/0xf0 [ 2019.102581] ? io_schedule_timeout+0x140/0x140 [ 2019.103598] path_openat+0x961/0x26d0 [ 2019.104408] ? path_lookupat+0x860/0x860 [ 2019.105249] ? lock_chain_count+0x20/0x20 [ 2019.106103] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2019.107153] do_filp_open+0x17e/0x3d0 [ 2019.107927] ? may_open_dev+0xf0/0xf0 [ 2019.108739] ? mark_held_locks+0x9e/0xe0 04:41:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8) [ 2019.109578] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2019.110768] ? asm_sysvec_call_function_single+0x12/0x20 [ 2019.111903] do_open_execat+0x116/0x690 [ 2019.112712] ? __ia32_sys_uselib+0x40/0x40 [ 2019.113586] ? memcpy+0x39/0x60 [ 2019.114291] open_exec+0x42/0x70 [ 2019.114997] load_misc_binary+0x973/0xb70 [ 2019.115883] bprm_execve+0x9c1/0x1b00 [ 2019.116695] ? open_exec+0x70/0x70 [ 2019.117429] ? memcpy+0x39/0x60 [ 2019.118127] ? copy_string_kernel+0x3b6/0x450 [ 2019.119078] do_execveat_common+0x76d/0x8d0 [ 2019.119967] ? bprm_execve+0x1b00/0x1b00 [ 2019.120832] __x64_sys_execveat+0xed/0x140 [ 2019.121745] do_syscall_64+0x33/0x40 [ 2019.122518] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2019.123554] RIP: 0033:0x7f21a736cb19 [ 2019.124309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2019.128007] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2019.129543] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 2019.130990] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 2019.132424] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2019.133856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2019.135295] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:41:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8004) 04:41:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x400000) 04:41:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 50) 04:41:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file2\x00', 0x1000, 0x0, &(0x7f0000000200), 0xf1006, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0, @ANYRESHEX=r1]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) 04:41:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="788a7dfb2ed8dfb7bd7fd4ced77d82acd4ad0cd6a95d5bb8b5cf31e9e265c04c3a1e288a4228aea8a90e42ce35f1cc89c2", @ANYRES32=r2, @ANYRES16=r1]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="0000dc80816d7be3ff000003"]) [ 2019.363034] FAULT_INJECTION: forcing a failure. [ 2019.363034] name failslab, interval 1, probability 0, space 0, times 0 [ 2019.365579] CPU: 1 PID: 12630 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2019.367043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2019.368758] Call Trace: [ 2019.369307] dump_stack+0x107/0x167 [ 2019.370063] should_fail.cold+0x5/0xa [ 2019.370855] ? create_object.isra.0+0x3a/0xa20 [ 2019.371783] should_failslab+0x5/0x20 [ 2019.372552] kmem_cache_alloc+0x5b/0x360 [ 2019.373385] create_object.isra.0+0x3a/0xa20 [ 2019.374292] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2019.375335] kmem_cache_alloc+0x159/0x360 [ 2019.376194] __d_alloc+0x2a/0x990 [ 2019.376913] d_alloc_parallel+0x111/0x1aa0 [ 2019.377784] ? __d_lookup+0x3bf/0x710 [ 2019.378587] ? lock_downgrade+0x6d0/0x6d0 [ 2019.379439] ? find_held_lock+0x2c/0x110 [ 2019.380282] ? __d_lookup_rcu+0x6b0/0x6b0 [ 2019.381136] ? __d_lookup+0x3e8/0x710 [ 2019.381931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2019.383026] lookup_open.isra.0+0x926/0x1230 [ 2019.383945] ? hashlen_string+0xf0/0xf0 [ 2019.384812] path_openat+0x961/0x26d0 [ 2019.385606] ? path_lookupat+0x860/0x860 [ 2019.386477] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2019.387574] do_filp_open+0x17e/0x3d0 [ 2019.388348] ? may_open_dev+0xf0/0xf0 [ 2019.389143] ? find_held_lock+0x2c/0x110 [ 2019.389986] ? kmem_cache_alloc+0x159/0x360 [ 2019.390884] ? mark_held_locks+0x9e/0xe0 [ 2019.391725] do_open_execat+0x116/0x690 [ 2019.392543] ? __ia32_sys_uselib+0x40/0x40 [ 2019.393429] ? memcpy+0x39/0x60 [ 2019.394111] open_exec+0x42/0x70 [ 2019.394820] load_misc_binary+0x973/0xb70 [ 2019.395684] bprm_execve+0x9c1/0x1b00 [ 2019.396490] ? open_exec+0x70/0x70 [ 2019.397219] ? memcpy+0x39/0x60 [ 2019.397906] ? copy_string_kernel+0x3b6/0x450 [ 2019.398843] do_execveat_common+0x76d/0x8d0 [ 2019.399722] ? bprm_execve+0x1b00/0x1b00 [ 2019.400567] __x64_sys_execveat+0xed/0x140 [ 2019.401431] do_syscall_64+0x33/0x40 [ 2019.402194] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2019.403230] RIP: 0033:0x7f21a736cb19 [ 2019.403987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2019.407699] 9pnet: Insufficient options for proto=fd [ 2019.407725] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2019.410310] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 2019.411750] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 2019.413188] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2019.414640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2019.416082] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 [ 2019.426874] 9pnet: Insufficient options for proto=fd 04:41:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x500, 0x20000022, 0x0) 04:41:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file0\x00', 0x400, 0xa) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="000000000000010000000000"]) acct(&(0x7f0000000000)='./file1/file0\x00') 04:41:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x100000000000000}}, './file1\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000500), 0x50000, 0x0) sendfile(r4, r3, &(0x7f0000000580)=0x400, 0x7fff) r5 = syz_open_dev$vcsa(&(0x7f0000000600), 0x3, 0x40500) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000640)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xaa, "e73e7eaa53f417"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000001640)={0x0, r8, "c5f184770274f7212527ca41586d1b3cb57439496a8460c936fbee6f674e3a9d96453e87b047bd610b3d571ce6c110f6de20b57777dff911f078e122c49a8594fe090e878ce0eec25f164982f0e67e58efdb5fa359bc7bb198c5f03415094615341e71a0aa56bb2b8eecc876ad6cd7298995ead62044cc0c765690efd9b0e802b8066c8a42688a45bea7e88b70c779213b4b46db4a8e0b376839b37888fc36e154ad3db0eacf4f58f399b1c6d49db27a0c36d92adfa41b22203d11e876d6f5f6867f089a413377b56246ecb169500775e26a4605c1ca85db6b775b415b712a3500fd6dee2e9803cffd58000d7b28ebd1b937646ae3dbf9452d6448d4a25877fd", "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"}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) mount$9p_virtio(&(0x7f0000000000), &(0x7f00000000c0)='./file2\x00', &(0x7f0000000180), 0x1002, &(0x7f0000000400)={'trans=virtio,', {[{@version_9p2000}, {@afid={'afid', 0x3d, 0x7fff}}, {@msize={'msize', 0x3d, 0x7fffffff}}, {@uname={'uname', 0x3d, 'fd/4\x00'}}, {@access_any}, {@dfltuid={'dfltuid', 0x3d, r9}}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@cache_loose}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@uid_lt={'uid<', 0xee00}}]}}) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)) 04:41:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf000) 04:41:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffff) 04:41:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 51) 04:41:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b26732e66617400020470000000f801000000", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:41:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc) [ 2032.487655] FAULT_INJECTION: forcing a failure. [ 2032.487655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2032.490647] CPU: 0 PID: 12659 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2032.492072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2032.493768] Call Trace: [ 2032.494327] dump_stack+0x107/0x167 [ 2032.495089] should_fail.cold+0x5/0xa [ 2032.495897] __alloc_pages_nodemask+0x182/0x680 [ 2032.496855] ? mark_held_locks+0x9e/0xe0 [ 2032.497708] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2032.498971] ? kmem_cache_free+0xa7/0x310 [ 2032.499854] alloc_pages_current+0x187/0x280 [ 2032.500789] __get_free_pages+0xc/0xa0 [ 2032.501591] ? kmem_cache_free+0x257/0x310 [ 2032.502480] tlb_remove_table+0x3ca/0xcb0 [ 2032.503355] ___pte_free_tlb+0x86/0xb0 [ 2032.504162] free_pgd_range+0x752/0x13a0 [ 2032.505050] free_pgtables+0x230/0x2f0 [ 2032.505864] exit_mmap+0x28e/0x4f0 [ 2032.506609] ? do_munmap+0x40/0x40 [ 2032.507397] mmput+0xca/0x340 [ 2032.508061] free_bprm+0x65/0x2e0 [ 2032.508773] do_execveat_common+0x2dc/0x8d0 [ 2032.509669] ? bprm_execve+0x1b00/0x1b00 [ 2032.510549] __x64_sys_execveat+0xed/0x140 [ 2032.511430] do_syscall_64+0x33/0x40 [ 2032.512199] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2032.513245] RIP: 0033:0x7f21a736cb19 [ 2032.514008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2032.517741] RSP: 002b:00007f21a48e2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2032.519303] RAX: ffffffffffffffda RBX: 00007f21a747ff60 RCX: 00007f21a736cb19 [ 2032.520751] RDX: 0000000000000000 RSI: 0000000020000480 RDI: ffffffffffffff9c [ 2032.522203] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2032.523662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2032.525111] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:41:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0236a9f62b00000000000000d067b4f21373a2168aa4ff"]) 04:41:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10) 04:41:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf002) 04:41:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x500, 0x20000022, 0x0) 04:41:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1000000) 04:41:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x12) 04:41:29 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r3) keyctl$set_timeout(0xf, r3, 0x0) r4 = getegid() setgid(r4) keyctl$chown(0x4, r3, 0xee01, r4) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r2, 0x400) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:41:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:41:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) tee(r1, r0, 0xffffffffffff8000, 0x1) 04:41:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x58) 04:41:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000000) 04:41:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1517f) 04:41:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}}], 0x500, 0x20000022, 0x0) 04:41:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 52) 04:41:42 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) openat(r0, &(0x7f0000000000)='./file2\x00', 0xc0a41, 0x1b5) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) [ 2045.776006] FAULT_INJECTION: forcing a failure. [ 2045.776006] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2045.778464] CPU: 1 PID: 12714 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 2045.779894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2045.781588] Call Trace: [ 2045.782137] dump_stack+0x107/0x167 [ 2045.782910] should_fail.cold+0x5/0xa [ 2045.783685] _copy_to_user+0x2e/0x180 [ 2045.784466] simple_read_from_buffer+0xcc/0x160 [ 2045.785426] proc_fail_nth_read+0x198/0x230 [ 2045.786307] ? proc_sessionid_read+0x230/0x230 [ 2045.787260] ? security_file_permission+0x24e/0x570 [ 2045.788265] ? perf_trace_initcall_start+0x101/0x380 [ 2045.789328] ? proc_sessionid_read+0x230/0x230 [ 2045.790252] vfs_read+0x228/0x580 [ 2045.790987] ksys_read+0x12d/0x260 [ 2045.791716] ? __ia32_sys_pwrite64+0x230/0x230 [ 2045.792651] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2045.793738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2045.794816] do_syscall_64+0x33/0x40 [ 2045.795578] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2045.796621] RIP: 0033:0x7f21a731f69c [ 2045.797381] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2045.801105] RSP: 002b:00007f21a48e2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2045.802776] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f21a731f69c [ 2045.804499] RDX: 000000000000000f RSI: 00007f21a48e21e0 RDI: 0000000000000004 [ 2045.806213] RBP: 00007f21a48e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2045.807959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2045.809676] R13: 00007fff072379df R14: 00007f21a48e2300 R15: 0000000000022000 04:41:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3000000) 04:41:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0) 04:41:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) faccessat(r0, &(0x7f0000000000)='./file2\x00', 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000008001000000005fe636b8c4c68b60fae5d50fa7ce2b2411596f7cb9de24e543c67d65a33f469e1cdbf3c5b4210553607dd169d6908e6348cb82fbbd1c7da930cb7d98fe40fec136bae3730596beb64d15c81d3505e4c251d8a3023a59357c9400258abacd653d53cf287403cbedbfb63eeec32a5d17e20e882b574964a777f725f522ec331b5665cbf0001b8ac57225e4739e73bfa8f6d3e73ffc2b62f1ee8039f83cc3d296e4c93d84bb84f561789312a53ace96ee2a0e4cf9f50c1d9f269e00d27331c496e89c9197f7382ace0003186f2a7b3730c88914f580106384c1e9a7c5cb553020e6be8f9701f3059bccd600"/257]) 04:41:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80000) 04:41:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) getdents64(r0, &(0x7f0000000000)=""/38, 0x26) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:41:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:41:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) readlinkat(r0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000380)=""/82, 0x52) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) open_tree(r1, &(0x7f0000000440)='./file1\x00', 0x80800) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) openat(r3, &(0x7f0000000240)='./file2\x00', 0xc000, 0x46) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', &(0x7f0000000300), 0x0) syz_io_uring_setup(0x1dbc, &(0x7f00000004c0)={0x0, 0xf20b, 0x10, 0x1, 0x260, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000580)=0x0, &(0x7f00000005c0)) syz_io_uring_submit(r5, 0x0, &(0x7f0000000600)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x1}, 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x6) 04:41:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x500, 0x20000022, 0x0) 04:41:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000000) 04:41:43 executing program 1: write$tun(0xffffffffffffffff, &(0x7f0000000300)={@void, @void, @x25={0x2, 0xc7, 0xfb, "60e2730c500f9e208868830ff93f63f427cd5b3ddb4bcf87144336651845ae79cfb8092ffdaa297e883d32688d7852837027289242e9fd13415d2b5a7a9f3365a05c0f7ee5d3f08e4d347fda5c49669618c255224f9f92b50f72b5cbad43e6cca61d4aa52bcb82dd7453214e70567335090e1492fc7556f2dead9898e7883cd3d3bbf45896a2a1cf5919ae34bf7e047fe14617fc1adebf5edc5b7c1802383244f80b41bf7d84e6750dfda505aa8632"}}, 0xb2) fallocate(0xffffffffffffffff, 0x2, 0x2ba0, 0x651a) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0x100000001}, {0x0, 0x0, 0x8000}], 0x2, &(0x7f00000001c0)=ANY=[]) r1 = openat(r0, &(0x7f00000000c0)='./file3\x00', 0x54004, 0x101) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 04:41:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x107903, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x400663, 0x191) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:41:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x500, 0x20000022, 0x0) 04:41:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2f0) 04:41:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2) 04:41:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x100000) 04:41:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5000000) 04:41:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000fb00000000000000"]) 04:41:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) r1 = openat$cgroup_pressure(r0, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) pread64(r1, &(0x7f0000000300)=""/86, 0x56, 0x5) 04:41:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6000000) 04:42:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7000000) 04:42:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x100000, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x110) recvmmsg$unix(r1, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000300)=""/241, 0xf1}, {&(0x7f0000000200)=""/35, 0x23}, {&(0x7f0000000400)=""/142, 0x8e}], 0x3, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000580)=""/140, 0x8c}, {&(0x7f0000000640)=""/50, 0x32}], 0x2}}], 0x2, 0x2001, &(0x7f0000000740)={0x77359400}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) 04:42:12 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x101100, 0x100) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x2000, 0x30) open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file0\x00', 0x88101) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x8663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') chdir(&(0x7f0000000240)='./file1\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:42:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x500, 0x20000022, 0x0) 04:42:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3) [ 2075.316862] FAT-fs (loop1): bogus number of reserved sectors [ 2075.318192] FAT-fs (loop1): Can't find a valid FAT filesystem 04:42:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x300) 04:42:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x105142, 0x1a) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x13, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10, 0x1, {0x0, r4}}, 0x4) pread64(r1, &(0x7f00000000c0)=""/53, 0x35, 0x0) 04:42:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x200000) 04:42:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4) [ 2075.409267] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:42:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x400000) 04:42:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x480) 04:42:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1d300000) 04:42:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file3\x00', 0x3ff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000580)="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", 0x1000, 0x100}, {&(0x7f0000000300)="d857796d3d71a6f93c4b79c51d427e98135644625a9f3f2f5adecf53ba64c6d1cd81013dad66d07f9ff58786e1c7562178f902e105bd51988b6030ffc1d923d3c5e7f03baaaf8e8f25988e0efe3bbcb4cd40f90c97bb6711ab55163826387eab1dfec8ad8d3cdf207edf4714ad146bb12a", 0x71, 0x1}], 0x120851, &(0x7f0000000240)) 04:42:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000540)) 04:42:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x500, 0x20000022, 0x0) 04:42:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') acct(&(0x7f0000000180)='./file0\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="050008000300000000000000"]) syz_open_dev$vcsn(&(0x7f0000000000), 0xcccb, 0x181003) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="963cc32ab42ae5bc3517ece9f00131049a7a35b52f7a6df441d78a055f8bd52b7750aaf8fcf28dbedb8d5fb6adec397eef6d1fabf814cbc1b105af37f6fa570ec598bfa0648e37cc9a87c6d3d81a4360cacc1e63870eef52ce69db977d73baaca29ee6c9fb00cce56ba0749421a962e523490a5a2d08d48b136b64350f3ca77ea8e74eec6b795017c09df8adaffd86f76e353a8fc69f463fcb6cdfac1ae9c5592b5e584197ee96"]) link(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000400)='./file1\x00') statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x2, &(0x7f0000000300)) 04:42:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5) 04:42:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x500) 04:42:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x40000000) 04:42:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffff) 04:42:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80040000) 04:42:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6) [ 2075.814914] 9pnet: Insufficient options for proto=fd [ 2075.850225] 9pnet: Insufficient options for proto=fd 04:42:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) r1 = openat2(r0, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000180)={0x0, 0xc0, 0x4}, 0x18) openat(r1, &(0x7f0000000240)='./file2\x00', 0x101000, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000580)={0x0, 0x80, 0x5}) 04:42:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7) 04:42:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x600) 04:42:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x807f0000) 04:42:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/l2cap\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00:']) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file2\x00', 0x0, 0x0, &(0x7f0000000380), 0x100008, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRES64=r0, @ANYRESOCT, @ANYRES32, @ANYRESHEX=r6, @ANYBLOB="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", @ANYRES16=r7, @ANYRESDEC, @ANYRES32=r3]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x29) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/121) r8 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="f310931d97ec45286e000006ab8fff94ce8cc7b20ddb44391be700bedda37ed0f8fcedcbc47816a7d796dd1bc95e64698f7d9121c84db73ddec8b76975661f5bd4ff28edaa9a65e51d10aa925ed3b6b20b1636c47a6b135e30462dd49c1b2954b392e9c787a289d173adadbf75b4d03c2a3979e3632d4a2fdeb83024d6d0b18de9a93a7b5cd9a7781caf74dfc3d0ffea75b8be9ce48164a13f2a21aef0c4d6887a9633afdd2427"]) 04:42:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1000000) [ 2076.081826] 9pnet: Insufficient options for proto=fd [ 2076.094796] 9pnet: Insufficient options for proto=fd [ 2076.104194] 9pnet: Insufficient options for proto=fd 04:42:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8) 04:42:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) recvmmsg$unix(r0, &(0x7f0000004300)=[{{&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000001400)=""/186, 0xba}, {&(0x7f00000014c0)=""/113, 0x71}], 0x5, &(0x7f0000000180)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f00000015c0)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000001640)=""/68, 0x44}], 0x1, &(0x7f00000016c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000001740)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f00000017c0)=""/6, 0x6}, {&(0x7f0000001800)=""/141, 0x8d}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002900)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000002980), 0x6e, &(0x7f0000002b40)=[{&(0x7f0000002a00)=""/52, 0x34}, {&(0x7f0000002a40)=""/227, 0xe3}], 0x2, &(0x7f0000002b80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}}, {{0x0, 0x0, &(0x7f0000003d00)=[{&(0x7f0000002c40)=""/171, 0xab}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x2, &(0x7f0000003d40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000003d80)=""/207, 0xcf}, {&(0x7f0000003e80)=""/126, 0x7e}], 0x2, &(0x7f0000003f40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003f80)=@abs, 0x6e, &(0x7f0000004200)=[{&(0x7f0000004000)=""/253, 0xfd}, {&(0x7f0000004100)=""/154, 0x9a}, {&(0x7f00000041c0)=""/45, 0x2d}], 0x3, &(0x7f0000004240)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}], 0x7, 0x40, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000100002a068ab370461d1f78411d3955125f6cdc90cc8dd3c1a6992eb611275d6d0b01a07a71c80d4f448cb7ee1a69e06878a15aec248819756dd10cec648da5e30d5e0572c32a9754bd0b079e86fc53d0cac85d04b6c38769fc4485af"]) 04:42:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) 04:42:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x2, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x60100, 0x41) openat(r0, &(0x7f0000000000)='./file2\x00', 0x4942, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)) 04:42:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8cffffff) 04:42:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x700) 04:42:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000000) 04:42:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00008e453200000300000000"]) 04:42:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc00) 04:42:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10) 04:42:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) openat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x400000, 0x66) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:42:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3000000) 04:42:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0020000) 04:42:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0) 04:42:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x0, 0x9, 0x9, 0x3, 0x6, 0x2, 0x1f2, 0x40, 0x210, 0x7fff, 0x7fff, 0x38, 0x2, 0x5, 0x6598, 0x9}, [{0x4, 0x2, 0x11a, 0x3, 0x0, 0xe1d, 0xff, 0x7}, {0x60000000, 0x1, 0x1, 0x7, 0xfffffffffffffff7, 0x7, 0x8, 0xd72}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x14b0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:42:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1200) 04:42:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) mount$cgroup2(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x1008000, &(0x7f0000000300)={[{@memory_localevents}], [{@hash}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fd/4\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '}['}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@subj_role={'subj_role', 0x3d, 'vfat\x00'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:42:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x165100, 0x8) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0xac) stat(&(0x7f0000000000)='./file2\x00', &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:42:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 04:42:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) 04:42:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 04:42:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2f0) 04:42:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000) 04:42:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) inotify_add_watch(r3, &(0x7f0000000180)='./file2\x00', 0x20000000) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000000)={0x30, 0x7, 0x4, "3f1f1437508acc2b2848a0860d3021df23fc0dc60cfd83abd75ece5f4ce36dda9f3eaa065c5e3b02de608206143a6fa2"}) 04:42:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:42:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000000) [ 2104.586723] FAT-fs (loop7): bogus number of reserved sectors [ 2104.588192] FAT-fs (loop7): Can't find a valid FAT filesystem 04:42:41 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x0, @fd, 0x5, 0x0, 0x0, 0x5, 0x1}, 0x680) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:42:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2230) [ 2104.655922] FAT-fs (loop7): Unrecognized mount option "./file0" or missing value 04:42:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3022) 04:42:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) 04:42:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfffff000) 04:42:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x300) 04:42:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:42:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) 04:42:56 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c0007ef70be43ded239ce72d60eeba3d7b5346d4eafe2d5e9687c9a3d92652ab39d9f5fa3b835a2b16a663f828a89130125b1a53114f3af67ec5cb16087ada09d6619ed9506f3df1acc22add6dc2625255085610dec6b55a480d4353e1ad7e8f9f40b5bde312809c1f767dec20cb2a0998350f8d2e6ea982613641cdbeccfeaf4387df1e58c32050629bf66ee0fb151ac39491330c7e937d2389d3fae9c7fa6ccaf6d81"]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file2\x00'}) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000180)='./file0/file0\x00', 0x2, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000240)="f956758d7a31", 0x6, 0x9}, {&(0x7f0000000300)="6667774439b662a6843e315dc3c9b5028016e61617e819ec340cbb674ea4049a72fae8471a3913201e7671567fe07f59027b05b668812606b8e3ad5cb1ce5486d6d34372c53107e0d587a87669a1e5cea0", 0x51, 0x5}, {&(0x7f0000000380)="e9c0", 0x2, 0xb4e7}], 0x4020, &(0x7f0000000580)={[{'rfdno'}, {'&'}, {'rfdno'}, {'fd/4\x00'}, {'vfat\x00'}, {'vfat\x00'}, {'*\'#:#{'}, {'wfdno'}], [{@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}, {@obj_role={'obj_role', 0x3d, '9p\x00'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@obj_role={'obj_role', 0x3d, 'vfat\x00'}}]}) openat(r5, &(0x7f0000000440)='./file2\x00', 0x1a5000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000540)) 04:42:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3f00) 04:42:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) fcntl$setstatus(r2, 0x4, 0x42000) 04:42:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5000000) 04:42:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xffffff8c) [ 2119.429083] 9pnet: Insufficient options for proto=fd 04:42:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfffffff6) 04:42:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000) 04:42:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6000000) 04:43:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:43:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7000000) 04:43:12 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0xc8c80) ftruncate(r0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r2 = getpgrp(0x0) tgkill(r2, r2, 0x21) syz_open_procfs(r2, &(0x7f0000000000)='sched\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:43:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffb}], 0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:43:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x480) 04:43:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) 04:43:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 04:43:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5800) 04:43:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xc000000) 04:43:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xffffffff000) 04:43:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8004) [ 2135.026343] FAT-fs (loop7): Unrecognized mount option "00000000000000000000" or missing value [ 2135.027530] FAT-fs (loop5): bogus number of reserved sectors [ 2135.029144] FAT-fs (loop5): Can't find a valid FAT filesystem 04:43:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x500) [ 2135.100138] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value 04:43:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7f8000000000) [ 2135.124603] FAT-fs (loop7): Unrecognized mount option "00000000000000000000" or missing value 04:43:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf000) 04:43:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file2\x00', &(0x7f00000000c0), &(0x7f0000000240)=@v3={0x3000000, [{0x1, 0x10000}, {0x3, 0x80000000}], r1}, 0x18, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file2\x00', 0x402000, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:43:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x600) 04:43:24 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000300)={0xf6e, 0x0, 0x2, 0x0, 0x0, [{{r4}, 0x9}, {{r0}}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:43:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) 04:43:24 executing program 1: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x30800, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:43:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 04:43:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) mknod$loop(&(0x7f0000000000)='./file2\x00', 0x800, 0x0) 04:43:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf002) 04:43:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10000000) 04:43:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x700) 04:43:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 04:43:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1517f) 04:43:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x100, 0x20) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:43:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 04:43:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80000) 04:43:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x12000000) 04:43:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000) 04:43:38 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c77a2c7664846", @ANYRESHEX=r4, @ANYBLOB=',\x00']) r5 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000400000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x814, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES64=r2, @ANYRESHEX=r1, @ANYRES16=r2, @ANYRESHEX, @ANYRES64]) chdir(&(0x7f0000000040)='./file0\x00') r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r7}}) r8 = getpgrp(0x0) tgkill(r8, r8, 0x21) r9 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x2) r10 = syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x10040) sendmsg$unix(r3, &(0x7f0000000240)={&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000580)="a2e8da9cf459b0c6dc08d0d9a0923629e245f532f8ead8186cfd6a97c4b440709be48c98307b2bd200b426e64868d11f2bb81906c5042af269395a4f18f152b9cb914894ae4dab5d6635f871a99a90577675c66b68f1f89ce4e7b788c3f608974142b99e3c68ede2f3afea6cc47d0f2586a2fada0377af30ecc03692f9d95edcde26e1d3b6f8fb4032e4d333468a90542fb24ebf0d83cf1a153c1fe8739ed28773f04802d476bd976f7c2dfe12c39cfb991ba2a82f3df7e1d7f5131331a5e5511af269fd357db587ae5039a573b9557c4af365d7b488c1926f30272580eecd4f97324337242cb63db455bb2c1d292b1b5e35497a30635c21e039df6e39169d72750ca5b0538465cd52bd2e7762dc755cb9c89f47a554c078c026c45509147da84b2be2b6a85a5a8975d9a1cdfbade28a6fa086e52f768a393b180d08480ab8d82807febb7e0c7a5f7ac4984f4d4c58bc3bb05d92b8cd8ff15e0ce8a90eee779312a65186dc6150604d774541e3d6303970adb579540f4c2fb5ed4b98f5422c6e154b461606d8c2e0ee80227c983f55b3b82e8de8054355833f878a3ae209a73cc94cbb7c691d5b417fad99c94e0082a5b940531d21c7a7c7ef9d5826d95daeaab932f8df80ae18a24236c441303f22d40d11e3b648117ec2cdc9aff585d68dbb48eb4df5a095b823e287aa93bfb674bc33afd03a1ff091bdeb175b5c1639d7b461ed3db220d975e27ebce23c1680ab4148e5944d206d81138099957142e62517e7b61b966f9b1703ebfaa47b755740bcf60ee39bb7791963b14ddf88231f67076eb8e8a8f979d1b6d58ab3727011b2af096dac8cd55afcb20c0ab52d2b5ad6faa5164d52eb68946bfa2fe6883b451759d907d84971b479bd5db80e0af62347cb1dfd46e5f480e24de3dcd49300c76258272f510c1a30cb2b1a49d03a6debf9214500c23b36b0a0bbb938f834d572611db28fb7236d62b93f2936355dc05698c4e772de90860ea99a76da091da4e883344db40cfc5730de046278c8be1a8e1b01faeee599ae4451b1a6a1fdf57f162abd6d96ab5a7970b0cd6002701e31923ee8ad7bb2a4b0dd88003a18166d1fb23471d004956df018ba4cd792d014e2fbd1c534b1e2cacad5f52f64ba3e082b97626f0a4d8dcf1e312e86341220256a43a7d8ee394608c76eb6cdb96d7afdb24f3bc63cb732180b559ab2efb5f8ed880d8327bcae1eff103a284e6f3a811709a0b78fc3445df3a6ace15492be84ef9cb8ed6384bbbe80a4cb3def96ff860ab7d8adb76ca4e2755c7fb91e65f1e41c9db8a08a6025ebd018959045f0b2991e87c5a834d2a2927a09c5a2fec8a1e107224d0673c303159484bec207b76f781934f09008729cec339fd23e5e88c272ff5fd157988094cb13d41a11cd8584f461fe7042d32f88d7ebdc03c7903831dbdffe2653f30928121578d5b2307af9cbbe1eb437f7280199d46b57a5789d923fefcbcd5deea3c8e4161b08bafc839cd3005305d0ded717672bdb4998c3f813afc4deb852ab5b58422e65d654100ddea6e0dcdfffdb88be7465f9582ba2e514c9903789039cb37a6a53f18137196fd2f10e6e344fcb0c51fb3e6d924ea9e805abc3fd2eb89f46dedacc8fbdafcc4f373afa47dd74e471685676f9bd2eef3c7688a92a1fdf1c70544cdbee2d358fa81963552d5068a9f80cb2c02a15479c4fa6dfc4795dc04d4a1ff57ee39d319c2eae291d4c3aa6df7b9b4d8648fe7c20c0c6796f3d7cbcad05b882e0b48220223b5d5673c6c12a7fc8d1a0e5449f452b1655bf624df79188d4f1c40d9c7dbf80c93065b15260440582c14c80773215db66b0578c14b6791e6a07911fe315f21c52a6afe4d84e02aba3b0c43b47fa0d1c754b5bee8f6e06cbcdbdb1166f2cfb3f64f5082fda0976c04106b2bc9e16a4b4127dfcd8721ac7ad563b632543815966bbfb81e8436cfad3a149e75b6bacce0fab40e6d30a3ffa847def1bc61463c1b263270ed75b609ec2ecd4aef9fdbd44e3de705ca53deeb5631eb8701ee4b08be75cb6733af865e51cd4a36c583089e02544a107ec62b1772557160cc3fa5364b7d7d0bde96430ed8491a8129b2ac4f2c45bb29ec6d63a9d2b9a391cf15286ed131f46d13047ea332851e82dde5f6da085141f79f42c664c8aa4b3a1b97bd4e536deb0734628f52c632a676ccdd33e7c8722aa3787fe58d307099855d03f3a3acc4adfc98b7ca5bfebba563b31f221747bdec5a50fb530e7823f6ec4995559c792a169ad595ed2423553a4a88e1a36bd337040d507562efc7fe8541c2b9151461eadde3b1b8ca911f0aef00fce7de8faf6f8faeb4db6a05a9e9c8560026426a951ac7f4039d8da1ed29be51af70fac26bac612ebed8fad0bf91a2e0213d051ce51c2845039853dc93e22921e6976105271fc2547aac3fc0299963ef65eda68a24ff735b07520b27d84765254795549fd4cbc8394bb181ccf33626c74a159da9041fb96ade6a34b1e0e93f0af15af81762a89a7f0fb502707a47d9ec31c0c95fc499e7775a744950f44965674cccfc27135dcbe74eda3e842778320e64f6a05dbaa364bc884c1a5374ea3561f9ecfbb5bfa92c34e06083852c5a43d37efb41244afd934386cd1dfafb054e05408389b85dee860ccfa51f05a172717b2450bd9b78664d5f127679a337f4134d4945da62caccf046a50d106c77cf84010f2e470044d9da8dfc39cb84bfd4f60c1a8fc71431e9d076ed0a7dfa5eb8f4dfb8a240aeb8ab0ce42c6f6066e4d00cdeaa1297405e0cebe5cc2534cea207a86b861ebd0760d6c7e0e8a16bed0a3e37d99620aa8774e8fdd09bab41b36fb74921869dc16fb6073cb5aef1cb6dfbb071165725f9dbd6fb1583cebd459ae3cc7040e94c63b69d2e1fde2e8603544db48eaf7f4a5edba41eaa564d859bcba675aa2196f20337a48069aa7d91d906cd31f95bb11145cc9375dd5119ebe5fd0d188c0487224bcce7a4163f496f13b61a4add11b965d549858cf522965d31d695363f599cfdd1ed1638e5ca7f4ef7d53847f93e585848761da319c5df0803ba23d17970513cf9772768c9990e7f591f282d23371021458ece31243b794f3843a8b6c13f91601c404e4884a61cca2ea14f99038db16c1e23e5cca85d698f4f28556a11cf97cf27093b3bf0ad9e96b653d99118955354ae5c66e0857cbc42b715d6c29447ffe88b3f923cdd017e295d3edd2e08f8a281503d1c1735fb8ea9d28affaea0a2436c42dee7ff40291c1289e97d1cfe56e85a418ac65f828a8a6e463cfda193e48d15d483cb1779b1b858ad64031b9af1c6eb81d8037cb9a56bff6edc4cf3f943715eba59ec5ce0abbb5e9dc6d64c237d6f8f49ae65822315f44bef8e0de4270ee282c599e37d044fa6dfae36100aad8c268924e53ae2203494add32f5d7a565e3508b60329825f9201f95b78a46933735d4cf2a92053adaa09820485696bf092325155908c5184baf8874a2348f6bc01b32b287a2ec455445b2bdfc013c11427de6f07869a231bcad3d322871c78b76b056221f1c62b8295aabf033e135d9217c39a54e336316e71a687d766faccdeaec7c6fccd2972b3ba1bfc13bbf7c1fdc19ae33018d8190b525aef00b76b0c8d5ab4eaac90ebd3e50c4e40d13bf1157874759551b2618e306b2bf64b506b257b3a15379d596cc8f8056cfa0c1d2b5c4d218f985b47df402268a7276d5a9cbe0a50697b3a914501e0af58f0e98183569d1cb9c335d6dc8550519bf7a02d428c839659415e69b88dc341c5329b44abba3c347e29c0c975a48c9dc67db4a05146c6076f7ad55988f6d3797de7e66891206dca95a919ea5d3692f7191d481ec0368dba0807aadb1d71741b083a5def69885048ff85183eb3149ec483430118180cff6c8016e51529a3e8fac2d79d565895e908a7fee9595a9fc4910503ce2b6b4694a239192913246a7ce7c0eecb801dbbfc700ee4074b05ae18c0843a9d6354fb5faf2da91715d5807664d1aa0766218ccc1529ebe3d7dcdc8183a304a4bacd09bacbc913f1c892f70afcbdd31c1212ff7d7b12a0773f8649da663eca38e94b2444efa2efd5676f154ba10279b26d094d605dbcac4a1280852afcb1e2ea66ae71ad75670b5e0c366f0feabfe2349dced67110bc2dc52981224f8baa72a6ae6036ac03200001d4463f49f89d3549f1945a8a476619c4b1a669928ec81bbecca4b4adcd49df578f6c804c8732f8ab5602f745603ccda18e4811c11aeaa6606dea070476d2147a5320d349237256625e826e5b2465362a0ea78945faf41e5041bf8c1936559aa819bd0849ce13098937876be8c7039ea9a564a915756f0b121476c9bdbfab276e360f6ae263ec53faa12469232e1e252fa148f14b4a48042123ded8e7d1775bddba035f622c32a642b8085f218e661e07280a0178b174854a06def1ae35321f6d90a24a03e652527630ab38e5dfd2e2f8ad807a77a68003311d6986a81548694d25f67591794d931eeb8c16e6130ac8bdcf9a66da3be0fb329fc34a109658597731f27937ac85a69fc1faad582b9b8b47d1246897f1100a8fd6bfaebaf3c290ab19c38718eb8fb19d322341c167808fb63404ccd1e88ee325edd2969daea18b375a1c1b63865d85fb0c28264b82a0a2ddeff7bd611f912706c3955875caaf3a8fa3057b02c3d2ea76f1621d46beef7f74f5404fff52eb6b28596e1515e0deae69c716e8c42dafccea7b9cc712bd34b366114aae3f75b6ed7c12be13d5a345034a594521fc0e21e55a79b9b7e19fd060a53859c7e0772000c1adfead015a978f312b8276f94990400567c2db61ad29395a734ecb0a8820efb5db2c0ae81378e9f8de3df6df49409769529a359bc2013c312a0277f9347de24ddbe536e2bf370c8150b69563881efd1d559f30b53346cf890d7bdcef6666be9fdae64f8d0b1b60f2a6f660099a6ad2679924100c77900cb33b9eee83cace6a184bb3c0b73862de8bec9304b781cab380e4c453a749cc76b4b88c5b970e08f4345b32c4296b82a277141f41a60e44eb28ab2e2f9fdbe473fc360c97f9cadf81b72ba61fea909e36fee1759cc7325b86b12b40b38552be803cb1d8d803aed4002ad472a14de4c1af0696e493c1a1dc294bfe7119483ad96f11e1e29b2cf02c82271a05d2fe472a787a523093860380b9385909e76414f93124a5d4a7ec5844b2547c31808b0cd4876f69ee212ef6ec2b90da344f290638a88b31cf7941275d61bb482b8207131deee6447964a43beab0aa563b06c558dd3e248b623f56d81d5903fc473d75e752a4603b577fb331b8ecef3b03dc1f5fee141e73116e0699ad9bffd11fcc3554d0ed32b9b12067d16ded459452a9e3c1f120ae16536d40988d0d43443ee4e9ff9343a8a731b3f81cb498c62ef89affc4f6da839b8cb732c608d4c1d849e913527c8f8dbfcd1583797c7cc3da6d77776b10446af3ae47754615817493b1de5226edf5da48cd4c6e5134cf0c52fabe23ee87af9f0e4455a362d8d2fcd146f6d3f7756912175ce55effdaa37399274c81ddb6af6dcaa23ff6617ea902a66e2fd842c352f84b8e98c59c153f2de143443dcfc04a98ba081d96e5e4583e5efe09e27e097301d063cb87631ca7db74f00d11d783c317401c69ebd43cac6ea8f34c615cd80e59a7025b78f71812c0c6c7b8eaaf20ad27af065207e4217eb81b45fbef9839e6e24c79f0b7472116ee8a06ab8e368112073521aa64e5c3bbc93adb45591ace827164bbb6e55f85aa62e284e", 0x1000}, {&(0x7f0000001580)="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", 0x1000}], 0x2, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="f2e677276b55deae00000000f0ffffff01000000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r10], 0x68, 0x1}, 0x24000000) openat(r5, &(0x7f0000000080)='./file0/../file0\x00', 0x1, 0x40) r11 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r11, 0x1, &(0x7f0000000540)) 04:43:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000000000)='./file2\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:43:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x500, 0x20000022, 0x0) 04:43:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x100000) 04:43:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x22300000) 04:43:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) [ 2161.376914] FAT-fs (loop7): Unrecognized mount option "18446744073709551615" or missing value [ 2161.400741] 9pnet: Insufficient options for proto=fd [ 2161.416706] 9pnet: Insufficient options for proto=fd [ 2161.429906] FAT-fs (loop7): Unrecognized mount option "18446744073709551615" or missing value 04:43:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2ffb) [ 2161.451108] 9pnet: Insufficient options for proto=fd 04:43:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3f000000) 04:43:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b95a6a65f03c062798f40e4d5929992ab53dac96b85389158d6eaa9a1e28b61a5fc85a", @ANYRESDEC]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:43:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x200000) [ 2161.549948] FAT-fs (loop1): Unrecognized mount option "¹Zjeð<'˜ôMY)™*µ=¬–¸S‰nªš(¶_ÈZ18446744073709551615" or missing value 04:43:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) 04:43:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8000000000000) 04:43:38 executing program 7: recvmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000380)=""/73, 0x49}], 0x1, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}, 0x40002002) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000240)={0x38, r1, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x1c, 0x17, {0x16, 0xffffffff, @l2={'ib', 0x3a, 'syzkaller1\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)) 04:43:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x6c9c2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = getpgrp(0x0) tgkill(r0, r0, 0x21) r1 = getpgrp(0x0) tgkill(r1, r1, 0x21) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/packet\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) [ 2161.585533] FAT-fs (loop1): Unrecognized mount option "¹Zjeð<'˜ôMY)™*µ=¬–¸S‰nªš(¶_ÈZ18446744073709551615" or missing value 04:43:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000) 04:43:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x40000000) 04:43:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:43:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x400000) 04:43:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x58000000) 04:43:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="00b4ea4475d878eb5f906d6b66732e6661740002080100", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYRESOCT=0x0, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES64, @ANYRESOCT, @ANYBLOB="ab6e819f57c2523dfdc66d704d9bbb5b58f484a09a9e4c3333dfcfe8ac1f76b8974e31aa34b413a70e1dd5b0b27edcd83a7fba37a5e2494b701af1513d4f0e3cf71dd85d832165f36182bcd481d7c158a923a3139a21f0ea", @ANYRES16, @ANYRES16]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000380)='./file2\x00') mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f0000000240), 0x43000, &(0x7f00000003c0)={[{@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x33]}}, {@huge_within_size}, {@huge_advise}, {@huge_within_size}, {@huge_advise}], [{@pcr={'pcr', 0x3d, 0x3b}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x200) fallocate(r0, 0x10, 0x8, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="00200000000000000000ffdfa85bb8c5fcbd4e978fd650"]) 04:43:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x10000000000000) 04:43:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:43:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x500, 0x20000022, 0x0) 04:43:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8004) 04:43:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf000) 04:43:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7f510100) [ 2174.364048] FAT-fs (loop1): Unrecognized mount option "0177777777777777777777700000000000000000000000ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ01777777777777777777777«nŸWÂR=ýÆmpM›»[Xô„ šžL33ßÏè¬v¸—N1ª4´§Õ°²~ÜØ:º7¥âIKpñQ=O<÷Ø]ƒ!eóa‚¼Ô×ÁX©#£š!ðêÿÿÿÿ" or missing value [ 2174.415077] FAT-fs (loop1): Unrecognized mount option "0177777777777777777777700000000000000000000000ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ01777777777777777777777«nŸWÂR=ýÆmpM›»[Xô„ šžL33ßÏè¬v¸—N1ª4´§Õ°²~ÜØ:º7¥âIKpñQ=O<÷Ø]ƒ!eóa‚¼Ô×ÁX©#£š!ðêÿÿÿÿ" or missing value 04:44:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/12]) 04:44:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80040000) 04:44:05 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x3, 0x4d, 0x0, 0x6}) chdir(&(0x7f0000000040)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00']) 04:44:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x20000000000000) 04:44:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)={0x0, 0x3}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)={0xd0, 0x39dd, 0xfffffffb, "8c4f402a9c460046772a18a0e7b21a45a0c2704842b3ef25a55f74cbddad81366fcb1394c9168a52fedbfada0f28ac82e59234576da808f115dbdaf629aaddf49dbea3001877cd342c3fc805237fe67a63bf39f79fde4d998cccafd4d22967eab219050c68efb26170bb6b74c09dc9db94938a227255843c5fefbd7b65c713f73886557444d5f2fae81ddc88f5cb660fbf724fa07517915af2a59f02bf2c5254a67aa5b92c06fb75d3330b038e1e8bba8ba42b570e489331c53f29bc85c268ff51cf4a5ab2508ea62eee1035b52ee8db"}) 04:44:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x20000022, 0x0) 04:44:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffff) 04:44:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf002) 04:44:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x807f0000) 04:44:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x40000000000000) 04:44:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x8cffffff) 04:44:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfb2f) 04:44:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:44:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000580)="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", 0x1000, 0xcd8b}, {&(0x7f0000000300)="474ca5e86e2fa5dd118a639e5589dadf2a0f8655e1b0867d0645091dcdc4998e3e79f0269cb6cd984e9de86195e9bf6bc87fe58327e1cf4d681ad0e9b23dd039fa4391004ee3b48dfe75ecf530f1e46d1b5818bddb852c4ab6112d8922628012bd04a8286ec8e55a9425bafa965b69f512386ef0b6cb0e703b0c3ca32cd2f91868a782145fa01070b7c816690e5612d079bcf2cca52dd1ffe793ad7f12fa92cb25fb4e32638af00707", 0xa9, 0x5}, {&(0x7f00000003c0)="6164356e17979e0c5794b818fd065d118f0a040b37ec19b278239323e4ce2da7c10da29aca5be3d0c0fee2f6aec2de39d257e79b53fbc18d3a6408faaf8f3e5f90556fc02dc05194535006c65f870831aa2a483d", 0x54, 0x2}, {&(0x7f0000001580)="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", 0x1000, 0x8f56}], 0x225000, &(0x7f00000004c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}, {}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@oldalloc}, {@quota}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="a9d1a87d93907f0000ccc27515f1a926ffbd000000"]) 04:44:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1000000) 04:44:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 04:44:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x80000) 04:44:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x4}], 0x500, 0x20000022, 0x0) 04:44:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = getegid() setgid(r2) keyctl$chown(0x4, 0x0, 0xee01, r2) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000006040)={{0x1, 0x1, 0x18, r0, {0x7c}}, '.\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000006080)=0x0) getresgid(&(0x7f00000060c0), &(0x7f0000006100), &(0x7f0000006140)=0x0) sendmmsg$unix(r0, &(0x7f0000006240)=[{{&(0x7f0000000300)=@file={0x0, './file1/file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000580)="3e1bc8bb6fca2995acb528a060838ad89478f2553cc47648ba1fc80538873fd4462a4158f21f917fb98c000c96ec32566388fb96058a27201282b5fa11461264441b55c96cdbb3ef8186cf1f3a7e63f1779c312900e783b039f9d1be14f356f70553a97f601e167e5276247f9453f1c25da23eac400b93de2d309f2f3f27c4ba136c999571d6cb2b6bec8e86bf5040b39b0528918e25a25cc160a9372ea4e44678c004e670a3cf95419833a3992f51538d2f82433c9f6fcffbaba1b5533169ee0cdce837d9c9624dbe76d5bb758839c7a461fe33852f33ebae993bcda2dedb8b5d98d854a6413373844280f161268ddb8ab07bb9f02256fe02f957aa79678697884098d2a4845ee24bafb1ff733e4e0ee0a73cf520b26c6e6320e5e5a9b635f7094fed532e1810cd81e8679f215c27dc5d57e2cc233a1d0373f3c8f7466a57127e368394ac4e1166b1495647fcf609bef73682dc41aafc3a1a6e575b6e7aa8003877e3a95419876a63533f7180853b98abf5784fded4e9f42bd4ad934aa8e7bbd9e8f43d883ae6a306d9b385c1747e31621b5eaf704ccdf5d548e02b456350582a693955d0562bc6dba7da0cf6679c8324c65a91b31f77a1bfa882e5bc9e3bba434090f3ffa7132f6cc4873549de53dc44911948269645c714d26e0e41cafd7e9d965be65162b728b714a9fa3ff17f51a3eef3cbf94643f39fd797266c07dfbae186264fedfb25e41c8eb4e34ea4be95df1b725e12ce41e4a5b4ae03cfbe99005e6f4e6be431e8219c4cfbeddf6d88e17c52551f1421c59d5163653450488412a42562f68d340a81bae3044872ca1163f8ae015eeff77c7a4a6fa6db9fb6e147d9bff1f2a76b3fa9f0420eb8dff9533c792acd206eca61418a2b5977f8c05982c3ec4e6b6e6f54a2812ce143807dfe4a43d47ffac7b05bf826bbd4c4cbd4d8c34db8e5ca8a243b4f7ca4681ba9a954c8f55b93393c540764bfac66ef004d5fa2d7ce45baafc99eca18e3281739ae61995c81edd1fe938541600cf4c65d0e986749de278a1ef1c2b0b3a3592d5e827d9983c628e90bf3be7888604bd79f2337f811a7d5636ec8db858bd37a3056bd5a6de964c963ee5ccb2190be430815b893cb72c8534c27741cff5a7b6f248b08853d625ca3d49a171c96bbd7199dccbaf9e57a55a6fc6048944adfd154c65bde230fc21fdf5318e3320d7b128d7db0f9629aa49180a6e34ddac82afb6e1a1aeec4c1ef16b512a414d9a3c9d528b86f15f15c8c677dfb387e98e32af2ca7ad4209db7d9a5b871a68c73c896492327aed78f7d81c6692b48d8160c417d03d1bbd593d0f9d0952775875f55bdd300d79552a98c3fd904e752c4bf6ab8ff1de7743ce50a974f1d238f98bdc99ec67673bf216a3b8151be750ce4368b1b1492b63adb3ffb83a88e97d7ece797f994ce9e90aedba702bc1bf84037b99920636d423f3ba75cbe6b398883e56a9a2e0eb937cf91779dad7a57c80a018c37e617f38de66994d85c8b1179e36d3c31d2c889b1ee898622d4bd43f4365240d4ab64d2588f4b0b9cd46d209f42a43b342176f8c0ce3a980595e96ecc4e3ec84e9b2ff6dc226f8f42b517ef927424317f7cd8fe3ed9b3ef22313e8299438d3575efc5c30726f7f66dafe286921cfe1be94690271ac2583242dc3c9c46a5b00d2dab9a9195f2bf3b882b83255822c553607be858a2879c1d6c8febc23c92b4314f98cc8cdfd0e98e22b60df972b2b4064a95117616a7cebea9f6e5ba8c93e43b3ef57f0af7f0be6cad10004b862667dd5d47f0d95d8a139f8db4687318bc123b633c61af7847e576d00396f6584c479b794686536d8f9edd7e2a0326e85221b0837e5626f2e6302ad41f9b4b565b9043ed43dadd519b7fd0deb68316306ba51defd42bf6e7336c2209e8fca64fe8f5cbc935f63c717cc6441d44aad08e681d29c7079ba74e7e28a8816a5e4c5d29195f580ddf380b94b63a010b0864170791248cfbecfd8a465ef1517fd4121db16023f14d08628fc21fdd70c256dee6dbb148fbbb9b5782f8e668f562bb8fb52ad8be89403918428e5459df19ac2a08a6fc8d7d5cea0373914c5e0c8345fe67516b57fa25c085fbf4c1451b8a340832f14a98313c5f8b4b364486974eaf57611907add18718a7b8ce7f3bed74792c945f3d731fda4bc194331de3985e4990e8a01c68f9373c3845caf172b6a9087d491d0cb25478646dc7aa75a975ce4827b58110eb4e49f5cae613506cac26dd11573a921c5e01d590182cdb7a5486441bed1c523d1784a3c987960e1425c604f4e786a18fec2ca2397bac242302887d325374d2b857d6c0d376e0f5c656fbc127575fb6514670016d1e74298e978d1c82478443c2f654859deb13cd81c50ec2c9496ff134ce552061f2dbcdbcb1dee3f6218a17e56972b35c25bc91ebfdded188def3f22659b936153bb11e970ff6093f9f2cd87c09565a28dc27806f904b06de42f586e147bfe8c8abf3eb2ff5fe10c725300d33dec1637a4ea4688763d4ebf6fc112735586c19ae99770908677199d24e59b29def0733ed4931508a73842086229dd16c00c5c31c082e591429c3a37b30fd24564765ef7a1596681e9f5b89d5bb9abc4fe0ce53ecbaa47ffe7cad716337be18ef644edb331b2ccb692ebdf95dd80057b57a78331b116c0ddf17bcbc5c412e221bd5727f10c91a8aa34e06af668575245537aefcb2b9a70bcae5f1471883e7a2a395214e52089d4508451ba34deeeda13396214b6cd05836d66ac1b511b13e3aba69c59191deb91feb015bae715e3eb4dfec051902da4e6512555c2a2eb2f7534b3439f141aaf1ec1fa2185a204730516478f653e56f3b18d1ee655d238fa219772f5022788bcbd15cf24bdcf7a2d77909ef7a18e572350c5de91f63a020d4d0b07592845c3ceed1e922149ba2784be62ff9d90ba67e958f5d0eb88288d78ef5cc91c14bbf10ca74749e5dccd56c7a955592a7f13ab15a1c006d4fb2eaeec2478ed7f9750bbb3ae06d72f6d906c2743237c9af106f66380f64c7784de1fef56850ecb7b178e602dec3881f39057a4de0769439e047ba3ec30071962e64e79560729f2c78e2c60a13b8f0c3039f53150401a56bb1667ee418998e8a379169402bb9b739ead203de6c5c9d6fb69c9753cd26e70cff0c3e02dc22737f8e02e530f70cb5add890e2d014bb0e1783828e684999bc35a610b6d48083acbf9aa2a48af247b9fd933ef93cbddde0b12ea79281d7e7cd4fb214535988823ad541fe82babce27ba2d63da20420093cbaa7419313fb2a69aba7c00d5b85e1e02b543ace51c8f0855402e8cefe051fa81496c47e5e703c8c7a8af6b3fcf96973ae25f20679ae7417f62140de1ae17fd55845affc15f7a0fbf0a70f83c54248de0bc8285f7512213ffc9d5aa0b7c382e9e8ff707fd0616916b0d3baa63f1708872c9a6a039ea428db83b4f6dd235d625bfa6ce9ffa4e44141f21933874508906562273a5e6b046850809ecd924a4e465688e81091c1f6a532eb55fc3f10be841859ccf7cbb96ea299661dc827c9a52a2922e5137809862fbbb2609237ee9afaac56300669310cdeba0a87afadfbdcc69f500c889046be8868046a64972f13289e96c2dfe5cd3b41ad5ee090cd734489dee9469f3d3699a9e895a5b18b0716766667e95939e75e2f635bed52b2f97a28f93a4b9b6a20b540e6d83a7124e6d0f4840637266797d6a08caff215c28458ebb550a6c8c97f829dee2fdb9475ea78cb9e38f86683ccc66c32804ce4fd55ae655d7aad417346a40cfb4aa31bef3014d13b6b71d6ff749cf32a616fe4841ab4b565540107e498f436cfcdbd6550f924cab20de55aab4633bb3ab6fed46d68b37a863f68e9af90a2ce1761f00506a2af15bfa46ae605fa12e35de3633bfe1ed446a4525f4645ac2f02dc7aadd807eac917c15787cda9d87c255b3494269c4ba68abdaff5831c6d32b1496c710694c6956a50d6e176c9bbff75c253d76d43038bb09755335a32b2f4224dac6b1f93aa95b7096dec2cd034434e57c1268881a0c3258eeae977c282811a64096ba426327d27e894ddf0265d676f3d791733ade1c4b1a5b3adcaa73e7fa3ef3ec3466e4a0792c0f64e28828662fe40c56d7e9895f4b485467a8c797ff63018da405a3f83368e90b1b47c923c362a61fd32711af550bde6d230ef356fb0296eb45822e07d8427648b460781930d0b2cf10d9c7f3279f923f8bde270a3e62eace2c58299b0b092864e67c75fc2b2e1cbb4bb90bdc92598fdbe14e9b667632893309d0a7b15265b733fbc62e4e9d50b8590708bfb644d25122d4086718d19bd1775671c6ca5db0bece4ea53ee20d68332e8390350e20cecf238e77237c0613160184f177e0188a40a634dff14a1558d896a7492e838d4bedaef8164365664fe00b7545d761c9a6f7bbef052a8ce613b25ecb919a003f81c77f51d6d36e4e6d074a7ddae63c00a634768929398e37f2d02d0ce91b9b2d4e57b07968b5f1b2f4a94e576f986af0c5b1b6fa0b474d7af5a8b062cf253baac30c9dc4d1f9c477c1d039b6f5757ebe9d5c41ef997860b0f3cd861c91aa6386939770a5310870430fb3a08868287f7fd18321c5e41ae371018aef9c6c3d748160d0c348fdb0d04cfad2c6ed0abc0d29b60046f94135d535b8d8a031421252fcb8cb07446a1fbd820a5d843f6c1851f2fff33f788eccda44954741649d5841f1f614a55ce9ae391efede422ee3fa600f7cb915c1fec6d49a3be15c4534e3652482cf669aa93ab44a3310837427b7db14f961662bc2a3db37cbf3295ddf1a91ca7581f71420cc0db7faba896f24ddf356e49f3596be629365aa8234b1521b2ee71a1b87ac3c5458c05cdd96eef623b4f69dd53683467c0a26a860cba6df89a49d59b4505e66237f5f21464f6aa5325d0e294c4a6cd737c04b7ba961acf1d381c9c8e8872e9a0d506afff7b9ba73765adca2930c633d696e90271c1a8861f187cac835eaca8d7c0a56728f3ee5306470ed6a7bfc1b12117442e30ab5fe0eba0118f8133345eca830d7cc942e225f49fa9573017f77cc73408e44c96e5e075f4fe1952f7f0d9f990b3d3f5363a98e38634b1a6b0b21d2d5d9573baa29fb3ac09cb99f58aa646d654d07237efb3cecf645caebb6bb2cc8f7c815029c179c23ee0cad661c456e92eb85671943499b14a968428943d0ac4312d965eb294e29a422fec226081dacca3a78a68bbc0736393223a927b050579d7669a1a8f384e01d89a100d44cdd4cc6abd24a06b3e6018e31435b9515935588f30983117001d104a561ded5a89e114045763d42b6274c932dd437fe3f71a0581845533b2cf4a2d60e939934631c65192f1c634975637a20cce24d7c8f3ff601caf7000f22e1fe1a7c1f33ea0840ce14d69946131cc1ab638d689e654a02ccbe5d6934a552a0bfdcc2c08e3cf3b6b0703cb64041f551d67686df1174b6e56318830a0cc81effcfe702b9c42bdda3f8d2b312c43a028724a747ea42c9d641ebaa329af5dfc3a03d5f4ff30e95e2fb153c7689d26286db73a475e0fc909594d43b6d301aae5aa7e6f366ab5e672e90ba5a8c21d8442d48222404327b8b3bda1c739ec4a497e7f14c199e56a6689e5af98251c09cb22c67bca7e89eaa723a689ff091d3ae4d3011c51c100bc8dd8c29b42186ab044d9aef26bef80c467e1b3f5c83d3ab20bf87677957c214fe4375ebae04a0d8a220d21bfac69af5316e6ae652d11345c4d4151c4303c55a4bf1ccd", 0x1000}, {&(0x7f0000000380)="12a28564e9d9730678a3870247517f5e52204ef84c9b37ef5473186ec689cda1eb8592c5f1d143627af73213956e419eedced5c5c7db3c80e41a7576f8172df22e97c8bf704203457f0243017f8b61a56f605deeff085dea850e2660d2c3e93db0a6789fdf5ff8749e56600155ac7987d04ceabd0e4e2d2e467761c1fa3347d36aa6f7e1204362f56b1b5b96250639033e36d726e2882e2b", 0x98}, {&(0x7f00000000c0)="425a03771b095f8138314ee326f59325d23bb13e15a66c338d9c89b9aa", 0x1d}, {&(0x7f0000000440)="6b7a90b8b7608fce196cb266e7462850cbe387cc70afc962d8bc48359bdca325e9bc7f986fc8a36dcc6cd90bb8b6b4caea3cd89246e527195a5b23974779bd98e3bb7ad0eb35d5c88ba16aa7", 0x4c}, {&(0x7f0000000180)="f619522569913043ba8582f924ca", 0xe}], 0x5, &(0x7f0000001580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x78, 0x41}}, {{&(0x7f0000001600)=@file={0x1, './file2\x00'}, 0x6e, &(0x7f0000003a40)=[{&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="a420668a00a7a4c765da8b159cc72719b7d92025e20f8ea53ed2397e9de7dda11d52394254c4eddc41b5f22b875fcc1912fc8b35a09f8d43c051111b00fd3aab7fea070f3599335c2add8dc6b0a96c85cb52fa761bba8aa40c736f0691c1091b73f43d75a98f8924372dde99ead9269c0b1bbdacbe3aa1809fef7a96f48bfa5efed9ad6cfa8855f5967735e3ed3b2e722f1c3b7db84f585aa9c4691431148e1f2597158a8054862c8025ab2bd21d35a51cd66055a4e40021551c76e065f518309d72d522b147d6eb", 0xc8}, {&(0x7f0000002780)="b3d0a1f2fc5e64f928a3984395677db364cdfd60af67ca9d57cdd2917a79df20a79837d46165818e3cf0866691cd97dff0faf9f8bebb97079b52e0cd0473cb0e4ecf60ce35004875500eb12fcd11cec8dc8f51203befdfa704af27e69610b9b8d0655f2a61098c12f37aa1b3a901cadc24d0777738660415164ed6f359381d1d33ff0bf1f21cb223762185d488b75aead3add4a00808f878ded4704fe58e34e27e81e9ad251b79ba39289cc83ffdce5a903d17ac18bb8b6067e0f41ae25083fb6ecde3b1db3e79c4af005f", 0xcb}, {&(0x7f0000002880)="0a689fb87db3a5ed94365468e6889e1af6cad43b2f2ed6f861c25690720a594a72f69a11b4b0c936ac847fe15618a4d71bfa238d3e6ac8fe3472cb402eb2762371d9202f7fdfe3c0e3db70b9560fdb3714c35da055e2cbc1a2baa16935bd17bcaee53e", 0x63}, {&(0x7f0000002900)="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", 0x1000}, {&(0x7f0000003900)="b9012830e409b508cdf1e6e5a867bd73deef01d634bd104682d8a6562cc7c2f114ca6e45ab90c129407aca81a93f4a0401d6a1dc22c5d08ea856cc3b1f627b0aac", 0x41}, {&(0x7f0000003980)="f37554dfbc49f615754611c1da3331049f0ad8f82fb240ae852785bcd6627fbbdacaff6bedef5dae9e9afcb3a62099f3b57793ded446522fd065538c88a57ceedfcd9cae2c637e282860667ca2cdf06eb857c60f3a8c8bc319d46ea38423fbf298e6058e786636f8c23ccff88e4211dffda5f247c4d4db9144e0fa2dd5e6bc644cfd3dee7ef6372ebd8982", 0x8b}], 0x7, &(0x7f0000003ac0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x40}}, {{&(0x7f0000003b00)=@file={0x1, './file2\x00'}, 0x6e, &(0x7f0000005f40)=[{&(0x7f0000003b80)="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", 0x1000}, {&(0x7f0000004b80)="883a55bb523574d92e2a167a6c4ffa8be3a745fd41560831edf7a1bcdba933b085d749edd2cde98f9c95adcfc12a6c0d097d582adbc3c5cc26d89ecaab68a46d96d8a27312403e4ef90cbd0df9fe7fd9692a954ec0af75634c7fc879cf82d476f6a705242afa06c4a27bee0c6418c0bff2c8353d64451adc8ea068f527a136204fe407fbfbaad4bba545dba12644ec839631", 0x92}, {&(0x7f0000004c40)="db05e821909a1e80c88dbecd03dd4fafb91097da0d60cf7fdf6cd8bf5e173e872d7fcac35a6d59b84e1138b38aa71329e640039c1938d67df29004ef101fc7386c22edae5e7c7b", 0x47}, {&(0x7f0000004cc0)="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", 0x1000}, {&(0x7f0000005cc0)="7fa69d4aec63a5b5f27b36b2fe4e8d9d9159d9cb977fd949ec333019fcc761552601d29a5e5dd0edd1608440a0346681bea8e32676663df691412f5b545190b6ae90baa41c8e9d24aba60be66327b432f773a9ecd069437ecc495bce4406f79f21b3f0ff14810f7952278ddc1a84f467f514d13517d29c3d1f4cca459aa941a8", 0x80}, {&(0x7f0000005d40)="bb54d875fe7bb02edc368075c1702d050be69a7e1d4e2097d945f3f713ef7087e2a89fb01615d3d3e11f9ff9b8a26e8818d20ec4406409b43e848b2bb41fe8628800a76973fba9bc0145a69db696b566a8df7736480dca082ee93441dedf77d66ceb245565345269eccab96a7cce2d95e25b7d092266e208f596505132e350ba848a74d3c66a14522f921442382730669f239d1638042754b8fd0ce16049c9e024f362e59332aacd88df93b63a094994a2990a48de1176b64725f9e3a0537034d6f08fd244029034add6e27098602e956dcc968f0ca5657f63dbe81398d3ddced00e12c53bc92057f0e1dedf4aa8aed61eb85ca35440d1", 0xf7}, {&(0x7f0000005e40)="177b8c1fbfa2ee63f3b5ed4dcb694585b3c03fc16afb35b500cb67501d6c8440c8f237f2f0a0628c2737767275d2424c1bd3d2d5363ef5bca0eb7963abb125ad8f6b80b5bb185d1806a6b2930a674e8b1b8349e2945cdcce95287d5283d2c6ef91c4503cbd7c2f08bf52f8ee0b04a23254a6a29f5a593bd3e37ecc9bf3ab9cfe63fb3e1b48e38fe73ae458afbbe67f52f8c1b0ccad5280028a0af007df7c396374466f80098dce6a3181e256664cf9c12790afbad4745b", 0xb7}, {&(0x7f0000005f00)="81395311c3c2e6507158aad49e05e0e18cfd2b33bc1bbd91e50de5f532b6e78d03702f133fffd862f03efd7882d0714b8188db", 0x33}], 0x8, &(0x7f0000006180)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r7, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, r9}}}], 0x98, 0x10}}], 0x3, 0x20000181) r10 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r10, 0x1, &(0x7f0000000540)={0x0, 0x3}) syz_open_dev$mouse(&(0x7f0000000000), 0x81, 0x200) 04:44:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0020000) 04:44:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000000) 04:44:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') creat(&(0x7f0000000000)='./file2\x00', 0x40) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:44:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x100000) 04:44:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$sock(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="82a6aa355c8a6a8b2b446fb005b2f7788b3c01fb7679a439b1d1a7b75c97228cde372aa2401b103532df3dc12cf3aca2bc7c0000768c360839c69feec400ffa92bad7e0a2306dc97d282eb619cddf1057fad613d24082a6e3d00bf678a2d7c737e79f5228a099ffd5183782f04ba97f8f5f2b4d67e95d02e86456a3a39c1e48a3a6779e163d3772bab773f54a24609", 0x8f}], 0x1, &(0x7f00000000c0)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}], 0x30}, 0x800) lsetxattr$security_evm(&(0x7f0000000240)='./file1\x00', &(0x7f0000000380), &(0x7f0000000400)=@sha1={0x1, "fa0c33784d4268275a30efe5769a19f03f97f8fa"}, 0x15, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)) 04:44:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf6ffffff) 04:44:21 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') lremovexattr(&(0x7f0000000000)='\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = dup2(r0, r0) openat(r1, &(0x7f0000000180)='./file2\x00', 0x307340, 0x25) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:44:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 04:44:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf8ffffff) 04:44:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x200000) 04:44:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x2000}], 0x500, 0x20000022, 0x0) 04:44:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3000000) 04:44:21 executing program 1: modify_ldt$write(0x1, &(0x7f0000000000)={0x8, 0x1000, 0x400, 0x1, 0x1, 0x1, 0x0, 0x1}, 0x10) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x14, 0x7, 0x6, "34abf51761d7ce11b95d388c5fce2bef063732c9"}) 04:44:21 executing program 7: chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000180), &(0x7f0000000240)='./file1\x00', 0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x452001, 0x10) 04:44:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffffffffffff) 04:44:21 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c013ea99a2626523319e3e12e020b15e8c5ab88230780f3f472a5f252349b36a09a39039bedcbd13723c466fce578b2ef74873a772a25c048c2e02ccbea2be48c23d61356397d07f9ea9f0d7d387c20d20bb7f0ce84b595966654aa8bd41e98e212"]) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB="2c7766646e7bd3298ae71518b7213ffcb09bec9a0b22e454ae6197c4f332a485445d0954566b87775f3e17a5f6e63d40ce27f30da33f2d73c174f28033104e760b66cbf9e179fc6a562ce4ffb6f2d30b5bfc3f9069a95826b9a1000000000000", @ANYRESHEX=r6, @ANYBLOB=',\x00']) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x80, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17, 0x90}, {0x0, 0x0, 0x8000}], 0x8000, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="b72b1783508a6f652dad1c69668dcd89bdf7cf80511a096686808e839dccae1a62a97e50d15ec4f6935e855d737c762fe09c97a4647942630d025286dd1be2722f097103d86d9d7e97d991fc9e5aec", @ANYRES32=r1, @ANYRESHEX=r2, @ANYRES16=r5, @ANYBLOB="24bfe0cae59e7b346f9fd5cad320fdada807f1903c2f2a24e1aca80439b874c30b6780e6ee47bcc90e68dec2a8bf29ad1901fc6be1cbdf1a6fe5ce1092a947b465305e37f33090543e2523f6a8ea1991d46230232f47fce085435a63b2679e2bb713701f961982295eefc8b0c6aaa1c9567739f06f778a0f0b8ad60d7cd2fd", @ANYBLOB="0000000000000d472a6388ffda508ba41824a97d8bc618a08768bba3dc54938e24b5b61805af314b0973c7099ef13bf0ef9fe866ca29c5a7e0bd151e2717e32daeb0f098aea5ca96334be72f3e65bb05a4875bf0bbbc51c4c1cd3872811a", @ANYRES64=r7, @ANYRESDEC=0x0]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000004f6a36e1cb000000"]) 04:44:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x4000000) 04:44:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x400000) 04:44:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x100000000000000) [ 2204.772937] 9pnet: Insufficient options for proto=fd [ 2204.788736] 9pnet: Insufficient options for proto=fd [ 2204.801057] 9pnet: Insufficient options for proto=fd 04:44:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x200000000000000) 04:44:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000300)=""/244, 0xf4}], 0x1) 04:44:35 executing program 1: getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000180)=0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f00000001c0)='./file1\x00', 0x2184a1, 0x42) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000240)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') openat(r1, &(0x7f0000000000)='./file0\x00', 0x204800, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="0100bcfd9a93bd4fe4a12908"]) 04:44:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x5000000) 04:44:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfbffffff) 04:44:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000300)="eb3c6d6b66732e66049306c55b9812cd70000500000000c3554a43f48d1e02234cfb34f820488bfe87dfa4af83071e591b3ef80892a1855d32c585569e2a10bcb31ca8bdd4a899cb1bc152ad4c6b1f010f509aac21d356228211b8c33a7e96a9b910f627f784958ca9a08e2ac1043edf077caa1845c27e96a2f17cfcd0c97d8c9d", 0x81}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:44:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x4000}], 0x500, 0x20000022, 0x0) 04:44:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xf0ffff) [ 2218.884913] FAT-fs (loop5): invalid media value (0x00) [ 2218.885545] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2218.918038] FAT-fs (loop5): Unrecognized mount option "./file2" or missing value 04:44:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfeffffff) 04:44:36 executing program 5: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x480040, 0x44) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000580)={0x2, 0x87, @start={0x0, 0x1, "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", "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"}, [0x79f, 0xfffffffffffff0b0, 0x1, 0x1, 0x9, 0x1f, 0x7fffffff, 0xc72c, 0x7b, 0x5, 0x9, 0x0, 0x100, 0x7, 0x40, 0x10001, 0xffff, 0x5, 0x4, 0x8, 0x1, 0x81, 0x3, 0x7f, 0x9a1, 0xd6, 0x0, 0x25f, 0xfffffffffffffffb, 0x3, 0x9b04, 0x40, 0x8, 0x3236, 0xb00d, 0x1, 0x7, 0x100000000, 0x0, 0x52b, 0xbf, 0x3, 0x800, 0x4, 0x5, 0x7f, 0x10000, 0x0, 0xfffffffffffffff7, 0x18, 0x1, 0x2, 0x4, 0x2, 0x8, 0x30, 0x0, 0x7, 0x1, 0x9, 0x5, 0x105, 0x9, 0x3]}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)={0x0, 0x3}) 04:44:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x6000000) 04:44:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x1000000) 04:44:36 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x96}}, './file2/file0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x28, 0x3f7, 0x100, 0x703d2c, 0x25dfdbfe, {0x7, 0x7, './file0', './file2'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x404083d) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000540)) 04:44:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xfffff000) 04:44:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x300000000000000) 04:44:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x500, 0x20000022, 0x0) 04:44:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x2000000) [ 2219.224921] FAT-fs (loop1): Unrecognized mount option "./file2" or missing value 04:44:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x3000000) 04:44:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x7000000) 04:44:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x400000000000000) 04:44:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x3f}]}, 0x58) close(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0xffffff7f) 04:44:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="e4", 0x1, 0x0, 0x0, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}, 0x200000}], 0x500, 0x20000022, 0x0) 04:44:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x663, 0x48) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') truncate(&(0x7f0000000000)='./file0\x00', 0x6) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000540)) 04:44:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="000000000000001e7c2535c8633d18688017004e2e540dcebec638e5912a1600519bc31acccfb640babea4e6c09adc769833aa1a704ff03f63c662f89982af5de1f2cffe7643bc2fd12d4d6b840c926c94a018b792f531e54609e21a21ac220adf7a3e7905716ee40a", @ANYRESHEX=r4, @ANYBLOB=',\x00']) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r5 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x6e}, {0x0, 0x0, 0x245}], 0x0, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRES16=r2, @ANYRESHEX=r4, @ANYRESHEX]) chmod(&(0x7f0000000000)='./file1\x00', 0xbc) chdir(&(0x7f0000000040)='./file0\x00') r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) read(r6, &(0x7f0000000180)=""/17, 0x11) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file2\x00', 0x400663, 0x0) openat(r5, &(0x7f00000000c0)='./file2\x00', 0x400100, 0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r8, &(0x7f00000003c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002abd7000fedbdf25010000000000000009410000001c0018000000006574683a7465616d5f736c6176655f3000010000"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x5) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000ff0095dc603bbc5fa44b9a4ef1b3d25ca631992e431b26e83217b6b66c65ab961ba2f2aac82f5ec2ff2ab8f5ff4255ec1ba5ccbc3d7f3d343937ab8d6ae1a9c9de4341c918df1f6203a3e6ef7670666edeeed54eb36ab78a5fddd0b3"]) [ 2219.841049] FAT-fs (loop1): Unrecognized mount option "18446744073709551615ÿÿÿÿÿÿÿÿ" or missing value 04:44:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) close(r1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x500000000000000) [ 2219.922074] 9pnet: Insufficient options for proto=fd [ 2219.925950] 9pnet: Insufficient options for proto=fd [ 2219.945717] 9pnet: Insufficient options for proto=fd [ 2219.966865] 9pnet: Insufficient options for proto=fd [ 2219.971146] FAT-fs (loop1): Unrecognized mount option "18446744073709551615ÿÿÿÿÿÿÿÿ" or missing value VM DIAGNOSIS: 04:49:44 Registers: info registers vcpu 0 RAX=ffffffff83e1d800 RBX=ffffffff84e322c0 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3193510010 CR3=000000000cc08000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004184416380000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1d800 RBX=ffff88800852b300 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000563c632b1678 CR3=000000000cc08000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000020000000000000002 XMM02=0201039aff15007f02fe016c6c6f502e XMM03=000006060201d5588c9bfcbe3ceda3fc XMM04=20636578650a006873616d7320636578 XMM05=61746f7420636578650a007364656573 XMM06=7473657220726f74756365786511006c XMM07=0e006e65672063657865080073747261 XMM08=6169727420636578650b007a7a756620 XMM09=0a006873616d7320636578650a006567 XMM10=636578650a0073646565732063657865 XMM11=726f74756365786511006c61746f7420 XMM12=20636578650800737472617473657220 XMM13=6469646e616320636578650e006e6567 XMM14=696d696e696d20636578650d00657461 XMM15=000073746e696820636578650a00657a