mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x2031, r0, 0x2000200)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r1, 0x0)
ioctl$BLKTRACESTART(r0, 0x1274, 0x0)
setsockopt(r1, 0x5, 0xcb, &(0x7f0000000040)="a6de", 0x2)
getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:53 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$vbi(0x0, 0x3, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2)

[  410.665796][T23306] FAULT_INJECTION: forcing a failure.
[  410.665796][T23306] name failslab, interval 1, probability 0, space 0, times 0
[  410.745738][T23306] CPU: 1 PID: 23306 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  410.753782][T23306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  410.763854][T23306] Call Trace:
[  410.767163][T23306]  dump_stack+0x172/0x1f0
[  410.771525][T23306]  should_fail.cold+0xa/0x15
[  410.776134][T23306]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  410.781958][T23306]  ? ___might_sleep+0x163/0x280
[  410.786837][T23306]  __should_failslab+0x121/0x190
14:36:53 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x7f, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'none\x00', 0xc, 0x1fc0000, 0xa}, 0x2c)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  410.791786][T23306]  should_failslab+0x9/0x14
[  410.796313][T23306]  __kmalloc+0x2dc/0x740
[  410.800571][T23306]  ? lockdep_init_map+0x1be/0x6d0
[  410.805617][T23306]  ? prealloc_shrinker+0xa6/0x350
[  410.810666][T23306]  prealloc_shrinker+0xa6/0x350
[  410.815527][T23306]  alloc_super+0x710/0x890
[  410.819951][T23306]  ? test_single_super+0x10/0x10
[  410.824896][T23306]  sget_userns+0xf1/0x560
[  410.829229][T23306]  ? kill_litter_super+0x60/0x60
[  410.834175][T23306]  ? test_single_super+0x10/0x10
[  410.839130][T23306]  ? kill_litter_super+0x60/0x60
[  410.844083][T23306]  sget+0x10c/0x150
[  410.847904][T23306]  mount_bdev+0xff/0x3c0
[  410.852157][T23306]  ? vfat_mount+0x40/0x40
[  410.856498][T23306]  vfat_mount+0x35/0x40
[  410.860665][T23306]  ? setup+0x120/0x120
[  410.864742][T23306]  legacy_get_tree+0xf2/0x200
[  410.869438][T23306]  vfs_get_tree+0x123/0x450
[  410.873953][T23306]  do_mount+0x1436/0x2c40
[  410.878310][T23306]  ? copy_mount_string+0x40/0x40
[  410.883269][T23306]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  410.889525][T23306]  ? copy_mount_options+0x280/0x3a0
14:36:53 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
listen(r0, 0x0)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0)
getsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

[  410.894737][T23306]  ksys_mount+0xdb/0x150
[  410.898994][T23306]  __x64_sys_mount+0xbe/0x150
[  410.903684][T23306]  do_syscall_64+0x103/0x610
[  410.908296][T23306]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  410.914195][T23306] RIP: 0033:0x45b81a
[  410.918094][T23306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  410.937713][T23306] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
14:36:53 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  410.946145][T23306] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  410.954132][T23306] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  410.962115][T23306] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  410.970096][T23306] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  410.978072][T23306] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:53 executing program 2 (fault-call:0 fault-nth:51):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:53 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x3f, 0x100000000, 0x9, 0x4, 0x16, 0x1, 0xca4c, 0xffffffff, 0x93fc, 0x80000000, 0x2, 0x5})

14:36:53 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x400)
ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x793, 0xb7, 0x4, 0x0, 0x9, 0x0, 0x4105, 0x100, 0x2, 0x3, 0x1000, 0x0, 0x0, 0x6e4, 0x0, 0x3, 0xff, 0xb11c, 0x2ba})

14:36:53 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:36:53 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x80000001})
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:53 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x802, 0x0)
connect$x25(r1, &(0x7f0000000400)={0x9, @remote={[], 0x0}}, 0x12)
ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x101, 0x0, [], {0x0, @bt={0x7, 0x8, 0x0, 0x2, 0x40, 0x4c1, 0x401, 0x7f, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x10}}})
socket$inet_udplite(0x2, 0x2, 0x88)
alarm(0x3f9)
ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000100))
futex(&(0x7f0000000340)=0x2, 0x4, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x1, 0x0)
r2 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x50, r1, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1)
ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x74, 0x0, &(0x7f0000000200)=[@transaction_sg={0x40486311, {{0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x40, 0x18, &(0x7f0000000180)=[@ptr={0x70742a85, 0x1, &(0x7f0000000000), 0x1, 0x0, 0x1ff}, @fd={0x66642a85, 0x0, r1, 0x0, 0x1}], &(0x7f00000001c0)=[0x0, 0x28, 0x30]}, 0x21}}, @acquire_done={0x40106309, r2, 0x3}, @increfs={0x40046304, 0x2}, @dead_binder_done={0x40086310, 0x3}], 0x45, 0x0, &(0x7f0000000280)="3d5810e75ed54b93b1363bf04010b5f16790b03b5073989f42fa79fb4256cd5fd0db4f9122491e3635456a484c42c6fb37c5f1fb8d7a0c7f34d6b15ae34433a034164d32cf"})
pipe2$9p(&(0x7f0000000440), 0x84000)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:53 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:53 executing program 0:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0xfffffffffffffff9, 0x1, 0x8})
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4)

14:36:53 executing program 3:
syz_emit_ethernet(0xb7, &(0x7f0000000000)={@remote, @dev={[], 0x23}, [], {@llc={0x4, {@snap={0xaa, 0xab, "06", "04ec68", 0x800, "d5e32416a23a1a7f171cf1152817bca4f9d0faae70339e5b041271d97460b1d968ad7d58a6f4b028676a3e8c8e4a4ce21fc7dd4f95292be3b80ef5f741e73c91b908af93b6406c8e9463afeac0e07fd0aa1240dc176da7cbe84d2fe1ec82109370c4fcb24ebe32f49b2b8ae49ae90b7e0ce7ff3d717f450855b559e9aec0efa78faef483d3fff4d4c4ab7e872a97f5c88ca59801707f52662b2e15366c0a345506"}}}}}, &(0x7f00000000c0)={0x1, 0x2, [0x856, 0xde9, 0xa00, 0xe6e]})
socket$pptp(0x18, 0x1, 0x2)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80100, 0x0)

14:36:53 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  411.268017][T23348] FAULT_INJECTION: forcing a failure.
[  411.268017][T23348] name failslab, interval 1, probability 0, space 0, times 0
14:36:53 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  411.365714][T23348] CPU: 0 PID: 23348 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  411.373750][T23348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  411.383819][T23348] Call Trace:
[  411.387127][T23348]  dump_stack+0x172/0x1f0
[  411.391479][T23348]  should_fail.cold+0xa/0x15
[  411.396083][T23348]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  411.401902][T23348]  ? ___might_sleep+0x163/0x280
[  411.401924][T23348]  __should_failslab+0x121/0x190
[  411.401940][T23348]  should_failslab+0x9/0x14
[  411.401962][T23348]  kmem_cache_alloc_trace+0x2d1/0x760
[  411.411753][T23348]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  411.427405][T23348]  __memcg_init_list_lru_node+0x8a/0x1e0
[  411.433055][T23348]  __list_lru_init+0x3cf/0x6e0
[  411.437838][T23348]  alloc_super+0x762/0x890
[  411.442269][T23348]  ? test_single_super+0x10/0x10
[  411.447231][T23348]  sget_userns+0xf1/0x560
[  411.451569][T23348]  ? kill_litter_super+0x60/0x60
[  411.456516][T23348]  ? test_single_super+0x10/0x10
[  411.461457][T23348]  ? kill_litter_super+0x60/0x60
[  411.466427][T23348]  sget+0x10c/0x150
[  411.470267][T23348]  mount_bdev+0xff/0x3c0
[  411.474526][T23348]  ? vfat_mount+0x40/0x40
[  411.478869][T23348]  vfat_mount+0x35/0x40
[  411.483032][T23348]  ? setup+0x120/0x120
[  411.487111][T23348]  legacy_get_tree+0xf2/0x200
[  411.491797][T23348]  vfs_get_tree+0x123/0x450
[  411.491817][T23348]  do_mount+0x1436/0x2c40
[  411.491839][T23348]  ? copy_mount_string+0x40/0x40
[  411.491856][T23348]  ? _copy_from_user+0xdd/0x150
[  411.491877][T23348]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  411.500698][T23348]  ? copy_mount_options+0x280/0x3a0
[  411.500719][T23348]  ksys_mount+0xdb/0x150
[  411.500738][T23348]  __x64_sys_mount+0xbe/0x150
[  411.530910][T23348]  do_syscall_64+0x103/0x610
[  411.535512][T23348]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  411.541406][T23348] RIP: 0033:0x45b81a
[  411.545314][T23348] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:36:53 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x9, 0x2000)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  411.564942][T23348] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  411.573377][T23348] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  411.581361][T23348] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  411.589345][T23348] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  411.597337][T23348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  411.605326][T23348] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:54 executing program 2 (fault-call:0 fault-nth:52):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:54 executing program 4:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2)
bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc)
ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x3f, 0x2})
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, <r1=>0x0}, &(0x7f0000000100)=0xc)
ioctl$TUNSETGROUP(r0, 0x400454ce, r1)

14:36:54 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r0, 0x0)
r1 = fcntl$dupfd(r0, 0x406, r0)
ioctl$TIOCEXCL(r1, 0x540c)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:54 executing program 0:
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x8000, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/loop-control\x00', 0x40000, 0x0)
r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0)='TIPCv2\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x42, r1, 0xd00, 0x70bd25, 0x25dfdbff}, 0xffffffffffffffe4}, 0x1, 0x0, 0x0, 0x84}, 0x40004)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r3 = syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4)
ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000880)=[0x0, 0xc9e])
r4 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000000)={0x100000000, 0x7, 0x3f, 0x2, 0x9, 0xffff})
getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}}, &(0x7f0000000180)=0xe8)
stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = getuid()
getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000380)=0xe8)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, <r9=>0x0}, &(0x7f0000000400)=0xc)
r10 = geteuid()
bind$rose(r3, &(0x7f0000000900)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c)
stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, <r11=>0x0})
getresgid(&(0x7f0000000500)=<r12=>0x0, &(0x7f0000000540), &(0x7f0000000580))
fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r13=>0x0})
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0})
stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0})
fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r16=>0x0})
r17 = getgid()
r18 = getgid()
syz_open_dev$radio(&(0x7f0000000940)='/dev/radio#\x00', 0x0, 0x2)
fsetxattr$system_posix_acl(r4, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="02000600", @ANYRES32=r8, @ANYBLOB="02000100", @ANYRES32=r9, @ANYBLOB="02000100", @ANYRES32=r10, @ANYBLOB="02000700", @ANYRES32=r11, @ANYBLOB="040003000000000008000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r14, @ANYBLOB="08000200", @ANYRES32=r15, @ANYBLOB="08000400", @ANYRES32=r16, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r17, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB="10000100000000002000000000000000"], 0x94, 0x2)

14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=<r1=>0x0)
fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x2, 0x2, 0x10000, 0x401, r1})
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r2=>0x0)
r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x408002, 0x0)
ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000140)=""/126)
fcntl$lock(r0, 0x0, &(0x7f0000000040)={0x3, 0x7, 0x0, 0x4, r2})

14:36:54 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0)
ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000040))

14:36:54 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  411.870755][T23381] FAULT_INJECTION: forcing a failure.
[  411.870755][T23381] name failslab, interval 1, probability 0, space 0, times 0
[  411.901992][T23381] CPU: 1 PID: 23381 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  411.910035][T23381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  411.920104][T23381] Call Trace:
[  411.920135][T23381]  dump_stack+0x172/0x1f0
[  411.920162][T23381]  should_fail.cold+0xa/0x15
[  411.932371][T23381]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  411.938201][T23381]  ? ___might_sleep+0x163/0x280
[  411.943075][T23381]  __should_failslab+0x121/0x190
[  411.948027][T23381]  should_failslab+0x9/0x14
[  411.952550][T23381]  kmem_cache_alloc_trace+0x2d1/0x760
[  411.957943][T23381]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  411.957975][T23381]  __memcg_init_list_lru_node+0x8a/0x1e0
[  411.969428][T23381]  __list_lru_init+0x3cf/0x6e0
[  411.974214][T23381]  alloc_super+0x762/0x890
[  411.978649][T23381]  ? test_single_super+0x10/0x10
[  411.983599][T23381]  sget_userns+0xf1/0x560
[  411.987939][T23381]  ? kill_litter_super+0x60/0x60
[  411.992886][T23381]  ? test_single_super+0x10/0x10
[  411.992899][T23381]  ? kill_litter_super+0x60/0x60
[  411.992911][T23381]  sget+0x10c/0x150
[  411.992929][T23381]  mount_bdev+0xff/0x3c0
[  411.992944][T23381]  ? vfat_mount+0x40/0x40
[  411.992963][T23381]  vfat_mount+0x35/0x40
[  411.992977][T23381]  ? setup+0x120/0x120
[  411.992991][T23381]  legacy_get_tree+0xf2/0x200
[  411.993010][T23381]  vfs_get_tree+0x123/0x450
[  411.993027][T23381]  do_mount+0x1436/0x2c40
[  411.993049][T23381]  ? copy_mount_string+0x40/0x40
[  412.006715][T23381]  ? _copy_from_user+0xdd/0x150
[  412.015269][T23381]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  412.015283][T23381]  ? copy_mount_options+0x280/0x3a0
[  412.015310][T23381]  ksys_mount+0xdb/0x150
[  412.015326][T23381]  __x64_sys_mount+0xbe/0x150
[  412.015344][T23381]  do_syscall_64+0x103/0x610
[  412.015364][T23381]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  412.015376][T23381] RIP: 0033:0x45b81a
[  412.015391][T23381] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  412.015400][T23381] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  412.015414][T23381] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
14:36:54 executing program 1:
socket$inet6_udplite(0xa, 0x2, 0x88)
signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x4}, 0x8)
r0 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x5)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x3f, r0, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
set_thread_area(&(0x7f0000000000)={0xfff, 0x101000, 0x400, 0x1, 0x8, 0x6, 0x3, 0x6, 0x5, 0x3})
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r1, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000000140), &(0x7f0000000180)=0xc)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc)
r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x180, 0x0)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00')
sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x12c, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9d1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x410a95d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd76}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xf4f0, @mcast1, 0x8c6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4bd}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000}, 0xc001)
setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4)

14:36:54 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1)

14:36:54 executing program 4:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0)
sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40080000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, 0x1, 0xf, 0x100, 0x70bd25, 0x25dfdbff, {0xf, 0x0, 0x6}, [@typed={0xc, 0x1c, @u64=0x3}, @generic="73768232a5fc83d2ed2f4a73cf06efa76307ffd9185e22d85da806deeee76e0e09be443095e98941e463864b2db2af60eb16c92d6a8c6fe34effbcd2249f0f5967ddf4b3981487ce579ca48a836dbb3e09b63b54aa9bede3c2c95ad5601b77c2d104900d725f01ac82eeae8cab4343d5256684d427664e079b0a9d8b7a059fa7564a1b8b688c4d576f755876903b151a7167a533069107ae11afb6254f26f1b3efe687ad6865c76989204e6851323e9937d0109e42c1c535ffb317bca0ededf4ea0df7b40620c77177f37f43c1fd720940c1546645f9ee6541ab1c0b139393694c98c891579e6c11145f34907c59fc466d2e59831a36baefd7", @generic="eea021940bdfdd89df35a036a588bb7adc4bef093da616b649f32e52b7181aba3aba62b96fccd74cb7fb68cae9786a360f52724867878123de7396b80fd73344923b239d9bae8fb2f16aefec077626c89542af07420ba11b25271f2a45828c878ad62dd970d6a8aa439cd2ecc315f906e8879fe30420699ff2b43603385b57b2ef834b605657a8630a78f1be049608b39509e36821bde224278233e2f6912f6375", @generic="a01185c83a1eddc00888f4c2861dae071b07665f22fc4f2009d2070fa2f3eab1311f8f27fd1c679ef27210a414691a4087a4c8a6accd8a7a40cbec4ca01a19572fb97397ddc01a459933ac0b947fe1fc51e424fdf9043db6244d5095", @typed={0x8, 0x51, @ipv4=@dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x220}, 0x1, 0x0, 0x0, 0x880}, 0x80)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4)

14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0)
sendto$inet(r1, &(0x7f0000000040)="a458bee1e77c9824a973673e3ebd89adbea03b6e9e17d3bbd48c64eab93efbce0d4fdd2a3e925f5599fc5c6ab539bb91b89dc1f84170c7a76ec20a2b960f4eaea04eeb752d487a4de0d28e63eacf35113c1e3f1085ba385bd73de7898f7db8ee0552f0e90ac8adef99ab92d8767d946994386fa8f1206292bb08c53b1d6b2121df", 0x81, 0x40, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10)

[  412.015423][T23381] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  412.015438][T23381] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  412.032814][T23381] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  412.032824][T23381] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:54 executing program 2 (fault-call:0 fault-nth:53):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:54 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8080, 0x0)
getsockname$netrom(r1, &(0x7f0000000040)={{}, [@bcast, @remote, @remote, @default, @netrom, @rose, @default, @null]}, &(0x7f00000000c0)=0x48)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:54 executing program 4:
r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200800, 0x0)
r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r1, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6af}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x801}, 0x4000)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4)

14:36:54 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r0, 0x80009)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)
r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20000)
write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x0, 0x1}}, 0x20)

14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x103, 0x0)
ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f00000000c0))
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1, 0x5, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3})
setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @broadcast}, 0x10)

14:36:54 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  412.304255][T23501] FAULT_INJECTION: forcing a failure.
[  412.304255][T23501] name failslab, interval 1, probability 0, space 0, times 0
[  412.370236][T23501] CPU: 0 PID: 23501 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  412.378309][T23501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  412.389866][T23501] Call Trace:
[  412.393188][T23501]  dump_stack+0x172/0x1f0
[  412.397545][T23501]  should_fail.cold+0xa/0x15
[  412.402159][T23501]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  412.407990][T23501]  ? ___might_sleep+0x163/0x280
[  412.412870][T23501]  __should_failslab+0x121/0x190
14:36:54 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x8200)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:54 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:54 executing program 4:
r0 = socket$pptp(0x18, 0x1, 0x2)
ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x8)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4)

14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
pipe2(&(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x2000000008400b)
ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x7f, 0xf0a, 0x5, 0x8, 0x0, 0x3, 0x4, 0x3, 0x401, 0x120000})
ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  412.417828][T23501]  should_failslab+0x9/0x14
[  412.422359][T23501]  kmem_cache_alloc_trace+0x2d1/0x760
[  412.427764][T23501]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  412.433595][T23501]  __memcg_init_list_lru_node+0x8a/0x1e0
[  412.439255][T23501]  __list_lru_init+0x3cf/0x6e0
[  412.444050][T23501]  alloc_super+0x762/0x890
[  412.448479][T23501]  ? test_single_super+0x10/0x10
[  412.453431][T23501]  sget_userns+0xf1/0x560
[  412.457789][T23501]  ? kill_litter_super+0x60/0x60
[  412.457807][T23501]  ? test_single_super+0x10/0x10
[  412.457820][T23501]  ? kill_litter_super+0x60/0x60
14:36:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  412.457833][T23501]  sget+0x10c/0x150
[  412.457852][T23501]  mount_bdev+0xff/0x3c0
14:36:55 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  412.457867][T23501]  ? vfat_mount+0x40/0x40
[  412.457887][T23501]  vfat_mount+0x35/0x40
[  412.457902][T23501]  ? setup+0x120/0x120
[  412.457917][T23501]  legacy_get_tree+0xf2/0x200
[  412.457935][T23501]  vfs_get_tree+0x123/0x450
[  412.457953][T23501]  do_mount+0x1436/0x2c40
[  412.457975][T23501]  ? copy_mount_string+0x40/0x40
[  412.458000][T23501]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  412.458014][T23501]  ? copy_mount_options+0x280/0x3a0
[  412.458032][T23501]  ksys_mount+0xdb/0x150
[  412.458050][T23501]  __x64_sys_mount+0xbe/0x150
[  412.458070][T23501]  do_syscall_64+0x103/0x610
[  412.458091][T23501]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  412.458104][T23501] RIP: 0033:0x45b81a
[  412.458119][T23501] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  412.458127][T23501] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  412.458143][T23501] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  412.458153][T23501] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  412.458162][T23501] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  412.458171][T23501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  412.458180][T23501] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:55 executing program 2 (fault-call:0 fault-nth:54):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:55 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0)
fgetxattr(r0, &(0x7f0000000000)=@random={'osx.', '/dev/dlm-control\x00'}, &(0x7f0000002500)=""/4096, 0x1000)
r1 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8000)
sendmsg$nl_crypto(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44101}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delrng={0x10, 0x14, 0x801, 0x70bd2b, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x5)
listen(r1, 0x0)
r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-control\x00', 0x20000, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000014c0)={<r4=>0x0, 0x1000, "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"}, &(0x7f0000000540)=0x1008)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000580)={r4, 0x2}, &(0x7f00000005c0)=0x8)
getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:55 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x11, "edc5b0945a60d53460acba2af3a4"}, 0x10, 0x1)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:55 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x80010, r0, 0x0)

14:36:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffff73, 0x6, 0x0, 0x6, 0x1f, 0x14, "2920b313aedcd3afde0d0fd857c57ff098cd9c18f56aa9f9c2385487932e3dd189c1ff2ca2a36aef1b2f974107d8b1c3e653599ff8cd13c9a57543879ad21a2c", "3bfc78f99cdd1a273aabe7a58df1244c7a18d7e8295a72f2a27c6b8e081ba856b6ad30d890fe69c632c74b68b749a4c283478fbf109e422fe3da885a6fa8dac5", "7b507ff213308c61ff8d9ec21b1a8c7b51eb14f1c796e2fabbbfce28f39185ee", [0x5, 0x2]})

14:36:55 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  412.976132][T23553] FAULT_INJECTION: forcing a failure.
[  412.976132][T23553] name failslab, interval 1, probability 0, space 0, times 0
[  413.012262][T23553] CPU: 1 PID: 23553 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  413.020324][T23553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  413.030394][T23553] Call Trace:
[  413.033693][T23553]  dump_stack+0x172/0x1f0
[  413.038041][T23553]  should_fail.cold+0xa/0x15
[  413.042647][T23553]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  413.048472][T23553]  ? ___might_sleep+0x163/0x280
[  413.053343][T23553]  __should_failslab+0x121/0x190
[  413.058303][T23553]  should_failslab+0x9/0x14
[  413.062826][T23553]  kmem_cache_alloc_trace+0x2d1/0x760
[  413.068228][T23553]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  413.074065][T23553]  __memcg_init_list_lru_node+0x8a/0x1e0
[  413.079720][T23553]  __list_lru_init+0x3cf/0x6e0
[  413.084507][T23553]  alloc_super+0x762/0x890
[  413.088939][T23553]  ? test_single_super+0x10/0x10
[  413.093894][T23553]  sget_userns+0xf1/0x560
[  413.098231][T23553]  ? kill_litter_super+0x60/0x60
[  413.103181][T23553]  ? test_single_super+0x10/0x10
[  413.108129][T23553]  ? kill_litter_super+0x60/0x60
[  413.113080][T23553]  sget+0x10c/0x150
[  413.116907][T23553]  mount_bdev+0xff/0x3c0
[  413.121159][T23553]  ? vfat_mount+0x40/0x40
[  413.125508][T23553]  vfat_mount+0x35/0x40
[  413.129709][T23553]  ? setup+0x120/0x120
[  413.133791][T23553]  legacy_get_tree+0xf2/0x200
[  413.138482][T23553]  vfs_get_tree+0x123/0x450
[  413.143002][T23553]  do_mount+0x1436/0x2c40
[  413.147352][T23553]  ? copy_mount_string+0x40/0x40
[  413.152316][T23553]  ? _copy_from_user+0xdd/0x150
[  413.157185][T23553]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  413.163439][T23553]  ? copy_mount_options+0x280/0x3a0
[  413.168653][T23553]  ksys_mount+0xdb/0x150
14:36:55 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00')
sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012abd7000b8cfa2464d8b18dddbdf250e09005d5d6f3ec990e2ca08000100058110fb84642635c54fa4000c000900080ede0d05c74e7bd2a3e90dd88a7c1dc91a01ab85c520891228b3b42f114695a026f9867b2d4b17d51fe3ebe4a71b8148e82db1"], 0x3c}}, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0xf}, r2}, 0x14)
ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'sit0\x00', 0x8000})

[  413.172908][T23553]  __x64_sys_mount+0xbe/0x150
[  413.177596][T23553]  do_syscall_64+0x103/0x610
[  413.182199][T23553]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  413.188193][T23553] RIP: 0033:0x45b81a
[  413.192093][T23553] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  413.192103][T23553] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
14:36:55 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:36:55 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$kcm(0x29, 0x7, 0x0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0)
ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {<r2=>0x0}, {}, {}]})
ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000200)={r2, &(0x7f0000000180)=""/66})
r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0xb8000)
setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000040)=0x8, 0x4)
rt_sigsuspend(&(0x7f0000000080)={0x401}, 0x8)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200400, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080))
ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040))
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x501, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x104c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4880)

14:36:55 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0)
r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00')
sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xb5}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x10)
syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:55 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r0, 0x0)
r1 = open(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200000, 0x69)
ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000240))
setxattr(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080)=',posix_acl_accesssystem\x00', 0x18, 0x2)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

[  413.192118][T23553] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  413.192128][T23553] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  413.192136][T23553] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  413.192144][T23553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  413.192152][T23553] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:55 executing program 2 (fault-call:0 fault-nth:55):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:55 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:36:55 executing program 3:
clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
r2 = dup2(r1, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2)
clone(0x2502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0)
getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f00000000c0))
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'\x00\x00\xf6\x8c\x00\x00\x00\x00\x9bU\x00\x00\xc5\xcb\x00'})

14:36:55 executing program 4:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
keyctl$join(0x1, 0x0)
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0)
ioctl$UI_DEV_DESTROY(r0, 0x5502)

14:36:55 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)
socket$unix(0x1, 0x6, 0x0)
write$binfmt_script(r0, &(0x7f0000000000)={'#! ', '\xe9\x1fq\x89Y\x1e\x923aK', [{0x20, 'ppp0\\{'}, {}, {0x20, 'em0+'}, {0x20, '{vboxnet0'}], 0xa, "d643c2b1a7a2d68dbaa59dae9a7589ced2283099b3b6df0174834d2277020aa14d0990ae3f93cfac"}, 0x4d)

14:36:55 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000400)={r1, 0x1, 0x4000, 0xfffff000})
setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000540)=0x4, 0x6f)
r2 = syz_open_dev$radio(&(0x7f0000000440)='/dev/radio#\x00', 0x3, 0x2)
clock_gettime(0x0, &(0x7f0000000480)={<r3=>0x0, <r4=>0x0})
ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000004c0)={0x0, 0x9, 0x4, 0x0, {r3, r4/1000+10000}, {0x3, 0x1, 0x1, 0x8000, 0x52, 0x1, "f7dca464"}, 0x4, 0x0, @userptr=0x40, 0x4})
getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=<r5=>0x0)
stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = getgid()
getgroups(0x2, &(0x7f00000001c0)=[0xee01, <r8=>0x0])
fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
getgroups(0x9, &(0x7f0000000340)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, <r11=>0xee00, 0xffffffffffffffff, 0xee00])
fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r5, @ANYBLOB="040006000000000008000600", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="efff0000", @ANYRES32=r10, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="10000200000000002000060000000000"], 0x5c, 0x2)

14:36:55 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf)
ioctl$KDADDIO(r0, 0x400455c8, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080))

14:36:55 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffff, 0x40000)
ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000040)={0x4, 0x7aa, {0x57, 0x4a, 0x3, {0x8000, 0x6}, {0x18, 0x7fff}, @const={0x4, {0xb4b0, 0x7, 0x6, 0x68}}}, {0x55, 0x7, 0x100000001, {0x38, 0x1000}, {0x4, 0x8}, @ramp={0x7fff, 0x744e, {0x5, 0xffffffff, 0x8, 0x7}}}})
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  413.594165][T23592] FAULT_INJECTION: forcing a failure.
[  413.594165][T23592] name failslab, interval 1, probability 0, space 0, times 0
[  413.651089][T23592] CPU: 0 PID: 23592 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  413.659215][T23592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  413.669285][T23592] Call Trace:
[  413.672700][T23592]  dump_stack+0x172/0x1f0
[  413.677052][T23592]  should_fail.cold+0xa/0x15
[  413.681753][T23592]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  413.687584][T23592]  ? ___might_sleep+0x163/0x280
[  413.692453][T23592]  __should_failslab+0x121/0x190
[  413.697410][T23592]  should_failslab+0x9/0x14
[  413.702018][T23592]  kmem_cache_alloc_trace+0x2d1/0x760
[  413.707436][T23592]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  413.713270][T23592]  __memcg_init_list_lru_node+0x8a/0x1e0
[  413.718937][T23592]  __list_lru_init+0x3cf/0x6e0
[  413.723723][T23592]  alloc_super+0x762/0x890
[  413.728158][T23592]  ? test_single_super+0x10/0x10
[  413.733111][T23592]  sget_userns+0xf1/0x560
[  413.737464][T23592]  ? kill_litter_super+0x60/0x60
[  413.742423][T23592]  ? test_single_super+0x10/0x10
[  413.747385][T23592]  ? kill_litter_super+0x60/0x60
[  413.752425][T23592]  sget+0x10c/0x150
[  413.756246][T23592]  mount_bdev+0xff/0x3c0
[  413.760500][T23592]  ? vfat_mount+0x40/0x40
[  413.764849][T23592]  vfat_mount+0x35/0x40
[  413.769106][T23592]  ? setup+0x120/0x120
[  413.773185][T23592]  legacy_get_tree+0xf2/0x200
[  413.777877][T23592]  vfs_get_tree+0x123/0x450
[  413.782402][T23592]  do_mount+0x1436/0x2c40
[  413.786759][T23592]  ? copy_mount_string+0x40/0x40
[  413.791724][T23592]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  413.797988][T23592]  ? copy_mount_options+0x280/0x3a0
[  413.803207][T23592]  ksys_mount+0xdb/0x150
[  413.807463][T23592]  __x64_sys_mount+0xbe/0x150
[  413.812153][T23592]  do_syscall_64+0x103/0x610
[  413.816757][T23592]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  413.822649][T23592] RIP: 0033:0x45b81a
[  413.826550][T23592] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:36:56 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
mmap(&(0x7f0000c2b000/0x2000)=nil, 0x2000, 0x2000005, 0x4f42e503b690ff94, r0, 0x0)
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480)={<r1=>0x0}, &(0x7f0000000180)=0xc)
r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40200, 0x0)
ioctl$TCSETA(r2, 0x5406, &(0x7f00000003c0)={0x6, 0x100000001, 0x3, 0x9, 0x1b, 0x4ca8a5b, 0x42, 0x4, 0x10001, 0x10001})
ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0)
setxattr$security_evm(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@sha1={0x1, "da12c893fb6032247c17c75202a5a39349520f38"}, 0x15, 0x1)
ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00000002c0)=r1)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={<r3=>r0})
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80020010}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="030b0b5a39389f2cb57c56a3630734169eeb4d36b071dce204", @ANYRES16=r4, @ANYBLOB="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"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0)
bind$alg(r5, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58)
connect$nfc_llcp(r2, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x3, 0x6, 0x4, "80ce7a5fbbcbbaf4cb2e03d87821c64f6d84efce433bff054bba7c8ae6c39a60336191f801f535bd7ea6867b906351f15cc63e5dca050c3ce31ea76a637b65", 0x24}, 0x60)
ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xa)

14:36:56 executing program 1:
r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x10842)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=<r1=>0x0, @ANYBLOB="d600000001c0b17d75d0267c4f3a8c4243c850e5a93aa91b0636a4e42bdfdc57f50050fa34e712a7f7fc6c07e9ffda5295b7c4f2ded988fef105a6ca335aa3896de18426f0cc759da5c3312a65454571798a80f2ea04aa69f809440564d78c9a42bb4cd0176bf23600846c074fae6558be79a7b6701a7b923eb168d186d29683ecf4d452ee06e7ff4aa239b21b74fdfc418ecfa8cc83a3369c04d80b56b0376612d06b653fe5b28721db8b11f347b7d40a9ba9ffd544c260ac14417987e9fdd1eec3f3b5305eda0ff938f9989d686da104ccd181beec10bd2b94"], &(0x7f0000000140)=0xde)
setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000240)={r1, @in={{0x2, 0x4e23, @local}}}, 0x84)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000340)=@raw=[@generic={0x6, 0x20, 0x1, 0x80000001, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0x8, 0x7}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xb6, &(0x7f00000003c0)=""/182, 0x40f00, 0x1, [], 0x0, 0xf, r0, 0x8, &(0x7f0000000480)={0x1, 0x1ff}, 0x8, 0x10, 0x0}, 0x70)
r2 = socket$unix(0x1, 0x0, 0x0)
write$P9_RXATTRWALK(r0, &(0x7f0000000300)={0xf, 0x1f, 0x1, 0xa9}, 0xf)
bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(r2, 0x0)
getsockopt$sock_cred(r2, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:56 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00')
getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78)

14:36:56 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  413.846187][T23592] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  413.854613][T23592] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  413.862645][T23592] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  413.870645][T23592] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  413.870654][T23592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  413.870661][T23592] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:36:56 executing program 2 (fault-call:0 fault-nth:56):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:36:56 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5c00000000000000, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x7ff, 0x4, [0x9]})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:36:56 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
listen(0xffffffffffffffff, 0x0)
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
ioctl$sock_ifreq(r0, 0x8925, &(0x7f0000000000)={'veth0_to_team\x00', @ifru_flags=0xb000})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc)

14:36:56 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
socket$rxrpc(0x21, 0x2, 0xa)

14:36:56 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:36:56 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4)

[  414.094376][T23621] FAULT_INJECTION: forcing a failure.
[  414.094376][T23621] name failslab, interval 1, probability 0, space 0, times 0
[  414.152010][T23621] CPU: 1 PID: 23621 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  414.160049][T23621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  414.170128][T23621] Call Trace:
[  414.173456][T23621]  dump_stack+0x172/0x1f0
[  414.177810][T23621]  should_fail.cold+0xa/0x15
[  414.182432][T23621]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  414.188257][T23621]  ? ___might_sleep+0x163/0x280
[  414.193138][T23621]  __should_failslab+0x121/0x190
[  414.198094][T23621]  should_failslab+0x9/0x14
[  414.202610][T23621]  kmem_cache_alloc_trace+0x2d1/0x760
[  414.208004][T23621]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  414.213845][T23621]  __memcg_init_list_lru_node+0x8a/0x1e0
[  414.219502][T23621]  __list_lru_init+0x3cf/0x6e0
[  414.224285][T23621]  alloc_super+0x762/0x890
[  414.228718][T23621]  ? test_single_super+0x10/0x10
[  414.233668][T23621]  sget_userns+0xf1/0x560
[  414.238009][T23621]  ? kill_litter_super+0x60/0x60
[  414.242960][T23621]  ? test_single_super+0x10/0x10
[  414.247912][T23621]  ? kill_litter_super+0x60/0x60
[  414.252871][T23621]  sget+0x10c/0x150
[  414.256700][T23621]  mount_bdev+0xff/0x3c0
[  414.260953][T23621]  ? vfat_mount+0x40/0x40
[  414.265316][T23621]  vfat_mount+0x35/0x40
[  414.269486][T23621]  ? setup+0x120/0x120
[  414.273574][T23621]  legacy_get_tree+0xf2/0x200
[  414.278354][T23621]  vfs_get_tree+0x123/0x450
[  414.282878][T23621]  do_mount+0x1436/0x2c40
[  414.287226][T23621]  ? copy_mount_string+0x40/0x40
[  414.287245][T23621]  ? _copy_from_user+0xdd/0x150
[  414.287267][T23621]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  414.287282][T23621]  ? copy_mount_options+0x280/0x3a0
[  414.287311][T23621]  ksys_mount+0xdb/0x150
[  414.287331][T23621]  __x64_sys_mount+0xbe/0x150
[  414.317444][T23621]  do_syscall_64+0x103/0x610
[  414.322054][T23621]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  414.322069][T23621] RIP: 0033:0x45b81a
[  414.322084][T23621] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  414.322093][T23621] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  414.322107][T23621] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  414.322115][T23621] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  414.322124][T23621] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  414.322133][T23621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  414.322141][T23621] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
[  416.033088][ T2996] Bluetooth: hci0: command 0x1003 tx timeout
[  416.040146][ T1174] Bluetooth: hci0: sending frame failed (-49)
[  416.752685][ T2996] Bluetooth: hci1: command 0x1003 tx timeout
[  416.758831][ T1174] Bluetooth: hci1: sending frame failed (-49)
[  418.112065][ T2996] Bluetooth: hci0: command 0x1001 tx timeout
[  418.118193][ T1174] Bluetooth: hci0: sending frame failed (-49)
[  418.831963][ T2996] Bluetooth: hci1: command 0x1001 tx timeout
[  418.838099][ T1174] Bluetooth: hci1: sending frame failed (-49)
[  420.192051][ T2996] Bluetooth: hci0: command 0x1009 tx timeout
[  420.911905][ T2996] Bluetooth: hci1: command 0x1009 tx timeout
14:37:07 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf)
ioctl$KDADDIO(r0, 0x400455c8, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080))

14:37:07 executing program 1:
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
r0 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56)
pipe2(&(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x80800)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={<r2=>0xffffffffffffffff}, 0x2, 0x7}}, 0x20)
write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x2}}}, 0x90)
listen(r0, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000240)=0xc)

14:37:07 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:07 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:07 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$KIOCSOUND(r1, 0x4b2f, 0x2000000000000025)
socket$can_raw(0x1d, 0x3, 0x1)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:07 executing program 2 (fault-call:0 fault-nth:57):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  424.993095][T23741] FAULT_INJECTION: forcing a failure.
[  424.993095][T23741] name failslab, interval 1, probability 0, space 0, times 0
[  425.058027][T23741] CPU: 1 PID: 23741 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  425.066065][T23741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  425.076145][T23741] Call Trace:
[  425.079467][T23741]  dump_stack+0x172/0x1f0
[  425.083884][T23741]  should_fail.cold+0xa/0x15
[  425.083910][T23741]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  425.083935][T23741]  ? ___might_sleep+0x163/0x280
[  425.094384][T23741]  __should_failslab+0x121/0x190
[  425.094402][T23741]  should_failslab+0x9/0x14
[  425.094419][T23741]  kmem_cache_alloc_trace+0x2d1/0x760
[  425.094437][T23741]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  425.094459][T23741]  __memcg_init_list_lru_node+0x8a/0x1e0
[  425.094480][T23741]  __list_lru_init+0x3cf/0x6e0
[  425.125788][T23741]  alloc_super+0x762/0x890
[  425.125805][T23741]  ? test_single_super+0x10/0x10
[  425.125832][T23741]  sget_userns+0xf1/0x560
[  425.125850][T23741]  ? kill_litter_super+0x60/0x60
[  425.125865][T23741]  ? test_single_super+0x10/0x10
[  425.125877][T23741]  ? kill_litter_super+0x60/0x60
[  425.125892][T23741]  sget+0x10c/0x150
[  425.135496][T23741]  mount_bdev+0xff/0x3c0
[  425.135513][T23741]  ? vfat_mount+0x40/0x40
[  425.155166][T23741]  vfat_mount+0x35/0x40
[  425.155183][T23741]  ? setup+0x120/0x120
[  425.155202][T23741]  legacy_get_tree+0xf2/0x200
[  425.163955][T23741]  vfs_get_tree+0x123/0x450
[  425.163979][T23741]  do_mount+0x1436/0x2c40
[  425.185388][T23741]  ? copy_mount_string+0x40/0x40
[  425.185406][T23741]  ? _copy_from_user+0xdd/0x150
14:37:07 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'team_slave_1\x00', 0xc8})

14:37:07 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x1)
bind$isdn(r0, &(0x7f0000000040)={0x22, 0x8, 0x5, 0x1, 0x401}, 0x6)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
fcntl$setstatus(r0, 0x4, 0x0)
r2 = syz_open_dev$vbi(0x0, 0x2, 0x2)
openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000080)=0x8, 0x4)

[  425.185427][T23741]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  425.185439][T23741]  ? copy_mount_options+0x280/0x3a0
[  425.185465][T23741]  ksys_mount+0xdb/0x150
[  425.185483][T23741]  __x64_sys_mount+0xbe/0x150
[  425.199495][T23741]  do_syscall_64+0x103/0x610
[  425.199519][T23741]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  425.215769][T23741] RIP: 0033:0x45b81a
14:37:07 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  425.215786][T23741] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  425.215794][T23741] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  425.224713][T23741] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  425.224722][T23741] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  425.224730][T23741] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
14:37:07 executing program 1:
syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3008010, &(0x7f0000001540)={[{@flush_merge='flush_merge'}, {@noquota='noquota'}, {@heap='heap'}, {@fsync_mode_strict='fsync_mode=strict'}], [{@fowner_gt={'fowner>'}}]})

[  425.224739][T23741] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  425.224747][T23741] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:07 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0x0, 0x2)
mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0xb0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x8001)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, <r2=>0x0}, &(0x7f0000000180)=0xc)
stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x202000, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xe13}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode'}}], [{@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@audit='audit'}, {@euid_gt={'euid>', r2}}, {@measure='measure'}, {@fsname={'fsname', 0x3d, '\\ppp0['}}, {@fowner_lt={'fowner<', r3}}, {@subj_role={'subj_role', 0x3d, 'lo'}}, {@context={'context', 0x3d, 'root'}}]})

14:37:07 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  425.422790][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  425.485467][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock
[  425.503101][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  425.538070][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock
[  425.603140][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  425.629535][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock
[  425.644271][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  425.655079][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock
[  427.402030][ T7858] Bluetooth: hci0: command 0x1003 tx timeout
[  427.408606][T10396] Bluetooth: hci0: sending frame failed (-49)
[  429.471950][ T3257] Bluetooth: hci0: command 0x1001 tx timeout
[  429.478076][T10396] Bluetooth: hci0: sending frame failed (-49)
[  431.551884][ T3257] Bluetooth: hci0: command 0x1009 tx timeout
14:37:18 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
listen(r0, 0x3a7)
r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x36959cf800000000, @loopback, 0xe000000}], 0x1c)

14:37:18 executing program 4:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x1)
getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={<r2=>0x0}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0x3, @mcast2, 0xb0}}, 0x8, 0xfe8}, 0x90)

14:37:18 executing program 2 (fault-call:0 fault-nth:58):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:18 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:18 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:18 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00')
preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000080)=""/80, 0x50}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000240)=""/185, 0xb9}], 0x5, 0x0)

[  435.886924][T23781] FAULT_INJECTION: forcing a failure.
[  435.886924][T23781] name failslab, interval 1, probability 0, space 0, times 0
[  435.940418][T23781] CPU: 0 PID: 23781 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  435.948446][T23781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  435.958518][T23781] Call Trace:
[  435.961830][T23781]  dump_stack+0x172/0x1f0
[  435.966182][T23781]  should_fail.cold+0xa/0x15
[  435.970791][T23781]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  435.976620][T23781]  ? ___might_sleep+0x163/0x280
[  435.976643][T23781]  __should_failslab+0x121/0x190
[  435.976660][T23781]  should_failslab+0x9/0x14
[  435.976682][T23781]  kmem_cache_alloc_trace+0x2d1/0x760
[  435.986482][T23781]  __memcg_init_list_lru_node+0x8a/0x1e0
[  435.986508][T23781]  __list_lru_init+0x3cf/0x6e0
[  436.006760][T23781]  alloc_super+0x762/0x890
[  436.011188][T23781]  ? test_single_super+0x10/0x10
[  436.016138][T23781]  sget_userns+0xf1/0x560
[  436.020472][T23781]  ? kill_litter_super+0x60/0x60
[  436.025422][T23781]  ? test_single_super+0x10/0x10
[  436.030393][T23781]  ? kill_litter_super+0x60/0x60
[  436.035349][T23781]  sget+0x10c/0x150
[  436.039175][T23781]  mount_bdev+0xff/0x3c0
[  436.043425][T23781]  ? vfat_mount+0x40/0x40
[  436.047765][T23781]  vfat_mount+0x35/0x40
[  436.051928][T23781]  ? setup+0x120/0x120
[  436.056167][T23781]  legacy_get_tree+0xf2/0x200
[  436.060852][T23781]  vfs_get_tree+0x123/0x450
[  436.065372][T23781]  do_mount+0x1436/0x2c40
[  436.069715][T23781]  ? copy_mount_string+0x40/0x40
[  436.074666][T23781]  ? _copy_from_user+0xdd/0x150
[  436.079526][T23781]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  436.085771][T23781]  ? copy_mount_options+0x280/0x3a0
[  436.090977][T23781]  ksys_mount+0xdb/0x150
[  436.095227][T23781]  __x64_sys_mount+0xbe/0x150
[  436.099913][T23781]  do_syscall_64+0x103/0x610
[  436.104515][T23781]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  436.110410][T23781] RIP: 0033:0x45b81a
[  436.114315][T23781] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:18 executing program 1:
r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x0, 0x0)
ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000180)=0x32)

14:37:18 executing program 4:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

[  436.133929][T23781] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  436.142345][T23781] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  436.150330][T23781] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  436.158316][T23781] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  436.166330][T23781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  436.174316][T23781] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:18 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
r2 = geteuid()
fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x207389c05f619ed0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]})
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0)
prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:18 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:18 executing program 2 (fault-call:0 fault-nth:59):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:18 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28)

14:37:18 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070")
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="eb7fc86d4f66732ee6617400020441", 0xf}], 0x0, 0x0)

14:37:18 executing program 0:
r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x0)
ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ff8000/0x4000)=nil, 0x1, 0x3, 0x10, &(0x7f0000ffb000/0x2000)=nil, 0x2})
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4)

[  436.465462][T23806] FAULT_INJECTION: forcing a failure.
[  436.465462][T23806] name failslab, interval 1, probability 0, space 0, times 0
[  436.531201][T23806] CPU: 0 PID: 23806 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  436.539227][T23806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  436.549286][T23806] Call Trace:
[  436.552602][T23806]  dump_stack+0x172/0x1f0
[  436.556953][T23806]  should_fail.cold+0xa/0x15
[  436.561556][T23806]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  436.567380][T23806]  ? ___might_sleep+0x163/0x280
[  436.572246][T23806]  __should_failslab+0x121/0x190
[  436.577192][T23806]  should_failslab+0x9/0x14
[  436.581700][T23806]  kmem_cache_alloc_trace+0x2d1/0x760
[  436.587082][T23806]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  436.592904][T23806]  __memcg_init_list_lru_node+0x8a/0x1e0
[  436.598549][T23806]  __list_lru_init+0x3cf/0x6e0
[  436.603332][T23806]  alloc_super+0x762/0x890
[  436.607761][T23806]  ? test_single_super+0x10/0x10
[  436.612705][T23806]  sget_userns+0xf1/0x560
[  436.617036][T23806]  ? kill_litter_super+0x60/0x60
[  436.621980][T23806]  ? test_single_super+0x10/0x10
[  436.626920][T23806]  ? kill_litter_super+0x60/0x60
[  436.631858][T23806]  sget+0x10c/0x150
[  436.635677][T23806]  mount_bdev+0xff/0x3c0
[  436.639921][T23806]  ? vfat_mount+0x40/0x40
[  436.644260][T23806]  vfat_mount+0x35/0x40
[  436.648422][T23806]  ? setup+0x120/0x120
[  436.652493][T23806]  legacy_get_tree+0xf2/0x200
[  436.657181][T23806]  vfs_get_tree+0x123/0x450
[  436.661689][T23806]  do_mount+0x1436/0x2c40
[  436.666032][T23806]  ? copy_mount_string+0x40/0x40
[  436.670976][T23806]  ? _copy_from_user+0xdd/0x150
[  436.675840][T23806]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  436.682084][T23806]  ? copy_mount_options+0x280/0x3a0
[  436.687289][T23806]  ksys_mount+0xdb/0x150
[  436.691547][T23806]  __x64_sys_mount+0xbe/0x150
[  436.696234][T23806]  do_syscall_64+0x103/0x610
[  436.700833][T23806]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  436.706729][T23806] RIP: 0033:0x45b81a
[  436.710627][T23806] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:19 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[0x1508, 0xddf]})
r2 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000001c0)=""/160, &(0x7f0000000280)=0xa0)
ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000000c0)={0x401, 0x4, 0x3, {0xd, @sdr={0x0, 0x8}}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000002c0)={@multicast2, @broadcast}, 0x8)

14:37:19 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  436.730237][T23806] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  436.738653][T23806] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  436.746625][T23806] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  436.754598][T23806] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  436.762573][T23806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  436.770544][T23806] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:19 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28)

14:37:19 executing program 4:
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clone(0x20002102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000600)="410f01f964ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc8fa97812ca6f")
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x2}, 0x20)
getsockopt$bt_hci(r1, 0x0, 0x0, 0x0, &(0x7f0000000140))

[  436.822175][T23810] FAT-fs (loop3): bogus number of FAT structure
[  436.829572][T23810] FAT-fs (loop3): Can't find a valid FAT filesystem
14:37:19 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1e)
fchmod(r0, 0x1)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xb)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  436.916479][T23827] FAT-fs (loop3): bogus number of FAT structure
14:37:19 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  436.959080][T23827] FAT-fs (loop3): Can't find a valid FAT filesystem
14:37:19 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28)

14:37:19 executing program 2 (fault-call:0 fault-nth:60):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:19 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070")
syz_execute_func(&(0x7f0000000280)="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")

14:37:19 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0)
bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x1, 0x1, 0x4, 0x0, 0x0, "521d5de14507cb944b470bacab31fcf33d8455f0f53475b4aa77e06fb52b954701f56c476001c3e2f3f584060f4fc5bd6f9fe3a7dbe09d78cd4b183d159351", 0x13}, 0x60)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4)

14:37:19 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070")
r1 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c)
listen(r1, 0x80000000000000bd)
r2 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r3 = accept4(r1, 0x0, 0x0, 0x0)
recvfrom$ax25(r3, 0x0, 0x0, 0x0, 0x0, 0x0)

14:37:19 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28)

[  437.196176][T23848] FAULT_INJECTION: forcing a failure.
[  437.196176][T23848] name failslab, interval 1, probability 0, space 0, times 0
[  437.283729][T23848] CPU: 1 PID: 23848 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  437.291773][T23848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  437.301840][T23848] Call Trace:
[  437.305159][T23848]  dump_stack+0x172/0x1f0
[  437.309511][T23848]  should_fail.cold+0xa/0x15
[  437.314113][T23848]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  437.319938][T23848]  ? ___might_sleep+0x163/0x280
[  437.324806][T23848]  __should_failslab+0x121/0x190
[  437.329747][T23848]  should_failslab+0x9/0x14
[  437.329766][T23848]  kmem_cache_alloc_trace+0x2d1/0x760
[  437.329786][T23848]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  437.329812][T23848]  __memcg_init_list_lru_node+0x8a/0x1e0
[  437.329837][T23848]  __list_lru_init+0x3cf/0x6e0
[  437.351138][T23848]  alloc_super+0x762/0x890
[  437.351156][T23848]  ? test_single_super+0x10/0x10
[  437.351174][T23848]  sget_userns+0xf1/0x560
[  437.351189][T23848]  ? kill_litter_super+0x60/0x60
[  437.351213][T23848]  ? test_single_super+0x10/0x10
[  437.379483][T23848]  ? kill_litter_super+0x60/0x60
[  437.384432][T23848]  sget+0x10c/0x150
[  437.388254][T23848]  mount_bdev+0xff/0x3c0
[  437.392507][T23848]  ? vfat_mount+0x40/0x40
[  437.396848][T23848]  vfat_mount+0x35/0x40
[  437.401016][T23848]  ? setup+0x120/0x120
[  437.405094][T23848]  legacy_get_tree+0xf2/0x200
[  437.409778][T23848]  vfs_get_tree+0x123/0x450
[  437.414288][T23848]  do_mount+0x1436/0x2c40
[  437.418642][T23848]  ? copy_mount_string+0x40/0x40
[  437.423596][T23848]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:37:19 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  437.429849][T23848]  ? copy_mount_options+0x280/0x3a0
[  437.435075][T23848]  ksys_mount+0xdb/0x150
[  437.439339][T23848]  __x64_sys_mount+0xbe/0x150
[  437.444027][T23848]  do_syscall_64+0x103/0x610
[  437.448627][T23848]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  437.454522][T23848] RIP: 0033:0x45b81a
[  437.458420][T23848] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:19 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  437.478038][T23848] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  437.486465][T23848] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  437.494442][T23848] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  437.502509][T23848] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  437.510492][T23848] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  437.518469][T23848] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:19 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
fanotify_mark(r1, 0x80, 0x1, r1, &(0x7f0000000040)='\x00')
openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x82000, 0x0)

14:37:19 executing program 3:

14:37:19 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:20 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:20 executing program 2 (fault-call:0 fault-nth:61):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:20 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:20 executing program 3:

14:37:20 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  437.844666][T23888] FAULT_INJECTION: forcing a failure.
[  437.844666][T23888] name failslab, interval 1, probability 0, space 0, times 0
[  437.894360][T23888] CPU: 0 PID: 23888 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  437.902389][T23888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  437.912458][T23888] Call Trace:
[  437.915770][T23888]  dump_stack+0x172/0x1f0
[  437.920121][T23888]  should_fail.cold+0xa/0x15
[  437.920151][T23888]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  437.930542][T23888]  ? ___might_sleep+0x163/0x280
[  437.930569][T23888]  __should_failslab+0x121/0x190
[  437.940362][T23888]  should_failslab+0x9/0x14
[  437.940388][T23888]  kmem_cache_alloc_trace+0x2d1/0x760
[  437.950246][T23888]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  437.950278][T23888]  __memcg_init_list_lru_node+0x8a/0x1e0
[  437.961712][T23888]  __list_lru_init+0x3cf/0x6e0
[  437.966494][T23888]  alloc_super+0x762/0x890
[  437.970921][T23888]  ? test_single_super+0x10/0x10
[  437.975864][T23888]  sget_userns+0xf1/0x560
[  437.980196][T23888]  ? kill_litter_super+0x60/0x60
[  437.985137][T23888]  ? test_single_super+0x10/0x10
[  437.990077][T23888]  ? kill_litter_super+0x60/0x60
[  437.995018][T23888]  sget+0x10c/0x150
[  437.998836][T23888]  mount_bdev+0xff/0x3c0
[  438.003080][T23888]  ? vfat_mount+0x40/0x40
[  438.007419][T23888]  vfat_mount+0x35/0x40
[  438.011578][T23888]  ? setup+0x120/0x120
[  438.015650][T23888]  legacy_get_tree+0xf2/0x200
[  438.020345][T23888]  vfs_get_tree+0x123/0x450
[  438.024868][T23888]  do_mount+0x1436/0x2c40
[  438.029208][T23888]  ? copy_mount_string+0x40/0x40
[  438.034161][T23888]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  438.040404][T23888]  ? copy_mount_options+0x280/0x3a0
[  438.045611][T23888]  ksys_mount+0xdb/0x150
[  438.049860][T23888]  __x64_sys_mount+0xbe/0x150
[  438.054550][T23888]  do_syscall_64+0x103/0x610
[  438.059153][T23888]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  438.065046][T23888] RIP: 0033:0x45b81a
[  438.068944][T23888] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  438.088556][T23888] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  438.096996][T23888] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  438.104973][T23888] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  438.112945][T23888] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  438.120916][T23888] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  438.128892][T23888] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:20 executing program 4:

14:37:20 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:20 executing program 3:

14:37:20 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:20 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:20 executing program 2 (fault-call:0 fault-nth:62):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:20 executing program 3:

14:37:20 executing program 0:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
r1 = syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={<r2=>0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14)

14:37:20 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:20 executing program 4:

14:37:20 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  438.363956][T23905] FAULT_INJECTION: forcing a failure.
[  438.363956][T23905] name failslab, interval 1, probability 0, space 0, times 0
[  438.424371][T23905] CPU: 1 PID: 23905 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  438.432395][T23905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  438.442635][T23905] Call Trace:
[  438.442664][T23905]  dump_stack+0x172/0x1f0
[  438.442690][T23905]  should_fail.cold+0xa/0x15
[  438.442715][T23905]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  438.442742][T23905]  ? ___might_sleep+0x163/0x280
[  438.442764][T23905]  __should_failslab+0x121/0x190
[  438.442783][T23905]  should_failslab+0x9/0x14
[  438.442809][T23905]  kmem_cache_alloc_trace+0x2d1/0x760
[  438.442830][T23905]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  438.486536][T23905]  __memcg_init_list_lru_node+0x8a/0x1e0
[  438.492189][T23905]  __list_lru_init+0x3cf/0x6e0
[  438.497055][T23905]  alloc_super+0x762/0x890
[  438.501485][T23905]  ? test_single_super+0x10/0x10
[  438.506442][T23905]  sget_userns+0xf1/0x560
[  438.510781][T23905]  ? kill_litter_super+0x60/0x60
[  438.515729][T23905]  ? test_single_super+0x10/0x10
14:37:20 executing program 3:

14:37:20 executing program 4:

14:37:20 executing program 3:

[  438.520665][T23905]  ? kill_litter_super+0x60/0x60
[  438.520681][T23905]  sget+0x10c/0x150
[  438.520701][T23905]  mount_bdev+0xff/0x3c0
[  438.520716][T23905]  ? vfat_mount+0x40/0x40
[  438.520736][T23905]  vfat_mount+0x35/0x40
[  438.542156][T23905]  ? setup+0x120/0x120
[  438.546240][T23905]  legacy_get_tree+0xf2/0x200
[  438.550928][T23905]  vfs_get_tree+0x123/0x450
[  438.555448][T23905]  do_mount+0x1436/0x2c40
[  438.559798][T23905]  ? copy_mount_string+0x40/0x40
[  438.564755][T23905]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:37:20 executing program 4:

[  438.571002][T23905]  ? copy_mount_options+0x280/0x3a0
[  438.576211][T23905]  ksys_mount+0xdb/0x150
[  438.580461][T23905]  __x64_sys_mount+0xbe/0x150
[  438.585144][T23905]  do_syscall_64+0x103/0x610
[  438.585166][T23905]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  438.585179][T23905] RIP: 0033:0x45b81a
[  438.585196][T23905] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:21 executing program 3:

[  438.585205][T23905] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  438.585219][T23905] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  438.585228][T23905] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  438.585237][T23905] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  438.585247][T23905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  438.585256][T23905] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:21 executing program 4:

[  438.672602][T23919] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
14:37:21 executing program 2 (fault-call:0 fault-nth:63):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:21 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:21 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
setuid(r1)

14:37:21 executing program 3:

14:37:21 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:21 executing program 4:

14:37:21 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:21 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:21 executing program 3:

14:37:21 executing program 4:

14:37:21 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x8000, 0x100000001, 0x200, <r2=>0x0}, &(0x7f0000000040)=0x10)
setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r2, 0x8000}, 0x8)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  438.976863][T23935] FAULT_INJECTION: forcing a failure.
[  438.976863][T23935] name failslab, interval 1, probability 0, space 0, times 0
[  439.041932][T23935] CPU: 1 PID: 23935 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  439.050009][T23935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  439.060078][T23935] Call Trace:
[  439.063387][T23935]  dump_stack+0x172/0x1f0
[  439.067772][T23935]  should_fail.cold+0xa/0x15
[  439.072388][T23935]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  439.078215][T23935]  ? ___might_sleep+0x163/0x280
[  439.083082][T23935]  __should_failslab+0x121/0x190
14:37:21 executing program 3:

[  439.088026][T23935]  should_failslab+0x9/0x14
[  439.092538][T23935]  kmem_cache_alloc_trace+0x2d1/0x760
[  439.097920][T23935]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  439.103757][T23935]  __memcg_init_list_lru_node+0x8a/0x1e0
[  439.109404][T23935]  __list_lru_init+0x3cf/0x6e0
[  439.114180][T23935]  alloc_super+0x762/0x890
[  439.118608][T23935]  ? test_single_super+0x10/0x10
[  439.123553][T23935]  sget_userns+0xf1/0x560
[  439.127889][T23935]  ? kill_litter_super+0x60/0x60
[  439.132832][T23935]  ? test_single_super+0x10/0x10
[  439.137776][T23935]  ? kill_litter_super+0x60/0x60
[  439.142719][T23935]  sget+0x10c/0x150
[  439.146534][T23935]  mount_bdev+0xff/0x3c0
[  439.150782][T23935]  ? vfat_mount+0x40/0x40
[  439.155124][T23935]  vfat_mount+0x35/0x40
[  439.159292][T23935]  ? setup+0x120/0x120
[  439.163376][T23935]  legacy_get_tree+0xf2/0x200
[  439.168070][T23935]  vfs_get_tree+0x123/0x450
[  439.172590][T23935]  do_mount+0x1436/0x2c40
[  439.176941][T23935]  ? copy_mount_string+0x40/0x40
[  439.181897][T23935]  ? copy_mount_options+0x1ea/0x3a0
[  439.187106][T23935]  ? __sanitizer_cov_trace_pc+0x48/0x50
[  439.192662][T23935]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  439.198908][T23935]  ? copy_mount_options+0x280/0x3a0
[  439.198929][T23935]  ksys_mount+0xdb/0x150
[  439.198948][T23935]  __x64_sys_mount+0xbe/0x150
[  439.198969][T23935]  do_syscall_64+0x103/0x610
[  439.198993][T23935]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  439.220141][T23935] RIP: 0033:0x45b81a
[  439.220156][T23935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  439.220164][T23935] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  439.220178][T23935] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  439.220188][T23935] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  439.220197][T23935] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
14:37:21 executing program 2 (fault-call:0 fault-nth:64):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:21 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:21 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:21 executing program 0:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$vbi(0x0, 0x3, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:21 executing program 4:

14:37:21 executing program 3:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)

[  439.220207][T23935] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  439.220216][T23935] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:21 executing program 4:

14:37:21 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
clock_nanosleep(0x7, 0x0, &(0x7f0000000040), 0x0)
connect$rose(r1, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:21 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600))

14:37:21 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  439.451559][T23962] FAULT_INJECTION: forcing a failure.
[  439.451559][T23962] name failslab, interval 1, probability 0, space 0, times 0
[  439.506519][T23962] CPU: 0 PID: 23962 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  439.514545][T23962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  439.524613][T23962] Call Trace:
[  439.527925][T23962]  dump_stack+0x172/0x1f0
[  439.532276][T23962]  should_fail.cold+0xa/0x15
[  439.536899][T23962]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  439.542722][T23962]  ? ___might_sleep+0x163/0x280
[  439.547593][T23962]  __should_failslab+0x121/0x190
[  439.552538][T23962]  should_failslab+0x9/0x14
[  439.557055][T23962]  kmem_cache_alloc_trace+0x2d1/0x760
[  439.562442][T23962]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  439.568272][T23962]  __memcg_init_list_lru_node+0x8a/0x1e0
[  439.573938][T23962]  __list_lru_init+0x3cf/0x6e0
[  439.578719][T23962]  alloc_super+0x762/0x890
[  439.583149][T23962]  ? test_single_super+0x10/0x10
[  439.588100][T23962]  sget_userns+0xf1/0x560
[  439.592435][T23962]  ? kill_litter_super+0x60/0x60
[  439.597407][T23962]  ? test_single_super+0x10/0x10
[  439.602362][T23962]  ? kill_litter_super+0x60/0x60
[  439.607305][T23962]  sget+0x10c/0x150
[  439.611142][T23962]  mount_bdev+0xff/0x3c0
[  439.615398][T23962]  ? vfat_mount+0x40/0x40
[  439.619743][T23962]  vfat_mount+0x35/0x40
[  439.623905][T23962]  ? setup+0x120/0x120
[  439.627982][T23962]  legacy_get_tree+0xf2/0x200
[  439.632667][T23962]  vfs_get_tree+0x123/0x450
[  439.637182][T23962]  do_mount+0x1436/0x2c40
[  439.641534][T23962]  ? copy_mount_string+0x40/0x40
[  439.646482][T23962]  ? _copy_from_user+0xdd/0x150
[  439.651353][T23962]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  439.657605][T23962]  ? copy_mount_options+0x280/0x3a0
[  439.662813][T23962]  ksys_mount+0xdb/0x150
[  439.667067][T23962]  __x64_sys_mount+0xbe/0x150
[  439.671752][T23962]  do_syscall_64+0x103/0x610
[  439.676370][T23962]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  439.682267][T23962] RIP: 0033:0x45b81a
[  439.686166][T23962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:22 executing program 4:

14:37:22 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
r2 = socket$inet6(0xa, 0x80001, 0x0)
setsockopt$inet6_group_source_req(r2, 0x29, 0xb, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100))
ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000240))
syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0x7, 0x400000)
getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={<r3=>0x0, 0xc7}, &(0x7f0000000180)=0x8)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={<r4=>r3, 0x1, 0x10001}, &(0x7f0000000200)=0x8)
write$eventfd(r1, &(0x7f0000000300), 0x8)
getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380)={<r5=>0xffffffffffffffff}, 0x2}}, 0x20)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r5, r1}}, 0x18)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x10000, 0x3, 0x0, 0xe31, 0x7f, 0x51, 0x7, 0x2, r4}, &(0x7f00000002c0)=0x20)
setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x300000000000000, 0x4)

[  439.705980][T23962] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  439.714409][T23962] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  439.722477][T23962] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  439.730455][T23962] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  439.738446][T23962] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  439.746428][T23962] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:22 executing program 2 (fault-call:0 fault-nth:65):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:22 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600))

14:37:22 executing program 3:

14:37:22 executing program 4:

14:37:22 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:22 executing program 0:
syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x5, 0x80)
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
sendmsg(r1, &(0x7f0000002780)={&(0x7f0000000040)=@x25={0x9, @null='               \x00'}, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)="afb5d5bf022b30a915ee51d99f55988868b16d32cfb88a5cfacafacc11decde38367542907d015cfd194354dde7755c3b4642d04a87dc3e35c2f756c2d5c488b71c964059a8cf9dc9b30c96f4c429c30cf96a707c705bf99e999ec7ddded0d45ea3fdf962bb22ff2bd356f9d992abacb310f0f50a9b03bae7d1e1324789b01970b2bf71a21efdf960fb6c0e49269cb44f2779a384a0315b274a3bbee1b442958b9ee3cbb76e535831b87c2874d483f98276545cb28d40f06dc0406610074632a56ca2c5f8bdfd812fb4c2f700d458094aa2683696059ef57c4fb", 0xda}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="36816c6919a7dcd92f97cd9bd89cfa6be3aef92978ace42c35defcfef7ca398861a07576db44fbcf332094153d62305730c09eec50f8200c791654eb339e8cad121f0faeed85831ca65ee5ca374856a5c4eb2fbe982c6249131777b5ec1dee9e75285622", 0x64}], 0x3, &(0x7f0000001280)=[{0xf0, 0x117, 0x4, "aa2f6b39863f464c6028661b3f98391589ce1ee7784dc5a1c10446f168f760b3dba99da4c1a6d310da9f0c85ff0ce294aad56f9f47f89de56f5fd984f004301bbd2f1e550b3c61cc21cd5b61fad04c80e5be722e7cb4925f28360491d78c1e33d72eb364d11967ac325ade68b77c451c4416a5930e9c79ef8b5d66d6b8dcf3db5c7e931e85ddb9b0058ca06a33b35295f29014d575be2575306cf23e2b6f0b9d7db652b3f4d7071b5c58209973740282170dedd2dcb6609260008b654a63c9d6668076db9dba1deadd5bb6996fb967a40f8cfb16bbce87ce37"}, {0x88, 0x116, 0x7, "8bc85fb4499c45e0776576e53e5949706c947f95478d49780646571f32835819adf1087cf914ec23b66e39272b9044ce4ca05197099dd11a5cb6c44db877e6700d170ac9349b05647f1c3f99fbf174786cd13f148e9e5cf53874b29a30c5c2e2d70dda81ee954ad092657916f851cc9beb1f11a3"}, {0x28, 0x117, 0x7, "8e89faddcdcef738297e62b41208930003491399"}, {0xf8, 0x29, 0x0, "5e8c3265065be40123db6a8574352373a02005b9b210a155607c7d00945dee59c2d6cf2df8042bc85f3f64f608b08de085d15ade152af124ab61958d901c04890082a030c58f3b2a2c6d6a67321a6125acf8019fb12c1417c13e360fab87d221be53d2ca631158376edb5920bd7b618f133b1c68a28e4c16371e7c71d159943882c11c51c1b573448c40433fcfb8bfa7fa345da9c03c9c8d292a85e6c66ae7ca7d95c66cadcaad5e8904b9e863d76dc825d3f69134b0271a663cadd6c104852ab00da4ce1a532c06534812261328c286e72dd4c306f1073174231043d3c8f0a38037d5715f58ef9f"}, {0xf0, 0x19a, 0x2f, "4f9c9fd214e8a021df168fbca638c2aa1d2473e10250df2fc48f09becd2b795ea4405360fd5f5a8aa550e1a2bf7610f614dcc322bbde77d1e1ddd41835054be28a6354fe63d03b8227e4640e39352bf77cd6247f8ac94d09d639499fa515aecd3f7fc7889343234425f5bea34016867d6bdd19a361a869c2fe1cc4b1d2294789888688a460198490c918df4566ef103faaaaa96f57b7f0e6d4dbab467093f9082247d34517a68da2998f2528700ffb63de277ae9dfc4f5a02e0ef75778ab823b3499e471dc5dfec886818f3db19c55457e4c6dfbdda123bc005ece"}, {0x58, 0x11d, 0x1, "45ac1b9f951edd3fff05f4542a914a6bff593572cdd8260968f6c1baf29b7e9e6b1df8a1e91c3f5610eaa1035131283a1cd08b07287778d739bc80691976027a5f8952eb95"}, {0x1010, 0x117, 0x5, "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"}, {0x10, 0x107, 0xfffffffffffffffa}, {0xc8, 0x11f, 0x100000000, "8b02965401e09498e8fb8289551ade6a5332ccbd1b042529d608d105cb5811dffc7b4684ebdfefae31fc58e3576afb1a7c2a3b80c4954b3881cf2647053088d682a261019a7f4a508de7aed8fbd75a24b470030d571fc6f11fd0cc402dde2f92d82fc927e0cf68e1ad157058cef22f691ba9851f178810a8a8b9ba532a27d4d4f7e3f4e0a440f789563543ee1fd2bcb29c5dd742169a30db876c9d273600ceb8b7275bb87499f3ce6512b5ef6be395fe3241b3f0"}], 0x14c8}, 0x890)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:22 executing program 4:

14:37:22 executing program 3:

14:37:22 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600))

14:37:22 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  440.044178][T23991] FAULT_INJECTION: forcing a failure.
[  440.044178][T23991] name failslab, interval 1, probability 0, space 0, times 0
14:37:22 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:22 executing program 4:

[  440.132542][T23991] CPU: 0 PID: 23991 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  440.140579][T23991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  440.150642][T23991] Call Trace:
[  440.153945][T23991]  dump_stack+0x172/0x1f0
[  440.153970][T23991]  should_fail.cold+0xa/0x15
[  440.153991][T23991]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  440.154017][T23991]  ? ___might_sleep+0x163/0x280
[  440.154039][T23991]  __should_failslab+0x121/0x190
[  440.178553][T23991]  should_failslab+0x9/0x14
[  440.183071][T23991]  kmem_cache_alloc_trace+0x2d1/0x760
[  440.188465][T23991]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  440.194325][T23991]  __memcg_init_list_lru_node+0x8a/0x1e0
[  440.199973][T23991]  __list_lru_init+0x3cf/0x6e0
[  440.204753][T23991]  alloc_super+0x762/0x890
[  440.209184][T23991]  ? test_single_super+0x10/0x10
[  440.214131][T23991]  sget_userns+0xf1/0x560
[  440.218466][T23991]  ? kill_litter_super+0x60/0x60
[  440.223423][T23991]  ? test_single_super+0x10/0x10
[  440.228374][T23991]  ? kill_litter_super+0x60/0x60
[  440.233329][T23991]  sget+0x10c/0x150
[  440.237258][T23991]  mount_bdev+0xff/0x3c0
[  440.241605][T23991]  ? vfat_mount+0x40/0x40
[  440.245970][T23991]  vfat_mount+0x35/0x40
[  440.250132][T23991]  ? setup+0x120/0x120
[  440.254212][T23991]  legacy_get_tree+0xf2/0x200
[  440.259386][T23991]  vfs_get_tree+0x123/0x450
[  440.263902][T23991]  do_mount+0x1436/0x2c40
[  440.268280][T23991]  ? copy_mount_string+0x40/0x40
[  440.275034][T23991]  ? _copy_from_user+0xdd/0x150
[  440.281046][T23991]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  440.287325][T23991]  ? copy_mount_options+0x280/0x3a0
[  440.292556][T23991]  ksys_mount+0xdb/0x150
[  440.292573][T23991]  __x64_sys_mount+0xbe/0x150
[  440.292592][T23991]  do_syscall_64+0x103/0x610
[  440.292615][T23991]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  440.301582][T23991] RIP: 0033:0x45b81a
[  440.301602][T23991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  440.335648][T23991] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  440.344177][T23991] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  440.352179][T23991] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  440.362129][T23991] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  440.370618][T23991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  440.379561][T23991] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:22 executing program 2 (fault-call:0 fault-nth:66):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:22 executing program 1:
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:22 executing program 4:

14:37:22 executing program 3:

14:37:22 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:22 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
prctl$PR_SET_THP_DISABLE(0x29, 0x0)
r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2)
getpeername$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x10)
r2 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x98, "ea60266d39b760a90b5c21e7c65f7f58a7af9e1d6f5249519228f211edc8472a2f7bcdb8198ab27a825fff008ecf6d88fece170afd31035b9ab38d398f7f9758494a60d4e7c81e0cc3eced968a7daa434e505d1513d53fda6a16fed3c1047de301300d0bd96f4ef1b280e235ee1f527d1410d9b6e2713e35f84851a4a48b8573ff2c8612abc1665a5de80d80f55852bcc90db079f275bf98"}, &(0x7f00000000c0)=0xbc)
splice(r2, &(0x7f0000000100), r2, &(0x7f0000000140), 0x4, 0xf)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:22 executing program 3:

14:37:22 executing program 1:
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:22 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:22 executing program 4:

14:37:23 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
vmsplice(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="e9f62d91afd701473dc5b0bf7d09237d0b4c5e7dbeb24b6269adff10e4028836e87060efac2f7aad6d407f0fdf0d9b2e5896edd909e9a9f272661aa335ee4766e15620dd00eafa544cbf22314b4f395dbe2781bc5bf8ce747f03fb80ffee909d64345a1f0112d089ae414dda78b1386a55b46c69de36b37905a6e44559da88e654342c67606b405c190e179fc09248feae14078cf3c0fbdea6a684201e5bfbaf0f68c59fd0ad90b4ca9cf97e7b92d2dfb5454b879f94602977fa0cb1a50bfc", 0xbf}, {&(0x7f00000000c0)="ccde6b41cd227d476b149d43601b438867f9e9bbec5f26a1dd455b2f9fea14cf66624c7039335ef711b80c479c7aca1ddf9c7f5edd53621d96f3c5418e7b6749ad5f32262545fc7c7c44fad5491313141d0266a7baf528e105a849d33e666b2a1e1b2f5b0f22a57f482feb6b6f255e1e712ea86357d666e2d973de441f511ec47983d83c2a5ce39916075b8fa4df20d980eec161df5adff4cf782a6dcf184663afade8416aae0ff7a7946a6015fdd61c95042b5d34b84f0dc1a682275055daa7fdbefb0628c566ceee0e74d5a840ffdee6a7eabf6b41ebe97ba09d8eaa52fce017", 0xe1}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="195b989deb75a13acc7be494c04ceab46d6d037d53ec427b63ab764d6e1a8cfe483b3d9c516f0d75120ec955e0e7dd09ec0c10805b47fbd210c4938872fb7019a99f5c92555acf1266b31d39fd04cd7004b0cae98e675a63", 0x58}, {&(0x7f0000001240)="7b6afc74918f3559ef897c7e407d78a407f93da83b7a2fff3cbb8a0e927ffc42c4a3f8c73fd3bfa104b38ca3936e68adf385907e5375917884a6c7cf6da22a58f03abec1538e6e8749ffe310e5023d501027164569c0ee7db70d16e3", 0x5c}], 0x5, 0x2)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
mkdir(&(0x7f0000000180)='./file0\x00', 0x0)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x0, 0x0)
r2 = fanotify_init(0x0, 0x0)
fanotify_mark(r2, 0x400000000000007d, 0x103a, r1, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

[  440.584896][T24017] FAULT_INJECTION: forcing a failure.
[  440.584896][T24017] name failslab, interval 1, probability 0, space 0, times 0
14:37:23 executing program 3:

[  440.657830][T24017] CPU: 0 PID: 24017 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  440.665869][T24017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  440.665882][T24017] Call Trace:
[  440.679375][T24017]  dump_stack+0x172/0x1f0
[  440.683724][T24017]  should_fail.cold+0xa/0x15
[  440.688338][T24017]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  440.694167][T24017]  ? ___might_sleep+0x163/0x280
[  440.699033][T24017]  __should_failslab+0x121/0x190
[  440.703985][T24017]  should_failslab+0x9/0x14
[  440.708508][T24017]  kmem_cache_alloc_trace+0x2d1/0x760
[  440.713900][T24017]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  440.719728][T24017]  __memcg_init_list_lru_node+0x8a/0x1e0
[  440.725378][T24017]  __list_lru_init+0x3cf/0x6e0
[  440.730159][T24017]  alloc_super+0x762/0x890
[  440.734585][T24017]  ? test_single_super+0x10/0x10
[  440.739542][T24017]  sget_userns+0xf1/0x560
[  440.743879][T24017]  ? kill_litter_super+0x60/0x60
[  440.743896][T24017]  ? test_single_super+0x10/0x10
[  440.743909][T24017]  ? kill_litter_super+0x60/0x60
[  440.743923][T24017]  sget+0x10c/0x150
[  440.743943][T24017]  mount_bdev+0xff/0x3c0
[  440.743958][T24017]  ? vfat_mount+0x40/0x40
[  440.743978][T24017]  vfat_mount+0x35/0x40
[  440.753863][T24017]  ? setup+0x120/0x120
[  440.771133][T24017]  legacy_get_tree+0xf2/0x200
[  440.771155][T24017]  vfs_get_tree+0x123/0x450
[  440.771173][T24017]  do_mount+0x1436/0x2c40
[  440.771195][T24017]  ? copy_mount_string+0x40/0x40
[  440.779415][T24017]  ? _copy_from_user+0xdd/0x150
[  440.779438][T24017]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  440.779453][T24017]  ? copy_mount_options+0x280/0x3a0
[  440.779474][T24017]  ksys_mount+0xdb/0x150
[  440.818354][T24017]  __x64_sys_mount+0xbe/0x150
[  440.823051][T24017]  do_syscall_64+0x103/0x610
[  440.827657][T24017]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  440.833551][T24017] RIP: 0033:0x45b81a
[  440.837452][T24017] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  440.857149][T24017] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  440.865570][T24017] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  440.873542][T24017] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  440.881518][T24017] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  440.889488][T24017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  440.897459][T24017] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:23 executing program 2 (fault-call:0 fault-nth:67):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:23 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:23 executing program 1:
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:23 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000200)={0x0, 0x0, 0x3ed, {}, [], "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", "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"})

14:37:23 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:23 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f00000001c0)=[0x0, 0x2], 0x2)
ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x2000, 0x1})
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000200)='eth1mime_type\x00', 0xe)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@timestamp, @mss={0x2, 0x2}, @sack_perm], 0x3)

[  441.109526][T24042] FAULT_INJECTION: forcing a failure.
[  441.109526][T24042] name failslab, interval 1, probability 0, space 0, times 0
14:37:23 executing program 1:
creat(0x0, 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:23 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

[  441.207195][T24042] CPU: 1 PID: 24042 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  441.215221][T24042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  441.225279][T24042] Call Trace:
[  441.228599][T24042]  dump_stack+0x172/0x1f0
[  441.234600][T24042]  should_fail.cold+0xa/0x15
[  441.239202][T24042]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  441.245029][T24042]  ? ___might_sleep+0x163/0x280
[  441.249898][T24042]  __should_failslab+0x121/0x190
[  441.254845][T24042]  should_failslab+0x9/0x14
[  441.260374][T24042]  kmem_cache_alloc_node_trace+0x270/0x720
[  441.268227][T24042]  __kmalloc_node+0x3d/0x70
[  441.273953][T24042]  kvmalloc_node+0x68/0x100
[  441.278464][T24042]  __list_lru_init+0x4a6/0x6e0
[  441.283245][T24042]  alloc_super+0x78d/0x890
[  441.287672][T24042]  ? test_single_super+0x10/0x10
[  441.292628][T24042]  sget_userns+0xf1/0x560
[  441.296964][T24042]  ? kill_litter_super+0x60/0x60
[  441.301907][T24042]  ? test_single_super+0x10/0x10
[  441.306848][T24042]  ? kill_litter_super+0x60/0x60
[  441.311799][T24042]  sget+0x10c/0x150
[  441.315617][T24042]  mount_bdev+0xff/0x3c0
[  441.319872][T24042]  ? vfat_mount+0x40/0x40
[  441.324212][T24042]  vfat_mount+0x35/0x40
[  441.324229][T24042]  ? setup+0x120/0x120
[  441.324244][T24042]  legacy_get_tree+0xf2/0x200
[  441.324262][T24042]  vfs_get_tree+0x123/0x450
[  441.324280][T24042]  do_mount+0x1436/0x2c40
[  441.324302][T24042]  ? copy_mount_string+0x40/0x40
[  441.324329][T24042]  ? _copy_from_user+0xdd/0x150
14:37:23 executing program 1:
creat(0x0, 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:23 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:23 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:23 executing program 0:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="ac030000", @ANYRES16=r2, @ANYBLOB="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"], 0x3ac}, 0x1, 0x0, 0x0, 0x4}, 0x50)
setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4)
setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x67, @dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x3, 'lc\x00', 0x20, 0xfffffffffffffffc, 0x45}, 0x2c)

[  441.324351][T24042]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  441.324376][T24042]  ? copy_mount_options+0x280/0x3a0
[  441.341748][T24042]  ksys_mount+0xdb/0x150
[  441.355828][T24042]  __x64_sys_mount+0xbe/0x150
[  441.355850][T24042]  do_syscall_64+0x103/0x610
[  441.355879][T24042]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  441.355892][T24042] RIP: 0033:0x45b81a
[  441.355907][T24042] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  441.355915][T24042] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  441.355929][T24042] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  441.355945][T24042] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  441.371584][T24042] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  441.371594][T24042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  441.371603][T24042] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:23 executing program 2 (fault-call:0 fault-nth:68):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:23 executing program 1:
creat(0x0, 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:23 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9)
sendfile(r1, r1, &(0x7f0000000240), 0x80810002f79e)

14:37:23 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:23 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0)
write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e)
ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040))
syz_open_pts(r1, 0x0)

14:37:24 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:24 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:24 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  441.706120][T24076] FAULT_INJECTION: forcing a failure.
[  441.706120][T24076] name failslab, interval 1, probability 0, space 0, times 0
[  441.766505][T24076] CPU: 0 PID: 24076 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  441.774533][T24076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  441.784595][T24076] Call Trace:
[  441.787906][T24076]  dump_stack+0x172/0x1f0
[  441.792268][T24076]  should_fail.cold+0xa/0x15
[  441.796892][T24076]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  441.802721][T24076]  ? ___might_sleep+0x163/0x280
[  441.807586][T24076]  __should_failslab+0x121/0x190
[  441.812561][T24076]  should_failslab+0x9/0x14
[  441.817079][T24076]  kmem_cache_alloc_trace+0x2d1/0x760
[  441.822470][T24076]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  441.828299][T24076]  __memcg_init_list_lru_node+0x8a/0x1e0
[  441.833958][T24076]  __list_lru_init+0x3cf/0x6e0
[  441.838740][T24076]  alloc_super+0x762/0x890
[  441.843174][T24076]  ? test_single_super+0x10/0x10
[  441.848135][T24076]  sget_userns+0xf1/0x560
[  441.852487][T24076]  ? kill_litter_super+0x60/0x60
[  441.857446][T24076]  ? test_single_super+0x10/0x10
[  441.862401][T24076]  ? kill_litter_super+0x60/0x60
[  441.867366][T24076]  sget+0x10c/0x150
[  441.871186][T24076]  mount_bdev+0xff/0x3c0
[  441.875437][T24076]  ? vfat_mount+0x40/0x40
[  441.879786][T24076]  vfat_mount+0x35/0x40
[  441.883956][T24076]  ? setup+0x120/0x120
[  441.888035][T24076]  legacy_get_tree+0xf2/0x200
[  441.892721][T24076]  vfs_get_tree+0x123/0x450
[  441.897236][T24076]  do_mount+0x1436/0x2c40
[  441.901585][T24076]  ? copy_mount_string+0x40/0x40
[  441.906556][T24076]  ? _copy_from_user+0xdd/0x150
[  441.911425][T24076]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  441.917672][T24076]  ? copy_mount_options+0x280/0x3a0
[  441.922887][T24076]  ksys_mount+0xdb/0x150
[  441.927144][T24076]  __x64_sys_mount+0xbe/0x150
[  441.931837][T24076]  do_syscall_64+0x103/0x610
[  441.936446][T24076]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  441.942352][T24076] RIP: 0033:0x45b81a
[  441.946262][T24076] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  441.965872][T24076] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  441.974291][T24076] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  441.982279][T24076] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  441.990270][T24076] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  441.998259][T24076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  442.006232][T24076] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:24 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:24 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:24 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:24 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:24 executing program 2 (fault-call:0 fault-nth:69):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:24 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, 0x0, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  442.424823][T24102] FAULT_INJECTION: forcing a failure.
[  442.424823][T24102] name failslab, interval 1, probability 0, space 0, times 0
14:37:24 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:24 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  442.535258][T24102] CPU: 0 PID: 24102 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  442.543307][T24102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  442.553386][T24102] Call Trace:
[  442.556696][T24102]  dump_stack+0x172/0x1f0
[  442.561043][T24102]  should_fail.cold+0xa/0x15
[  442.565643][T24102]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  442.571464][T24102]  ? ___might_sleep+0x163/0x280
[  442.576334][T24102]  __should_failslab+0x121/0x190
[  442.581285][T24102]  should_failslab+0x9/0x14
[  442.585806][T24102]  kmem_cache_alloc_trace+0x2d1/0x760
[  442.591187][T24102]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  442.597014][T24102]  __memcg_init_list_lru_node+0x8a/0x1e0
[  442.602659][T24102]  __list_lru_init+0x3cf/0x6e0
[  442.607433][T24102]  alloc_super+0x762/0x890
[  442.611852][T24102]  ? test_single_super+0x10/0x10
[  442.616791][T24102]  sget_userns+0xf1/0x560
[  442.621122][T24102]  ? kill_litter_super+0x60/0x60
[  442.626063][T24102]  ? test_single_super+0x10/0x10
[  442.631005][T24102]  ? kill_litter_super+0x60/0x60
[  442.635944][T24102]  sget+0x10c/0x150
[  442.639758][T24102]  mount_bdev+0xff/0x3c0
[  442.644002][T24102]  ? vfat_mount+0x40/0x40
[  442.648348][T24102]  vfat_mount+0x35/0x40
[  442.652513][T24102]  ? setup+0x120/0x120
[  442.656584][T24102]  legacy_get_tree+0xf2/0x200
[  442.661268][T24102]  vfs_get_tree+0x123/0x450
[  442.665782][T24102]  do_mount+0x1436/0x2c40
[  442.670127][T24102]  ? copy_mount_string+0x40/0x40
[  442.675079][T24102]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  442.681332][T24102]  ? copy_mount_options+0x280/0x3a0
[  442.686551][T24102]  ksys_mount+0xdb/0x150
[  442.690806][T24102]  __x64_sys_mount+0xbe/0x150
[  442.695492][T24102]  do_syscall_64+0x103/0x610
[  442.700090][T24102]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  442.705986][T24102] RIP: 0033:0x45b81a
[  442.709891][T24102] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  442.729675][T24102] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  442.738094][T24102] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  442.746066][T24102] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  442.754040][T24102] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  442.762015][T24102] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  442.769987][T24102] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:25 executing program 0:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
r1 = syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={<r2=>0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14)

14:37:25 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, 0x0, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:25 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, 0x0, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 2 (fault-call:0 fault-nth:70):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  442.960265][T24127] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:25 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:25 executing program 0:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
r1 = syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={<r2=>0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14)

[  443.124672][T24139] FAULT_INJECTION: forcing a failure.
[  443.124672][T24139] name failslab, interval 1, probability 0, space 0, times 0
14:37:25 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:25 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  443.182935][T24149] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
[  443.222329][T24139] CPU: 0 PID: 24139 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
14:37:25 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  443.230375][T24139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  443.230385][T24139] Call Trace:
[  443.230426][T24139]  dump_stack+0x172/0x1f0
[  443.248123][T24139]  should_fail.cold+0xa/0x15
[  443.252734][T24139]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  443.260085][T24139]  ? ___might_sleep+0x163/0x280
[  443.260108][T24139]  __should_failslab+0x121/0x190
14:37:25 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

[  443.260125][T24139]  should_failslab+0x9/0x14
14:37:25 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:25 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  443.260144][T24139]  kmem_cache_alloc_trace+0x2d1/0x760
[  443.260163][T24139]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  443.260188][T24139]  __memcg_init_list_lru_node+0x8a/0x1e0
[  443.260209][T24139]  __list_lru_init+0x3cf/0x6e0
[  443.260230][T24139]  alloc_super+0x762/0x890
[  443.260247][T24139]  ? test_single_super+0x10/0x10
[  443.260264][T24139]  sget_userns+0xf1/0x560
[  443.260278][T24139]  ? kill_litter_super+0x60/0x60
[  443.260295][T24139]  ? test_single_super+0x10/0x10
14:37:25 executing program 2 (fault-call:0 fault-nth:71):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  443.260307][T24139]  ? kill_litter_super+0x60/0x60
14:37:25 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:25 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  443.260333][T24139]  sget+0x10c/0x150
[  443.260353][T24139]  mount_bdev+0xff/0x3c0
14:37:25 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  443.260375][T24139]  ? vfat_mount+0x40/0x40
[  443.260396][T24139]  vfat_mount+0x35/0x40
[  443.260411][T24139]  ? setup+0x120/0x120
[  443.260426][T24139]  legacy_get_tree+0xf2/0x200
[  443.260444][T24139]  vfs_get_tree+0x123/0x450
[  443.260462][T24139]  do_mount+0x1436/0x2c40
[  443.260482][T24139]  ? copy_mount_string+0x40/0x40
[  443.260503][T24139]  ? __sanitizer_cov_trace_const_cmp4+0x11/0x20
[  443.260519][T24139]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  443.260531][T24139]  ? copy_mount_options+0x280/0x3a0
[  443.260548][T24139]  ksys_mount+0xdb/0x150
[  443.260562][T24139]  __x64_sys_mount+0xbe/0x150
[  443.260581][T24139]  do_syscall_64+0x103/0x610
[  443.260601][T24139]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  443.260613][T24139] RIP: 0033:0x45b81a
[  443.260627][T24139] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  443.260635][T24139] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
14:37:26 executing program 0:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
r1 = syz_open_dev$vbi(0x0, 0x1, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0)
setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={<r2=>0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14)

14:37:26 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:26 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:26 executing program 2 (fault-call:0 fault-nth:72):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  443.260647][T24139] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  443.260656][T24139] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  443.260664][T24139] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  443.260672][T24139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  443.260679][T24139] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
[  443.582565][T24171] FAULT_INJECTION: forcing a failure.
[  443.582565][T24171] name failslab, interval 1, probability 0, space 0, times 0
14:37:26 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

[  443.582585][T24171] CPU: 0 PID: 24171 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  443.582594][T24171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  443.582600][T24171] Call Trace:
[  443.582623][T24171]  dump_stack+0x172/0x1f0
[  443.582646][T24171]  should_fail.cold+0xa/0x15
[  443.582667][T24171]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  443.582690][T24171]  ? ___might_sleep+0x163/0x280
[  443.582712][T24171]  __should_failslab+0x121/0x190
[  443.582728][T24171]  should_failslab+0x9/0x14
[  443.582745][T24171]  kmem_cache_alloc_trace+0x2d1/0x760
[  443.582765][T24171]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  443.582789][T24171]  __memcg_init_list_lru_node+0x8a/0x1e0
[  443.582811][T24171]  __list_lru_init+0x3cf/0x6e0
[  443.582833][T24171]  alloc_super+0x762/0x890
[  443.582850][T24171]  ? test_single_super+0x10/0x10
[  443.582866][T24171]  sget_userns+0xf1/0x560
[  443.582881][T24171]  ? kill_litter_super+0x60/0x60
[  443.582898][T24171]  ? test_single_super+0x10/0x10
[  443.582911][T24171]  ? kill_litter_super+0x60/0x60
14:37:26 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:26 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

[  443.582932][T24171]  sget+0x10c/0x150
[  443.582953][T24171]  mount_bdev+0xff/0x3c0
[  443.582969][T24171]  ? vfat_mount+0x40/0x40
[  443.582991][T24171]  vfat_mount+0x35/0x40
[  443.583007][T24171]  ? setup+0x120/0x120
[  443.583022][T24171]  legacy_get_tree+0xf2/0x200
[  443.583041][T24171]  vfs_get_tree+0x123/0x450
[  443.583059][T24171]  do_mount+0x1436/0x2c40
[  443.583083][T24171]  ? copy_mount_string+0x40/0x40
[  443.583100][T24171]  ? _copy_from_user+0xdd/0x150
[  443.583121][T24171]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:37:26 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  443.583135][T24171]  ? copy_mount_options+0x280/0x3a0
[  443.583156][T24171]  ksys_mount+0xdb/0x150
[  443.583174][T24171]  __x64_sys_mount+0xbe/0x150
[  443.583197][T24171]  do_syscall_64+0x103/0x610
[  443.583218][T24171]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  443.583230][T24171] RIP: 0033:0x45b81a
[  443.583246][T24171] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
14:37:26 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  443.583255][T24171] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  443.583271][T24171] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  443.583281][T24171] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  443.583291][T24171] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  443.583300][T24171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  443.583310][T24171] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
[  443.789840][T24189] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'.
[  444.049676][T24193] FAULT_INJECTION: forcing a failure.
[  444.049676][T24193] name failslab, interval 1, probability 0, space 0, times 0
14:37:26 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  444.132297][T24193] CPU: 0 PID: 24193 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  444.140356][T24193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  444.150422][T24193] Call Trace:
[  444.153729][T24193]  dump_stack+0x172/0x1f0
[  444.158078][T24193]  should_fail.cold+0xa/0x15
[  444.162689][T24193]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  444.168509][T24193]  ? ___might_sleep+0x163/0x280
[  444.173385][T24193]  __should_failslab+0x121/0x190
[  444.178344][T24193]  should_failslab+0x9/0x14
[  444.182861][T24193]  __kmalloc+0x2dc/0x740
[  444.187115][T24193]  ? __list_lru_init+0xd1/0x6e0
[  444.191980][T24193]  __list_lru_init+0xd1/0x6e0
[  444.196673][T24193]  alloc_super+0x78d/0x890
[  444.201091][T24193]  ? test_single_super+0x10/0x10
[  444.201109][T24193]  sget_userns+0xf1/0x560
[  444.201127][T24193]  ? kill_litter_super+0x60/0x60
[  444.215344][T24193]  ? test_single_super+0x10/0x10
[  444.220296][T24193]  ? kill_litter_super+0x60/0x60
[  444.225256][T24193]  sget+0x10c/0x150
[  444.229079][T24193]  mount_bdev+0xff/0x3c0
[  444.233334][T24193]  ? vfat_mount+0x40/0x40
[  444.237683][T24193]  vfat_mount+0x35/0x40
[  444.241848][T24193]  ? setup+0x120/0x120
[  444.245925][T24193]  legacy_get_tree+0xf2/0x200
[  444.250615][T24193]  vfs_get_tree+0x123/0x450
[  444.255216][T24193]  do_mount+0x1436/0x2c40
[  444.260037][T24193]  ? copy_mount_string+0x40/0x40
[  444.264989][T24193]  ? _copy_from_user+0xdd/0x150
[  444.265012][T24193]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  444.265026][T24193]  ? copy_mount_options+0x280/0x3a0
[  444.265045][T24193]  ksys_mount+0xdb/0x150
[  444.276125][T24193]  __x64_sys_mount+0xbe/0x150
[  444.276147][T24193]  do_syscall_64+0x103/0x610
[  444.276172][T24193]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  444.300712][T24193] RIP: 0033:0x45b81a
[  444.304611][T24193] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  444.324219][T24193] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
14:37:26 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:26 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:26 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:26 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:26 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  444.332638][T24193] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  444.340611][T24193] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  444.340621][T24193] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  444.340629][T24193] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  444.340638][T24193] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:26 executing program 2 (fault-call:0 fault-nth:73):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:26 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:26 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:26 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:26 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:26 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

[  444.556485][T24236] FAULT_INJECTION: forcing a failure.
[  444.556485][T24236] name failslab, interval 1, probability 0, space 0, times 0
[  444.569923][T24236] CPU: 0 PID: 24236 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  444.577926][T24236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  444.587990][T24236] Call Trace:
[  444.591300][T24236]  dump_stack+0x172/0x1f0
[  444.595666][T24236]  should_fail.cold+0xa/0x15
[  444.600274][T24236]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  444.606289][T24236]  ? ___might_sleep+0x163/0x280
[  444.611169][T24236]  __should_failslab+0x121/0x190
[  444.616116][T24236]  should_failslab+0x9/0x14
[  444.620663][T24236]  kmem_cache_alloc_trace+0x2d1/0x760
[  444.626053][T24236]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  444.631881][T24236]  __memcg_init_list_lru_node+0x8a/0x1e0
[  444.637534][T24236]  __list_lru_init+0x3cf/0x6e0
[  444.642326][T24236]  alloc_super+0x78d/0x890
[  444.646760][T24236]  ? test_single_super+0x10/0x10
[  444.651708][T24236]  sget_userns+0xf1/0x560
[  444.656041][T24236]  ? kill_litter_super+0x60/0x60
[  444.660983][T24236]  ? test_single_super+0x10/0x10
[  444.665920][T24236]  ? kill_litter_super+0x60/0x60
[  444.670859][T24236]  sget+0x10c/0x150
[  444.674685][T24236]  mount_bdev+0xff/0x3c0
[  444.678933][T24236]  ? vfat_mount+0x40/0x40
[  444.683281][T24236]  vfat_mount+0x35/0x40
[  444.687453][T24236]  ? setup+0x120/0x120
[  444.687469][T24236]  legacy_get_tree+0xf2/0x200
[  444.687489][T24236]  vfs_get_tree+0x123/0x450
[  444.687507][T24236]  do_mount+0x1436/0x2c40
[  444.687529][T24236]  ? copy_mount_string+0x40/0x40
[  444.696275][T24236]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  444.696292][T24236]  ? copy_mount_options+0x280/0x3a0
[  444.696312][T24236]  ksys_mount+0xdb/0x150
[  444.725766][T24236]  __x64_sys_mount+0xbe/0x150
[  444.730461][T24236]  do_syscall_64+0x103/0x610
[  444.735066][T24236]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  444.740968][T24236] RIP: 0033:0x45b81a
14:37:27 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:27 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

[  444.744870][T24236] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  444.764577][T24236] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  444.773001][T24236] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  444.780986][T24236] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  444.788971][T24236] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  444.796949][T24236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
14:37:27 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:27 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  444.804927][T24236] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:27 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:27 executing program 2 (fault-call:0 fault-nth:74):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:27 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:27 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:27 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:27 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:27 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:27 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:27 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  445.360884][T24283] FAULT_INJECTION: forcing a failure.
[  445.360884][T24283] name failslab, interval 1, probability 0, space 0, times 0
[  445.561950][T24283] CPU: 1 PID: 24283 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  445.569992][T24283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  445.580141][T24283] Call Trace:
[  445.583453][T24283]  dump_stack+0x172/0x1f0
[  445.583479][T24283]  should_fail.cold+0xa/0x15
[  445.583499][T24283]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  445.583525][T24283]  ? ___might_sleep+0x163/0x280
[  445.583549][T24283]  __should_failslab+0x121/0x190
[  445.583567][T24283]  should_failslab+0x9/0x14
[  445.583588][T24283]  kmem_cache_alloc_node_trace+0x270/0x720
[  445.583615][T24283]  __kmalloc_node+0x3d/0x70
[  445.583635][T24283]  kvmalloc_node+0x68/0x100
[  445.627499][T24283]  __list_lru_init+0x4a6/0x6e0
[  445.632278][T24283]  alloc_super+0x78d/0x890
[  445.636719][T24283]  ? test_single_super+0x10/0x10
[  445.641669][T24283]  sget_userns+0xf1/0x560
[  445.646007][T24283]  ? kill_litter_super+0x60/0x60
[  445.650950][T24283]  ? test_single_super+0x10/0x10
[  445.655975][T24283]  ? kill_litter_super+0x60/0x60
[  445.660914][T24283]  sget+0x10c/0x150
[  445.664735][T24283]  mount_bdev+0xff/0x3c0
[  445.668984][T24283]  ? vfat_mount+0x40/0x40
[  445.673332][T24283]  vfat_mount+0x35/0x40
[  445.677493][T24283]  ? setup+0x120/0x120
[  445.681567][T24283]  legacy_get_tree+0xf2/0x200
[  445.686257][T24283]  vfs_get_tree+0x123/0x450
[  445.690776][T24283]  do_mount+0x1436/0x2c40
[  445.695144][T24283]  ? copy_mount_string+0x40/0x40
[  445.700112][T24283]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  445.706364][T24283]  ? copy_mount_options+0x280/0x3a0
[  445.711579][T24283]  ksys_mount+0xdb/0x150
[  445.715838][T24283]  __x64_sys_mount+0xbe/0x150
[  445.720552][T24283]  do_syscall_64+0x103/0x610
[  445.725247][T24283]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  445.731253][T24283] RIP: 0033:0x45b81a
[  445.735157][T24283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  445.754769][T24283] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  445.763200][T24283] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  445.771194][T24283] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  445.779182][T24283] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  445.787166][T24283] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  445.795147][T24283] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:28 executing program 2 (fault-call:0 fault-nth:75):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:28 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:28 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:28 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:28 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:28 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  446.015952][T24313] FAULT_INJECTION: forcing a failure.
[  446.015952][T24313] name failslab, interval 1, probability 0, space 0, times 0
14:37:28 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  446.132050][T24313] CPU: 0 PID: 24313 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  446.140083][T24313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  446.150150][T24313] Call Trace:
[  446.153464][T24313]  dump_stack+0x172/0x1f0
[  446.157818][T24313]  should_fail.cold+0xa/0x15
[  446.162435][T24313]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  446.168268][T24313]  ? ___might_sleep+0x163/0x280
[  446.173174][T24313]  __should_failslab+0x121/0x190
[  446.178124][T24313]  should_failslab+0x9/0x14
[  446.182642][T24313]  kmem_cache_alloc_node_trace+0x270/0x720
[  446.188466][T24313]  __kmalloc_node+0x3d/0x70
[  446.192980][T24313]  kvmalloc_node+0x68/0x100
[  446.197496][T24313]  __list_lru_init+0x4a6/0x6e0
[  446.202271][T24313]  alloc_super+0x78d/0x890
[  446.206694][T24313]  ? test_single_super+0x10/0x10
[  446.211640][T24313]  sget_userns+0xf1/0x560
[  446.215980][T24313]  ? kill_litter_super+0x60/0x60
[  446.220925][T24313]  ? test_single_super+0x10/0x10
[  446.225868][T24313]  ? kill_litter_super+0x60/0x60
[  446.230807][T24313]  sget+0x10c/0x150
[  446.234627][T24313]  mount_bdev+0xff/0x3c0
[  446.238872][T24313]  ? vfat_mount+0x40/0x40
[  446.243210][T24313]  vfat_mount+0x35/0x40
[  446.247376][T24313]  ? setup+0x120/0x120
[  446.251454][T24313]  legacy_get_tree+0xf2/0x200
[  446.256570][T24313]  vfs_get_tree+0x123/0x450
[  446.261086][T24313]  do_mount+0x1436/0x2c40
[  446.261111][T24313]  ? copy_mount_string+0x40/0x40
[  446.261137][T24313]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  446.261158][T24313]  ? copy_mount_options+0x280/0x3a0
14:37:28 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  446.270413][T24313]  ksys_mount+0xdb/0x150
[  446.270433][T24313]  __x64_sys_mount+0xbe/0x150
[  446.270456][T24313]  do_syscall_64+0x103/0x610
[  446.270478][T24313]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  446.270496][T24313] RIP: 0033:0x45b81a
[  446.281903][T24313] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  446.281913][T24313] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  446.281928][T24313] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  446.281939][T24313] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  446.281948][T24313] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  446.281958][T24313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  446.281967][T24313] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:28 executing program 2 (fault-call:0 fault-nth:76):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:28 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:28 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:28 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:28 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:29 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:29 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:29 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  446.599335][T24357] FAULT_INJECTION: forcing a failure.
[  446.599335][T24357] name failslab, interval 1, probability 0, space 0, times 0
[  446.669215][T24357] CPU: 0 PID: 24357 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
[  446.677252][T24357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  446.687328][T24357] Call Trace:
[  446.690655][T24357]  dump_stack+0x172/0x1f0
[  446.695018][T24357]  should_fail.cold+0xa/0x15
[  446.699630][T24357]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  446.705465][T24357]  ? ___might_sleep+0x163/0x280
[  446.710345][T24357]  __should_failslab+0x121/0x190
[  446.715300][T24357]  should_failslab+0x9/0x14
[  446.719828][T24357]  kmem_cache_alloc_trace+0x2d1/0x760
[  446.725215][T24357]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  446.731046][T24357]  __memcg_init_list_lru_node+0x8a/0x1e0
[  446.736694][T24357]  __list_lru_init+0x3cf/0x6e0
[  446.736717][T24357]  alloc_super+0x78d/0x890
[  446.736736][T24357]  ? test_single_super+0x10/0x10
[  446.750874][T24357]  sget_userns+0xf1/0x560
[  446.755209][T24357]  ? kill_litter_super+0x60/0x60
[  446.755228][T24357]  ? test_single_super+0x10/0x10
[  446.755241][T24357]  ? kill_litter_super+0x60/0x60
[  446.755259][T24357]  sget+0x10c/0x150
[  446.773853][T24357]  mount_bdev+0xff/0x3c0
[  446.778104][T24357]  ? vfat_mount+0x40/0x40
[  446.782451][T24357]  vfat_mount+0x35/0x40
[  446.786621][T24357]  ? setup+0x120/0x120
[  446.790698][T24357]  legacy_get_tree+0xf2/0x200
[  446.795398][T24357]  vfs_get_tree+0x123/0x450
[  446.799919][T24357]  do_mount+0x1436/0x2c40
[  446.804264][T24357]  ? copy_mount_string+0x40/0x40
[  446.809221][T24357]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:37:29 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:29 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  446.815479][T24357]  ? copy_mount_options+0x280/0x3a0
[  446.820699][T24357]  ksys_mount+0xdb/0x150
[  446.824956][T24357]  __x64_sys_mount+0xbe/0x150
[  446.829644][T24357]  do_syscall_64+0x103/0x610
[  446.834257][T24357]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  446.840159][T24357] RIP: 0033:0x45b81a
[  446.844061][T24357] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  446.863681][T24357] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  446.863698][T24357] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  446.863705][T24357] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  446.863713][T24357] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  446.863722][T24357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  446.863730][T24357] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:29 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:29 executing program 2 (fault-call:0 fault-nth:77):
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:29 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:29 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180))
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:29 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:29 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  447.119361][T24383] FAULT_INJECTION: forcing a failure.
[  447.119361][T24383] name failslab, interval 1, probability 0, space 0, times 0
[  447.152122][T24383] CPU: 1 PID: 24383 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96
14:37:29 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

[  447.160139][T24383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  447.170199][T24383] Call Trace:
[  447.173510][T24383]  dump_stack+0x172/0x1f0
[  447.177873][T24383]  should_fail.cold+0xa/0x15
[  447.182476][T24383]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  447.188289][T24383]  ? ___might_sleep+0x163/0x280
[  447.193164][T24383]  __should_failslab+0x121/0x190
[  447.198110][T24383]  should_failslab+0x9/0x14
[  447.202621][T24383]  kmem_cache_alloc_trace+0x2d1/0x760
[  447.208104][T24383]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  447.218636][T24383]  __memcg_init_list_lru_node+0x8a/0x1e0
[  447.224462][T24383]  __list_lru_init+0x3cf/0x6e0
[  447.229243][T24383]  alloc_super+0x78d/0x890
[  447.233674][T24383]  ? test_single_super+0x10/0x10
[  447.238621][T24383]  sget_userns+0xf1/0x560
[  447.242957][T24383]  ? kill_litter_super+0x60/0x60
[  447.247901][T24383]  ? test_single_super+0x10/0x10
[  447.252844][T24383]  ? kill_litter_super+0x60/0x60
[  447.258670][T24383]  sget+0x10c/0x150
[  447.262492][T24383]  mount_bdev+0xff/0x3c0
[  447.266739][T24383]  ? vfat_mount+0x40/0x40
[  447.271079][T24383]  vfat_mount+0x35/0x40
[  447.275244][T24383]  ? setup+0x120/0x120
[  447.279326][T24383]  legacy_get_tree+0xf2/0x200
[  447.284010][T24383]  vfs_get_tree+0x123/0x450
[  447.288520][T24383]  do_mount+0x1436/0x2c40
[  447.292900][T24383]  ? copy_mount_string+0x40/0x40
[  447.297854][T24383]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  447.304101][T24383]  ? copy_mount_options+0x280/0x3a0
[  447.309308][T24383]  ksys_mount+0xdb/0x150
[  447.313570][T24383]  __x64_sys_mount+0xbe/0x150
[  447.318256][T24383]  do_syscall_64+0x103/0x610
[  447.322866][T24383]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  447.328761][T24383] RIP: 0033:0x45b81a
[  447.332676][T24383] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00
[  447.352293][T24383] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[  447.360806][T24383] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a
[  447.368778][T24383] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00
[  447.376754][T24383] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0
[  447.384728][T24383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004
[  447.393234][T24383] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003
14:37:29 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:29 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180))
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:30 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0)

14:37:30 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:30 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180))
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:30 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:30 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:30 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:30 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

[  448.413855][T24447] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  448.429868][T24447] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  448.449422][T24447] FAT-fs (loop2): Filesystem has been set read-only
14:37:30 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='\nfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:30 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0)

14:37:30 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:30 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:30 executing program 0:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 4:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:31 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0)

14:37:31 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='%fat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:31 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0)

14:37:31 executing program 4:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:31 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 0:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 4:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:31 executing program 0:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0)

14:37:31 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='v\nat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:31 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:31 executing program 0:
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600))

14:37:31 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:31 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:31 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='v%at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:32 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600))

14:37:32 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:32 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:32 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600))

14:37:32 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='v.at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:32 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:32 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='v/at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:32 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:32 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:32 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='voat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:33 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vf\nt\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:33 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
close(0xffffffffffffffff)
r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r1, 0x0, 0x40, 0x9)
r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0)
write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0)
stat(0x0, &(0x7f0000000680))
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r2, 0x0, 0x0, 0x1000f4)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0)
sendfile(r2, r3, 0x0, 0x8000fffffffe)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:33 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:33 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vf%t\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:33 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:33 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  451.611500][   T26] audit: type=1804 audit(1556807853.972:136): pid=24693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/758/bus" dev="sda1" ino=17927 res=1
14:37:34 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfet\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:34 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
close(0xffffffffffffffff)
r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r1, 0x0, 0x40, 0x9)
r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0)
write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0)
stat(0x0, &(0x7f0000000680))
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r2, 0x0, 0x0, 0x1000f4)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0)
sendfile(r2, r3, 0x0, 0x8000fffffffe)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:34 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:34 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  452.176206][   T26] audit: type=1804 audit(1556807854.542:137): pid=24833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/759/bus" dev="sda1" ino=17959 res=1
14:37:34 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfot\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:34 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:34 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
close(0xffffffffffffffff)
r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
fallocate(r1, 0x0, 0x40, 0x9)
r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0)
write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0)
stat(0x0, &(0x7f0000000680))
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fallocate(r2, 0x0, 0x0, 0x1000f4)
r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0)
sendfile(r2, r3, 0x0, 0x8000fffffffe)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:35 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:35 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfa\n\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  452.750299][T24833] syz-executor.5 (24833) used greatest stack depth: 23032 bytes left
14:37:35 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

[  452.948085][   T26] audit: type=1804 audit(1556807855.312:138): pid=24984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/760/bus" dev="sda1" ino=17955 res=1
14:37:35 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfa%\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:35 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:35 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  453.501441][T24984] syz-executor.5 (24984) used greatest stack depth: 22968 bytes left
14:37:35 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x02', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:36 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:36 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x03', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:36 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10)

14:37:36 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 5:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, 0x0, 0x0)

14:37:36 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:36 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, 0x0, 0x0)

14:37:36 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:36 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, 0x0, 0x0)

14:37:36 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x05', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:37 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10)

14:37:37 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x06', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:37 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10)

14:37:37 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0)

14:37:37 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070")
r1 = socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1)
connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10)

14:37:37 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\a', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:37 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:37 executing program 3:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0)

14:37:37 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0)

14:37:37 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r0, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r0, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0)

14:37:38 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\t', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:38 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r0, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 1:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\n', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:38 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 1:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:38 executing program 3:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:38 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:38 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x0e', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:39 executing program 1:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 3:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 5:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 3:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x10', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:39 executing program 5:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 5:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x14', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:39 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:39 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:39 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:40 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat#', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:40 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 3:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:40 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 3:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 5:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatH', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:40 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(0x0, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 3:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 5 (fault-call:1 fault-nth:0):
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:40 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatL', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:40 executing program 3 (fault-call:1 fault-nth:0):
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:40 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:40 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:41 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:41 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat`', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:41 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x2)

14:37:41 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 5:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@hyper})
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x3ff, 0x5, 0x1})

14:37:41 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5411)

14:37:41 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfath', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:41 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
prctl$PR_SVE_SET_VL(0x32, 0xc260)

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x541b)

14:37:41 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5421)

14:37:41 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatl', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:41 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2)
accept4$netrom(r1, 0x0, &(0x7f0000000040), 0x800)
r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2)
ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000100))
ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000000c0)={0x10000, 0xc170c, "e21d5cabac62e21d2e23a65e3f631f5fe638f3f9f9ddad09", {0x100000000, 0x9}, 0x100})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
syz_read_part_table(0x1, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="1e6ada1aedcaed1368c53355cf168cf1479e05d1e83ed6b6ddc04c2bff159037bf03ac0c6ebccd1f47b0b18c46", 0x2d, 0x6}, {&(0x7f0000000180)="89c7d24987dd43b0d6add3ff1e8f692f8810338fe9cb2614e7a2a1e9e873f649ebd2b477b9366c6953813eaaf87def2622d1d7c4133c7c26334121c19e38dd97532481bd6fca70a15e1b4b4b03cd7b462ff624aa84ea311a2ff2c183aee73b61d2bff96513b4f55ce91ff9321a6c9c9958670638329110cf6fe0818003bc99e71890c0e8c819fbffa4100faa6d6336a967133daf274fdcd6a585d23b33ed78", 0x9f, 0x1}, {&(0x7f0000000240)="77fb5098c3baae166acf30e36a1be32b9a27d4b6f6d75db0dca69f5d414afcc53d635b53f4b9d42aa5548d9c12bec67482defcca53581faf89cb12b9cf99e65e0576fbcd3cc2ee0d8ada7a6b6b766f11565ba43ae0f25a1a069fdaad3f0a833635d2319b1900dfa2a196246c2e2033a720b990ef4208205b860a08dde090e09a42d11b175c972323e280a2dc92799c0f", 0x90, 0x80000000}, {&(0x7f0000000300)="cf3eb1e317ee2b06c5d2560000ca4a49b55f28a7cc72abd18822c8562bd7809a4b97ba4fe42d4acdd22c68b88c9fc38c8b23eac713a01e9ce40782a7cbdca5b231ee7c7afaf21d216f4ff7c38d81c23f96570f177608a3b0f73092cbc2ac59bb11d7de28d440ad0f84b5fc9cd22509b54d1afd0e33e6522d589c6b020caf4b8fe10c6e524355122a0f7f85a22d7d9ce17026e58d6b9bf7b9956ee5ced7d730d552b66fb940e16dd3c1421b29399012a982a9bfc3440071a177e6399aae1c29652ca55242e8ca3d50bc", 0xc9}])

14:37:41 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5450)

14:37:41 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:41 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5451)

14:37:42 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatt', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:42 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='vmnet0vboxnet0\x00', 0xf, 0x3)

14:37:42 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5452)

14:37:42 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5460)

14:37:42 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x40)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x10800, 0x0)
connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10)
ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180))
getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:42 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatz', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:42 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8901)

14:37:42 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:42 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = shmget$private(0x0, 0x3000, 0x18, &(0x7f0000ffd000/0x3000)=nil)
shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000280)=""/10)
r2 = accept(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, <r3=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000240)=0x80)
setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3)
setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3)
r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f900e6ce558496f75ea67d903c3a0dda3d66f31fe08fbd43784614575d2709f636168a137cd4776cf20fa9f349c486f9950f0f6e261364642573abd961cb6130867d7dca43738f54b63a42c8a2ffcbba4e5a8c8a3b799767a76372a13c0ffcc7892da48fd8a65b8aebde246bf6b2c1036f3629ef02819044de6d0655a4a2f36b69e4cc", 0x83, 0xfffffffffffffffe)
r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$negate(0xd, r4, 0xec, r5)

14:37:42 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:42 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8902)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  460.625133][T26544] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  460.644548][T26544] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:43 executing program 5:
r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x30000)
ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x71e04ab7, 0x91, 0x3, 0x7, 0x2ab})
rt_sigaction(0x3b, &(0x7f00000001c0)={&(0x7f0000000100)="66450f38db74cd2dc462fd1773ec95640f1f00400f95080f495017c42178ae50da2e64f3440fbd6f9366450f72d200c483bd48be8400000000", {0x1}, 0x80000000, &(0x7f0000000140)="c442d5901c36410f01dd67470f72d7e2c481e351b1ff0000002e3e2e2e2e66420f3a62570000f3a70fa36800410f1aa9da64ec3bc4c3fd7977adb80f03be05000000"}, 0x0, 0x8, &(0x7f0000000200))
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)={0x0, 0x0, {0xff, 0x1, 0x3014, 0x7, 0x9, 0xf, 0x2, 0x5}})

[  460.681913][T26544] FAT-fs (loop2): Filesystem has been set read-only
14:37:43 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  460.748772][T26544] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  460.777185][T26544] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8903)

[  460.818818][T26544] FAT-fs (loop2): Filesystem has been set read-only
14:37:43 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat)', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8904)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:43 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8906)

14:37:43 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8907)

14:37:43 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat*', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:43 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:43 executing program 5:
r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2)
setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e24, 0xffffffff850c4dc5, @ipv4={[], [], @broadcast}, 0xff}, {0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0xbabc}, 0xfff, [0x7, 0x1, 0x3, 0x406, 0x0, 0xffffffffffffffff, 0x9, 0x1000]}, 0x5c)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x890b)

14:37:43 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x890c)

14:37:43 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:44 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
listen(0xffffffffffffffff, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8915)

14:37:44 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfatB', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:44 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x281)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, <r3=>0x0}, &(0x7f00000001c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8)
stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000500)=0xe8)
getgroups(0x2, &(0x7f0000000540)=[<r7=>0x0, 0xffffffffffffffff])
lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0})
write$FUSE_DIRENTPLUS(r1, &(0x7f0000000700)={0x2b0, 0x0, 0x3, [{{0x6, 0x2, 0x5, 0x4, 0xda5f, 0x8, {0x6, 0xfc, 0xe000000000000, 0xa4a9, 0x6, 0x3, 0x0, 0x3, 0x7, 0x400, 0x5, r2, r3, 0x8c7c, 0x400}}, {0x6, 0x7, 0x7, 0x5, ')[^:em0'}}, {{0x4, 0x3, 0x7fffffff, 0x80000001, 0xfffffffffffffe01, 0x7fffffff, {0x6, 0x895, 0xf8, 0xb9, 0x1f, 0x3, 0x7, 0x2, 0x4, 0x219d, 0x1, r4, r5, 0x5, 0xfffffffff28d1975}}, {0x2, 0x0, 0x18, 0x81, 'mime_type[J#bdevvboxnet0'}}, {{0x6, 0x1, 0x1, 0x9, 0x6, 0xc00, {0x5, 0x4b2, 0x8, 0xfffffffffffffffc, 0x400, 0x4, 0xdd08, 0xffffffff, 0xfffffffffffffffa, 0x6, 0x10001, r6, r7, 0x8, 0x2}}, {0x0, 0x5, 0xb, 0xa0e, 'wlan0)wlan0'}}, {{0x2, 0x1, 0x6, 0x7fffffff, 0x4c4, 0x3cfc44bf000000, {0x2, 0x100, 0x8001, 0x983a, 0x401, 0x20, 0x1, 0xaef, 0x3f, 0xffffffffffffff9e, 0x8, r8, r9, 0x3, 0x7}}, {0x2, 0x9ff1, 0xc, 0x4, '/dev/media#\x00'}}]}, 0x2b0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:44 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:44 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x891e)

14:37:44 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:44 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0)
sendto$llc(r0, &(0x7f0000000040)="ff4a5534f735366d5463d17579a9e4b5d21c76af1f2878dca9a2b45c8afad6ff93a79539152633e111ce741f2efa5daec36d9d966765f960d2b1d61031ca0ae44c2adfd54681e3ad96716e", 0x4b, 0x8000, &(0x7f00000000c0)={0x1a, 0x11f, 0x5359, 0x5, 0x10001, 0x2, @broadcast}, 0x10)

14:37:44 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8940)

14:37:44 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat|', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:44 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:44 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8941)

14:37:44 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x12478a9b)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0)
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[r1, r1, r1, r1, r1, r1, r1], 0x7)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:37:44 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:44 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x894c)

14:37:44 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat}', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:44 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:44 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8980)

14:37:45 executing program 5:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:45 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat~', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8981)

14:37:45 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x401, @null, @netrom={'nr', 0x0}, 0x2, [@bcast, @null, @null, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]})

14:37:45 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8982)

14:37:45 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8983)

14:37:45 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:45 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x7f', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:45 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0)
getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4)
ioctl$SIOCRSACCEPT(r1, 0x89e3)
dup(r1)
ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040))
ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x162)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89a0)

14:37:45 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89a1)

14:37:45 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:45 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e0)

14:37:45 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x200080, 0x0)
ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000280)={0xff})
r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r3})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x5, 0x2, 0x3, 0x8, 0xfffffffffffffff9, 0x2}, 0x20)
syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x40002)
ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000140)={0xd, @sliced={0x0, [0x10000, 0x7, 0x100000000, 0x80000001, 0x7f, 0xffffffffffff14db, 0x7fffffff, 0x20, 0x574b, 0x5, 0xfffffffffffffffb, 0xfff, 0xfadf, 0xb5, 0x80000001, 0x42, 0x2, 0x4f48825c, 0x9, 0x3ff, 0x9b28, 0x7f, 0x7, 0x3, 0x3, 0xa5, 0x7, 0xdd, 0x3, 0x4, 0x2, 0x4, 0xece, 0x8, 0x869, 0x1f, 0x0, 0xff, 0x80, 0x7db6, 0x1000, 0x7, 0x6, 0x1d6, 0x3, 0x9, 0x100000001, 0x8e91], 0x7}})
ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000002c0)=0x1)

14:37:45 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:45 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x80', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:45 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e1)

14:37:46 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:46 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = open(&(0x7f0000000280)='./file0\x00', 0x2400, 0x2)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000002c0)="66b02b704569c1a79afa0285cc9d65cac756c3e97676fb2752cc0f3417c01634354077729eb89920e4770e1bf5b32295e7f11e44d49107ee656ba90aac1cdc793501c1d5b91d7a46e1e4b66d0e9993e97ac61ae94d69df70beb055fc3002763898e9f2411c", &(0x7f0000000340)="436deb7e29c03aae1018a87f7700a28756567fb86d730e8c6a1e699257271c31d66fa5757d13a6885d3b8b953d6bc6132ea86bb21253c3cfb82dc28296e0096f7835fd99d9ac977819535ffeda2a02a3a60e02c9a60b4da59160e8d02c85fb726459111a72f2cc3cd5c36c6c29347c9b2cd79830513fc7472f3ca5cc21fadabd2f78eaaa2869c7fa11a1f2360e52b6c56661cc5758f0b9ff", 0x2}, 0x20)
r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000040)="ef4cf437cfc754d8dc9d8dfdab327c189d0853bdb5650d11e422310e87b39451cb49a40fd99960be11aa83f5d727481b065cca5c0055fca2a132281be6374abd655bbe02c585ae516cb750b5cae17b1e2a6938656d058d3a68d91ad56503c0c03e1ad1c0c9e0358eb4f72e428d4a4017ec0aab16bf2fac3c1f3c1a9eec0872b188", &(0x7f0000000100)="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", 0x2}, 0x20)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x8000, 0x0)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e3)

14:37:46 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x81', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:46 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:46 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)

14:37:46 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:46 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
socket$inet_dccp(0x2, 0x6, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={<r1=>0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000000c0)='&GPL\x00'}, 0x30)
r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8042, 0x0)
perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x40, 0x8001, 0xc41, 0x570b, 0x0, 0x6, 0x10030, 0x1, 0x3f, 0x400, 0x6, 0x200, 0x0, 0xa5d, 0x1000, 0x4, 0x8, 0x50000000000000, 0x5f, 0x0, 0x0, 0x8d8, 0x7, 0x8, 0x1000, 0x7, 0x4, 0x100000000, 0x7ff, 0x4, 0x3, 0xfffffffffffffff7, 0x3f8, 0x7, 0x1, 0x800, 0x0, 0x100000000, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x7656, 0x4, 0x4, 0x7, 0x9, 0x6e189aec}, r1, 0xffffffffffffffff, r2, 0x1)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e5)

14:37:46 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 0 (fault-call:4 fault-nth:0):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 5:
r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x400)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
bind$rose(r1, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40)
setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1)
r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8480, 0x0)
ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000100))
setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000940)={'mangle\x00', 0x2, [{}, {}]}, 0x48)
ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x1fb)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x40049409)

14:37:46 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x82', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  464.287117][T27757] FAULT_INJECTION: forcing a failure.
[  464.287117][T27757] name failslab, interval 1, probability 0, space 0, times 0
[  464.349798][T27757] CPU: 1 PID: 27757 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  464.357838][T27757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  464.367917][T27757] Call Trace:
[  464.371234][T27757]  dump_stack+0x172/0x1f0
[  464.375590][T27757]  should_fail.cold+0xa/0x15
[  464.380208][T27757]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  464.386040][T27757]  __should_failslab+0x121/0x190
[  464.392532][T27757]  should_failslab+0x9/0x14
14:37:46 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  464.397049][T27757]  kmem_cache_alloc+0x2b2/0x6f0
[  464.401923][T27757]  getname_flags+0xd6/0x5b0
[  464.406442][T27757]  __x64_sys_execveat+0xd4/0x130
[  464.411401][T27757]  do_syscall_64+0x103/0x610
[  464.416008][T27757]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  464.421908][T27757] RIP: 0033:0x458da9
[  464.425820][T27757] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  464.445433][T27757] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  464.453856][T27757] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  464.461833][T27757] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  464.469820][T27757] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  464.477793][T27757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  464.485772][T27757] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x4020940d)

14:37:46 executing program 4:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:46 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0045878)

14:37:46 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffc, 0x2000)
ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x37, 0x12, 0x8, 0xd, 0x3, 0xffff, 0x3, 0xc6})

14:37:47 executing program 0 (fault-call:4 fault-nth:1):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:47 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0045878)

[  464.833182][T27998] FAULT_INJECTION: forcing a failure.
[  464.833182][T27998] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  464.846441][T27998] CPU: 1 PID: 27998 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  464.854429][T27998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  464.864495][T27998] Call Trace:
[  464.867804][T27998]  dump_stack+0x172/0x1f0
[  464.872161][T27998]  should_fail.cold+0xa/0x15
[  464.876766][T27998]  ? lockdep_hardirqs_on+0x418/0x5d0
[  464.882063][T27998]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  464.887888][T27998]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  464.893374][T27998]  should_fail_alloc_page+0x50/0x60
[  464.898583][T27998]  __alloc_pages_nodemask+0x1a1/0x8d0
[  464.903970][T27998]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  464.909704][T27998]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  464.909728][T27998]  cache_grow_begin+0x9c/0x860
[  464.909748][T27998]  ? getname_flags+0xd6/0x5b0
[  464.924991][T27998]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  464.931247][T27998]  kmem_cache_alloc+0x62d/0x6f0
[  464.936124][T27998]  getname_flags+0xd6/0x5b0
[  464.940648][T27998]  __x64_sys_execveat+0xd4/0x130
[  464.945593][T27998]  do_syscall_64+0x103/0x610
[  464.950193][T27998]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  464.956093][T27998] RIP: 0033:0x458da9
[  464.956109][T27998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:37:47 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
syz_init_net_socket$rose(0xb, 0x5, 0x0)

14:37:47 executing program 4 (fault-call:3 fault-nth:0):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:47 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:47 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0189436)

14:37:47 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  464.956116][T27998] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  464.956130][T27998] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  464.956137][T27998] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  464.956145][T27998] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  464.956154][T27998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  464.956162][T27998] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  465.040323][T28012] FAULT_INJECTION: forcing a failure.
[  465.040323][T28012] name failslab, interval 1, probability 0, space 0, times 0
[  465.062238][T28012] CPU: 0 PID: 28012 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  465.070240][T28012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  465.080292][T28012] Call Trace:
[  465.080320][T28012]  dump_stack+0x172/0x1f0
14:37:47 executing program 0 (fault-call:4 fault-nth:2):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  465.080354][T28012]  should_fail.cold+0xa/0x15
[  465.080384][T28012]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  465.080411][T28012]  ? ___might_sleep+0x163/0x280
[  465.103229][T28012]  __should_failslab+0x121/0x190
[  465.108179][T28012]  should_failslab+0x9/0x14
[  465.112693][T28012]  kmem_cache_alloc+0x2b2/0x6f0
[  465.117562][T28012]  ? ksys_write+0x1f1/0x2d0
[  465.122082][T28012]  getname_flags+0xd6/0x5b0
[  465.126598][T28012]  ? do_syscall_64+0x26/0x610
[  465.131287][T28012]  __x64_sys_execveat+0xd4/0x130
[  465.136248][T28012]  do_syscall_64+0x103/0x610
14:37:47 executing program 5:
r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0)
setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x7f, 0x1f, 0x1, 0x2}, 0x8)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  465.140853][T28012]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  465.146748][T28012] RIP: 0033:0x458da9
[  465.150650][T28012] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  465.170259][T28012] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  465.178683][T28012] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  465.186661][T28012] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  465.194633][T28012] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  465.202605][T28012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  465.213456][T28012] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:47 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc020660b)

14:37:47 executing program 4 (fault-call:3 fault-nth:1):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  465.289614][T28113] FAULT_INJECTION: forcing a failure.
[  465.289614][T28113] name failslab, interval 1, probability 0, space 0, times 0
[  465.317431][T28110] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  465.362317][T28113] CPU: 0 PID: 28113 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  465.370375][T28113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  465.380447][T28113] Call Trace:
[  465.383764][T28113]  dump_stack+0x172/0x1f0
[  465.388115][T28113]  should_fail.cold+0xa/0x15
[  465.392739][T28113]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  465.398569][T28113]  ? ___might_sleep+0x163/0x280
[  465.403439][T28113]  __should_failslab+0x121/0x190
[  465.408397][T28113]  should_failslab+0x9/0x14
[  465.412917][T28113]  kmem_cache_alloc+0x2b2/0x6f0
[  465.417782][T28113]  ? save_stack+0xa9/0xd0
[  465.419515][T28181] FAULT_INJECTION: forcing a failure.
[  465.419515][T28181] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  465.422121][T28113]  dup_fd+0x85/0xb30
[  465.439195][T28113]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  465.445266][T28113]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  465.451505][T28113]  ? debug_smp_processor_id+0x3c/0x280
[  465.456992][T28113]  unshare_fd+0x160/0x1d0
[  465.461328][T28113]  ? set_max_threads+0xe0/0xe0
[  465.466106][T28113]  ? retint_kernel+0x2d/0x2d
[  465.470696][T28113]  ? trace_hardirqs_on_caller+0x6a/0x220
[  465.476373][T28113]  ? cache_grow_end+0xa4/0x190
[  465.481148][T28113]  unshare_files+0x7f/0x1f0
[  465.485654][T28113]  ? __ia32_sys_unshare+0x40/0x40
[  465.490703][T28113]  ? retint_kernel+0x2d/0x2d
[  465.495300][T28113]  __do_execve_file.isra.0+0x27e/0x23f0
[  465.500851][T28113]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  465.507092][T28113]  ? __phys_addr_symbol+0x30/0x70
[  465.512114][T28113]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  465.517836][T28113]  ? __check_object_size+0x3d/0x42f
[  465.523041][T28113]  ? copy_strings_kernel+0x110/0x110
[  465.528327][T28113]  ? strncpy_from_user+0x2a8/0x380
[  465.533451][T28113]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  465.539701][T28113]  __x64_sys_execveat+0xed/0x130
[  465.544646][T28113]  do_syscall_64+0x103/0x610
[  465.549238][T28113]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  465.555122][T28113] RIP: 0033:0x458da9
[  465.559018][T28113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  465.578628][T28113] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  465.587048][T28113] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  465.595026][T28113] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  465.602995][T28113] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  465.610970][T28113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  465.618942][T28113] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  465.626940][T28181] CPU: 1 PID: 28181 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  465.630617][T28110] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  465.634927][T28181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  465.634934][T28181] Call Trace:
[  465.634957][T28181]  dump_stack+0x172/0x1f0
[  465.634979][T28181]  should_fail.cold+0xa/0x15
[  465.634992][T28181]  ? retint_kernel+0x2d/0x2d
[  465.635011][T28181]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  465.635031][T28181]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  465.635055][T28181]  should_fail_alloc_page+0x50/0x60
[  465.635077][T28181]  __alloc_pages_nodemask+0x1a1/0x8d0
[  465.655005][T28181]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  465.655033][T28181]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  465.655056][T28181]  cache_grow_begin+0x9c/0x860
[  465.655076][T28181]  ? getname_flags+0xd6/0x5b0
[  465.662673][T28181]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  465.662695][T28181]  kmem_cache_alloc+0x62d/0x6f0
[  465.662719][T28181]  getname_flags+0xd6/0x5b0
[  465.662734][T28181]  ? do_syscall_64+0x26/0x610
[  465.662756][T28181]  __x64_sys_execveat+0xd4/0x130
[  465.662775][T28181]  do_syscall_64+0x103/0x610
[  465.662796][T28181]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  465.672037][T28110] FAT-fs (loop2): Filesystem has been set read-only
[  465.677733][T28181] RIP: 0033:0x458da9
[  465.677750][T28181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  465.677758][T28181] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  465.677773][T28181] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  465.677788][T28181] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  465.805013][T28181] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:37:48 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0)
connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xcc, 0x1, 0x80, 0x2, 0x1, 0x660}, 0x6}, 0xa)

14:37:48 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = dup(r0)
ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000004b80))
recvmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000001040)=@un=@abs, 0x80, &(0x7f0000001480)=[{&(0x7f00000010c0)=""/188, 0xbc}, {&(0x7f0000001180)=""/38, 0x26}, {&(0x7f00000011c0)=""/42, 0x2a}, {&(0x7f0000001200)=""/108, 0x6c}, {&(0x7f0000001280)=""/210, 0xd2}, {&(0x7f0000001380)=""/217, 0xd9}], 0x6, &(0x7f0000001500)=""/130, 0x82}, 0x81}, {{&(0x7f00000015c0)=@xdp, 0x80, &(0x7f0000001900)=[{&(0x7f0000001640)=""/53, 0x35}, {&(0x7f0000001680)=""/209, 0xd1}, {&(0x7f0000001780)=""/97, 0x61}, {&(0x7f0000001800)=""/251, 0xfb}], 0x4, &(0x7f0000001940)=""/251, 0xfb}, 0x7}, {{&(0x7f0000001a40)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001ac0)=""/44, 0x2c}, {&(0x7f0000001b00)=""/205, 0xcd}, {&(0x7f0000001c00)=""/132, 0x84}, {&(0x7f0000001cc0)=""/125, 0x7d}], 0x4, &(0x7f0000001d80)=""/141, 0x8d}, 0x64}, {{&(0x7f0000001e40)=@pppol2tp={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000001ec0)=""/88, 0x58}, {&(0x7f0000001f40)=""/48, 0x30}, {&(0x7f0000001f80)=""/15, 0xf}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/42, 0x2a}, {&(0x7f0000003000)=""/41, 0x29}, {&(0x7f0000003040)=""/218, 0xda}, {&(0x7f0000003140)=""/47, 0x2f}], 0x8, &(0x7f0000003200)=""/219, 0xdb}, 0x2}, {{&(0x7f0000003300)=@tipc=@name, 0x80, &(0x7f0000003580)=[{&(0x7f0000003380)=""/170, 0xaa}, {&(0x7f0000003440)=""/13, 0xd}, {&(0x7f0000003480)=""/201, 0xc9}], 0x3, &(0x7f00000035c0)=""/109, 0x6d}, 0x6}, {{&(0x7f0000003640)=@l2, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/215, 0xd7}, {&(0x7f00000037c0)=""/10, 0xa}], 0x2, &(0x7f0000003840)=""/201, 0xc9}, 0x5}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f0000003940)=""/72, 0x48}, {&(0x7f00000039c0)=""/165, 0xa5}, {&(0x7f0000003a80)=""/14, 0xe}, {&(0x7f0000003ac0)=""/52, 0x34}, {&(0x7f0000003b00)=""/4096, 0x1000}], 0x5, &(0x7f0000004b80)}, 0x2}, {{&(0x7f0000004bc0)=@nfc_llcp, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004c40)=""/149, 0x95}, {&(0x7f0000004d00)=""/65, 0x41}, {&(0x7f0000004d80)=""/134, 0x86}, {&(0x7f0000004e40)=""/128, 0x80}, {&(0x7f0000004ec0)=""/14, 0xe}], 0x5, &(0x7f0000004f80)=""/131, 0x83}, 0x3}], 0x8, 0x100, &(0x7f0000005240)={0x0, 0x989680})
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000005280)={<r3=>0x0}, &(0x7f00000052c0)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000005300)={0x8, 0xc, 0x7, 0x2, r3}, &(0x7f0000005340)=0x10)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
sendto$inet6(r2, &(0x7f0000005480)="cf57b58655ee4fe8bd0c6e540fca8e46b34079b5a755a73583867c200fb4c79d4345a840f05a98fd3ff1cdc44dadccd85d265bd2a903e80ff1291f0660eea24b9bc8e49fffa1f49bfd3f8249eb6b94e70a", 0x51, 0x4000, &(0x7f0000005500)={0xa, 0x4e20, 0x811, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}, 0x1c)
r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0)
sendto$x25(r4, &(0x7f0000000040)="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", 0x1000, 0x1, 0x0, 0x0)
ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000005380)="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")
socket$inet_udplite(0x2, 0x2, 0x88)

[  465.812992][T28181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  465.820971][T28181] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:48 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  465.918266][T28110] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
14:37:48 executing program 4 (fault-call:3 fault-nth:2):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:48 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
pipe2(&(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x4000)
recvfrom$inet(r1, &(0x7f0000000040)=""/133, 0x85, 0x100, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x189)

[  465.958693][T28110] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  466.008105][T28110] FAT-fs (loop2): Filesystem has been set read-only
14:37:48 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:48 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x191800, 0x0)
ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0xfffffffffffffffe, 0x92, 0xff, 0xa7, 0x8, "e1f39aa7239aa5a5db28187a870909d94eb9f2", 0x7, 0x1447})
ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  466.064504][T28240] FAULT_INJECTION: forcing a failure.
[  466.064504][T28240] name failslab, interval 1, probability 0, space 0, times 0
14:37:48 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
pipe(&(0x7f0000000440)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000540)={0x7, 0x7896})
ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}})
r2 = accept4(r0, 0x0, &(0x7f0000000100), 0x800)
ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000140)="410260c1de571d9ed390e27669bad035ebd541858ce82d0fe1b6a08d889a8166a14b7e4c9cb431fae5f4c1b70984024b3d605a9a31c1c28aed66330cbd70b138edf26128a8cb051f6479501bea7f2f8b2ab57eed75e55d630d79af5cc7df9491e8f64d60b9d59e6cc6fd8c2ac7daf47d6f837680f460b8e0104c6d31263d9ac8751694f2a6ab706ee137cbb3ef8fce4e17f26fdfef83a12ecd663daf4789bd3f5f488508850ed513d7124f503c71804fab5e")
r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x88000)
prctl$PR_GET_SECCOMP(0x15)
getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in, @in=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8)
accept4$ax25(r3, &(0x7f00000003c0)={{0x3, @rose}, [@default, @null, @default, @bcast, @bcast, @remote, @remote, @rose]}, &(0x7f00000000c0)=0x48, 0x80800)
getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000004c0), &(0x7f0000000500)=0xb)
ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={<r4=>0x0})
ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000080)={r4, &(0x7f0000000340)=""/100})

[  466.131089][T28240] CPU: 1 PID: 28240 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  466.139113][T28240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  466.149168][T28240] Call Trace:
[  466.152475][T28240]  dump_stack+0x172/0x1f0
[  466.156824][T28240]  should_fail.cold+0xa/0x15
[  466.161433][T28240]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  466.167250][T28240]  ? __should_failslab+0x14/0x190
[  466.172294][T28240]  __should_failslab+0x121/0x190
[  466.177256][T28240]  should_failslab+0x9/0x14
[  466.181763][T28240]  kmem_cache_alloc+0x2b2/0x6f0
[  466.186622][T28240]  ? save_stack+0xa9/0xd0
[  466.190963][T28240]  dup_fd+0x85/0xb30
[  466.194860][T28240]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  466.200933][T28240]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  466.207182][T28240]  ? debug_smp_processor_id+0x3c/0x280
[  466.212653][T28240]  unshare_fd+0x160/0x1d0
[  466.216987][T28240]  ? set_max_threads+0xe0/0xe0
[  466.221784][T28240]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  466.227250][T28240]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  466.232711][T28240]  ? lockdep_hardirqs_on+0x418/0x5d0
[  466.238001][T28240]  unshare_files+0x7f/0x1f0
[  466.242510][T28240]  ? __ia32_sys_unshare+0x40/0x40
[  466.247549][T28240]  __do_execve_file.isra.0+0x27e/0x23f0
[  466.253113][T28240]  ? copy_strings_kernel+0x110/0x110
[  466.258404][T28240]  ? strncpy_from_user+0x2a8/0x380
[  466.263528][T28240]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  466.269778][T28240]  __x64_sys_execveat+0xed/0x130
[  466.274730][T28240]  do_syscall_64+0x103/0x610
[  466.279328][T28240]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  466.285231][T28240] RIP: 0033:0x458da9
[  466.289133][T28240] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  466.308739][T28240] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  466.317152][T28240] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
14:37:48 executing program 0 (fault-call:4 fault-nth:3):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:48 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002140)='/dev/autofs\x00', 0x80100, 0x0)
ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000040)={0x3, 0x0, 0x2080, {0x10000, 0x1, 0x1}, [], "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", "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"})

14:37:48 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  466.325125][T28240] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  466.333095][T28240] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  466.341161][T28240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  466.349134][T28240] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  466.398829][T28249] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  466.401502][T28251] FAULT_INJECTION: forcing a failure.
[  466.401502][T28251] name failslab, interval 1, probability 0, space 0, times 0
[  466.415370][T28249] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:48 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  466.448124][T28249] FAT-fs (loop2): Filesystem has been set read-only
[  466.458154][T28251] CPU: 1 PID: 28251 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  466.466143][T28251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  466.476201][T28251] Call Trace:
[  466.479503][T28251]  dump_stack+0x172/0x1f0
[  466.483848][T28251]  should_fail.cold+0xa/0x15
[  466.488451][T28251]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  466.494270][T28251]  ? ___might_sleep+0x163/0x280
14:37:48 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80840, 0x0)
write$FUSE_BMAP(r1, &(0x7f0000000040)={0x7, 0xffdffffffffffffe, 0x2, {0xfff}}, 0x18)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={<r2=>0x0, 0xffffffff, 0xfffffffffffffff7}, &(0x7f0000000080)=0x8)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10)
ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='gretap0\x00')
setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0xeb, 0x8000, 0x4, 0x3, r2}, 0x10)
setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000001c0)=0x1, 0xfffffffffffffeea)
r3 = getuid()
ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000240)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r3})

14:37:48 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x801, 0x14)
ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1ff)

[  466.499160][T28251]  __should_failslab+0x121/0x190
[  466.504102][T28251]  should_failslab+0x9/0x14
[  466.508613][T28251]  kmem_cache_alloc_trace+0x2d1/0x760
[  466.513992][T28251]  ? lock_downgrade+0x880/0x880
[  466.518861][T28251]  alloc_fdtable+0x86/0x290
[  466.523386][T28251]  dup_fd+0x743/0xb30
[  466.527396][T28251]  unshare_fd+0x160/0x1d0
[  466.531741][T28251]  ? set_max_threads+0xe0/0xe0
[  466.536513][T28251]  ? retint_kernel+0x2d/0x2d
[  466.541111][T28251]  ? trace_hardirqs_on_caller+0x6a/0x220
[  466.546749][T28251]  ? cache_grow_end+0xa4/0x190
[  466.551522][T28251]  unshare_files+0x7f/0x1f0
[  466.556035][T28251]  ? __ia32_sys_unshare+0x40/0x40
[  466.561066][T28251]  ? retint_kernel+0x2d/0x2d
[  466.565670][T28251]  __do_execve_file.isra.0+0x27e/0x23f0
[  466.571224][T28251]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  466.577469][T28251]  ? __phys_addr_symbol+0x30/0x70
[  466.582502][T28251]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  466.588224][T28251]  ? __check_object_size+0x3d/0x42f
[  466.593436][T28251]  ? copy_strings_kernel+0x110/0x110
[  466.598723][T28251]  ? strncpy_from_user+0x2a8/0x380
[  466.603843][T28251]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  466.610100][T28251]  __x64_sys_execveat+0xed/0x130
[  466.615055][T28251]  do_syscall_64+0x103/0x610
[  466.619651][T28251]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  466.625541][T28251] RIP: 0033:0x458da9
[  466.629434][T28251] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  466.649037][T28251] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  466.657450][T28251] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  466.665420][T28251] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  466.673390][T28251] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  466.681372][T28251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  466.689346][T28251] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:49 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x42ca, 0x4000)
getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xfffffffffffffff9, 0x7, 0x7fffffff, 0x2c1228ae, 0x4, 0x5, 0x4, {<r2=>0x0, @in={{0x2, 0x4e23, @loopback}}, 0x6e, 0x8d, 0x3, 0x9, 0x5a8}}, &(0x7f0000000280)=0xb0)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x60000000000000, 0x2ffd}, 0x8)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8)
getgroups(0x5, &(0x7f0000000140)=[0xee01, 0xffffffffffffffff, 0xee01, <r4=>0xee00, 0xee01])
write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0x0, 0x2, {0x101, 0x6, 0x0, {0x1, 0x6, 0x7fff, 0x2, 0x7, 0x19, 0x7, 0x9, 0x2, 0x1, 0x2, r3, r4, 0x5}}}, 0x78)

[  466.753812][T28268] cgroup: fork rejected by pids controller in /syz1
[  466.766536][T28249] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  466.812148][T28249] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:49 executing program 4 (fault-call:3 fault-nth:3):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:49 executing program 5:
r0 = socket$caif_stream(0x25, 0x1, 0x4)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000000)=0x7)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  466.855976][T28249] FAT-fs (loop2): Filesystem has been set read-only
[  466.959251][T28378] FAULT_INJECTION: forcing a failure.
[  466.959251][T28378] name failslab, interval 1, probability 0, space 0, times 0
[  466.976430][T28378] CPU: 1 PID: 28378 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  466.984427][T28378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  466.994492][T28378] Call Trace:
[  466.997805][T28378]  dump_stack+0x172/0x1f0
[  467.002154][T28378]  should_fail.cold+0xa/0x15
[  467.006757][T28378]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  467.012578][T28378]  ? ___might_sleep+0x163/0x280
[  467.017438][T28378]  __should_failslab+0x121/0x190
[  467.022382][T28378]  should_failslab+0x9/0x14
[  467.026899][T28378]  kmem_cache_alloc_node_trace+0x270/0x720
[  467.032719][T28378]  __kmalloc_node+0x3d/0x70
[  467.037231][T28378]  kvmalloc_node+0x68/0x100
[  467.041740][T28378]  alloc_fdtable+0xd6/0x290
[  467.046249][T28378]  dup_fd+0x743/0xb30
[  467.050250][T28378]  unshare_fd+0x160/0x1d0
[  467.054587][T28378]  ? set_max_threads+0xe0/0xe0
[  467.059376][T28378]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  467.065023][T28378]  unshare_files+0x7f/0x1f0
[  467.069530][T28378]  ? should_fail+0x1de/0x852
[  467.074126][T28378]  ? __ia32_sys_unshare+0x40/0x40
[  467.079165][T28378]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  467.084985][T28378]  __do_execve_file.isra.0+0x27e/0x23f0
[  467.090623][T28378]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  467.096867][T28378]  ? __phys_addr_symbol+0x30/0x70
[  467.101902][T28378]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  467.107624][T28378]  ? __check_object_size+0x3d/0x42f
[  467.112926][T28378]  ? copy_strings_kernel+0x110/0x110
[  467.118215][T28378]  ? strncpy_from_user+0x2a8/0x380
[  467.123343][T28378]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  467.129594][T28378]  __x64_sys_execveat+0xed/0x130
[  467.134549][T28378]  do_syscall_64+0x103/0x610
[  467.139148][T28378]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  467.145042][T28378] RIP: 0033:0x458da9
[  467.148945][T28378] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  467.168556][T28378] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  467.176970][T28378] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  467.184945][T28378] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  467.192917][T28378] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  467.200892][T28378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
14:37:49 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:49 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:49 executing program 0 (fault-call:4 fault-nth:4):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:49 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x5, 0x3, 0x5, 0x401})
ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040))

[  467.208864][T28378] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:49 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = dup3(r0, r0, 0x80000)
write$tun(r1, &(0x7f0000000000)={@void, @void, @arp=@generic={0x335, 0xe84d, 0x6, 0x2, 0x9, @dev={[], 0x1e}, "cffb", @random="7d2549162746", "2323ef2355f903c2cd0a09577bcca507"}}, 0x26)

[  467.267559][T28483] FAULT_INJECTION: forcing a failure.
[  467.267559][T28483] name failslab, interval 1, probability 0, space 0, times 0
14:37:49 executing program 4 (fault-call:3 fault-nth:4):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:49 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0)
write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  467.345598][T28483] CPU: 0 PID: 28483 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  467.353619][T28483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  467.363680][T28483] Call Trace:
[  467.366995][T28483]  dump_stack+0x172/0x1f0
[  467.371358][T28483]  should_fail.cold+0xa/0x15
[  467.372417][T28527] FAULT_INJECTION: forcing a failure.
[  467.372417][T28527] name failslab, interval 1, probability 0, space 0, times 0
[  467.375971][T28483]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  467.375997][T28483]  ? ___might_sleep+0x163/0x280
[  467.376019][T28483]  __should_failslab+0x121/0x190
[  467.376036][T28483]  should_failslab+0x9/0x14
[  467.376054][T28483]  kmem_cache_alloc_node_trace+0x270/0x720
[  467.376085][T28483]  __kmalloc_node+0x3d/0x70
[  467.418987][T28483]  kvmalloc_node+0x68/0x100
[  467.423504][T28483]  alloc_fdtable+0xd6/0x290
[  467.428020][T28483]  dup_fd+0x743/0xb30
[  467.432026][T28483]  unshare_fd+0x160/0x1d0
[  467.436423][T28483]  ? lockdep_hardirqs_on+0x418/0x5d0
[  467.441716][T28483]  ? set_max_threads+0xe0/0xe0
[  467.446495][T28483]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  467.451963][T28483]  unshare_files+0x7f/0x1f0
[  467.456474][T28483]  ? __ia32_sys_unshare+0x40/0x40
[  467.461518][T28483]  __do_execve_file.isra.0+0x27e/0x23f0
[  467.467069][T28483]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  467.473316][T28483]  ? __phys_addr_symbol+0x30/0x70
[  467.478362][T28483]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  467.484091][T28483]  ? __check_object_size+0x3d/0x42f
[  467.489300][T28483]  ? copy_strings_kernel+0x110/0x110
[  467.494602][T28483]  ? strncpy_from_user+0x2a8/0x380
[  467.499719][T28483]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  467.505971][T28483]  __x64_sys_execveat+0xed/0x130
[  467.510923][T28483]  do_syscall_64+0x103/0x610
[  467.515524][T28483]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  467.521421][T28483] RIP: 0033:0x458da9
[  467.525322][T28483] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  467.544940][T28483] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  467.553359][T28483] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  467.561349][T28483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  467.569328][T28483] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  467.577318][T28483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  467.585299][T28483] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:50 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0)
ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/4096)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  467.593490][T28527] CPU: 1 PID: 28527 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  467.601482][T28527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  467.611538][T28527] Call Trace:
[  467.614837][T28527]  dump_stack+0x172/0x1f0
[  467.619191][T28527]  should_fail.cold+0xa/0x15
[  467.623795][T28527]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  467.629617][T28527]  ? ___might_sleep+0x163/0x280
[  467.634483][T28527]  __should_failslab+0x121/0x190
[  467.639432][T28527]  should_failslab+0x9/0x14
[  467.643949][T28527]  kmem_cache_alloc_node_trace+0x270/0x720
[  467.649772][T28527]  ? retint_kernel+0x2d/0x2d
[  467.654388][T28527]  __kmalloc_node+0x3d/0x70
[  467.658906][T28527]  kvmalloc_node+0x68/0x100
[  467.663416][T28527]  alloc_fdtable+0xd6/0x290
[  467.667935][T28527]  dup_fd+0x743/0xb30
[  467.671932][T28527]  unshare_fd+0x160/0x1d0
[  467.671951][T28527]  ? set_max_threads+0xe0/0xe0
[  467.671968][T28527]  ? retint_kernel+0x2d/0x2d
[  467.671984][T28527]  ? trace_hardirqs_on_caller+0x6a/0x220
[  467.671999][T28527]  ? cache_grow_end+0xa4/0x190
14:37:50 executing program 0 (fault-call:4 fault-nth:5):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  467.672020][T28527]  unshare_files+0x7f/0x1f0
[  467.672042][T28527]  ? __ia32_sys_unshare+0x40/0x40
[  467.696072][T28527]  ? retint_kernel+0x2d/0x2d
[  467.696100][T28527]  __do_execve_file.isra.0+0x27e/0x23f0
[  467.696116][T28527]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  467.696138][T28527]  ? __phys_addr_symbol+0x30/0x70
[  467.702887][T28525] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  467.705645][T28527]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  467.705662][T28527]  ? __check_object_size+0x3d/0x42f
[  467.705686][T28527]  ? copy_strings_kernel+0x110/0x110
[  467.705702][T28527]  ? strncpy_from_user+0x2a8/0x380
[  467.705724][T28527]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  467.715517][T28525] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  467.715842][T28527]  __x64_sys_execveat+0xed/0x130
[  467.727083][T28527]  do_syscall_64+0x103/0x610
[  467.727106][T28527]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  467.727119][T28527] RIP: 0033:0x458da9
14:37:50 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet_smc(0x2b, 0x1, 0x0)
r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x80000001, 0x206103)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100))
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x42001, 0x0)
openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
ioctl$TIOCSCTTY(r1, 0x540e, 0x7)
ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x51)
modify_ldt$write(0x1, &(0x7f0000000080)={0x7fff, 0xffffffffffffffff, 0x4000, 0x0, 0x32, 0x8, 0x1f, 0xa7b, 0x5, 0x81}, 0x10)

[  467.727134][T28527] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  467.727149][T28527] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  467.748467][T28525] FAT-fs (loop2): Filesystem has been set read-only
[  467.752314][T28527] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  467.752325][T28527] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
14:37:50 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:50 executing program 4 (fault-call:3 fault-nth:5):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  467.752343][T28527] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  467.752353][T28527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  467.752363][T28527] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  467.914818][T28646] FAULT_INJECTION: forcing a failure.
[  467.914818][T28646] name failslab, interval 1, probability 0, space 0, times 0
[  467.937024][T28669] FAULT_INJECTION: forcing a failure.
[  467.937024][T28669] name failslab, interval 1, probability 0, space 0, times 0
[  467.953474][T28646] CPU: 0 PID: 28646 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  467.961471][T28646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  467.971532][T28646] Call Trace:
[  467.974843][T28646]  dump_stack+0x172/0x1f0
[  467.979194][T28646]  should_fail.cold+0xa/0x15
[  467.983801][T28646]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  467.989622][T28646]  ? ___might_sleep+0x163/0x280
[  467.994495][T28646]  __should_failslab+0x121/0x190
[  467.999458][T28646]  should_failslab+0x9/0x14
[  468.003978][T28646]  kmem_cache_alloc_node_trace+0x270/0x720
[  468.009796][T28646]  ? kasan_unpoison_shadow+0x35/0x50
[  468.015094][T28646]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  468.020913][T28646]  __kmalloc_node+0x3d/0x70
[  468.025428][T28646]  kvmalloc_node+0x68/0x100
[  468.029941][T28646]  alloc_fdtable+0x142/0x290
[  468.034539][T28646]  dup_fd+0x743/0xb30
[  468.038546][T28646]  unshare_fd+0x160/0x1d0
[  468.042888][T28646]  ? set_max_threads+0xe0/0xe0
[  468.047658][T28646]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  468.053122][T28646]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  468.058584][T28646]  ? lockdep_hardirqs_on+0x418/0x5d0
[  468.063878][T28646]  unshare_files+0x7f/0x1f0
[  468.068476][T28646]  ? __ia32_sys_unshare+0x40/0x40
[  468.073520][T28646]  __do_execve_file.isra.0+0x27e/0x23f0
[  468.079079][T28646]  ? retint_kernel+0x2d/0x2d
[  468.083685][T28646]  ? copy_strings_kernel+0x110/0x110
[  468.088977][T28646]  ? strncpy_from_user+0x2a8/0x380
[  468.094098][T28646]  ? getname_flags+0x120/0x5b0
[  468.098871][T28646]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  468.105123][T28646]  __x64_sys_execveat+0xed/0x130
[  468.110085][T28646]  do_syscall_64+0x103/0x610
[  468.114687][T28646]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  468.120588][T28646] RIP: 0033:0x458da9
[  468.124487][T28646] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  468.144097][T28646] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  468.152515][T28646] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  468.160495][T28646] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  468.168473][T28646] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  468.176452][T28646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  468.184426][T28646] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  468.192434][T28669] CPU: 1 PID: 28669 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  468.200429][T28669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  468.210485][T28669] Call Trace:
[  468.213791][T28669]  dump_stack+0x172/0x1f0
[  468.218136][T28669]  should_fail.cold+0xa/0x15
[  468.222736][T28669]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  468.228559][T28669]  ? ___might_sleep+0x163/0x280
[  468.233423][T28669]  __should_failslab+0x121/0x190
[  468.238381][T28669]  should_failslab+0x9/0x14
[  468.242898][T28669]  kmem_cache_alloc_node_trace+0x270/0x720
[  468.248718][T28669]  __kmalloc_node+0x3d/0x70
[  468.253228][T28669]  kvmalloc_node+0x68/0x100
[  468.257743][T28669]  alloc_fdtable+0x142/0x290
[  468.262365][T28669]  dup_fd+0x743/0xb30
[  468.266365][T28669]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  468.271843][T28669]  unshare_fd+0x160/0x1d0
[  468.276187][T28669]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  468.281649][T28669]  ? set_max_threads+0xe0/0xe0
[  468.286431][T28669]  ? retint_kernel+0x2d/0x2d
[  468.291037][T28669]  unshare_files+0x7f/0x1f0
[  468.295547][T28669]  ? __ia32_sys_unshare+0x40/0x40
[  468.300577][T28669]  ? __do_execve_file.isra.0+0x237/0x23f0
[  468.306306][T28669]  ? unshare_files+0x1a/0x1f0
[  468.311007][T28669]  __do_execve_file.isra.0+0x27e/0x23f0
[  468.316592][T28669]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  468.322837][T28669]  ? __phys_addr_symbol+0x30/0x70
[  468.327863][T28669]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  468.333595][T28669]  ? __check_object_size+0x3d/0x42f
[  468.338807][T28669]  ? copy_strings_kernel+0x110/0x110
[  468.344098][T28669]  ? strncpy_from_user+0x2a8/0x380
[  468.349219][T28669]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  468.355477][T28669]  __x64_sys_execveat+0xed/0x130
[  468.360432][T28669]  do_syscall_64+0x103/0x610
[  468.365033][T28669]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  468.370933][T28669] RIP: 0033:0x458da9
[  468.374833][T28669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  468.395360][T28669] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  468.403775][T28669] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  468.411748][T28669] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  468.419723][T28669] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  468.427695][T28669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  468.435671][T28669] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:50 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:50 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:50 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)

14:37:50 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:50 executing program 0 (fault-call:4 fault-nth:6):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:50 executing program 4 (fault-call:3 fault-nth:6):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:50 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)

[  468.580232][T28726] FAULT_INJECTION: forcing a failure.
[  468.580232][T28726] name failslab, interval 1, probability 0, space 0, times 0
[  468.627205][T28814] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  468.631963][T28726] CPU: 1 PID: 28726 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  468.644239][T28726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  468.654298][T28726] Call Trace:
[  468.657646][T28726]  dump_stack+0x172/0x1f0
[  468.661988][T28726]  should_fail.cold+0xa/0x15
[  468.666587][T28726]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  468.672405][T28726]  ? ___might_sleep+0x163/0x280
[  468.677268][T28726]  __should_failslab+0x121/0x190
[  468.682210][T28726]  should_failslab+0x9/0x14
[  468.686718][T28726]  kmem_cache_alloc_trace+0x2d1/0x760
[  468.692104][T28726]  ? retint_kernel+0x2d/0x2d
[  468.696710][T28726]  __do_execve_file.isra.0+0x325/0x23f0
[  468.702261][T28726]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  468.703780][T28814] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  468.708682][T28726]  ? __phys_addr_symbol+0x30/0x70
14:37:51 executing program 3:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0)
getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:37:51 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  468.708697][T28726]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  468.708717][T28726]  ? __check_object_size+0x3d/0x42f
[  468.734520][T28726]  ? copy_strings_kernel+0x110/0x110
[  468.734536][T28726]  ? strncpy_from_user+0x2a8/0x380
[  468.734557][T28726]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  468.734579][T28726]  __x64_sys_execveat+0xed/0x130
[  468.734602][T28726]  do_syscall_64+0x103/0x610
[  468.734624][T28726]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  468.751592][T28833] FAULT_INJECTION: forcing a failure.
[  468.751592][T28833] name failslab, interval 1, probability 0, space 0, times 0
[  468.756149][T28726] RIP: 0033:0x458da9
[  468.756164][T28726] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  468.756172][T28726] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  468.756185][T28726] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  468.756194][T28726] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  468.756203][T28726] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  468.756211][T28726] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  468.756220][T28726] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  468.761924][T28814] FAT-fs (loop2): Filesystem has been set read-only
[  468.832207][T28833] CPU: 1 PID: 28833 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  468.852103][T28833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  468.852110][T28833] Call Trace:
[  468.852134][T28833]  dump_stack+0x172/0x1f0
[  468.852156][T28833]  should_fail.cold+0xa/0x15
[  468.852169][T28833]  ? retint_kernel+0x2d/0x2d
[  468.852187][T28833]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  468.852213][T28833]  __should_failslab+0x121/0x190
[  468.852232][T28833]  should_failslab+0x9/0x14
[  468.866782][T28833]  kmem_cache_alloc_trace+0x2d1/0x760
[  468.866811][T28833]  __do_execve_file.isra.0+0x325/0x23f0
[  468.866826][T28833]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
14:37:51 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$sndpcmp(&(0x7f00000006c0)='/dev/snd/pcmC#D#p\x00', 0x40, 0x420000)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000740)={<r2=>0x0, 0x10, &(0x7f0000000700)=[@in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000780)=0x10)
setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000007c0)={r2, 0x388b, 0x3}, 0x2a7)
socket$inet_dccp(0x2, 0x6, 0x0)
r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x746, 0x200)
sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast2}, 0x0, 0x4, 0x4, 0x2}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000000c0)="458b5be3db6d72add48140ce6a11e1ee00270bfa3c044173dd69a4db8e1a1704b21cabd37e5c6a0f738929f5dfd02f7dfb9c5432c21caa595b930775dea219cbb779d1e31a6ec9d7ad6eb4d21414c739212382c02a09522a37e2c35cf99ed41deb577054c10ea65aaf16c99a94c4da3a8d80f99925cae39877284e7515abed5146c2b69e25febbf9c43ab5ac500f2ebe3d1c8907ec308df7137c180677da8b37595d843e283250d414900d09a8c6bf75987c114a1741d67be9506728", 0xbc}, {&(0x7f0000000180)="729c43c335e24c05ec21fc58cd65a562cddba4c8f7246f84fd98b7a427a0da739af436a8b1fa661f4892b91b8434809a3e2c26a5a4ef6d07ee1edba43c6a6130cbb61237970f92b0cfd9135ea11584354757a18019ccbf7ae914dbd1df07a83fbdbf791ca45d062d", 0x68}, {&(0x7f0000000940)="55a5f4052b5b59351226519ee966cb63f885015ea53a4df3ecc2386ec8e5c3a01ebfa0e447179e00d4d8b47cc4fe7bc7a7cbcd0e53373b965d3ac43e8d219c51ae5285971ee40b4d2494d1de2107dcd8f07a66986f5ba440138a18c9a78a2907a9", 0x61}, {&(0x7f0000000280)="b30b5a4a48927f055ec9f5c0b05dae8ca32779235316ea92f1f0c70ebdd5c94857b1816f85ca6e6d4c74f703b46202ab888c80a1d38c16bc4920dadac4e54949637ce0b0aa8191938b381cc077532312942e1b7010a9d9bea23de0d2bfdf27bb95185ed4fb9e", 0xffffffffffffffe7}, {&(0x7f00000009c0)="15931c92005e797bb3ec76bede1fd31f624b4196fc96cc517468825f4caeace7211294b5d64b3e910c628c0a5e0b28133d6b51ee472c0558350f3948e70978e8d421bc8232b1fbe2ec23cb30445310c1d72567ab8480e06d5ebc86a50d6529f0b5a4bacfd787ada08ca3fae3afff01000080bbe7536d4691993f05b26b8b402c3c6c9d9bd101b620a3f13bee9400000000000000", 0x91}, {&(0x7f00000003c0)="d04b95156bf8f872d5a7c322021e307d87309a316b852c2d620048dd0c37a993c47275c5c44afbe47e203cbc29d38a6ab6749d664208f1c447d915c7fc8ac19e4827dce6160d7a3af957fa54c0482950d990379aa93f964fcf804d8d4f73d26dc86252d0d14ba477fcda67b6b5baf8d837b9b3f2ee75e21223d0bbeda5a6a1253ac71eef1330fdc0d520f64e08b2b269f456ff3eedb72cb74199b499081d6a611a7cad0b6db12a832fce9025abf410788e229fa04d6cb7ea434e28c17a8d3d41b6b34b390f13c96f20b15affdfb2", 0xce}, {&(0x7f00000004c0)="e6b0ac6e9e37c1f6a10e88c9c9035be55cbcf5f82e", 0x15}, {&(0x7f0000000500)="6ec0113f74519a9dbb1c6cbdcd7beaeea06d8735cce0e5204298f8f40613dc7242dba2b9f8898bcf2ef1d0625fe4bbab436fa8e5a33df01d6b77b1d06b5904e2dfc54758d3df7560d3c5ad015ba736a8bcad5e597a81ddf04e9282728f2d869526fa1ca4d57b3c04e096388a57210553c2fe847ec8f2b6d13f4442f5f38729ced5de16821023301b5406794af59ebb618fcb577dc477cea2801164735efbad81901d2fe5a95a0328e650ab6fb4038a", 0xaf}], 0x8, 0x0, 0x37e}, 0x20000000)
ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000800)={0x1, 0x2, [{r3, 0x0, 0xfffffffff0000000}, {r3, 0x0, 0xfffff000, 0xfffffffff0008000}]})
openat$nullb(0xffffffffffffff9c, &(0x7f0000000680)='/dev/nullb0\x00', 0x0, 0x0)
unlinkat(r1, &(0x7f0000000840)='./file0\x00', 0x0)
ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000880))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  468.866842][T28833]  ? __phys_addr_symbol+0x30/0x70
[  468.866855][T28833]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  468.866870][T28833]  ? __check_object_size+0x3d/0x42f
[  468.866896][T28833]  ? copy_strings_kernel+0x110/0x110
[  468.947587][T28833]  ? strncpy_from_user+0x2a8/0x380
[  468.952710][T28833]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  468.958962][T28833]  __x64_sys_execveat+0xed/0x130
[  468.963917][T28833]  do_syscall_64+0x103/0x610
[  468.968520][T28833]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  468.974413][T28833] RIP: 0033:0x458da9
[  468.978318][T28833] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  468.997941][T28833] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  469.006371][T28833] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  469.014354][T28833] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  469.022327][T28833] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  469.030311][T28833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  469.038291][T28833] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:51 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:51 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RCLUNK(r0, &(0x7f0000000100)={0x8b}, 0x7)
sync_file_range(r0, 0x0, 0x0, 0x0)
fallocate(r1, 0x0, 0x0, 0x2000002)
fallocate(r0, 0x0, 0x3042, 0x110001)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1})
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000180)=0x10000)
ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0xfff)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)

[  469.092415][T28814] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  469.122051][T28814] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  469.135909][T28814] FAT-fs (loop2): Filesystem has been set read-only
14:37:51 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:51 executing program 4 (fault-call:3 fault-nth:7):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:51 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:51 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:51 executing program 0 (fault-call:4 fault-nth:7):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  469.234821][T28851] FAULT_INJECTION: forcing a failure.
[  469.234821][T28851] name failslab, interval 1, probability 0, space 0, times 0
[  469.291785][T28851] CPU: 1 PID: 28851 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  469.300008][T28851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  469.310069][T28851] Call Trace:
[  469.313385][T28851]  dump_stack+0x172/0x1f0
[  469.317741][T28851]  should_fail.cold+0xa/0x15
[  469.322355][T28851]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  469.328177][T28851]  ? ___might_sleep+0x163/0x280
[  469.333039][T28851]  __should_failslab+0x121/0x190
[  469.337989][T28851]  should_failslab+0x9/0x14
[  469.342502][T28851]  kmem_cache_alloc+0x2b2/0x6f0
[  469.347384][T28851]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  469.353635][T28851]  ? __validate_process_creds+0x22d/0x380
[  469.359381][T28851]  prepare_creds+0x3e/0x3f0
[  469.363941][T28851]  prepare_exec_creds+0x12/0xf0
[  469.368803][T28851]  __do_execve_file.isra.0+0x393/0x23f0
[  469.374381][T28851]  ? copy_strings_kernel+0x110/0x110
[  469.379687][T28851]  __x64_sys_execveat+0xed/0x130
[  469.384641][T28851]  do_syscall_64+0x103/0x610
[  469.389245][T28851]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  469.395140][T28851] RIP: 0033:0x458da9
[  469.399040][T28851] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  469.418656][T28851] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  469.427084][T28851] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  469.435064][T28851] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  469.443037][T28851] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  469.451019][T28851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  469.458995][T28851] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  469.479877][T28863] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  469.504618][T28863] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:51 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x186, 0x400, 0x7, 0x7f})

[  469.554629][T28964] FAULT_INJECTION: forcing a failure.
[  469.554629][T28964] name failslab, interval 1, probability 0, space 0, times 0
[  469.568392][T28863] FAT-fs (loop2): Filesystem has been set read-only
[  469.581152][T28964] CPU: 1 PID: 28964 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  469.589147][T28964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  469.599204][T28964] Call Trace:
[  469.602513][T28964]  dump_stack+0x172/0x1f0
[  469.606869][T28964]  should_fail.cold+0xa/0x15
[  469.611484][T28964]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  469.617303][T28964]  ? ___might_sleep+0x163/0x280
[  469.622180][T28964]  __should_failslab+0x121/0x190
[  469.627129][T28964]  should_failslab+0x9/0x14
[  469.631639][T28964]  kmem_cache_alloc+0x2b2/0x6f0
[  469.636499][T28964]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  469.642751][T28964]  ? __validate_process_creds+0x22d/0x380
[  469.648480][T28964]  prepare_creds+0x3e/0x3f0
[  469.652994][T28964]  prepare_exec_creds+0x12/0xf0
[  469.657853][T28964]  __do_execve_file.isra.0+0x393/0x23f0
[  469.663408][T28964]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  469.669660][T28964]  ? __phys_addr_symbol+0x30/0x70
[  469.674700][T28964]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  469.680432][T28964]  ? __check_object_size+0x3d/0x42f
[  469.685682][T28964]  ? copy_strings_kernel+0x110/0x110
[  469.690976][T28964]  ? strncpy_from_user+0x2a8/0x380
[  469.696102][T28964]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:37:52 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40100, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x200, 0x7f, 0x2, <r2=>0x0}, &(0x7f0000000080)=0x10)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x84, "ab3aed303e9ce0f8dff5aabfd149c287c74b183dc15e71879ab30186a023e3264a080026c9d9f3bdd28712ba84105a7195a383b0058397f33062c59c41bd8eff2aa4acfde1e20dd5f043a1d77c877d7b3288cb3016a976d7df808ab4739f976b4dce1f57203029c8af015552a1e6a69f8afeee4d1b5c13fa01b0740ee02b4be533f5d009"}, &(0x7f0000000180)=0x8c)

[  469.702368][T28964]  __x64_sys_execveat+0xed/0x130
[  469.707411][T28964]  do_syscall_64+0x103/0x610
[  469.712023][T28964]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  469.717928][T28964] RIP: 0033:0x458da9
[  469.721831][T28964] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  469.741447][T28964] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  469.750010][T28964] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  469.757993][T28964] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  469.765976][T28964] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  469.774043][T28964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  469.782014][T28964] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  469.790367][   T26] audit: type=1800 audit(1556807871.972:139): pid=28849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16722 res=0
14:37:52 executing program 0 (fault-call:4 fault-nth:8):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  469.847832][T28863] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
14:37:52 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:52 executing program 4 (fault-call:3 fault-nth:8):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  469.890650][T28863] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:52 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1)

[  469.947597][T28978] FAULT_INJECTION: forcing a failure.
[  469.947597][T28978] name failslab, interval 1, probability 0, space 0, times 0
[  469.977229][T28863] FAT-fs (loop2): Filesystem has been set read-only
[  469.990794][T29022] FAULT_INJECTION: forcing a failure.
[  469.990794][T29022] name failslab, interval 1, probability 0, space 0, times 0
[  470.005984][T28978] CPU: 1 PID: 28978 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  470.013980][T28978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  470.024042][T28978] Call Trace:
[  470.027366][T28978]  dump_stack+0x172/0x1f0
[  470.031725][T28978]  should_fail.cold+0xa/0x15
[  470.036349][T28978]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  470.042202][T28978]  ? ___might_sleep+0x163/0x280
[  470.047074][T28978]  __should_failslab+0x121/0x190
[  470.052026][T28978]  should_failslab+0x9/0x14
[  470.056552][T28978]  kmem_cache_alloc+0x2b2/0x6f0
[  470.061422][T28978]  __alloc_file+0x27/0x300
[  470.065851][T28978]  alloc_empty_file+0x72/0x170
[  470.070637][T28978]  path_openat+0xef/0x46e0
[  470.075081][T28978]  ? save_stack+0xa9/0xd0
[  470.079420][T28978]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  470.084797][T28978]  ? __kmalloc+0x15c/0x740
[  470.089215][T28978]  ? security_prepare_creds+0x123/0x190
[  470.094765][T28978]  ? prepare_creds+0x2f5/0x3f0
[  470.099536][T28978]  ? prepare_exec_creds+0x12/0xf0
[  470.104567][T28978]  ? __do_execve_file.isra.0+0x393/0x23f0
[  470.110291][T28978]  ? __x64_sys_execveat+0xed/0x130
[  470.115412][T28978]  ? do_syscall_64+0x103/0x610
[  470.120178][T28978]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  470.126861][T28978]  ? __lock_acquire+0x548/0x3fb0
[  470.131816][T28978]  do_filp_open+0x1a1/0x280
[  470.136329][T28978]  ? may_open_dev+0x100/0x100
[  470.141114][T28978]  ? mark_held_locks+0xa4/0xf0
[  470.145892][T28978]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.151368][T28978]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.156835][T28978]  ? lockdep_hardirqs_on+0x418/0x5d0
[  470.162125][T28978]  ? trace_hardirqs_on_caller+0x6a/0x220
[  470.167781][T28978]  ? mark_held_locks+0xa4/0xf0
[  470.172554][T28978]  ? debug_smp_processor_id+0x3c/0x280
[  470.178021][T28978]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.183488][T28978]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.188957][T28978]  ? lockdep_hardirqs_on+0x418/0x5d0
[  470.194257][T28978]  do_open_execat+0x137/0x690
[  470.198950][T28978]  ? unregister_binfmt+0x170/0x170
[  470.204066][T28978]  ? lock_downgrade+0x880/0x880
[  470.208927][T28978]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  470.215174][T28978]  ? kasan_check_read+0x11/0x20
[  470.220037][T28978]  ? do_raw_spin_unlock+0x57/0x270
[  470.225161][T28978]  __do_execve_file.isra.0+0x178d/0x23f0
[  470.230840][T28978]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  470.237102][T28978]  ? copy_strings_kernel+0x110/0x110
[  470.242395][T28978]  ? strncpy_from_user+0x2a8/0x380
[  470.247523][T28978]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  470.253775][T28978]  __x64_sys_execveat+0xed/0x130
[  470.258736][T28978]  do_syscall_64+0x103/0x610
[  470.263355][T28978]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  470.269260][T28978] RIP: 0033:0x458da9
[  470.273160][T28978] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  470.292767][T28978] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  470.301187][T28978] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  470.309166][T28978] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  470.317140][T28978] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  470.325114][T28978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  470.333099][T28978] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  470.341108][T29022] CPU: 0 PID: 29022 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  470.349104][T29022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  470.359163][T29022] Call Trace:
[  470.362470][T29022]  dump_stack+0x172/0x1f0
[  470.366816][T29022]  should_fail.cold+0xa/0x15
[  470.371423][T29022]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  470.377244][T29022]  ? ___might_sleep+0x163/0x280
[  470.382107][T29022]  __should_failslab+0x121/0x190
[  470.387050][T29022]  should_failslab+0x9/0x14
[  470.392408][T29022]  kmem_cache_alloc+0x2b2/0x6f0
14:37:52 executing program 0 (fault-call:4 fault-nth:9):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  470.397266][T29022]  ? kasan_check_read+0x11/0x20
[  470.402125][T29022]  __alloc_file+0x27/0x300
[  470.406555][T29022]  alloc_empty_file+0x72/0x170
[  470.411375][T29022]  path_openat+0xef/0x46e0
[  470.415818][T29022]  ? save_stack+0xa9/0xd0
[  470.420155][T29022]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  470.425529][T29022]  ? __kmalloc+0x15c/0x740
[  470.429946][T29022]  ? security_prepare_creds+0x123/0x190
[  470.435526][T29022]  ? prepare_creds+0x2f5/0x3f0
[  470.440292][T29022]  ? prepare_exec_creds+0x12/0xf0
[  470.445322][T29022]  ? __do_execve_file.isra.0+0x393/0x23f0
[  470.451051][T29022]  ? __x64_sys_execveat+0xed/0x130
[  470.456166][T29022]  ? do_syscall_64+0x103/0x610
[  470.460935][T29022]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  470.467009][T29022]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.472475][T29022]  ? lockdep_hardirqs_on+0x418/0x5d0
[  470.477770][T29022]  do_filp_open+0x1a1/0x280
[  470.482281][T29022]  ? may_open_dev+0x100/0x100
[  470.486965][T29022]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.492430][T29022]  ? lockdep_hardirqs_on+0x418/0x5d0
[  470.497719][T29022]  ? retint_kernel+0x2d/0x2d
[  470.502321][T29022]  ? trace_hardirqs_on_caller+0x6a/0x220
[  470.507977][T29022]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  470.513461][T29022]  ? do_open_execat+0x117/0x690
[  470.518320][T29022]  do_open_execat+0x137/0x690
[  470.523015][T29022]  ? unregister_binfmt+0x170/0x170
[  470.528136][T29022]  ? lock_downgrade+0x880/0x880
[  470.533023][T29022]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  470.539272][T29022]  ? kasan_check_read+0x11/0x20
[  470.544127][T29022]  ? do_raw_spin_unlock+0x57/0x270
[  470.549253][T29022]  __do_execve_file.isra.0+0x178d/0x23f0
[  470.554888][T29022]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  470.561145][T29022]  ? copy_strings_kernel+0x110/0x110
[  470.566431][T29022]  ? strncpy_from_user+0x2a8/0x380
[  470.571554][T29022]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  470.577805][T29022]  __x64_sys_execveat+0xed/0x130
[  470.582757][T29022]  do_syscall_64+0x103/0x610
[  470.587441][T29022]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  470.593347][T29022] RIP: 0033:0x458da9
[  470.597251][T29022] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  470.616857][T29022] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  470.625272][T29022] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  470.633241][T29022] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  470.641213][T29022] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  470.649189][T29022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  470.657161][T29022] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:53 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:53 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:53 executing program 4 (fault-call:3 fault-nth:9):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:53 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:53 executing program 3:
fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, <r0=>0x0})
sched_getaffinity(r0, 0x8, &(0x7f00000000c0))
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
syz_open_procfs(r0, &(0x7f0000000100)='net/bnep\x00')
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80001, 0x0)
ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000040)={0x7, 0x5, 0xffff})

[  470.768429][T29087] FAULT_INJECTION: forcing a failure.
[  470.768429][T29087] name failslab, interval 1, probability 0, space 0, times 0
[  470.800255][T29087] CPU: 1 PID: 29087 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  470.808298][T29087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  470.818379][T29087] Call Trace:
[  470.821686][T29087]  dump_stack+0x172/0x1f0
[  470.826036][T29087]  should_fail.cold+0xa/0x15
[  470.830638][T29087]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  470.836461][T29087]  ? ___might_sleep+0x163/0x280
[  470.841323][T29087]  __should_failslab+0x121/0x190
[  470.846281][T29087]  should_failslab+0x9/0x14
[  470.850795][T29087]  kmem_cache_alloc+0x2b2/0x6f0
[  470.855653][T29087]  ? kasan_check_read+0x11/0x20
[  470.860516][T29087]  __alloc_file+0x27/0x300
[  470.864939][T29087]  alloc_empty_file+0x72/0x170
[  470.869707][T29087]  path_openat+0xef/0x46e0
[  470.874143][T29087]  ? save_stack+0xa9/0xd0
[  470.878482][T29087]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  470.883855][T29087]  ? __kmalloc+0x15c/0x740
[  470.888278][T29087]  ? security_prepare_creds+0x123/0x190
[  470.893833][T29087]  ? prepare_creds+0x2f5/0x3f0
[  470.898599][T29087]  ? prepare_exec_creds+0x12/0xf0
[  470.903628][T29087]  ? __do_execve_file.isra.0+0x393/0x23f0
[  470.909363][T29087]  ? __x64_sys_execveat+0xed/0x130
[  470.914484][T29087]  ? do_syscall_64+0x103/0x610
[  470.919255][T29087]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  470.925332][T29087]  ? __lock_acquire+0x548/0x3fb0
[  470.930285][T29087]  ? prepare_exec_creds+0x12/0xf0
[  470.935320][T29087]  do_filp_open+0x1a1/0x280
[  470.939841][T29087]  ? may_open_dev+0x100/0x100
[  470.944555][T29087]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  470.950194][T29087]  ? find_held_lock+0x35/0x130
[  470.954972][T29087]  ? __lock_acquire+0x548/0x3fb0
[  470.959919][T29087]  ? debug_smp_processor_id+0x3c/0x280
[  470.965394][T29087]  ? debug_smp_processor_id+0x3c/0x280
[  470.970873][T29087]  do_open_execat+0x137/0x690
[  470.975568][T29087]  ? unregister_binfmt+0x170/0x170
[  470.980686][T29087]  ? lock_downgrade+0x880/0x880
[  470.985545][T29087]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  470.991798][T29087]  ? kasan_check_read+0x11/0x20
[  470.996758][T29087]  ? do_raw_spin_unlock+0x57/0x270
[  471.001898][T29087]  __do_execve_file.isra.0+0x178d/0x23f0
[  471.007540][T29087]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  471.013806][T29087]  ? copy_strings_kernel+0x110/0x110
[  471.019129][T29087]  ? strncpy_from_user+0x2a8/0x380
[  471.024256][T29087]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  471.030514][T29087]  __x64_sys_execveat+0xed/0x130
[  471.035471][T29087]  do_syscall_64+0x103/0x610
[  471.040077][T29087]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  471.045989][T29087] RIP: 0033:0x458da9
[  471.049894][T29087] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:37:53 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40240, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001080)={{0xa, 0x4e20, 0x3eec, @mcast2, 0x5}, {0xa, 0x4e21, 0x8, @mcast1, 0x5}, 0xff, [0xa7, 0xffffffff, 0x6, 0x1, 0x4, 0x4, 0x9]}, 0x5c)
getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000)

[  471.069505][T29087] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  471.077925][T29087] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  471.085899][T29087] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  471.093876][T29087] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  471.101855][T29087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  471.109828][T29087] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  471.188520][T29098] FAULT_INJECTION: forcing a failure.
[  471.188520][T29098] name failslab, interval 1, probability 0, space 0, times 0
[  471.190112][T29096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  471.242277][T29098] CPU: 0 PID: 29098 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  471.250305][T29098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  471.257665][T29096] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  471.261878][T29098] Call Trace:
[  471.261929][T29098]  dump_stack+0x172/0x1f0
[  471.261955][T29098]  should_fail.cold+0xa/0x15
14:37:53 executing program 0 (fault-call:4 fault-nth:10):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:53 executing program 5:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x410140, 0x0)
connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0xb86a88884a62812, 0x2}, 0x1}}, 0x10)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  471.261978][T29098]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  471.262003][T29098]  ? ___might_sleep+0x163/0x280
[  471.262036][T29098]  __should_failslab+0x121/0x190
[  471.276939][T29096] FAT-fs (loop2): Filesystem has been set read-only
[  471.279463][T29098]  should_failslab+0x9/0x14
[  471.279482][T29098]  kmem_cache_alloc+0x2b2/0x6f0
[  471.279500][T29098]  ? kasan_check_read+0x11/0x20
[  471.279523][T29098]  __alloc_file+0x27/0x300
[  471.279547][T29098]  alloc_empty_file+0x72/0x170
[  471.333889][T29098]  path_openat+0xef/0x46e0
[  471.338329][T29098]  ? save_stack+0xa9/0xd0
[  471.342678][T29098]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  471.348053][T29098]  ? __kmalloc+0x15c/0x740
[  471.352472][T29098]  ? security_prepare_creds+0x123/0x190
[  471.358019][T29098]  ? prepare_creds+0x2f5/0x3f0
[  471.362789][T29098]  ? prepare_exec_creds+0x12/0xf0
[  471.367821][T29098]  ? __do_execve_file.isra.0+0x393/0x23f0
[  471.373575][T29098]  ? __x64_sys_execveat+0xed/0x130
[  471.378695][T29098]  ? do_syscall_64+0x103/0x610
[  471.383472][T29098]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  471.389551][T29098]  ? __lock_acquire+0x548/0x3fb0
[  471.394497][T29098]  ? prepare_exec_creds+0x12/0xf0
[  471.399534][T29098]  do_filp_open+0x1a1/0x280
[  471.404049][T29098]  ? may_open_dev+0x100/0x100
[  471.408732][T29098]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  471.414386][T29098]  ? find_held_lock+0x35/0x130
[  471.419159][T29098]  ? mark_held_locks+0xa4/0xf0
[  471.423928][T29098]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.429400][T29098]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.434868][T29098]  ? retint_kernel+0x2d/0x2d
[  471.439460][T29098]  ? trace_hardirqs_on_caller+0x6a/0x220
[  471.445101][T29098]  ? debug_smp_processor_id+0x3c/0x280
[  471.450566][T29098]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.456040][T29098]  do_open_execat+0x137/0x690
[  471.460728][T29098]  ? unregister_binfmt+0x170/0x170
[  471.465850][T29098]  ? lock_downgrade+0x880/0x880
[  471.470711][T29098]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  471.476963][T29098]  ? kasan_check_read+0x11/0x20
[  471.481821][T29098]  ? do_raw_spin_unlock+0x57/0x270
[  471.486944][T29098]  __do_execve_file.isra.0+0x178d/0x23f0
[  471.492597][T29098]  ? copy_strings_kernel+0x110/0x110
[  471.497886][T29098]  ? strncpy_from_user+0x2a8/0x380
[  471.503008][T29098]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  471.509257][T29098]  __x64_sys_execveat+0xed/0x130
[  471.514208][T29098]  do_syscall_64+0x103/0x610
[  471.518807][T29098]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  471.524703][T29098] RIP: 0033:0x458da9
[  471.528608][T29098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  471.548397][T29098] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  471.556816][T29098] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  471.564814][T29098] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  471.572789][T29098] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  471.580765][T29098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
14:37:53 executing program 3:
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x440000, 0x0)
ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000240)={0x100, 0x4, 0xff, 0x100000000})
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000))
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  471.588771][T29098] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:54 executing program 4 (fault-call:3 fault-nth:10):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  471.659661][T29096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  471.693928][T29096] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:54 executing program 3:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0)
bind$netrom(r0, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast2, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:37:54 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  471.733969][T29213] FAULT_INJECTION: forcing a failure.
[  471.733969][T29213] name failslab, interval 1, probability 0, space 0, times 0
[  471.756543][T29225] FAULT_INJECTION: forcing a failure.
[  471.756543][T29225] name failslab, interval 1, probability 0, space 0, times 0
[  471.764093][T29096] FAT-fs (loop2): Filesystem has been set read-only
[  471.798449][T29225] CPU: 0 PID: 29225 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  471.806473][T29225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  471.816547][T29225] Call Trace:
[  471.819855][T29225]  dump_stack+0x172/0x1f0
[  471.824204][T29225]  should_fail.cold+0xa/0x15
[  471.828809][T29225]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  471.834633][T29225]  ? ___might_sleep+0x163/0x280
[  471.839493][T29225]  __should_failslab+0x121/0x190
[  471.844432][T29225]  should_failslab+0x9/0x14
[  471.848933][T29225]  kmem_cache_alloc+0x2b2/0x6f0
[  471.853784][T29225]  ? rcu_read_lock_sched_held+0x110/0x130
[  471.859503][T29225]  ? kmem_cache_alloc+0x32e/0x6f0
[  471.864532][T29225]  security_file_alloc+0x39/0x170
[  471.869560][T29225]  __alloc_file+0xac/0x300
[  471.873977][T29225]  alloc_empty_file+0x72/0x170
[  471.878738][T29225]  path_openat+0xef/0x46e0
[  471.883171][T29225]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  471.888542][T29225]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.893997][T29225]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.899457][T29225]  ? lockdep_hardirqs_on+0x418/0x5d0
[  471.904740][T29225]  ? retint_kernel+0x2d/0x2d
[  471.909328][T29225]  ? trace_hardirqs_on_caller+0x6a/0x220
[  471.914976][T29225]  do_filp_open+0x1a1/0x280
[  471.919477][T29225]  ? may_open_dev+0x100/0x100
[  471.924162][T29225]  ? mark_held_locks+0xa4/0xf0
[  471.928924][T29225]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.934415][T29225]  ? mark_held_locks+0xa4/0xf0
[  471.939181][T29225]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.944638][T29225]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  471.950177][T29225]  ? lockdep_hardirqs_on+0x418/0x5d0
[  471.955461][T29225]  ? retint_kernel+0x2d/0x2d
[  471.960058][T29225]  do_open_execat+0x137/0x690
[  471.964743][T29225]  ? unregister_binfmt+0x170/0x170
[  471.969853][T29225]  ? lock_downgrade+0x880/0x880
[  471.974711][T29225]  ? kasan_check_read+0x11/0x20
[  471.979558][T29225]  ? do_raw_spin_unlock+0x57/0x270
[  471.984679][T29225]  __do_execve_file.isra.0+0x178d/0x23f0
[  471.990307][T29225]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  471.996563][T29225]  ? copy_strings_kernel+0x110/0x110
[  472.001843][T29225]  ? strncpy_from_user+0x2a8/0x380
[  472.006953][T29225]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.013195][T29225]  __x64_sys_execveat+0xed/0x130
[  472.018139][T29225]  do_syscall_64+0x103/0x610
[  472.022734][T29225]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  472.028618][T29225] RIP: 0033:0x458da9
[  472.032511][T29225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  472.052106][T29225] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  472.060511][T29225] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  472.068474][T29225] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  472.076437][T29225] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  472.084404][T29225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  472.092375][T29225] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  472.112990][T29213] CPU: 1 PID: 29213 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  472.120999][T29213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  472.131054][T29213] Call Trace:
[  472.134371][T29213]  dump_stack+0x172/0x1f0
[  472.138721][T29213]  should_fail.cold+0xa/0x15
[  472.143328][T29213]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  472.149158][T29213]  ? ___might_sleep+0x163/0x280
[  472.154028][T29213]  __should_failslab+0x121/0x190
[  472.158976][T29213]  should_failslab+0x9/0x14
[  472.163491][T29213]  __kmalloc_track_caller+0x2d8/0x740
[  472.168870][T29213]  ? pointer+0xa30/0xa30
[  472.173132][T29213]  ? kasan_check_read+0x11/0x20
[  472.177995][T29213]  ? sched_exec+0x1cc/0x260
[  472.182503][T29213]  ? kasprintf+0xbb/0xf0
[  472.186756][T29213]  kvasprintf+0xc8/0x170
[  472.191008][T29213]  ? bust_spinlocks+0xe0/0xe0
[  472.195695][T29213]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  472.201509][T29213]  ? sched_exec+0x1cc/0x260
[  472.206021][T29213]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  472.211838][T29213]  ? lockdep_hardirqs_on+0x418/0x5d0
[  472.217325][T29213]  kasprintf+0xbb/0xf0
[  472.221407][T29213]  ? kvasprintf_const+0x190/0x190
[  472.226444][T29213]  ? nr_iowait+0x130/0x130
[  472.230871][T29213]  ? kasan_check_read+0x12/0x20
[  472.235749][T29213]  __do_execve_file.isra.0+0x94b/0x23f0
[  472.241299][T29213]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  472.247565][T29213]  ? copy_strings_kernel+0x110/0x110
[  472.252854][T29213]  ? strncpy_from_user+0x2a8/0x380
[  472.257982][T29213]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.264236][T29213]  __x64_sys_execveat+0xed/0x130
[  472.269189][T29213]  do_syscall_64+0x103/0x610
[  472.273792][T29213]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  472.279686][T29213] RIP: 0033:0x458da9
[  472.283589][T29213] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  472.303198][T29213] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  472.311616][T29213] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  472.319586][T29213] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  472.327556][T29213] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  472.335534][T29213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  472.343509][T29213] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:54 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat ', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:54 executing program 3:
pipe2(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x80000)
setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000380), 0x2)
ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{<r2=>0x0}, {}, {}]})
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c3d8f", @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
read$FUSE(0xffffffffffffffff, 0x0, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[])
ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000180)={r2, &(0x7f00000000c0)=""/166})
r4 = gettid()
lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0})
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={r4, r5, r6}, 0xc)
r7 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r7, 0x89e2)

14:37:54 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:54 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2400, 0x0)
ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)})
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
close(r0)

14:37:54 executing program 4 (fault-call:3 fault-nth:11):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:54 executing program 0 (fault-call:4 fault-nth:11):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  472.450729][T29329] QAT: Invalid ioctl
14:37:54 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
accept4$rose(r0, &(0x7f0000000000)=@full={0xb, @dev, @rose, 0x0, [@remote, @rose, @bcast, @netrom, @netrom, @null]}, &(0x7f0000000040)=0x40, 0x800)
r1 = semget$private(0x0, 0x0, 0x0)
semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000080)=""/183)

[  472.492944][T29334] FAULT_INJECTION: forcing a failure.
[  472.492944][T29334] name failslab, interval 1, probability 0, space 0, times 0
[  472.511418][T29338] FAULT_INJECTION: forcing a failure.
[  472.511418][T29338] name failslab, interval 1, probability 0, space 0, times 0
[  472.533664][T29334] CPU: 1 PID: 29334 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  472.541658][T29334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  472.551719][T29334] Call Trace:
[  472.555024][T29334]  dump_stack+0x172/0x1f0
[  472.559383][T29334]  should_fail.cold+0xa/0x15
[  472.563990][T29334]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  472.569813][T29334]  ? ___might_sleep+0x163/0x280
[  472.574675][T29334]  __should_failslab+0x121/0x190
[  472.579619][T29334]  should_failslab+0x9/0x14
[  472.584131][T29334]  __kmalloc_track_caller+0x2d8/0x740
[  472.589506][T29334]  ? pointer+0xa30/0xa30
[  472.593752][T29334]  ? kasan_check_read+0x11/0x20
[  472.598609][T29334]  ? sched_exec+0x1cc/0x260
[  472.603116][T29334]  ? kasprintf+0xbb/0xf0
[  472.607375][T29334]  kvasprintf+0xc8/0x170
[  472.611621][T29334]  ? bust_spinlocks+0xe0/0xe0
[  472.616307][T29334]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  472.622122][T29334]  ? sched_exec+0x1cc/0x260
[  472.626634][T29334]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  472.632449][T29334]  ? lockdep_hardirqs_on+0x418/0x5d0
[  472.637743][T29334]  kasprintf+0xbb/0xf0
[  472.641816][T29334]  ? kvasprintf_const+0x190/0x190
[  472.646858][T29334]  ? nr_iowait+0x130/0x130
[  472.651282][T29334]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.657531][T29334]  ? kasan_check_read+0x11/0x20
[  472.662400][T29334]  __do_execve_file.isra.0+0x94b/0x23f0
[  472.667952][T29334]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  472.674211][T29334]  ? copy_strings_kernel+0x110/0x110
[  472.679506][T29334]  ? strncpy_from_user+0x2a8/0x380
[  472.684626][T29334]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.690876][T29334]  __x64_sys_execveat+0xed/0x130
[  472.695833][T29334]  do_syscall_64+0x103/0x610
[  472.700434][T29334]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  472.706328][T29334] RIP: 0033:0x458da9
[  472.710242][T29334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  472.729850][T29334] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  472.738269][T29334] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  472.746242][T29334] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  472.754216][T29334] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  472.762188][T29334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  472.770163][T29334] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  472.778166][T29338] CPU: 0 PID: 29338 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  472.786158][T29338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  472.796206][T29338] Call Trace:
[  472.796232][T29338]  dump_stack+0x172/0x1f0
[  472.796255][T29338]  should_fail.cold+0xa/0x15
[  472.796276][T29338]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  472.796299][T29338]  ? ___might_sleep+0x163/0x280
[  472.796319][T29338]  __should_failslab+0x121/0x190
[  472.796348][T29338]  should_failslab+0x9/0x14
[  472.828597][T29338]  __kmalloc_track_caller+0x2d8/0x740
[  472.833983][T29338]  ? pointer+0xa30/0xa30
[  472.838236][T29338]  ? trace_hardirqs_on_caller+0x6a/0x220
[  472.843883][T29338]  ? kasprintf+0xbb/0xf0
[  472.848139][T29338]  kvasprintf+0xc8/0x170
[  472.852396][T29338]  ? bust_spinlocks+0xe0/0xe0
[  472.857092][T29338]  kasprintf+0xbb/0xf0
[  472.861173][T29338]  ? kvasprintf_const+0x190/0x190
[  472.866215][T29338]  ? nr_iowait+0x130/0x130
[  472.870639][T29338]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.876887][T29338]  ? kasan_check_read+0x11/0x20
[  472.881755][T29338]  __do_execve_file.isra.0+0x94b/0x23f0
[  472.887304][T29338]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  472.893588][T29338]  ? copy_strings_kernel+0x110/0x110
[  472.898893][T29338]  ? strncpy_from_user+0x2a8/0x380
[  472.904019][T29338]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  472.904043][T29338]  __x64_sys_execveat+0xed/0x130
[  472.904066][T29338]  do_syscall_64+0x103/0x610
[  472.904089][T29338]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  472.915250][T29338] RIP: 0033:0x458da9
[  472.915266][T29338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  472.915275][T29338] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  472.915290][T29338] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  472.915300][T29338] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  472.915309][T29338] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  472.915317][T29338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
14:37:55 executing program 5:
syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x800)
r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x100, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x1, 0x0, @pic={0x1ff, 0x9, 0x1, 0x9, 0x9, 0x100000000, 0x1ff, 0x2, 0x1000200, 0x1, 0x1, 0x4, 0x4, 0x8, 0x7, 0x1}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:55 executing program 4 (fault-call:3 fault-nth:12):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  472.915333][T29338] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:55 executing program 0 (fault-call:4 fault-nth:12):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:55 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  473.113840][T29455] FAULT_INJECTION: forcing a failure.
[  473.113840][T29455] name failslab, interval 1, probability 0, space 0, times 0
[  473.149564][T29455] CPU: 1 PID: 29455 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  473.157578][T29455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  473.167633][T29455] Call Trace:
[  473.170940][T29455]  dump_stack+0x172/0x1f0
[  473.175286][T29455]  should_fail.cold+0xa/0x15
[  473.179907][T29455]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  473.185731][T29455]  __should_failslab+0x121/0x190
[  473.190677][T29455]  should_failslab+0x9/0x14
[  473.190695][T29455]  kmem_cache_alloc+0x2b2/0x6f0
[  473.190710][T29455]  ? nr_iowait+0x130/0x130
[  473.190733][T29455]  mm_alloc+0x1d/0xd0
[  473.208456][T29455]  __do_execve_file.isra.0+0xaa3/0x23f0
[  473.214020][T29455]  ? copy_strings_kernel+0x110/0x110
[  473.223055][T29455]  ? strncpy_from_user+0x2a8/0x380
[  473.223078][T29455]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  473.223100][T29455]  __x64_sys_execveat+0xed/0x130
[  473.223122][T29455]  do_syscall_64+0x103/0x610
[  473.223142][T29455]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  473.223155][T29455] RIP: 0033:0x458da9
[  473.223171][T29455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  473.223180][T29455] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  473.240918][T29455] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  473.240928][T29455] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  473.240937][T29455] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:37:55 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:55 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x132)
bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xff, 0x10001, 0x2, 0x5, 0x3ff, 0x9}, 0xfffffffffffffffe}, 0xa)

14:37:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x100)
setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
write$P9_ROPEN(r1, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x20, 0x3}, 0xfff}}, 0x18)

[  473.240945][T29455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  473.240961][T29455] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  473.354120][T29558] FAULT_INJECTION: forcing a failure.
[  473.354120][T29558] name failslab, interval 1, probability 0, space 0, times 0
[  473.386953][T29569] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  473.442391][T29558] CPU: 0 PID: 29558 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  473.446710][T29569] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  473.450411][T29558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  473.450418][T29558] Call Trace:
[  473.450446][T29558]  dump_stack+0x172/0x1f0
[  473.450473][T29558]  should_fail.cold+0xa/0x15
[  473.482621][T29558]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  473.488446][T29558]  ? ___might_sleep+0x163/0x280
[  473.493311][T29558]  __should_failslab+0x121/0x190
[  473.498269][T29558]  should_failslab+0x9/0x14
[  473.502783][T29558]  kmem_cache_alloc+0x2b2/0x6f0
[  473.507646][T29558]  ? nr_iowait+0x130/0x130
[  473.512085][T29558]  mm_alloc+0x1d/0xd0
[  473.516080][T29558]  __do_execve_file.isra.0+0xaa3/0x23f0
[  473.517557][T29569] FAT-fs (loop2): Filesystem has been set read-only
[  473.521626][T29558]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  473.521656][T29558]  ? copy_strings_kernel+0x110/0x110
[  473.521671][T29558]  ? strncpy_from_user+0x2a8/0x380
[  473.521694][T29558]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  473.551113][T29558]  __x64_sys_execveat+0xed/0x130
[  473.556070][T29558]  do_syscall_64+0x103/0x610
[  473.560677][T29558]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  473.566579][T29558] RIP: 0033:0x458da9
[  473.570484][T29558] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:37:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = dup2(r0, r0)
getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000002040)=@assoc_value={<r2=>0x0}, &(0x7f0000002380)=0x8)
setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000004440)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84)
lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004680)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000004780)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000047c0)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000048c0)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004900)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000004a00)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004a40)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000004b40)=0xe8)
lstat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, <r9=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004d00)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000004e00)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004e40)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000004f40)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004f80)={0x0, 0x0, <r12=>0x0}, &(0x7f0000004fc0)=0xc)
setxattr$system_posix_acl(&(0x7f0000004540)='./file0\x00', &(0x7f0000004580)='system.posix_acl_access\x00', &(0x7f0000005000)={{}, {0x1, 0x2}, [{0x2, 0x3, r3}, {0x2, 0x5, r4}, {0x2, 0x3, r5}, {0x2, 0x4, r6}, {0x2, 0x7, r7}, {0x2, 0x2, r8}, {0x2, 0x1, r9}, {0x2, 0x7, r10}, {0x2, 0x4, r11}], {0x4, 0x4}, [{0x8, 0x5, r12}], {0x10, 0x4}, {0x20, 0x1}}, 0x74, 0x3)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={<r13=>r0})
sendmmsg$nfc_llcp(r13, &(0x7f0000004200)=[{&(0x7f0000000040)={0x27, 0x0, 0x0, 0x6, 0xfffffffffffffffb, 0x1ff, "7c10e119ce5a35402e878daf2866019c3ecd57319a4bc7bc70335d9ee131322dc8be67bc1d1cd4d37d93d815eca8826daf3f14e1b3f122eef07934ba9bb05f", 0x1f}, 0x60, &(0x7f0000000480)=[{&(0x7f00000000c0)="6cac8186a808ee9f501a74eb948d4cdc525926f7b0f1df4011046d00c924e645c46c7d7b67cec914736616e83f53529d2a94ec5d9b1e539edf611e2a27fa3109040d0fb9929e88cbdeb6e80e0a779f6be61be40ec755f3657243f2996c6793f4614dd941ace6fe49e27708c19302bead8925da0304da97febf6b72ab838321a9e0703831acf638a41e17d4ca29af98e2434aa7f6d05ed9a492d02ce84402133b370fb3d9bd524b7addf253776d95b8a56d78b8840b84c1fa", 0xb8}, {&(0x7f0000000180)="480403ed736ffec22b438a134055558f3c15026e6d466ec5ea0f46d56b69733cb80e2f80375427c15373", 0x2a}, {&(0x7f00000001c0)="6ae42ac891dcc10ece9ca4449296f23be3a14c4645dde2bfd0dcbde516a9f46b8d5a0770f2c77269f7edd87f7729fbbf9dbe634a69d744dbd8231142f90431f946099498ca54fa060a3edc3cf86925a39a4eb2db2e3898aa3f351774473021ee9cf6713874208de4a337ad7f86298452ee653e71871ea588f633cdb9bdbcdf762aca79328ff647e651716e944f7a8554ff097fbe973a825381e3918938cf8334e8", 0xa1}, {&(0x7f0000000280)="4769d93a84bb9b2f8e354646f95eccf0cbccd1ca3dba5a34c4e2ff800a373a554dc0798a636b15c55b45ca8e53dc9959b1a0350676bf62ee02b8335b5d262c9a0d61095d58f11f4b38a13e673bc1b4982a194adb11395d98c5c50c1bf077f13af4b99ed6a8cbb5bd8d3db512effd71c0180d96d98fc24896c83e0baea6da582bee1faff2efc0cb3af6f7c3c2c6c39a35f880779bd0f98a164cce5a960b647ad37dc675250d0b51d90161c04f161add122ca26ae7ae8cac8b7b0c4ad995bd3ca35462f2345a9e73e4af613d2b62d708e70f99d9f99024be558775c9d56c6351d3fed4fbf7e2", 0xe5}, {&(0x7f0000000380)="ab9dfdf07b97cb4257753b0b52ceedd562198ef8bb15f1be11e9d7ade86e412da88b6e629506ed94df7873dd4894752dce170024fce26dd6686a37b8e622c82289b84871c4fcd0a7bce1b4dbd73cadc2ac5a8fac065b9d2d5c704ebe2c51c367c999b7f2c6d0d1b01e2f0aeacd9023cc4270455c7f108bdd47c3fb8d26", 0x7d}, {&(0x7f0000000400)="f69e699fec1d60363c07f4d5e55ca47310d9b793054374de56d0b203514747531a8a395ba1d1225c2fdc921ff0", 0x2d}, {&(0x7f0000000440)="c50a38181755ffaf3766eebe0a95e3", 0xf}], 0x7, &(0x7f0000000500)={0x28, 0x11f, 0x1, "032b3340e26eeeedb1388453d13f216d472e7ae203828037"}, 0x28, 0x10}, {&(0x7f0000000540)={0x27, 0x0, 0x0, 0x1, 0x40, 0x1ff, "81dd9743f910309596517c45492e0be53e87bc28466df01ff7a99317e2ffe2885dc9790b59073f61b46d5c1614f514fc575269ef893a53f4f50df32eebb3dc", 0x28}, 0x60, &(0x7f0000000900)=[{&(0x7f00000005c0)="c8064d", 0x3}, {&(0x7f0000000600)="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", 0xfc}, {&(0x7f0000000700)="8723db59ab0a077f85d5d90f1ad53a1b3316cb2a6aa4a8442b1e3f8cac3ee3ea8287a5af64a6a2c895918cd5b2241b968f", 0x31}, {&(0x7f0000000740)="b322282269c1e1d1735c0fa376ad5867e370a7ce2f90ab916a94eebdcd5b48876e670dccf995cd4a037a861bffe3c33fad67537e8a60c823077b35dc4095f65ff18465a935edc50e69b827942547c90a29489c32bf183777ba023a759bc5b93030369c8357cb2e881988421f0324b788bdc02c2f3dce334f19c370eb1885ba6a7ee98cd0d5a669e52869ae0bdc133e9c2288e898a6287eeab68b3c31b57a896d60ee40451149e939bd7ea335db", 0xad}, {&(0x7f0000000800)="db34e905907ca4acee073ae17236b7657a442a5b9dd0ff5e4e55de08c91fa787bca5ff95b89578c320c9ab3bb364ba1e53bb3a9d15d7521f5949e01f59bbd3f371d795c83cd5b2566fac206c474c01b0086be5037c02eea3eaa73817eee232f237ed751d1776b50fbc27389581dfdccba3209e086b3358b2deaf65ebfaff0ad73ef4814233d8599decc15482524cb162f4e01d6c9882ca58c8703be7dec84c351b3c84bc534d7aff55eaa51ca51b663ce150bb4a2976aa8f", 0xb8}, {&(0x7f00000008c0)="3b2e762cc49fcfd3c202e3a2574ccdbe8c2b510b4f0a8b2c5ded76081e612ac0959b1bf7", 0x24}], 0x6, &(0x7f0000000980)={0xa0, 0x10e, 0x9, "97576b465169d81e0bf9da48fc2580b917283351a57c9604ef3bc097112a3489673db3081028c2ae42dba7c1a6b530ca5ab563c49d4bf29ae36ad6c5eed228c0d4cf0ca138e853cb482a15d9fe35a28c970dc1f591677c2ade96d516107df14f036612e31c25d9f4e7da4a25b3a00cc691b256e240dd936a5a34ff0b69dbddbdf2d4890e0a084411fbc8e6087b8a5b"}, 0xa0, 0x20000084}, {&(0x7f0000000a40)={0x27, 0x1, 0x2, 0x2, 0x8001, 0x3, "25587c7ce407cab0e176ff57435fed7e351fee5b658e1cc9fe824aad891feadad4071424a673f19677fe9b2cac9bcd57cf2da6d1d2e9be70ee90b8b75e0ab7", 0x17}, 0x60, &(0x7f0000000d80)=[{&(0x7f0000000ac0)="a9f40ca45e6653210424bc9e34517bb17450ca1212bfb727ba2fb3edec81d5b232874706ee202ab277a96a616b91cde9eedd80a9db10c078a0b5723b1e2e1c357f6ab91140aa173cd6ccb0e34a3e5b703b63ee5294c4b5c0dfbd4c874a63f155bc6ff0e0be4fcdfb9485de5a4c9cf759c2fa7757eed2a2a847a704e90e47bb22bec5f804fe69b831bcc5bbf33196c6ad44a7b45e5ecb9b54060e0b24727b8c431047b6fc2f649cbb67382454d4b99b4b11ae", 0xb2}, {&(0x7f0000000b80)="c9d5b3fc3cf3230ca90481ee9a25b5edc843", 0x12}, {&(0x7f0000000bc0)="f5ace3d3adedcd6176643344db1693fa10fba6ca256a4b918b1d3286e6c489916df1a04f3c8faeeecea5b16d196726553b0b21518599d4caa23a870d6280d57de5c977c796253766485a1f5dbb3dc721c9d7057133cc6cbe7940bda1786c4bf55e2a1ab121a586f48a2ba9456cf87103d4bb6dba9c59164ccaf6b1f972ea3935518d324c72670c360410fba987a6d42e37f734b316797c353e364fb9446fd807f19e2cc7f9f645f72f87f2e8845662d138e76a755ea59b9ea239fea4036c02fd0ac887593a5505299cbdf3d19279058cd15d2c19e992f66ebd8d5c936e28ec13d001b6daf7b622a71dcc0cad55ecbecd4b0870f9939032ecf89a36", 0xfb}, {&(0x7f0000000cc0)="44af92d564e93d6edb2399301fc9a50115898504b7ec18bfe895477fe0bea0af6e53b36d342e9fd00b706fd060a50eff8f2293331b14cb22c85b4f420bb749e913fd603407385a1c4288c9c793048a4687a02ec73f761eda8425e47e790db921cce3eac85a4f1ebceb57994e48d2c51ee03d8bd628b5dece40534c59584f173fe12f73c34c2571fa63cd097f8fc19308f13960e2091bff1c5c19da", 0x9b}], 0x4, &(0x7f0000000dc0)={0x10, 0x109, 0xa2}, 0x10, 0x40}, {&(0x7f0000000e00)={0x27, 0x0, 0x2, 0x2, 0x4, 0x7, "4abe1ca422743828f7a38fbac0be3add670a0d6945b56f1c9b888a25f5e4c1515112544de6389a1a65a730b4251287db1cdaa8ea719d2897a46753558aaa44", 0x1a}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000000e80)="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", 0xfb}, {&(0x7f0000000f80)="0def", 0x2}, {&(0x7f0000000fc0)="428b70455d1b4d111ffa57741124d1911b682d51ffee982ea9d0831090ca232b5039b9a4feba8d7b2e00e1769457358e794c8ae91f4383bde7617f4692c9cad81516e27caff4b8dc84551a7b956c50995d8035d73ec9c88204feb3ab4c82827b6ad56204929fcf4a13bf324fc5dabd47d571e32e277243804940f2870de70c5104b5105bca3bf55141cd6fed00ce8ecd9b961838c909b49e434ec87ac65b6723ed087a535876985dc322fb38672ae392cfd8b88d546a80d4dec36d10e7536d6110f67c53f63c7298d6c6d00ff542a2cda2ba0bc49a8f3a550b87748667b5cb28468451", 0xe3}, {&(0x7f00000010c0)="64e9f653363dcc4da3851218ec9521b848b5f7c95b8b1b03a97442965f9b31d9f04efecc6b4f900b3baa2d00a81467d2547508c28a1135d05faef826769797b55eb5ca325aa806758b757d638e068a3755a8e1d631959ca7de10aa53f5755abd6c1a614fb4d5d13d0db145ee7200bef88c59", 0x72}, {&(0x7f0000001140)="16af6994e733367a979e0f467f1c82980f12ea7628c6e6e809c20c18f533d431e26787475c7cd2d25866dce9ab6dffa0cf594bc66e5de5205581d05b612f4e87b9a4690c455d71be577b4757c63a30b1b5b5c2e57fe6432cc76f35562aef42dc65", 0x61}], 0x5, &(0x7f0000001240)={0xb0, 0x0, 0x1, "acfa4308f9cdf64d6b2882adb9e8137608ada78417d4fb4a345a94fc744a719212ffabc8ab090c2ac5ea7810e42a11db37c672cf088710d4a977818c198a1f6e574438705cad23bb50d856aa6c9a066391ad135de0e8dd1d3522e9a9fdeedbd4bfeb71cd2602fa9f9535e8d8572f146302857c3461033a919d8013e6ba5b620e1c8a4074a741f14258d54b8401310542ff27635ca4c9fe2150"}, 0xb0, 0x40000d0}, {&(0x7f0000001300)={0x27, 0x0, 0x1, 0x7, 0x100000001, 0x8000, "399c15c0a907bcf29ce999d00ced4633992323db853f61d04a3aade0b749c91c26f4026ac59349fc2043c95cc4eddcfe37373d4f554947be673e7f69e92192", 0x11}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000001380)="22e2edeccb16e1da48522139de78f4dd64b8d51d9585e663c9e5ca72cdc67dfe10d660c7258e06712f18ce64cb695ac26e9e59c2ab37326aa2a3822f0ee0840bf44d1bb24958af1a85cb4754aaa1a80d9f39577e2353228baac0f02dae438c2931e0465ff835dccd23e51a876454ca93fe5a56bbba00aea6c0a3b56da90873a417", 0x81}, {&(0x7f0000001440)="cb90aaea6585ee34e7b6da225340cc93b3ecaf04a94f50e5cb9ba26f81116fde624e439a30f3d7c7f81f30e4ec0722aa49999d66ab932bf086161e19f8691d27aae76d18adc0149e7c17af0804fa1fc1c21771a7d469caf74020c8d793a684185f7986badc36a0402be80b67c2e6de5cfdeee8ad6003363d520acb7f34b33e1b04f92987a1a147f3a29374632c90e28ebc2461a749a537428f6049503e93065dd73aeef3a8275788ca480dd5c44a06127cdb50ecf0155bfa2b3b9eb0ec5ee136273215d11a09a2f2374b821db7ee9124ac164ffd86ae4ef40e92b41f154de1dc96f84f6cc005", 0xe6}, {&(0x7f0000001540)="f8b51f3c308b0f0a014106930d5e2a6b8e66a5cbc5cc26c441118350372441873327e2fb5c3e564278b4653b3edc99a082bc3eb3005429739bc9cd39cb38f9e2ba76762f6c833d046449e33066dbaf1e273393e77284560b4dd42e032ca711abe1782c3583a992ceebd8af71820b99a0ae1cf1082c5e7c658b1592f71120fec75c2bd183e7f79d8c9afa806b2d9728bab11f495711867285d724fe75c282c12416", 0xa1}, {&(0x7f0000001600)="2bc789e13e963f484aa904e53f7d0d33397d28c155488583cee59912d99af630f6ddd07afd2ef15d6ebaa085eb8bd6318938e210b4128e3c455ea2b992791d1ad68073d867763a463b53cf8ab0cca500a5db5c3a8df0974fa8e72d6d036f19d8eb6b76627c5b19528a7722b21ff6c5f59df8b19e1173711e61722a93c651d5442487785df6acb327d26732220c3e1c2f170f87aef29339318293863a498f5c770a7f777d9627748d29f9e63d6fe3a75776cb7b72e1326cc94aed3f04e9bb32ee3d2d3e57baf4", 0xc6}, {&(0x7f0000001700)="9a50191e8690321b69752278d63e345fb7f24f7bd06f31d4bf11681590bfe147f7eb9969ccade2f3c659ebcf352b7342f49047ea960c5079bcd00b233dd091a0b209d7432f53bee45272704f5644ff5ce9251b9447820853fa404032fd1cef4dc525b9dbb12d9cb50f3d4900b80b27feaee58890524ebc10e635d0f96273917383b1ad8511aed059f2846d02ef17dc8e2ff662ff13f835e33398819c35393c86ea768db653aeaddf4842b151700440a913426ac0f4bb10fc", 0xb8}, {&(0x7f00000017c0)="effe6386795c9d6532773e33255aafaa72c8c7bcc9c59e7ea429f60ac03bbb9efdef1ae78077a118ef68a5a958e7156fcc03e779e1169adff28f20d8e385d67db4e7c57a277558ce6a8f87f7ba63f17f683d44ccf7fa2284410082ed7172aceed6de117c10f958740cb9847086fe33ad32e2ca8a1a41d9a510e0fb196630cbbd35b365914ff213b87b7e7d7e", 0x8c}, {&(0x7f0000001880)="1de05240fc38b15dea506f65d66876215d48ffc7c60af689d437864fae67d060cb56c5f42e0f4c8c81e5ac341593529bd743812438bf276897a8d9aa6043826b0cf5f7d7351434a8c707d9d8d998e2d4c30342376285931435df0d4732b30cf5eec921b8072120fd5027ac84a58aafc340e042ce72fb4a992df696254448dec0299f7d3aa9e51c1530df509215b398331621ac0f021098504f4b49299ce61d76498e953ec2ceade4a48808409014cf4992cbe55572f003c9bad5b885bdd09423e7f0250527ec5209", 0xc8}, {&(0x7f0000001980)="d3ab7e33c0e82c1b641733291c2ec35d3099fcf8219f820f0f930f9734a10468308eeffd7bc9d4a66ff484017e4989b83772e5e1a2acefa17cb07e8ff6fc74", 0x3f}, {&(0x7f00000019c0)="ab132782117424f89689ca7c71e0a28140de999a338734277dfd4605a5a6b8236e7839765c15a63c26fae6f54e938f28dced3e6b0c6ff5672c4f6e532db42a231c138e8f49c58877e81d0cebf75a98bc2c0a5223194741944babaea97d61159b2cf34c28ebe61006cc47dad80155483ab4c7f8c3f9eb69cc20e1d329804453362b7eafba8b130ead2d96c99a428d20eb073806360638889e3107fa4f63447f0dd07e9f137ec7d1c5ad453a9af837b51fd957809a02cf26ff8633", 0xba}, {&(0x7f0000001a80)="91c8816d462112e554ab7f838ab73b955e73f9062ddd32b1f3d82ddcd2a8c057ba68f0d5b8961f8f9cf78f0ab1af2309a9128876056c48ccbc1f510a1ee071d8a9901af8bc5f5693b51ca426d75d618bfba4271d9d938fc056401bf3b80d0b7cf3cd13f4eccc6f7945044521d67152be29173e22a1266b5826a0c07dffa0f6d549adf558a7aa731e720044594008ead2aa33fff4e4316ee189c1c12845085c5b5d3000324e689b23e10e4c8ad57fe5", 0xaf}], 0xa, &(0x7f0000001c00)={0x68, 0x0, 0x20, "59c8bf85366bdc8c4f9f3c441d2428f489787b032aa497b8968aa4b1634822e2d55ed1741a67b9cddbfc09783d9a0e31463dda5cab763319c66d693536cff3e6ab9662467ddc40ce9c9760dcd04222491f61"}, 0x68, 0x40}, {&(0x7f0000001c80)={0x27, 0x0, 0x1, 0x0, 0x401, 0x11, "81564f0e4b0125b4ce5fc63def56382c4a3a2658bf97382e222e1055d4d9b6295e6761af1ba4507b99dd08f62ff57da05fa7235bde86bfab246d74450fe6d1", 0x21}, 0x60, &(0x7f00000021c0)=[{&(0x7f0000001d00)="14dc557776bbefb8063b9d6bfb12c81a24c1fc492aaf0dbc92d7fb539a159b227fd34f3c7c983e65de121b6742e30582584af3c2793cfddf71decbe89c2357098c4ad0da248ce8f07ef6a4031bb8941b3b1b384f1653155e47c9cbbaacab3a84517863dda6302e4ec1aa4625d46939da3040eec0552b0cd693c420ff1651bad1e6b9dff0ba3c7246a22765ee5850463d9c3ac08498b88fb79007c660904b469d63031c49e1a9740b018f0fe8fbd49ece2b276533fc25ac137a6098704a37685f28f0c07c85378a8e26cead5f7fec86930d0c78894e6fe16914", 0xd9}, {&(0x7f0000001e00)="99075421b544c45d8847f2dfd4a7d12e89a427196193ae6b8bdc1459ad51381137b383524946edd03e8bd19d6182a2361beb7718e4c58c79811fcd772e0ca8e637b7311a2543a26d21d43f27b44f3651e7503140485630b1c878", 0x5a}, {&(0x7f0000001e80)="7ca5ab27982421751158ff3f6c0a10d35daa3b61e1279c2b62bc23984ea32712201c105c425855993bbb2f2560000ab7ee743ed91eac7ede91814daf51632d42a5dcb5075e2bfa0376484a1bb35c0c09e12dbc22f760075cbc38c520874cefb230e608dc37656690f503800acf236b44e0a703a5ae706f91ed7c984c0b4e0bc3981ab4", 0x83}, {&(0x7f0000001f40)="c1b0008536a7178c66e1565ca2e988d276906f2d9bd930adbea7ec3b16", 0x1d}, {&(0x7f0000001f80)="7a79b9a2dad0cc4c2138b11539376a4a766ad4a5287e5d1d033f021792beaaa2b8b5fa4d45f7b34f3bebe89637f0f7aa6c187668e1dbc0e220acad84c7eae94a3d55d31bc4a5cc59f4d0eea3e01459e6426ff91c58967f3ba1d7d0f387cd812d3a37784cae51281f60c1610265564c06986785f82968ecf9d41ceaeaf9bbeaba3b7981da32df8706aa62b08b1822255d7c179684e6de321d92e2b2420e5474412c512ecefee6eeb642405d0d1f980ce18445f639c1871992cdebd5ca", 0xbc}, {&(0x7f0000002040)}, {&(0x7f0000002080)="2c965d510977cbe6573402c07053a181c8441ad31f2d6a350f9b53aedf33c1e8f5ca22c87a5a0fb60abeee1ed3394e019ec1db62b3ee1f2a015572f3a459b92f705fe7d74c7750e50ddb9367daf358b439", 0x51}, {&(0x7f0000002100)="5f83dc29ff11a6847d07ad7a871d86d2f2681f934fea13675d78cddf1b2d4a6aa3c6ca9b8359e06f5957d35dd9f2ee18654e09ee5a0d03b4717c5849cd5d6a3487356e71a8483de8697b9c863357a4a0885f0f49a8ff7c2bf59a8ecde5e3d78a6681cdb2fa723918da9e4fdf545537b53a8a5b57be2005e432029f0105fa5b51adff35b60b96c2d0543f83bfb903a6ba1e5a", 0x92}], 0x8, &(0x7f0000002240)={0x98, 0x3a, 0x3, "df9776235539bee50934b7bc2e56969df5782e9129662b96102cab06162d4e0e502facf5308aeb0267904518c6eddd3df8697bd32ae459a94d74715b5d115269437a732ba89cb592bfc54d49ce3cc54ae9dd8ebfc0f70157bd776a53abb5756835806e233c2981cb15b8cbcd41834db8b94709b6cbc7bdd002b754f4ed999af61f6a"}, 0x98, 0x80}, {&(0x7f0000002300)={0x27, 0x1, 0x2, 0x5, 0x9, 0x7, "75cb1ec624f6f62971a1b970ebf611eca82d3780a86e1f87e17fa732e0e6702c5cd501be8c9f12613bbe27cdad4f891b2bdb8bdaa16db548326331c346b7c5", 0x3b}, 0x60, &(0x7f0000002600)=[{&(0x7f0000002380)}, {&(0x7f00000023c0)="58721cca9f27aba1d0235aecab1cb697af7cdc129a26f5c031a1d5a0d1ab8cc0ec03ce3131bf9684169ac14a5f80be5595db8ec75e6428664550158fcb1666428fae284030b7b2a0933b761a8ab6a295dd836223d69c98660c979cb8a2e9b387af3f20682968296ee8fac2b158d22e", 0x6f}, {&(0x7f0000002440)="fe0c70f6218cabcccb219cf06c40fde20cc68789e6ee2280b5ced5291f6ec24c92d28c66372100d75824b19688b6d68f6518e8", 0x33}, {&(0x7f0000002480)="b435759d2157acd321c78f40b489501635a9766a19e6c2fb0057a1724c1895160903d2bdd87bacc9a0304e263b8cba5d", 0x30}, {&(0x7f00000024c0)="2d66fdafe05a6d8eb22fc869dd20eefc75a31b9f9b8d6ab766967f52a43df00f29a1bc8896a391b8364f9646a1499016df", 0x31}, {&(0x7f0000002500)="87b926cf87fe265d1913786b97d41498521ee3d480b223850509daa051ccc7461b8ed1e6a6bb97416436110dfb63391f0d35ea31c57d98ee83be04701b74fd19054394a88492ddb7e8579ed239eadef52555968709def5f66948269bc617289e3d0a321eb8de4cbd632dce", 0x6b}, {&(0x7f0000002580)="15008564b128773a011f88b842ddf7cda306998e0b333b727cb971da24e84613edef0c4c0044fc4d60911c7aaa24cc960cf499083fd2df8b148d89e547f53bea6a25e9986bb06cce734a47178d66edd46d927870688c22e17054bf97d5198a88a5bd2f1758ea9630f1", 0x69}], 0x7, &(0x7f0000002680)={0xa0, 0x112, 0xcd, "f8454fc69595cff180e8283bc869f2bc8cc78d89fac534165192e48d70d82e06845515ba3c977301b798ab686299a5cefcbe7ecfcc399a5aea3e07f47ec34a40a98170af25176b155e79997496a4aafdc1329638ae1a7e44702d2680d7d37d2062bd15f3258c998a7b09a46d72775f5e48ac3d7f870bb18b7d56a175a4a231a8212fd3b5270b1dc66d71a3e98a"}, 0xa0, 0x8800}, {&(0x7f0000002740)={0x27, 0x1, 0x0, 0x2, 0x72, 0x8, "f3251c4dac503f72fcb682cc90ae241b98e5c69db31662c6b54993a4d929a7fb48b5827684a8f94d0d1839381c97772162f000f614e3ae03de40ad8f5b7c2f", 0x2f}, 0x60, &(0x7f0000003c00)=[{&(0x7f00000027c0)="147f7ba92a77fd6812595972c7217f0911c1d8e06975dd32807bca0b6c12d895fb5c90f832711618a4bea33b9e303855df8dc87aa0539ceb2cc4406930d93344740893e8cb098979dca23a6ac7c1e8eee74feb51fc6f72eb4ed01314e0b87a193502005c109440843a759f29a8e62db6bd24688cb46ff803b63db5a278c5f8752c269847e75d6f0a57930077485f92eef4948876b15b44b5d9bf01ab6f9234b8bf775c277f1fe6b9", 0xa8}, {&(0x7f0000002880)="0aea7c9c9735a07f92b8f51fcae6266949e946a62838282aef3cde40aa0d74ec7f8a2a51f1dbd76217b702108e4f0ec44fdc79ef53879dd6f7e186470618af4488a062630d9d9de9450eb2228278b838f2da7ba7e4d93c9b8eb8a1906538399b2893b7dca2b46080bfa678d78e848d037e3e5e2d74a31a01aac0f4896bbc66c2c046577dfd7e94c7416501e56060bc4c0a29739dcace50f6559c82c4f0aac4995af4b97ef0748b617d7ffcfbe1fcf646aa53491cd337639f794942bf3880e39f0494c8e0b5e29ef4bde9d822ca7f00aab67a3acaba2695526f110984b3404eb0b75a117161d7", 0xe6}, {&(0x7f0000002980)="44a6db3fd6912d5a628767876cb8dec82033cbf4daf02a170ae82ca94e632259e9b2b51f68f4852a7a17a31c6f091da0f4750b13ef72c0f4c5f3ea149ab0888938e81bc031192577fde0ccc7967e090b39e7d6c6b65a2b8abc4e1dd8ddc87639475afc17db16", 0x66}, {&(0x7f0000002a00)="188acda3fe9062ccea158be75187099be9af8c7a20f4e7f2abc7adb2e58ada9b8f6d5f6f450fa4db3e5d9d2c38a36645f4a7c1187c44a9a508aa0ce1400ebb0e536fb6369b2c3e62c8f1e556749ffa0e07b34a5a29cc256948492366eb113d48a7619370f0358cf57c640e3a56680eccd3532e940f4308ee27743fb34bef0c166c5ddc117297262ffff0c689223c49e6b390a947ee10f3c2adf4b17881b8e1908d56e66a6bad9770cd20b7e110fcf51b4a764ed65809da37921e1ac4ed040ad0850162ab4fc032ee2a36f094081d2d10a8cd6040d795d20fed78c150a51539b9be69163b32f86fe6a7f373", 0xeb}, {&(0x7f0000002b00)="6ed78fcfc15b1ef4ba667d9daf85b8069a1df006dc5039f0f6592e13d51ec12088d987b0c06e23914958ecb5fbb1509a70504211e8b5a51030c53355d5219f641405ec814937d25dc7a6ebcdacacf08780e034482f5fee74262fed0fc3bb26c8af1e71610d5420e13bf1854a6a9e8e677976b5ec8d87f5b885c7f9ad825d0214a4f5254a16f3f0b0db04cc0be99b3ed4", 0x90}, {&(0x7f0000002bc0)="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", 0x1000}, {&(0x7f0000003bc0)="630a5ae9ce064d818ebb66d7a2c132760d97d728d3255eb51160d09936961e", 0x1f}], 0x7, 0x0, 0x0, 0x40040}, {&(0x7f0000003c80)={0x27, 0x0, 0x0, 0x6, 0x400, 0x2, "33cbf83c9e8b9f6f2f003984ed3edf58f294f22f9480fa960b490f6b7b0f0e0d593c17325429d0a7c03719b5176beae535a13dd79cae479f0a13c87f945a53", 0x14}, 0x60, &(0x7f0000003dc0)=[{&(0x7f0000003d00)="ecc1839a920ffaa8a457c7e31eec742104fe514500a6655e2340ed5741e739f613b118a71efd37c25575624b4eaddfb9999a08428142293d7b9e35ba8044b010f4ded5c910d426fa8779992f614174e14edb94d6a2e011466d5b2aee7c73a1a64ab52b8afb4a132297576ee6c94dacbee79c95fdb1bc6d6713c7e43d19a31e6e7b5cf2acefcdf0ece5648de1a00e58d3d2fae2ad0c3e74dd0b675d8b6b3eb6f63d7a1f4205a8a687d685df4ca73ec50cc713cf6884", 0xb5}], 0x1, &(0x7f0000003e00)={0x108, 0x103, 0x5, "434a1e0b309e7b4ee553b0ef316a1a82553439c065f324f0e6c15ad4c99cd8375770178e2d26b030c8d31ced6a6daf9925971412863c8ef35fa4cc0982be5edfd6252990d72a51c6bfa7f9f2e72f8d5b32e832961773e3a229197cb9128113dfddacd8a1927341df33f5c99a4b99ed5461f92efc206b39899231d97cbe24e75624b78c61c08e1e5daa64bc6f5611f792abc234e47dc84eff250e626f9f53a654f00fdad34e8b2f32e160d135ca0583cb946c30459a9f69ae0ed0a49b95e726843dd172d132c06941e6cde917363d1f712a2411c05914a62a98fdfa7a81801af0bcac330e85240e9447dd472a373641651fe5544e"}, 0x108, 0x4}, {&(0x7f0000003f40)={0x27, 0x1, 0x2, 0x3, 0x1, 0x5, "c697751d1018c9be860992eda7b3e94a20368c5a87057166e64903c7efcc341c60f3e933846fd76c668e348fcfe491c512cf1ff627c066a3ca0a1bc749773e", 0x2e}, 0x60, &(0x7f00000040c0)=[{&(0x7f0000003fc0)="b37b991241252a09a3772323af880322ec8feeebb931deaaa59608039c89d265", 0x20}, {&(0x7f0000004000)="4bdf639e5d43d637d9d0e39086a47cb17894d54a8688235f8f88a42e29c7e4542e5dc7f37771f357edf1805c1475ab524154db7ab4ea5373ceb7121d04fb967dac144e43d161be23711bf34874a1bf1f4514f4135cfde5df1c88695be64e144fffee2294800f2da4312d5bbcf66168cc5082d5ee966a7cef72cbc39dd8dd8b1b4b704f98d5b96d11027c004f5be42297ee4d10c0a05c932816efcc28187e573ced3dbb7ab7845b819df969ccdfdd65e78961f689951397c1e491dda49c3f41", 0xbf}], 0x2, &(0x7f0000004100)={0xd0, 0x116, 0x8, "7fab2c9afca39f4c150c107d4c8a48b01c96dbfe5f1167836ffad71e4c42024d48920da308afd2d3a6184ffa8a397df87924dc5944ff0579e7588eda6e6a24f006f781fe749cd35e66a02c51a37a04e353a1ef657aa2da096b009c4c48cb58826fd3bb84f9cd87c5743bd71a9a0cd3a704026ff352582be3e74ebc931d483d6903ac0b585c90aca934ba7d5bf3f0fcedda1830cbc677aba6d58332b9a8499c8bde7b5379fad784e46bebe280343b06a1cdae624a5278a624d1611ec9"}, 0xd0, 0x8004}], 0xa, 0x4000000)
setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000004500)={0xbf, @remote, 0x4e21, 0x2, 'lblc\x00', 0xe, 0x5, 0x7}, 0x2c)

14:37:55 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:55 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x20000)
sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000a0cebd70008da7543702bb4115fddbdf25"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x1)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:56 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:56 executing program 4 (fault-call:3 fault-nth:13):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:56 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400, 0x0)
r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2)
r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={<r2=>r0})
getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x54)

[  473.590102][T29558] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  473.598607][T29558] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  473.606587][T29558] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  473.614566][T29558] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  473.622571][T29558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  473.630541][T29558] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  473.725004][T29569] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  473.754478][T29689] FAULT_INJECTION: forcing a failure.
[  473.754478][T29689] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  473.762055][T29569] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  473.809647][T29689] CPU: 1 PID: 29689 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  473.817670][T29689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  473.819807][T29569] FAT-fs (loop2): Filesystem has been set read-only
[  473.827727][T29689] Call Trace:
[  473.827756][T29689]  dump_stack+0x172/0x1f0
[  473.827784][T29689]  should_fail.cold+0xa/0x15
[  473.827808][T29689]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  473.827828][T29689]  ? ___might_sleep+0x163/0x280
[  473.827854][T29689]  should_fail_alloc_page+0x50/0x60
[  473.827878][T29689]  __alloc_pages_nodemask+0x1a1/0x8d0
[  473.867801][T29689]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  473.873292][T29689]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  473.879010][T29689]  ? retint_kernel+0x2d/0x2d
[  473.883623][T29689]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  473.889864][T29689]  alloc_pages_current+0x107/0x210
[  473.894985][T29689]  __get_free_pages+0xc/0x40
[  473.899572][T29689]  pgd_alloc+0x8b/0x3f0
[  473.903730][T29689]  ? pgd_page_get_mm+0x40/0x40
[  473.908494][T29689]  ? lockdep_init_map+0x1be/0x6d0
[  473.913520][T29689]  ? lockdep_init_map+0x1be/0x6d0
[  473.918552][T29689]  mm_init+0x590/0x9b0
[  473.922624][T29689]  mm_alloc+0xa6/0xd0
[  473.926609][T29689]  __do_execve_file.isra.0+0xaa3/0x23f0
[  473.932153][T29689]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  473.938400][T29689]  ? copy_strings_kernel+0x110/0x110
[  473.943684][T29689]  ? strncpy_from_user+0x2a8/0x380
[  473.948798][T29689]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  473.955047][T29689]  __x64_sys_execveat+0xed/0x130
[  473.959988][T29689]  do_syscall_64+0x103/0x610
[  473.964585][T29689]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  473.970479][T29689] RIP: 0033:0x458da9
[  473.974376][T29689] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  473.993991][T29689] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  474.002399][T29689] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  474.010370][T29689] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  474.018343][T29689] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  474.026309][T29689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  474.034280][T29689] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:56 executing program 0 (fault-call:4 fault-nth:13):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:56 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={<r2=>0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d)

14:37:56 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:56 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)

14:37:56 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:56 executing program 4 (fault-call:3 fault-nth:14):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:56 executing program 5:
syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2)
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x400, 0x6, 0x8, 0x6, 0x1, 0x6, 0x0, 0x7, <r1=>0x0}, &(0x7f0000000040)=0x20)
r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff3, 0x4000)
write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r1, 0x4)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @loopback}}, 0x8001, 0x101}, &(0x7f0000000200)=0x90)

14:37:56 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8, 0x5}, {0x5, 0x141}]}, 0x14, 0x1)
openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2)

[  474.256661][T29706] FAULT_INJECTION: forcing a failure.
[  474.256661][T29706] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  474.270655][T29707] FAULT_INJECTION: forcing a failure.
[  474.270655][T29707] name failslab, interval 1, probability 0, space 0, times 0
[  474.307326][T29706] CPU: 1 PID: 29706 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  474.315366][T29706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  474.325424][T29706] Call Trace:
[  474.328733][T29706]  dump_stack+0x172/0x1f0
[  474.333077][T29706]  should_fail.cold+0xa/0x15
[  474.337685][T29706]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  474.343496][T29706]  ? ___might_sleep+0x163/0x280
[  474.348376][T29706]  should_fail_alloc_page+0x50/0x60
[  474.353586][T29706]  __alloc_pages_nodemask+0x1a1/0x8d0
[  474.358964][T29706]  ? debug_smp_processor_id+0x3c/0x280
[  474.364436][T29706]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  474.370201][T29706]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  474.375667][T29706]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  474.381135][T29706]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  474.387391][T29706]  alloc_pages_current+0x107/0x210
[  474.393487][T29706]  __get_free_pages+0xc/0x40
[  474.398086][T29706]  pgd_alloc+0x8b/0x3f0
[  474.402249][T29706]  ? pgd_page_get_mm+0x40/0x40
[  474.407020][T29706]  ? lockdep_init_map+0x1be/0x6d0
[  474.412056][T29706]  ? lockdep_init_map+0x1be/0x6d0
[  474.417094][T29706]  mm_init+0x590/0x9b0
[  474.421169][T29706]  mm_alloc+0xa6/0xd0
[  474.425160][T29706]  __do_execve_file.isra.0+0xaa3/0x23f0
[  474.430725][T29706]  ? copy_strings_kernel+0x110/0x110
[  474.436017][T29706]  ? getname_flags+0x3c9/0x5b0
[  474.440786][T29706]  ? __sanitizer_cov_trace_pc+0x20/0x50
[  474.446349][T29706]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  474.452610][T29706]  __x64_sys_execveat+0xed/0x130
[  474.457566][T29706]  do_syscall_64+0x103/0x610
[  474.462169][T29706]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  474.468065][T29706] RIP: 0033:0x458da9
[  474.471967][T29706] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  474.491572][T29706] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  474.499990][T29706] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  474.507964][T29706] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  474.515939][T29706] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  474.523941][T29706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  474.531917][T29706] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  474.539927][T29707] CPU: 0 PID: 29707 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  474.547919][T29707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  474.557976][T29707] Call Trace:
[  474.561282][T29707]  dump_stack+0x172/0x1f0
[  474.565630][T29707]  should_fail.cold+0xa/0x15
[  474.570232][T29707]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  474.576053][T29707]  ? ___might_sleep+0x163/0x280
[  474.580926][T29707]  __should_failslab+0x121/0x190
[  474.585877][T29707]  should_failslab+0x9/0x14
[  474.590401][T29707]  kmem_cache_alloc+0x2b2/0x6f0
[  474.595272][T29707]  vm_area_alloc+0x20/0x110
[  474.599781][T29707]  __do_execve_file.isra.0+0xc34/0x23f0
14:37:57 executing program 0 (fault-call:4 fault-nth:14):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:57 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  474.605356][T29707]  ? copy_strings_kernel+0x110/0x110
[  474.610656][T29707]  ? strncpy_from_user+0x2a8/0x380
[  474.610679][T29707]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  474.610701][T29707]  __x64_sys_execveat+0xed/0x130
[  474.610725][T29707]  do_syscall_64+0x103/0x610
[  474.622067][T29707]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  474.622081][T29707] RIP: 0033:0x458da9
14:37:57 executing program 4 (fault-call:3 fault-nth:15):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  474.622097][T29707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  474.622107][T29707] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  474.622121][T29707] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  474.622130][T29707] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  474.622139][T29707] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  474.622148][T29707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  474.622157][T29707] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:57 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x40c0, 0x80)
bind$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x24)

14:37:57 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  474.748092][T29715] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  474.786697][T29715] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:37:57 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x8}, 0x8)

[  474.804156][T29722] FAULT_INJECTION: forcing a failure.
[  474.804156][T29722] name failslab, interval 1, probability 0, space 0, times 0
[  474.818398][T29715] FAT-fs (loop2): Filesystem has been set read-only
[  474.829462][T29723] FAULT_INJECTION: forcing a failure.
[  474.829462][T29723] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  474.862097][T29723] CPU: 1 PID: 29723 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  474.870106][T29723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  474.880161][T29723] Call Trace:
[  474.883468][T29723]  dump_stack+0x172/0x1f0
[  474.887813][T29723]  should_fail.cold+0xa/0x15
[  474.892427][T29723]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  474.898245][T29723]  ? ___might_sleep+0x163/0x280
[  474.903113][T29723]  should_fail_alloc_page+0x50/0x60
[  474.908319][T29723]  __alloc_pages_nodemask+0x1a1/0x8d0
[  474.913709][T29723]  ? __mark_inode_dirty+0x23c/0x1290
[  474.919008][T29723]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  474.925003][T29723]  ? touch_atime+0x1b3/0x2a0
[  474.929602][T29723]  ? find_held_lock+0x35/0x130
[  474.934384][T29723]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  474.940639][T29723]  alloc_pages_current+0x107/0x210
[  474.945763][T29723]  get_zeroed_page+0x14/0x50
[  474.950368][T29723]  __pud_alloc+0x3b/0x250
[  474.954717][T29723]  __handle_mm_fault+0x7a5/0x3ec0
[  474.959762][T29723]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  474.965315][T29723]  ? find_held_lock+0x35/0x130
[  474.970101][T29723]  ? handle_mm_fault+0x322/0xb30
[  474.975062][T29723]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  474.981319][T29723]  ? kasan_check_read+0x11/0x20
[  474.986193][T29723]  handle_mm_fault+0x43f/0xb30
[  474.990971][T29723]  __get_user_pages+0x7b6/0x1a40
[  474.995936][T29723]  ? follow_page_mask+0x19a0/0x19a0
[  475.001144][T29723]  ? retint_kernel+0x2d/0x2d
[  475.005756][T29723]  get_user_pages_remote+0x21d/0x440
[  475.011059][T29723]  copy_strings.isra.0+0x3dc/0x890
[  475.016189][T29723]  ? remove_arg_zero+0x590/0x590
[  475.021132][T29723]  ? prepare_binprm+0x6aa/0x940
[  475.025990][T29723]  ? lock_downgrade+0x880/0x880
[  475.030846][T29723]  ? vma_link+0x117/0x180
[  475.035187][T29723]  ? install_exec_creds+0x180/0x180
[  475.040398][T29723]  copy_strings_kernel+0xa5/0x110
[  475.045435][T29723]  __do_execve_file.isra.0+0x10ef/0x23f0
[  475.051090][T29723]  ? copy_strings_kernel+0x110/0x110
[  475.056397][T29723]  __x64_sys_execveat+0xed/0x130
[  475.061359][T29723]  do_syscall_64+0x103/0x610
[  475.066050][T29723]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  475.071951][T29723] RIP: 0033:0x458da9
[  475.075856][T29723] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  475.095468][T29723] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  475.103889][T29723] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  475.111869][T29723] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  475.119854][T29723] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  475.127836][T29723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  475.135809][T29723] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  475.143827][T29722] CPU: 0 PID: 29722 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  475.151818][T29722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  475.161895][T29722] Call Trace:
[  475.165209][T29722]  dump_stack+0x172/0x1f0
[  475.169547][T29722]  should_fail.cold+0xa/0x15
[  475.174142][T29722]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  475.180045][T29722]  ? ___might_sleep+0x163/0x280
[  475.184988][T29722]  __should_failslab+0x121/0x190
[  475.189933][T29722]  should_failslab+0x9/0x14
[  475.194454][T29722]  kmem_cache_alloc+0x2b2/0x6f0
[  475.199326][T29722]  vm_area_alloc+0x20/0x110
[  475.203860][T29722]  __do_execve_file.isra.0+0xc34/0x23f0
[  475.209425][T29722]  ? copy_strings_kernel+0x110/0x110
[  475.214714][T29722]  ? strncpy_from_user+0x2a8/0x380
[  475.219841][T29722]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  475.226097][T29722]  __x64_sys_execveat+0xed/0x130
[  475.231054][T29722]  do_syscall_64+0x103/0x610
[  475.235660][T29722]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  475.241551][T29722] RIP: 0033:0x458da9
[  475.245453][T29722] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  475.272404][T29722] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  475.280819][T29722] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  475.288789][T29722] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  475.296762][T29722] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  475.304731][T29722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  475.312713][T29722] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  475.377337][T29715] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  475.401603][T29715] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  475.412092][T29715] FAT-fs (loop2): Filesystem has been set read-only
14:37:57 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x10', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:57 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
pipe(&(0x7f0000000000)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00')
accept4$tipc(r1, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x80800)
sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000008c}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xc0, r3, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x67}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfd84}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x96f}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4001}, 0x1)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:57 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:57 executing program 4 (fault-call:3 fault-nth:16):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:57 executing program 0 (fault-call:4 fault-nth:15):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:57 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
pipe(&(0x7f0000000000)={<r1=>0xffffffffffffffff})
ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x8, "00ea21f41bff9333e9a8770f4a0a5b0fd4aaca21b831d913faa569db9c2c3317", 0x2, 0x3ff, 0x4, 0x100000, 0x200, 0x2})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:57 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  475.532278][T29934] FAULT_INJECTION: forcing a failure.
[  475.532278][T29934] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  475.612851][T29934] CPU: 0 PID: 29934 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  475.620874][T29934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  475.630925][T29934] Call Trace:
[  475.634218][T29934]  dump_stack+0x172/0x1f0
[  475.638566][T29934]  should_fail.cold+0xa/0x15
[  475.643165][T29934]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  475.648986][T29934]  ? ___might_sleep+0x163/0x280
[  475.653861][T29934]  should_fail_alloc_page+0x50/0x60
[  475.659068][T29934]  __alloc_pages_nodemask+0x1a1/0x8d0
[  475.664457][T29934]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  475.670196][T29934]  ? retint_kernel+0x2d/0x2d
[  475.674801][T29934]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  475.681049][T29934]  alloc_pages_current+0x107/0x210
[  475.686170][T29934]  get_zeroed_page+0x14/0x50
[  475.688545][T29947] FAULT_INJECTION: forcing a failure.
[  475.688545][T29947] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  475.690762][T29934]  __pud_alloc+0x3b/0x250
[  475.690784][T29934]  __handle_mm_fault+0x7a5/0x3ec0
[  475.690808][T29934]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  475.718859][T29934]  ? find_held_lock+0x35/0x130
[  475.723634][T29934]  ? handle_mm_fault+0x322/0xb30
[  475.728588][T29934]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  475.734844][T29934]  ? kasan_check_read+0x11/0x20
[  475.739705][T29934]  handle_mm_fault+0x43f/0xb30
[  475.744483][T29934]  __get_user_pages+0x7b6/0x1a40
[  475.749459][T29934]  ? follow_page_mask+0x19a0/0x19a0
[  475.754670][T29934]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  475.760150][T29934]  get_user_pages_remote+0x21d/0x440
[  475.765454][T29934]  copy_strings.isra.0+0x3dc/0x890
[  475.770589][T29934]  ? remove_arg_zero+0x590/0x590
[  475.775532][T29934]  ? prepare_binprm+0x6aa/0x940
[  475.780392][T29934]  ? lock_downgrade+0x880/0x880
[  475.785243][T29934]  ? vma_link+0x117/0x180
[  475.789578][T29934]  ? install_exec_creds+0x180/0x180
[  475.794789][T29934]  copy_strings_kernel+0xa5/0x110
[  475.799829][T29934]  __do_execve_file.isra.0+0x10ef/0x23f0
[  475.805479][T29934]  ? copy_strings_kernel+0x110/0x110
[  475.811036][T29934]  ? strncpy_from_user+0x2a8/0x380
[  475.816245][T29934]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  475.822495][T29934]  __x64_sys_execveat+0xed/0x130
[  475.827445][T29934]  do_syscall_64+0x103/0x610
[  475.832047][T29934]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  475.837938][T29934] RIP: 0033:0x458da9
[  475.841837][T29934] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:37:58 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:58 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  475.861467][T29934] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  475.869884][T29934] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  475.877856][T29934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  475.885835][T29934] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  475.893841][T29934] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  475.901815][T29934] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  475.909957][T29947] CPU: 1 PID: 29947 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  475.917956][T29947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  475.928017][T29947] Call Trace:
[  475.931322][T29947]  dump_stack+0x172/0x1f0
[  475.935674][T29947]  should_fail.cold+0xa/0x15
[  475.940277][T29947]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  475.946095][T29947]  ? ___might_sleep+0x163/0x280
[  475.950965][T29947]  should_fail_alloc_page+0x50/0x60
[  475.956172][T29947]  __alloc_pages_nodemask+0x1a1/0x8d0
[  475.961552][T29947]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  475.967022][T29947]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  475.972743][T29947]  ? __pud_alloc+0x1d3/0x250
[  475.977367][T29947]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  475.983619][T29947]  alloc_pages_current+0x107/0x210
[  475.988743][T29947]  __pmd_alloc+0x41/0x460
[  475.993076][T29947]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  475.999329][T29947]  __handle_mm_fault+0x192a/0x3ec0
[  476.004462][T29947]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  476.010014][T29947]  ? find_held_lock+0x35/0x130
[  476.014784][T29947]  ? handle_mm_fault+0x322/0xb30
[  476.019831][T29947]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.026083][T29947]  ? kasan_check_read+0x11/0x20
[  476.030947][T29947]  handle_mm_fault+0x43f/0xb30
[  476.035722][T29947]  __get_user_pages+0x7b6/0x1a40
[  476.040668][T29947]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  476.046141][T29947]  ? follow_page_mask+0x19a0/0x19a0
[  476.051359][T29947]  ? retint_kernel+0x2d/0x2d
[  476.055971][T29947]  get_user_pages_remote+0x21d/0x440
[  476.061273][T29947]  copy_strings.isra.0+0x3dc/0x890
[  476.066399][T29947]  ? remove_arg_zero+0x590/0x590
[  476.071352][T29947]  ? prepare_binprm+0x6aa/0x940
[  476.076206][T29947]  ? lock_downgrade+0x880/0x880
[  476.081060][T29947]  ? vma_link+0x117/0x180
[  476.085400][T29947]  ? install_exec_creds+0x180/0x180
[  476.090608][T29947]  copy_strings_kernel+0xa5/0x110
[  476.095643][T29947]  __do_execve_file.isra.0+0x10ef/0x23f0
[  476.101293][T29947]  ? copy_strings_kernel+0x110/0x110
[  476.106583][T29947]  ? strncpy_from_user+0x2a8/0x380
[  476.111702][T29947]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.117956][T29947]  __x64_sys_execveat+0xed/0x130
[  476.122910][T29947]  do_syscall_64+0x103/0x610
[  476.127517][T29947]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  476.133409][T29947] RIP: 0033:0x458da9
[  476.137310][T29947] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  476.156925][T29947] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:37:58 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='vxcan1\x00')
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  476.165351][T29947] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  476.173325][T29947] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  476.181310][T29947] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  476.189294][T29947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  476.197267][T29947] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
14:37:58 executing program 4 (fault-call:3 fault-nth:17):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:58 executing program 5:
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x60000, 0x0)
ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8)
r1 = creat(&(0x7f0000000200)='./file0\x00', 0x6)
ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/173)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x3, 0x70, 0x100, 0x6, 0x281, 0x1, 0x0, 0xae1, 0x2, 0x4, 0x6, 0x3, 0x1, 0x5, 0x3, 0x8001, 0x1000, 0x7, 0x9, 0x0, 0x401, 0x5, 0x0, 0x5, 0xff, 0x4, 0x8, 0x9, 0x7fff, 0x80000000, 0x7, 0x28f, 0x2000000003, 0x1000003, 0x4, 0x74, 0x1, 0xfffffffffffffffc, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x2, 0x80, 0x7, 0x81, 0x5, 0x101})

14:37:58 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:58 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:58 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80800, 0x0)
r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8b90dbbf8fedb11482a46f1d2bf7be7d431f18ac7ee7ce5cec8da080c1e90e9ce8e7f02d06b4042c919b28c9c71ea0ce88f66cd387fbd7ac6a9e6b72db89b42869759b8b007b6aec8ef6d18d8e82b7f27563c18807125ab41426d630ad8de0e47d1f6b6cb51a5c771ba76c113115b5afde1bfee69f5c0a20ac23a94a96070307d0fe6e1f2e0d647dcb3647b85663b86b6b78b1d3f1afbab40d5022e34a7c8a29f823f7331e5ba7c3cc858a861100765a86fae70151f1084a8b62c3954097c70045a78dcad8ecd1ed4a0248cd3a9fc41dcdf8260d340b729d2732a928ac074862d6341b100bc2ce28c081d402a46ba88b959d3b52b163ff76", 0xf8, 0xffffffffffffffff)
keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r2, 0x81, 0x1}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha256-generic\x00'}}, &(0x7f0000000300)="25b298d58939b6946b5ee920892eafd6d52e2c246a91b961d8641c97b6c348b9a93f33827910aafb5a32089ac6bd9501cb3026a0f09da8fd47d29a806967c8050cec4aa0b6687b4898fe1815f724a41ffa4737d0de44b583e496a726df80119c3d52c606c030a94b399715f0657c22723d19c8c1d42449e3925cb4b891703f2d21aaee6f478214558ca80a837cdefe56676e748843c67c221cd9d838d823c39d035871fa413430ef3ecafce6903c0fd537fb37627c20277180dead4aebcb55c93b3470396dc204594d615898a86c27bd76986c17b12df91f1d5ea60d6e425a9932", &(0x7f0000000400)=""/245)
getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4)

14:37:58 executing program 0 (fault-call:4 fault-nth:16):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  476.425617][T29962] FAULT_INJECTION: forcing a failure.
[  476.425617][T29962] name failslab, interval 1, probability 0, space 0, times 0
[  476.502403][T29962] CPU: 0 PID: 29962 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96
[  476.510433][T29962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  476.520503][T29962] Call Trace:
[  476.523819][T29962]  dump_stack+0x172/0x1f0
[  476.528177][T29962]  should_fail.cold+0xa/0x15
[  476.532791][T29962]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  476.538615][T29962]  ? ___might_sleep+0x163/0x280
[  476.543486][T29962]  __should_failslab+0x121/0x190
[  476.548436][T29962]  should_failslab+0x9/0x14
[  476.552951][T29962]  kmem_cache_alloc+0x2b2/0x6f0
[  476.557811][T29962]  ? alloc_pages_current+0x10f/0x210
[  476.563116][T29962]  __pmd_alloc+0xc9/0x460
[  476.567451][T29962]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  476.570502][T30076] FAULT_INJECTION: forcing a failure.
[  476.570502][T30076] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  476.573701][T29962]  __handle_mm_fault+0x192a/0x3ec0
[  476.573726][T29962]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  476.573743][T29962]  ? find_held_lock+0x35/0x130
[  476.573761][T29962]  ? handle_mm_fault+0x322/0xb30
[  476.573788][T29962]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.573807][T29962]  ? kasan_check_read+0x11/0x20
[  476.573829][T29962]  handle_mm_fault+0x43f/0xb30
[  476.573852][T29962]  __get_user_pages+0x7b6/0x1a40
[  476.573869][T29962]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  476.573904][T29962]  ? follow_page_mask+0x19a0/0x19a0
[  476.638754][T29962]  ? retint_kernel+0x2d/0x2d
[  476.643457][T29962]  get_user_pages_remote+0x21d/0x440
[  476.648769][T29962]  copy_strings.isra.0+0x3dc/0x890
[  476.653903][T29962]  ? remove_arg_zero+0x590/0x590
[  476.658846][T29962]  ? prepare_binprm+0x6aa/0x940
[  476.663705][T29962]  ? lock_downgrade+0x880/0x880
[  476.668558][T29962]  ? validate_mm+0x502/0x620
[  476.673154][T29962]  ? install_exec_creds+0x180/0x180
[  476.678369][T29962]  copy_strings_kernel+0xa5/0x110
[  476.683424][T29962]  __do_execve_file.isra.0+0x10ef/0x23f0
[  476.689078][T29962]  ? copy_strings_kernel+0x110/0x110
[  476.694378][T29962]  ? strncpy_from_user+0x2a8/0x380
[  476.699507][T29962]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.705764][T29962]  __x64_sys_execveat+0xed/0x130
[  476.710715][T29962]  do_syscall_64+0x103/0x610
[  476.715322][T29962]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  476.721225][T29962] RIP: 0033:0x458da9
[  476.725300][T29962] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  476.744923][T29962] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:37:58 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  476.753348][T29962] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9
[  476.761329][T29962] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  476.769314][T29962] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  476.777295][T29962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4
[  476.785270][T29962] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005
[  476.793273][T30076] CPU: 1 PID: 30076 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  476.801266][T30076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  476.811322][T30076] Call Trace:
[  476.814629][T30076]  dump_stack+0x172/0x1f0
[  476.818966][T30076]  should_fail.cold+0xa/0x15
[  476.823564][T30076]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  476.829382][T30076]  ? ___might_sleep+0x163/0x280
[  476.834246][T30076]  should_fail_alloc_page+0x50/0x60
[  476.839447][T30076]  __alloc_pages_nodemask+0x1a1/0x8d0
[  476.844824][T30076]  ? __pud_alloc+0x1d3/0x250
[  476.849422][T30076]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  476.855140][T30076]  ? __pud_alloc+0x1d3/0x250
[  476.859741][T30076]  ? lock_downgrade+0x880/0x880
[  476.864594][T30076]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  476.870840][T30076]  alloc_pages_current+0x107/0x210
[  476.875966][T30076]  __pmd_alloc+0x41/0x460
[  476.880296][T30076]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  476.886541][T30076]  __handle_mm_fault+0x192a/0x3ec0
[  476.891662][T30076]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  476.897210][T30076]  ? find_held_lock+0x35/0x130
[  476.901978][T30076]  ? handle_mm_fault+0x322/0xb30
[  476.906931][T30076]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.913182][T30076]  ? kasan_check_read+0x11/0x20
[  476.918043][T30076]  handle_mm_fault+0x43f/0xb30
[  476.922819][T30076]  __get_user_pages+0x7b6/0x1a40
[  476.927774][T30076]  ? follow_page_mask+0x19a0/0x19a0
[  476.932991][T30076]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.939248][T30076]  get_user_pages_remote+0x21d/0x440
[  476.944550][T30076]  copy_strings.isra.0+0x3dc/0x890
[  476.949765][T30076]  ? remove_arg_zero+0x590/0x590
[  476.954725][T30076]  copy_strings_kernel+0xa5/0x110
[  476.959758][T30076]  __do_execve_file.isra.0+0x10ef/0x23f0
[  476.965406][T30076]  ? copy_strings_kernel+0x110/0x110
[  476.970692][T30076]  ? strncpy_from_user+0x2a8/0x380
[  476.975809][T30076]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  476.982059][T30076]  __x64_sys_execveat+0xed/0x130
[  476.987005][T30076]  do_syscall_64+0x103/0x610
[  476.991602][T30076]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  476.997497][T30076] RIP: 0033:0x458da9
[  477.001398][T30076] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  477.021008][T30076] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  477.029426][T30076] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  477.037396][T30076] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  477.045379][T30076] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:37:59 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:59 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0)

[  477.053364][T30076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  477.061337][T30076] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:37:59 executing program 5:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)

14:37:59 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8040, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:59 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, 0x0, 0x0, 0x0, 0x1000)

14:37:59 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:59 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:37:59 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x111280, 0x0)
ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x4, 0x3, 0x8a, &(0x7f0000ffe000/0x1000)=nil, 0x200000000})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:59 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:59 executing program 3:
lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00')
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
connect(r0, &(0x7f0000000080)=@llc={0x1a, 0x30f, 0x1, 0x7fff, 0xffffffff, 0x1}, 0x80)

14:37:59 executing program 0 (fault-call:4 fault-nth:17):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:37:59 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

14:37:59 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0)
ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:37:59 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300)

14:37:59 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  477.557337][T30172] FAULT_INJECTION: forcing a failure.
[  477.557337][T30172] name failslab, interval 1, probability 0, space 0, times 0
[  477.601231][T30172] CPU: 0 PID: 30172 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  477.609354][T30172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  477.619421][T30172] Call Trace:
[  477.622736][T30172]  dump_stack+0x172/0x1f0
[  477.627093][T30172]  should_fail.cold+0xa/0x15
[  477.631700][T30172]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  477.637546][T30172]  ? __should_failslab+0x59/0x190
[  477.642580][T30172]  __should_failslab+0x121/0x190
14:38:00 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80002, 0x0)
ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x6, 0x0, [], &(0x7f0000000040)=0x9})
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000000c0)={0xfffffffffffffe01, 0xfff, 0x4, 0x6, 0x7f, 0x6})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
accept4$bt_l2cap(r1, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x800)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={<r2=>0x0, 0x6f, "a906f559f9c5a5073dfee544a03bb2269439c333f6006de23c08655dbfe80795a6402f3130fcb29bd83e5526e86c6b5993ee23fa5d859a6d8ca01d585e7ad76f9074a0aff5f1fe91422ef12fd4f536dee30b9a18576b160914fa5d384ad2460d073a8790037cb890d9677ad47e045c"}, &(0x7f0000000180)=0x77)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x8, 0x800}, &(0x7f0000000200)=0x8)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2)

14:38:00 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500)

[  477.647521][T30172]  should_failslab+0x9/0x14
[  477.652040][T30172]  kmem_cache_alloc+0x2b2/0x6f0
[  477.656906][T30172]  ? alloc_pages_current+0x10f/0x210
[  477.662200][T30172]  __pmd_alloc+0xc9/0x460
[  477.666541][T30172]  __handle_mm_fault+0x192a/0x3ec0
[  477.671660][T30172]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  477.677189][T30172]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  477.682645][T30172]  handle_mm_fault+0x43f/0xb30
[  477.687397][T30172]  __get_user_pages+0x7b6/0x1a40
[  477.692325][T30172]  ? follow_page_mask+0x19a0/0x19a0
[  477.697514][T30172]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  477.703751][T30172]  ? fsnotify+0xbc0/0xbc0
[  477.708066][T30172]  get_user_pages_remote+0x21d/0x440
[  477.713348][T30172]  copy_strings.isra.0+0x3dc/0x890
[  477.718448][T30172]  ? remove_arg_zero+0x590/0x590
[  477.723375][T30172]  ? retint_kernel+0x2d/0x2d
[  477.727969][T30172]  copy_strings_kernel+0xa5/0x110
[  477.732982][T30172]  __do_execve_file.isra.0+0x10ef/0x23f0
[  477.738605][T30172]  ? copy_strings_kernel+0x110/0x110
[  477.743923][T30172]  ? strncpy_from_user+0x2a8/0x380
[  477.749035][T30172]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  477.755263][T30172]  __x64_sys_execveat+0xed/0x130
[  477.760185][T30172]  do_syscall_64+0x103/0x610
[  477.764763][T30172]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  477.770730][T30172] RIP: 0033:0x458da9
[  477.774633][T30172] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:38:00 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
syz_extract_tcp_res(&(0x7f0000000000), 0x8f91, 0x0)

14:38:00 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0)

[  477.794222][T30172] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  477.802614][T30172] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  477.810570][T30172] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  477.818520][T30172] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  477.826484][T30172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  477.834452][T30172] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:00 executing program 0 (fault-call:4 fault-nth:18):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:00 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
fgetxattr(r0, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000040), 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  477.987176][T30235] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
14:38:00 executing program 1:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={<r2=>0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d)

14:38:00 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600)

14:38:00 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
r2 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='/cgroup-loem0security(.wlan1{[[eth1*\x00', 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r2)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8)
ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="518731b5b30e623d1e34ca861f105592c93cbf91a81c7ca167b530ddb26dd42e7ca82213df6ae52bfeb84fce2977cdd13402787197bf5050b27cdafcbe5bc39326a3d4fc4bddf4b9ca7b61e12ead89fa4707a30c37c8c0251aaf4d6d8edeb8a7bf248f42c0808ff1cf6206b5348b56b3b11f2e13f531fd34f6f9146e54828d4b56457bae3525981948134d7534e19cb947c5fbe18ddda1c2b8790f7347faf3faee510f43f0f3b083efd5f2f011646f33ebd04e2072876ade342a4d871b48a877937a614e3ea70b98ed205932aad37dfc24a61a36a5", 0xd5, 0xfffffffffffffffb)

[  478.040634][T30238] FAULT_INJECTION: forcing a failure.
[  478.040634][T30238] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  478.079829][T30235] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  478.105338][T30238] CPU: 1 PID: 30238 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  478.113381][T30238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  478.123452][T30238] Call Trace:
[  478.126773][T30238]  dump_stack+0x172/0x1f0
[  478.131125][T30238]  should_fail.cold+0xa/0x15
[  478.135692][T30235] FAT-fs (loop2): Filesystem has been set read-only
[  478.135732][T30238]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  478.148135][T30238]  ? ___might_sleep+0x163/0x280
[  478.153003][T30238]  should_fail_alloc_page+0x50/0x60
[  478.158215][T30238]  __alloc_pages_nodemask+0x1a1/0x8d0
[  478.163613][T30238]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  478.169365][T30238]  ? get_task_policy.part.0+0x29/0xb0
[  478.174755][T30238]  ? __sanitizer_cov_trace_pc+0x48/0x50
[  478.180311][T30238]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  478.186581][T30238]  alloc_pages_current+0x107/0x210
[  478.191709][T30238]  pte_alloc_one+0x1b/0x1a0
[  478.196227][T30238]  __pte_alloc+0x20/0x310
[  478.200571][T30238]  __handle_mm_fault+0x3391/0x3ec0
[  478.205702][T30238]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  478.211261][T30238]  ? find_held_lock+0x35/0x130
[  478.216042][T30238]  ? handle_mm_fault+0x322/0xb30
[  478.220997][T30238]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  478.227259][T30238]  ? kasan_check_read+0x11/0x20
[  478.232128][T30238]  handle_mm_fault+0x43f/0xb30
[  478.236933][T30238]  __get_user_pages+0x7b6/0x1a40
[  478.241897][T30238]  ? follow_page_mask+0x19a0/0x19a0
[  478.247109][T30238]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:38:00 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = socket$pptp(0x18, 0x1, 0x2)
getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000)
r2 = fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001040)={0x0, <r3=>0x0}, &(0x7f0000001080)=0xc)
stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
r5 = syz_open_dev$mouse(&(0x7f00000011c0)='/dev/input/mouse#\x00', 0x80, 0x40042)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000001380)=ANY=[@ANYBLOB="a71eb3053485c0af0404000037aa72e0cd4769632982c69b36cb65f29252d55503a8367e56eab357230160c8f402ef08e1d1559f23e7c794aa1e0884011c1bcb264c098b928906fbb9f0052977058ae4e6a65133ed0eb417e09dda8989e9535689575784c3f8674d71742d5b7cd31ad994b5b6d0083ddff807c6ee85f632092cf3194de5e262a8a0f05992a48c5e614ca1c88949a20fb1a787e1b99041e5f62d1e73e060c2f40379d165d3805dab9f3513aa3fd72a1f3f7bb51f0924d2a85fa76bf501d259d93c531b52983e852e0ce98d744b7132a4e9fe1c133665332ea5dd0edb2ff4cb02fec7ab511bf8db21e58b5e48e2c9accc1f2024e255f6f73e4442bc9d458c8437c3966b66d362e78d6e2108299313b89cc08aae183e50fa9b50b6828d0559fd18ac1b678fbfad5b1898dd85ad3b317fcf6e0cd43ae5e11ccc760b0ea0ae51c42dd733ac4d24c72c", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000001240)=0x14)
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={r2, r3, r4}, 0xc)

[  478.253377][T30238]  ? fsnotify+0xbc0/0xbc0
[  478.257724][T30238]  get_user_pages_remote+0x21d/0x440
[  478.263036][T30238]  copy_strings.isra.0+0x3dc/0x890
[  478.268169][T30238]  ? remove_arg_zero+0x590/0x590
[  478.273113][T30238]  ? prepare_binprm+0x6aa/0x940
[  478.277973][T30238]  ? lock_downgrade+0x880/0x880
[  478.282831][T30238]  ? vma_link+0x117/0x180
[  478.287177][T30238]  ? install_exec_creds+0x180/0x180
[  478.292393][T30238]  copy_strings_kernel+0xa5/0x110
[  478.297433][T30238]  __do_execve_file.isra.0+0x10ef/0x23f0
[  478.303084][T30238]  ? copy_strings_kernel+0x110/0x110
[  478.308385][T30238]  ? strncpy_from_user+0x2a8/0x380
[  478.313535][T30238]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  478.319813][T30238]  __x64_sys_execveat+0xed/0x130
[  478.324773][T30238]  do_syscall_64+0x103/0x610
[  478.329385][T30238]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  478.335718][T30238] RIP: 0033:0x458da9
[  478.339627][T30238] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  478.359246][T30238] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  478.367668][T30238] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  478.375646][T30238] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  478.383625][T30238] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  478.393190][T30238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
14:38:00 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700)

[  478.401164][T30238] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  478.470775][T30235] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  478.501180][T30235] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  478.521298][T30235] FAT-fs (loop2): Filesystem has been set read-only
14:38:00 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\xf4', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:00 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:00 executing program 1:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={<r2=>0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8)
write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d)

14:38:00 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900)

14:38:00 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x2)
ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x800, 0x14, 0x40, 0xffffffff, "427612ce26e24b9e47718809151b69ab6968aa380fa72bdcc939a4526cbbd9a1"})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:00 executing program 0 (fault-call:4 fault-nth:19):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  478.678207][T30463] FAULT_INJECTION: forcing a failure.
[  478.678207][T30463] name failslab, interval 1, probability 0, space 0, times 0
14:38:01 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
lookup_dcookie(0x7, &(0x7f0000000000)=""/4096, 0x1000)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:01 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  478.753414][T30463] CPU: 0 PID: 30463 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  478.761448][T30463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  478.771509][T30463] Call Trace:
[  478.774816][T30463]  dump_stack+0x172/0x1f0
[  478.779167][T30463]  should_fail.cold+0xa/0x15
[  478.783772][T30463]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  478.789595][T30463]  ? ___might_sleep+0x163/0x280
[  478.794460][T30463]  __should_failslab+0x121/0x190
[  478.799417][T30463]  should_failslab+0x9/0x14
[  478.803928][T30463]  kmem_cache_alloc+0x2b2/0x6f0
[  478.808792][T30463]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  478.815053][T30463]  ptlock_alloc+0x20/0x70
[  478.819402][T30463]  pte_alloc_one+0x6d/0x1a0
[  478.823924][T30463]  __pte_alloc+0x20/0x310
[  478.828269][T30463]  __handle_mm_fault+0x3391/0x3ec0
[  478.833406][T30463]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  478.838958][T30463]  ? find_held_lock+0x35/0x130
[  478.843732][T30463]  ? handle_mm_fault+0x322/0xb30
[  478.848688][T30463]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  478.854946][T30463]  ? kasan_check_read+0x11/0x20
[  478.859812][T30463]  handle_mm_fault+0x43f/0xb30
[  478.864588][T30463]  __get_user_pages+0x7b6/0x1a40
[  478.869552][T30463]  ? follow_page_mask+0x19a0/0x19a0
[  478.874777][T30463]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  478.880268][T30463]  get_user_pages_remote+0x21d/0x440
[  478.885605][T30463]  copy_strings.isra.0+0x3dc/0x890
[  478.890741][T30463]  ? remove_arg_zero+0x590/0x590
[  478.895693][T30463]  ? prepare_binprm+0x6aa/0x940
14:38:01 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
recvfrom$rose(r0, &(0x7f0000000000)=""/243, 0x209, 0x40010140, 0x0, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x71, 0x10000)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f, 0x8}}, 0x20)

14:38:01 executing program 3:
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0)
setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180)={0x43, 0x0, 0x2}, 0x10)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x201, 0x0)
bind$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0xd1, {0x8, 0x0, 0x2, 0x26, 0x400, 0x80}, 0x7, 0x6}, 0xe)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r2, &(0x7f0000000040)="f2a0ea7a96a8d26a92e4a537f233f08607c7cc75d6e51ecb8cf9a42ac9ff9c1ea5cc8690f14051e62b4c91c585321ef00df216edc1f4e1b85eb69841432520de0e642364858860f56dd2a017b3a19b2e2af579c00b2b2f5b02a4d9b6f93deea58f840404930bb52ca93252e049a25af857af59b6c56c2c5b8ecd77", &(0x7f00000000c0)}, 0x18)
socket$inet(0x2, 0x3, 0x80)

14:38:01 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x8080)
sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x1, 0xffff, 0x2, 0x17, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x0, 0x4e22}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_address={0x3, 0x7, 0x32, 0x80, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_key={0xf, 0x9, 0x358, 0x0, "4a0f1a2f242ffa35ca0852dd00fdd30cddf14d9b41a9d63feac4caa9a0a23dec6093aa5649ace77d6a18c99efcff47627269eeeea624e044a99314c2081793d0c7260a707688e1a8b588fa24f57df384bbaf2903d2ac472dd3b7260b054ebeff19cf5d0c4cd8d409b85d78"}]}, 0xb8}}, 0x20040000)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:01 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00)

[  478.900560][T30463]  ? install_exec_creds+0x180/0x180
[  478.905779][T30463]  copy_strings_kernel+0xa5/0x110
[  478.910827][T30463]  __do_execve_file.isra.0+0x10ef/0x23f0
[  478.916489][T30463]  ? copy_strings_kernel+0x110/0x110
[  478.921776][T30463]  ? strncpy_from_user+0x2a8/0x380
[  478.926901][T30463]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  478.933244][T30463]  __x64_sys_execveat+0xed/0x130
[  478.938208][T30463]  do_syscall_64+0x103/0x610
[  478.942818][T30463]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  478.949594][T30463] RIP: 0033:0x458da9
[  478.949612][T30463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  478.949620][T30463] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:01 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat!', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:01 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:01 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00)

[  478.949635][T30463] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
14:38:01 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  478.949644][T30463] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  478.949654][T30463] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:01 executing program 0 (fault-call:4 fault-nth:20):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  478.949663][T30463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  478.949672][T30463] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:01 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:01 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00)

14:38:01 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
pipe2(&(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x80000)
inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x20000000)

[  479.493739][T30881] FAULT_INJECTION: forcing a failure.
[  479.493739][T30881] name failslab, interval 1, probability 0, space 0, times 0
[  479.532191][T30881] CPU: 0 PID: 30881 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
14:38:01 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
socket$can_bcm(0x1d, 0x2, 0x2)

14:38:01 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00)

[  479.540243][T30881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  479.550353][T30881] Call Trace:
[  479.553672][T30881]  dump_stack+0x172/0x1f0
[  479.558026][T30881]  should_fail.cold+0xa/0x15
[  479.562646][T30881]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  479.568469][T30881]  ? ___might_sleep+0x163/0x280
[  479.573334][T30881]  __should_failslab+0x121/0x190
[  479.578295][T30881]  should_failslab+0x9/0x14
[  479.578313][T30881]  kmem_cache_alloc+0x2b2/0x6f0
[  479.578335][T30881]  ? __might_sleep+0x95/0x190
[  479.578366][T30881]  __anon_vma_prepare+0x62/0x3c0
[  479.578394][T30881]  __handle_mm_fault+0x34db/0x3ec0
[  479.578417][T30881]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  479.587765][T30881]  ? find_held_lock+0x35/0x130
[  479.587785][T30881]  ? handle_mm_fault+0x322/0xb30
[  479.587813][T30881]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  479.587833][T30881]  ? kasan_check_read+0x11/0x20
[  479.587859][T30881]  handle_mm_fault+0x43f/0xb30
[  479.633573][T30881]  __get_user_pages+0x7b6/0x1a40
[  479.638534][T30881]  ? follow_page_mask+0x19a0/0x19a0
[  479.643739][T30881]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  479.649992][T30881]  ? fsnotify+0xbc0/0xbc0
[  479.654337][T30881]  get_user_pages_remote+0x21d/0x440
[  479.659661][T30881]  copy_strings.isra.0+0x3dc/0x890
[  479.664795][T30881]  ? remove_arg_zero+0x590/0x590
[  479.669740][T30881]  ? prepare_binprm+0x6aa/0x940
[  479.674595][T30881]  ? lock_downgrade+0x880/0x880
[  479.679453][T30881]  ? vma_link+0x117/0x180
[  479.683788][T30881]  ? install_exec_creds+0x180/0x180
[  479.689002][T30881]  copy_strings_kernel+0xa5/0x110
[  479.694038][T30881]  __do_execve_file.isra.0+0x10ef/0x23f0
[  479.699693][T30881]  ? copy_strings_kernel+0x110/0x110
[  479.704985][T30881]  ? strncpy_from_user+0x2a8/0x380
[  479.710109][T30881]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  479.716402][T30881]  __x64_sys_execveat+0xed/0x130
[  479.721369][T30881]  do_syscall_64+0x103/0x610
[  479.725976][T30881]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  479.731876][T30881] RIP: 0033:0x458da9
[  479.735780][T30881] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  479.755480][T30881] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  479.763907][T30881] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  479.771884][T30881] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  479.779861][T30881] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:02 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x111400, 0x0)

[  479.787845][T30881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  479.795835][T30881] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:02 executing program 0 (fault-call:4 fault-nth:21):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:02 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\"', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:02 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:02 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:02 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:02 executing program 3:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:38:02 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00)

[  480.035845][T31034] FAULT_INJECTION: forcing a failure.
[  480.035845][T31034] name failslab, interval 1, probability 0, space 0, times 0
[  480.079467][T31034] CPU: 1 PID: 31034 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  480.087498][T31034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  480.097561][T31034] Call Trace:
[  480.100875][T31034]  dump_stack+0x172/0x1f0
[  480.105231][T31034]  should_fail.cold+0xa/0x15
[  480.109841][T31034]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  480.115660][T31034]  ? ___might_sleep+0x163/0x280
[  480.120522][T31034]  __should_failslab+0x121/0x190
[  480.125464][T31034]  should_failslab+0x9/0x14
[  480.129973][T31034]  kmem_cache_alloc+0x2b2/0x6f0
[  480.134835][T31034]  ? __might_sleep+0x95/0x190
[  480.139525][T31034]  __anon_vma_prepare+0x1b1/0x3c0
[  480.144554][T31034]  ? __pte_alloc+0x1ba/0x310
[  480.149157][T31034]  __handle_mm_fault+0x34db/0x3ec0
[  480.154284][T31034]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  480.159836][T31034]  ? find_held_lock+0x35/0x130
[  480.164610][T31034]  ? handle_mm_fault+0x322/0xb30
[  480.169564][T31034]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  480.175811][T31034]  ? kasan_check_read+0x11/0x20
[  480.180673][T31034]  handle_mm_fault+0x43f/0xb30
[  480.185452][T31034]  __get_user_pages+0x7b6/0x1a40
[  480.190409][T31034]  ? follow_page_mask+0x19a0/0x19a0
[  480.195642][T31034]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  480.201121][T31034]  get_user_pages_remote+0x21d/0x440
[  480.206429][T31034]  copy_strings.isra.0+0x3dc/0x890
[  480.211559][T31034]  ? remove_arg_zero+0x590/0x590
[  480.216509][T31034]  ? copy_strings_kernel+0x1f/0x110
[  480.221718][T31034]  copy_strings_kernel+0xa5/0x110
[  480.226753][T31034]  __do_execve_file.isra.0+0x10ef/0x23f0
[  480.232404][T31034]  ? copy_strings_kernel+0x110/0x110
[  480.237694][T31034]  ? strncpy_from_user+0x2a8/0x380
[  480.242816][T31034]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  480.249063][T31034]  __x64_sys_execveat+0xed/0x130
[  480.254016][T31034]  do_syscall_64+0x103/0x610
[  480.258618][T31034]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  480.264509][T31034] RIP: 0033:0x458da9
[  480.268413][T31034] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  480.288022][T31034] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  480.296441][T31034] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  480.304417][T31034] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  480.312392][T31034] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  480.320379][T31034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
14:38:02 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2)
r2 = getuid()
mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2000000, &(0x7f0000000300)=ANY=[@ANYBLOB="e794ab59a29afa002c7266646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',wxdno=', @ANYRESHEX=r0, @ANYBLOB=',posixacl,fscache,mmap,fscache,posixacl,subj_user=+#,rootcontext=unconfined_u,subj_role=cpuset,hash,uid<', @ANYRESDEC=r2, @ANYBLOB="d76b15cb3c0d465a6f39f3c9e706cac6a9b3c07f97cb516fc75e2a4955197b8fd3b76d81a78a638f74b2bb4413f815f755b4dbc1e936490522ba00084a5a438ea25829723103e29b8e545cc4d999277482a80ee2425ac04efcc60a9df3a284262f164c2b9f1bad85e3a2d6bc7497252a9347c37f0930d97b736cff58c17281884e8fb70d31bb41cf2597f5aeeb9b"])
r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000040)={0x52c, 0x7f, 0x200})

[  480.328370][T31034] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:02 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002)

14:38:02 executing program 0 (fault-call:4 fault-nth:22):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:02 executing program 1 (fault-call:8 fault-nth:0):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:02 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat5', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:02 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x5033c0, 0x0)

[  480.574606][T31101] FAULT_INJECTION: forcing a failure.
[  480.574606][T31101] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  480.599976][T31110] FAULT_INJECTION: forcing a failure.
[  480.599976][T31110] name failslab, interval 1, probability 0, space 0, times 0
[  480.614041][T31110] CPU: 0 PID: 31110 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  480.622033][T31110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  480.632091][T31110] Call Trace:
[  480.635404][T31110]  dump_stack+0x172/0x1f0
[  480.639758][T31110]  should_fail.cold+0xa/0x15
[  480.644379][T31110]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  480.650214][T31110]  ? ___might_sleep+0x163/0x280
[  480.655085][T31110]  __should_failslab+0x121/0x190
[  480.660030][T31110]  should_failslab+0x9/0x14
[  480.664547][T31110]  kmem_cache_alloc+0x2b2/0x6f0
[  480.669421][T31110]  getname_flags+0xd6/0x5b0
14:38:03 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x5353a178d3cca3bb)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x9c, r2, 0x424, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x14}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x9c}}, 0x200408c1)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00')
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7fffffff, 0xf7e, 0x8000, 0xd493, 0xb77a, 0x0, 0x7, 0xc0, <r4=>0x0}, &(0x7f0000000080)=0x20)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x200}, &(0x7f0000000100)=0x8)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  480.673944][T31110]  __x64_sys_execveat+0xd4/0x130
[  480.678898][T31110]  do_syscall_64+0x103/0x610
[  480.683501][T31110]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  480.689480][T31110] RIP: 0033:0x458da9
[  480.689496][T31110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  480.689505][T31110] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:03 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003)

14:38:03 executing program 5:
r0 = msgget$private(0x0, 0x12)
msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/4096)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:38:03 executing program 1 (fault-call:8 fault-nth:1):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  480.689520][T31110] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  480.689530][T31110] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  480.689538][T31110] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  480.689554][T31110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  480.713049][T31110] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  480.762247][T31101] CPU: 1 PID: 31101 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  480.770240][T31101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  480.780302][T31101] Call Trace:
[  480.780331][T31101]  dump_stack+0x172/0x1f0
[  480.780366][T31101]  should_fail.cold+0xa/0x15
[  480.780399][T31101]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  480.798389][T31101]  ? ___might_sleep+0x163/0x280
[  480.803272][T31101]  should_fail_alloc_page+0x50/0x60
[  480.808485][T31101]  __alloc_pages_nodemask+0x1a1/0x8d0
[  480.813867][T31101]  ? __anon_vma_prepare+0x184/0x3c0
[  480.819082][T31101]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  480.824827][T31101]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  480.831085][T31101]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  480.837352][T31101]  alloc_pages_vma+0xdd/0x540
[  480.842050][T31101]  __handle_mm_fault+0x1dd4/0x3ec0
[  480.847177][T31101]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  480.852727][T31101]  ? find_held_lock+0x35/0x130
[  480.857496][T31101]  ? handle_mm_fault+0x322/0xb30
[  480.862451][T31101]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  480.868705][T31101]  ? kasan_check_read+0x11/0x20
[  480.873570][T31101]  handle_mm_fault+0x43f/0xb30
[  480.878356][T31101]  __get_user_pages+0x7b6/0x1a40
[  480.883321][T31101]  ? follow_page_mask+0x19a0/0x19a0
[  480.888535][T31101]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  480.894792][T31101]  ? fsnotify+0xbc0/0xbc0
[  480.899131][T31101]  get_user_pages_remote+0x21d/0x440
[  480.904437][T31101]  copy_strings.isra.0+0x3dc/0x890
[  480.909575][T31101]  ? remove_arg_zero+0x590/0x590
[  480.914522][T31101]  ? prepare_binprm+0x6aa/0x940
[  480.919408][T31101]  ? lock_downgrade+0x880/0x880
[  480.924359][T31101]  ? vma_link+0x117/0x180
[  480.928703][T31101]  ? install_exec_creds+0x180/0x180
[  480.933918][T31101]  copy_strings_kernel+0xa5/0x110
[  480.938954][T31101]  __do_execve_file.isra.0+0x10ef/0x23f0
[  480.944867][T31101]  ? copy_strings_kernel+0x110/0x110
[  480.950179][T31101]  __x64_sys_execveat+0xed/0x130
[  480.955132][T31101]  do_syscall_64+0x103/0x610
[  480.959734][T31101]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  480.965630][T31101] RIP: 0033:0x458da9
[  480.969527][T31101] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  480.989142][T31101] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  480.997558][T31101] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  480.997568][T31101] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  480.997577][T31101] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:03 executing program 0 (fault-call:4 fault-nth:23):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  480.997587][T31101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  480.997595][T31101] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  481.109529][T31171] FAULT_INJECTION: forcing a failure.
[  481.109529][T31171] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  481.122779][T31171] CPU: 0 PID: 31171 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  481.130769][T31171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  481.140830][T31171] Call Trace:
[  481.144134][T31171]  dump_stack+0x172/0x1f0
[  481.148487][T31171]  should_fail.cold+0xa/0x15
[  481.153202][T31171]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  481.159024][T31171]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  481.164490][T31171]  ? lockdep_hardirqs_on+0x418/0x5d0
[  481.169780][T31171]  ? retint_kernel+0x2d/0x2d
[  481.174383][T31171]  ? trace_hardirqs_on_caller+0x6a/0x220
[  481.180037][T31171]  should_fail_alloc_page+0x50/0x60
[  481.185243][T31171]  __alloc_pages_nodemask+0x1a1/0x8d0
[  481.190627][T31171]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  481.196355][T31171]  ? find_held_lock+0x35/0x130
[  481.201144][T31171]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  481.206962][T31171]  cache_grow_begin+0x9c/0x860
[  481.212700][T31171]  ? getname_flags+0xd6/0x5b0
[  481.221551][T31171]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  481.227892][T31171]  kmem_cache_alloc+0x62d/0x6f0
[  481.232749][T31171]  ? ksys_write+0x1f1/0x2d0
[  481.237263][T31171]  getname_flags+0xd6/0x5b0
[  481.241773][T31171]  ? do_syscall_64+0x26/0x610
[  481.246464][T31171]  __x64_sys_execveat+0xd4/0x130
[  481.251416][T31171]  do_syscall_64+0x103/0x610
[  481.257477][T31171]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  481.263393][T31171] RIP: 0033:0x458da9
[  481.267293][T31171] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  481.286905][T31171] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  481.295334][T31171] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
14:38:03 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0xc01)
ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000040)={0x6, 0x3, @raw_data=[0x135a, 0xf4e, 0x221, 0x8, 0x7, 0xf65, 0x48e7, 0x1ff, 0x4, 0xfffffffffffffff8, 0x0, 0x1, 0xd2f8, 0x8, 0x0, 0x31]})

[  481.303319][T31171] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  481.311305][T31171] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  481.319289][T31171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  481.327263][T31171] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  481.380319][T31278] FAULT_INJECTION: forcing a failure.
[  481.380319][T31278] name failslab, interval 1, probability 0, space 0, times 0
[  481.402039][T31278] CPU: 0 PID: 31278 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  481.410046][T31278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  481.410074][T31278] Call Trace:
[  481.410104][T31278]  dump_stack+0x172/0x1f0
[  481.410129][T31278]  should_fail.cold+0xa/0x15
[  481.432376][T31278]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  481.438203][T31278]  ? __should_failslab+0x59/0x190
[  481.443245][T31278]  __should_failslab+0x121/0x190
[  481.448196][T31278]  should_failslab+0x9/0x14
[  481.452711][T31278]  kmem_cache_alloc_trace+0x2d1/0x760
[  481.458102][T31278]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  481.464463][T31278]  ? debug_smp_processor_id+0x3c/0x280
[  481.469946][T31278]  tomoyo_find_next_domain+0xe4/0x1f8a
[  481.475429][T31278]  ? mark_held_locks+0xf0/0xf0
[  481.480218][T31278]  ? perf_trace_lock+0x510/0x510
[  481.485163][T31278]  ? lockdep_hardirqs_on+0x418/0x5d0
[  481.490457][T31278]  ? trace_hardirqs_on_caller+0x6a/0x220
[  481.496108][T31278]  ? tomoyo_dump_page+0x510/0x510
[  481.501143][T31278]  ? lock_acquire+0x16f/0x3f0
[  481.505828][T31278]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  481.511651][T31278]  tomoyo_bprm_check_security+0x12a/0x1b0
[  481.517387][T31278]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  481.523220][T31278]  security_bprm_check+0x69/0xb0
[  481.528172][T31278]  search_binary_handler+0x77/0x570
[  481.533393][T31278]  ? kasan_check_read+0x11/0x20
[  481.538271][T31278]  __do_execve_file.isra.0+0x1394/0x23f0
[  481.543948][T31278]  ? copy_strings_kernel+0x110/0x110
[  481.549243][T31278]  ? strncpy_from_user+0x2a8/0x380
[  481.554376][T31278]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  481.560660][T31278]  __x64_sys_execveat+0xed/0x130
[  481.565618][T31278]  do_syscall_64+0x103/0x610
[  481.570230][T31278]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  481.576128][T31278] RIP: 0033:0x458da9
[  481.580031][T31278] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  481.599646][T31278] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  481.608075][T31278] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  481.616052][T31278] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  481.624031][T31278] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:03 executing program 3:
ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2)
r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x552)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={<r2=>0xffffffffffffffff}, 0x2, 0x3}}, 0x20)
write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10)
ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0xe, 0xfffffffffffff801, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]})
setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x9, 0x101, 0x0, 0x8}, 0x8)
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x2, 0x10001, 0x4, 0x3, 0x13, 0x9, 0x3, 0x401, 0x81, 0x209cb3ad, 0x9, 0xf27})
ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xffffffff, 0x9, 0x7, 0x2, 0x12, 0xffff, 0x9, 0x3ff, 0x7fffffff, 0x10000, 0x0, 0x1})

14:38:03 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004)

[  481.632006][T31278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  481.639979][T31278] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:04 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:04 executing program 1 (fault-call:8 fault-nth:2):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:04 executing program 0 (fault-call:4 fault-nth:24):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:04 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005)

14:38:04 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
timer_create(0x7, &(0x7f00000002c0)={0x0, 0x30, 0x0, @thr={&(0x7f0000000200)="3a05da4062a7ebac996e63858c9e97e4e4081d4c851286dfbd74600d4aef825c5f9efdbae7772ca8f94c9aff5757fe9af54b4e18b74c3185b78ed374aad61855eeab9022fc5f1607367177bc2858d0d219fc26e70fa3b1512fbcace5a27ce4b5983d5ed4c170ae715ed13fa79831f41cf7d0419418c78438022ef572d9e1a81d210eca5b760b8ee60eefb5cc49089e4da4674371e79b6aff2fe7633efd8481dccf517b02d3061ce88e32a93a617527936442", &(0x7f0000000000)="023531aadac755a0ff1a04b5f79066119bbedc4dc3"}}, &(0x7f0000000300)=<r1=>0x0)
timer_getoverrun(r1)
ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e22, @multicast2}, {0x6, @dev={[], 0x26}}, 0xe, {0x2, 0x4e20, @rand_addr=0x4}, 'bond0\x00'})
r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40400, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r0})
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={<r3=>0x0, 0x3ff}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0x43b0, @remote, 0xffffffffffffffe0}}}, 0x84)

[  481.853986][T31378] FAULT_INJECTION: forcing a failure.
[  481.853986][T31378] name failslab, interval 1, probability 0, space 0, times 0
[  481.866912][T31378] CPU: 1 PID: 31378 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  481.874911][T31378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  481.884976][T31378] Call Trace:
[  481.888285][T31378]  dump_stack+0x172/0x1f0
[  481.892640][T31378]  should_fail.cold+0xa/0x15
[  481.897331][T31378]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  481.903162][T31378]  ? ___might_sleep+0x163/0x280
[  481.908021][T31378]  __should_failslab+0x121/0x190
[  481.912965][T31378]  should_failslab+0x9/0x14
[  481.917477][T31378]  kmem_cache_alloc_trace+0x2d1/0x760
[  481.922895][T31378]  ? lock_downgrade+0x880/0x880
[  481.924890][T31400] FAULT_INJECTION: forcing a failure.
[  481.924890][T31400] name failslab, interval 1, probability 0, space 0, times 0
[  481.927756][T31378]  alloc_fdtable+0x86/0x290
[  481.927777][T31378]  dup_fd+0x743/0xb30
[  481.927809][T31378]  unshare_fd+0x160/0x1d0
[  481.953180][T31378]  ? trace_hardirqs_on_caller+0x6a/0x220
[  481.958827][T31378]  ? set_max_threads+0xe0/0xe0
[  481.963604][T31378]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  481.969076][T31378]  unshare_files+0x7f/0x1f0
[  481.973593][T31378]  ? __ia32_sys_unshare+0x40/0x40
[  481.978637][T31378]  __do_execve_file.isra.0+0x27e/0x23f0
[  481.984194][T31378]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  481.990445][T31378]  ? __phys_addr_symbol+0x30/0x70
[  481.995478][T31378]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
14:38:04 executing program 5:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite6\x00')
getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x1)
msgget(0x1, 0x2)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00')
r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400, 0x0)
sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="580000f8", @ANYRES16=r2, @ANYBLOB="040025bd7000fbdbdf25050000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="7ba035deda80f17e04000000714008210900", @ANYRES32=r3, @ANYBLOB="0c00050001000000000000000c00030008000000000000000800010000000000"], 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4044084)

[  482.001206][T31378]  ? __check_object_size+0x3d/0x42f
[  482.006420][T31378]  ? copy_strings_kernel+0x110/0x110
[  482.011718][T31378]  ? strncpy_from_user+0x2a8/0x380
[  482.016847][T31378]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  482.023106][T31378]  __x64_sys_execveat+0xed/0x130
[  482.028068][T31378]  do_syscall_64+0x103/0x610
[  482.032671][T31378]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  482.038566][T31378] RIP: 0033:0x458da9
[  482.042467][T31378] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  482.062074][T31378] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  482.070495][T31378] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  482.078470][T31378] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  482.086444][T31378] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  482.094416][T31378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
14:38:04 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:04 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006)

[  482.102392][T31378] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  482.112973][T31400] CPU: 0 PID: 31400 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  482.120976][T31400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  482.131027][T31400] Call Trace:
[  482.134319][T31400]  dump_stack+0x172/0x1f0
[  482.138672][T31400]  should_fail.cold+0xa/0x15
[  482.143279][T31400]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  482.149069][T31400]  ? ___might_sleep+0x163/0x280
[  482.153905][T31400]  __should_failslab+0x121/0x190
[  482.158825][T31400]  should_failslab+0x9/0x14
[  482.163320][T31400]  kmem_cache_alloc_trace+0x2d1/0x760
[  482.168673][T31400]  ? retint_kernel+0x2d/0x2d
[  482.173250][T31400]  ? trace_hardirqs_on_caller+0x6a/0x220
[  482.178878][T31400]  tomoyo_find_next_domain+0x12c/0x1f8a
[  482.184423][T31400]  ? retint_kernel+0x2d/0x2d
[  482.188994][T31400]  ? tomoyo_dump_page+0x510/0x510
[  482.193997][T31400]  ? lock_acquire+0x1ea/0x3f0
[  482.198661][T31400]  tomoyo_bprm_check_security+0x12a/0x1b0
[  482.204367][T31400]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  482.210161][T31400]  security_bprm_check+0x69/0xb0
[  482.215096][T31400]  search_binary_handler+0x77/0x570
[  482.220286][T31400]  ? kasan_check_read+0x11/0x20
[  482.225121][T31400]  __do_execve_file.isra.0+0x1394/0x23f0
[  482.230738][T31400]  ? copy_strings_kernel+0x110/0x110
[  482.236034][T31400]  __x64_sys_execveat+0xed/0x130
[  482.240964][T31400]  do_syscall_64+0x103/0x610
[  482.245543][T31400]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  482.251416][T31400] RIP: 0033:0x458da9
[  482.255294][T31400] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  482.274969][T31400] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  482.283371][T31400] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  482.291359][T31400] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  482.299317][T31400] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  482.307273][T31400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  482.315230][T31400] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
14:38:04 executing program 1 (fault-call:8 fault-nth:3):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:04 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:04 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007)

14:38:04 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  482.498038][T31463] FAULT_INJECTION: forcing a failure.
[  482.498038][T31463] name failslab, interval 1, probability 0, space 0, times 0
[  482.511119][T31463] CPU: 1 PID: 31463 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  482.519134][T31463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  482.529188][T31463] Call Trace:
[  482.532527][T31463]  dump_stack+0x172/0x1f0
[  482.536874][T31463]  should_fail.cold+0xa/0x15
[  482.541485][T31463]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  482.547305][T31463]  ? ___might_sleep+0x163/0x280
[  482.552176][T31463]  __should_failslab+0x121/0x190
[  482.557121][T31463]  should_failslab+0x9/0x14
[  482.561634][T31463]  kmem_cache_alloc_node_trace+0x270/0x720
[  482.567461][T31463]  __kmalloc_node+0x3d/0x70
[  482.571978][T31463]  kvmalloc_node+0x68/0x100
[  482.576517][T31463]  alloc_fdtable+0xd6/0x290
[  482.581030][T31463]  dup_fd+0x743/0xb30
[  482.585037][T31463]  unshare_fd+0x160/0x1d0
[  482.589382][T31463]  ? trace_hardirqs_on_caller+0x6a/0x220
[  482.595027][T31463]  ? set_max_threads+0xe0/0xe0
[  482.599799][T31463]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  482.605277][T31463]  unshare_files+0x7f/0x1f0
[  482.609788][T31463]  ? __ia32_sys_unshare+0x40/0x40
[  482.614831][T31463]  __do_execve_file.isra.0+0x27e/0x23f0
[  482.620391][T31463]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  482.626642][T31463]  ? __phys_addr_symbol+0x30/0x70
[  482.631673][T31463]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  482.637401][T31463]  ? __check_object_size+0x3d/0x42f
[  482.642647][T31463]  ? copy_strings_kernel+0x110/0x110
[  482.647939][T31463]  ? strncpy_from_user+0x2a8/0x380
[  482.653062][T31463]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  482.653084][T31463]  __x64_sys_execveat+0xed/0x130
[  482.664243][T31463]  do_syscall_64+0x103/0x610
[  482.664265][T31463]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  482.664277][T31463] RIP: 0033:0x458da9
[  482.664291][T31463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:38:05 executing program 0 (fault-call:4 fault-nth:25):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  482.664299][T31463] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  482.664313][T31463] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  482.664321][T31463] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  482.664329][T31463] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  482.664338][T31463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  482.664356][T31463] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:05 executing program 1 (fault-call:8 fault-nth:4):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:05 executing program 5:
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50d902, 0x0)
ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0xfffffffffffffffe)
ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000140)=0xffffffffffffffff)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
fsync(r1)
ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={<r2=>0x0})
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r2, 0x22})
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:38:05 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  482.915847][T31529] FAULT_INJECTION: forcing a failure.
[  482.915847][T31529] name failslab, interval 1, probability 0, space 0, times 0
[  482.928792][T31529] CPU: 1 PID: 31529 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  482.936775][T31529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  482.936790][T31529] Call Trace:
[  482.950149][T31529]  dump_stack+0x172/0x1f0
[  482.954492][T31529]  should_fail.cold+0xa/0x15
[  482.959101][T31529]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  482.964929][T31529]  ? ___might_sleep+0x163/0x280
[  482.969804][T31529]  __should_failslab+0x121/0x190
[  482.974751][T31529]  should_failslab+0x9/0x14
[  482.979262][T31529]  kmem_cache_alloc_node_trace+0x270/0x720
[  482.985076][T31529]  ? kasan_unpoison_shadow+0x35/0x50
[  482.990371][T31529]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  482.990394][T31529]  __kmalloc_node+0x3d/0x70
[  482.990411][T31529]  kvmalloc_node+0x68/0x100
[  482.990431][T31529]  alloc_fdtable+0x142/0x290
[  483.009801][T31529]  dup_fd+0x743/0xb30
[  483.013810][T31529]  unshare_fd+0x160/0x1d0
[  483.018146][T31529]  ? set_max_threads+0xe0/0xe0
[  483.022935][T31529]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  483.028589][T31529]  unshare_files+0x7f/0x1f0
[  483.033103][T31529]  ? should_fail+0x1de/0x852
[  483.037704][T31529]  ? __ia32_sys_unshare+0x40/0x40
[  483.042744][T31529]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  483.048214][T31529]  ? lockdep_hardirqs_on+0x418/0x5d0
[  483.053512][T31529]  ? retint_kernel+0x2d/0x2d
[  483.058106][T31529]  ? trace_hardirqs_on_caller+0x6a/0x220
14:38:05 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009)

14:38:05 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x5, 0xfffffffffffffffb, 0x100, 0x400})

14:38:05 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100a)

[  483.058131][T31529]  __do_execve_file.isra.0+0x27e/0x23f0
[  483.058159][T31529]  ? copy_strings_kernel+0x110/0x110
[  483.074629][T31529]  __x64_sys_execveat+0xed/0x130
[  483.079581][T31529]  do_syscall_64+0x103/0x610
[  483.084195][T31529]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  483.090096][T31529] RIP: 0033:0x458da9
[  483.090113][T31529] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  483.090122][T31529] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  483.090145][T31529] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  483.129999][T31529] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  483.137975][T31529] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  483.137985][T31529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  483.137993][T31529] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  483.143716][T31526] FAULT_INJECTION: forcing a failure.
[  483.143716][T31526] name failslab, interval 1, probability 0, space 0, times 0
[  483.176048][T31526] CPU: 1 PID: 31526 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  483.184041][T31526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  483.194104][T31526] Call Trace:
[  483.197408][T31526]  dump_stack+0x172/0x1f0
[  483.201754][T31526]  should_fail.cold+0xa/0x15
[  483.206372][T31526]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  483.212192][T31526]  ? __task_pid_nr_ns+0x1b1/0x530
[  483.217269][T31526]  __should_failslab+0x121/0x190
[  483.226309][T31526]  should_failslab+0x9/0x14
[  483.230833][T31526]  kmem_cache_alloc_trace+0x4b/0x760
[  483.236128][T31526]  ? kasan_check_read+0x11/0x20
[  483.240995][T31526]  proc_self_get_link+0x16f/0x1d0
[  483.246156][T31526]  link_path_walk.part.0+0xeec/0x1340
[  483.251535][T31526]  ? proc_ns_dir_readdir+0x570/0x570
[  483.251556][T31526]  ? walk_component+0x2000/0x2000
[  483.251575][T31526]  ? save_stack+0x45/0xd0
[  483.251592][T31526]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  483.251607][T31526]  ? getname_kernel+0x40/0x370
[  483.251626][T31526]  path_lookupat.isra.0+0xe3/0x8d0
[  483.251648][T31526]  ? do_syscall_64+0x103/0x610
[  483.288271][T31526]  ? path_parentat.isra.0+0x160/0x160
[  483.293651][T31526]  ? debug_smp_processor_id+0x3c/0x280
[  483.299135][T31526]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  483.304788][T31526]  filename_lookup+0x1b0/0x410
[  483.309567][T31526]  ? nd_jump_link+0x1d0/0x1d0
14:38:05 executing program 3:
r0 = syz_open_dev$video4linux(&(0x7f0000001140)='/dev/v4l-subdev#\x00', 0x0, 0x202000)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x8000, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000001340)={0x1, &(0x7f0000001280)=[{}]})
write$UHID_DESTROY(r1, &(0x7f0000001240), 0x4)
ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000001180)={0xfffffffffffffffb, "3532714c15de77736738b955f605dfa3b0a1a366a087066f885d1c10b5a7ed3a", 0x1, 0x6a0, 0x5912, 0xe780, 0x8, 0x0, 0xc39, 0xfffffffffffffe00})
r2 = syz_open_dev$media(&(0x7f00000010c0)='/dev/media#\x00', 0x39, 0x840)
epoll_wait(r2, &(0x7f0000001100)=[{}, {}, {}], 0x3, 0x9)
r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e2)
sysinfo(&(0x7f00000000c0)=""/4096)
prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="809428c12f8270a6be9d715dd42ad58ff3233f3334b04fffdcaf32bdd6f1e24e6043f8d3f10636c7cafc289f34641e2e47223d7a78a474b69539fbd93908f769510044266d7affed2431c9e9c363120aab4c9c978c7dd2e42ed0f43f0bc2091cda9d1d18420ab391e35ba88fc6ed5818dff2375da19843c99d7c4926c2616e88c8adea48", 0x84)

14:38:05 executing program 5:
r0 = syz_open_dev$dmmidi(&(0x7f0000000640)='/dev/dmmidi#\x00', 0x0, 0x18a00)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000680)={<r1=>0x0, 0x5}, &(0x7f00000006c0)=0x8)
setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000700)={0x1, 0x80, 0x201, 0x2, 0x8, 0x7fffffff, 0xffffffffffff7cbf, 0x200, r1}, 0x20)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0)
getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)

[  483.314286][T31526]  ? memcpy+0x46/0x50
[  483.318276][T31526]  ? getname_kernel+0x223/0x370
[  483.323168][T31526]  kern_path+0x36/0x40
[  483.327246][T31526]  tomoyo_realpath_nofollow+0x74/0xdb
[  483.332633][T31526]  ? tomoyo_realpath_from_path+0x730/0x730
[  483.338461][T31526]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  483.344716][T31526]  ? tomoyo_init_request_info+0x105/0x1d0
[  483.350483][T31526]  tomoyo_find_next_domain+0x28c/0x1f8a
[  483.356047][T31526]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  483.361529][T31526]  ? tomoyo_dump_page+0x510/0x510
14:38:05 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018)

[  483.366588][T31526]  tomoyo_bprm_check_security+0x12a/0x1b0
[  483.372322][T31526]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  483.378157][T31526]  security_bprm_check+0x69/0xb0
[  483.383113][T31526]  search_binary_handler+0x77/0x570
[  483.388325][T31526]  ? kasan_check_read+0x11/0x20
[  483.393237][T31526]  __do_execve_file.isra.0+0x1394/0x23f0
[  483.398898][T31526]  ? copy_strings_kernel+0x110/0x110
[  483.404189][T31526]  ? strncpy_from_user+0x2a8/0x380
[  483.409320][T31526]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  483.415593][T31526]  __x64_sys_execveat+0xed/0x130
[  483.420549][T31526]  do_syscall_64+0x103/0x610
[  483.425159][T31526]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  483.431056][T31526] RIP: 0033:0x458da9
[  483.434989][T31526] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  483.454603][T31526] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:05 executing program 1 (fault-call:8 fault-nth:5):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  483.463029][T31526] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  483.471007][T31526] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  483.478990][T31526] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  483.487071][T31526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  483.495095][T31526] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  483.641286][T31655] FAULT_INJECTION: forcing a failure.
[  483.641286][T31655] name failslab, interval 1, probability 0, space 0, times 0
[  483.658430][T31655] CPU: 0 PID: 31655 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  483.666771][T31655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  483.676833][T31655] Call Trace:
[  483.676865][T31655]  dump_stack+0x172/0x1f0
[  483.676891][T31655]  should_fail.cold+0xa/0x15
[  483.676914][T31655]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  483.676938][T31655]  ? ___might_sleep+0x163/0x280
[  483.676964][T31655]  __should_failslab+0x121/0x190
[  483.689148][T31655]  should_failslab+0x9/0x14
[  483.689168][T31655]  kmem_cache_alloc_node_trace+0x270/0x720
[  483.689190][T31655]  ? kasan_unpoison_shadow+0x35/0x50
[  483.699834][T31655]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  483.699857][T31655]  __kmalloc_node+0x3d/0x70
[  483.699880][T31655]  kvmalloc_node+0x68/0x100
[  483.709304][T31655]  alloc_fdtable+0x142/0x290
[  483.709324][T31655]  dup_fd+0x743/0xb30
[  483.709361][T31655]  unshare_fd+0x160/0x1d0
[  483.748093][T31655]  ? set_max_threads+0xe0/0xe0
[  483.752874][T31655]  unshare_files+0x7f/0x1f0
[  483.757396][T31655]  ? __ia32_sys_unshare+0x40/0x40
[  483.762439][T31655]  ? __do_execve_file.isra.0+0x237/0x23f0
[  483.768170][T31655]  __do_execve_file.isra.0+0x27e/0x23f0
[  483.773721][T31655]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  483.779971][T31655]  ? __phys_addr_symbol+0x30/0x70
[  483.785000][T31655]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  483.790724][T31655]  ? __check_object_size+0x3d/0x42f
[  483.795943][T31655]  ? copy_strings_kernel+0x110/0x110
[  483.801233][T31655]  ? strncpy_from_user+0x2a8/0x380
[  483.806363][T31655]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  483.812709][T31655]  __x64_sys_execveat+0xed/0x130
[  483.817661][T31655]  do_syscall_64+0x103/0x610
[  483.822268][T31655]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  483.828159][T31655] RIP: 0033:0x458da9
[  483.832059][T31655] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  483.851674][T31655] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  483.860100][T31655] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  483.868075][T31655] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  483.876046][T31655] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  483.884021][T31655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  483.893216][T31655] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:06 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:06 executing program 0 (fault-call:4 fault-nth:26):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:06 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:06 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027)

14:38:06 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0)
write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7)

14:38:06 executing program 1 (fault-call:8 fault-nth:6):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  484.033485][T31663] FAULT_INJECTION: forcing a failure.
[  484.033485][T31663] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  484.046741][T31663] CPU: 0 PID: 31663 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96
[  484.046754][T31663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  484.046760][T31663] Call Trace:
[  484.046789][T31663]  dump_stack+0x172/0x1f0
[  484.046814][T31663]  should_fail.cold+0xa/0x15
[  484.077028][T31663]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  484.082858][T31663]  ? __lock_acquire+0x548/0x3fb0
[  484.087821][T31663]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  484.094088][T31663]  should_fail_alloc_page+0x50/0x60
[  484.099476][T31663]  __alloc_pages_nodemask+0x1a1/0x8d0
[  484.099499][T31663]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  484.099519][T31663]  ? find_held_lock+0x35/0x130
[  484.115512][T31663]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  484.121341][T31663]  cache_grow_begin+0x9c/0x860
[  484.126135][T31663]  ? getname_kernel+0x53/0x370
[  484.130910][T31663]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  484.137174][T31663]  kmem_cache_alloc+0x62d/0x6f0
[  484.142045][T31663]  getname_kernel+0x53/0x370
[  484.146649][T31663]  kern_path+0x20/0x40
[  484.150774][T31663]  tomoyo_realpath_nofollow+0x74/0xdb
[  484.156197][T31663]  ? tomoyo_realpath_from_path+0x730/0x730
[  484.162151][T31663]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  484.168425][T31663]  ? tomoyo_init_request_info+0x105/0x1d0
[  484.174169][T31663]  tomoyo_find_next_domain+0x28c/0x1f8a
[  484.179730][T31663]  ? mark_held_locks+0xf0/0xf0
[  484.184529][T31663]  ? tomoyo_dump_page+0x510/0x510
[  484.189579][T31663]  ? lock_acquire+0x16f/0x3f0
[  484.194274][T31663]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  484.196847][T31673] FAULT_INJECTION: forcing a failure.
[  484.196847][T31673] name failslab, interval 1, probability 0, space 0, times 0
[  484.200109][T31663]  tomoyo_bprm_check_security+0x12a/0x1b0
[  484.200126][T31663]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  484.200150][T31663]  security_bprm_check+0x69/0xb0
[  484.229373][T31663]  search_binary_handler+0x77/0x570
[  484.234617][T31663]  ? kasan_check_read+0x11/0x20
[  484.239571][T31663]  __do_execve_file.isra.0+0x1394/0x23f0
[  484.245373][T31663]  ? copy_strings_kernel+0x110/0x110
[  484.250717][T31663]  ? strncpy_from_user+0x2a8/0x380
[  484.255890][T31663]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  484.262257][T31663]  __x64_sys_execveat+0xed/0x130
[  484.267227][T31663]  do_syscall_64+0x103/0x610
[  484.271887][T31663]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  484.277859][T31663] RIP: 0033:0x458da9
[  484.281917][T31663] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  484.301579][T31663] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  484.310011][T31663] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9
[  484.317998][T31663] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  484.325990][T31663] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:06 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200)
sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xe, 0x6, 0x9, 0x3, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e24}]}, 0x18}}, 0x24008014)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040))

14:38:06 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0)
bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f00000000c0)="c8914b5bf40b48501d4de9622c9638e1d9bb56800480522be873222c432d240287bf23bd160cab79e9ea69801b454f6086df58eb5e8867ce303044c4ae5e24ed12c64eb9f1c730497881e6dd2aeec1a5bab5", &(0x7f0000000140)=""/65}, 0x18)
ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r0, r2})

[  484.334060][T31663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4
[  484.342219][T31663] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006
[  484.350247][T31673] CPU: 1 PID: 31673 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  484.358247][T31673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  484.368310][T31673] Call Trace:
[  484.368339][T31673]  dump_stack+0x172/0x1f0
[  484.368368][T31673]  should_fail.cold+0xa/0x15
[  484.368385][T31673]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  484.368405][T31673]  ? ___might_sleep+0x163/0x280
[  484.368423][T31673]  __should_failslab+0x121/0x190
[  484.368445][T31673]  should_failslab+0x9/0x14
[  484.380719][T31673]  kmem_cache_alloc_trace+0x2d1/0x760
[  484.392964][T31673]  ? __virt_addr_valid+0x55/0x240
[  484.393029][T31673]  __do_execve_file.isra.0+0x325/0x23f0
[  484.393080][T31673]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  484.393124][T31673]  ? __phys_addr_symbol+0x30/0x70
[  484.393163][T31673]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  484.393207][T31673]  ? __check_object_size+0x3d/0x42f
[  484.393283][T31673]  ? copy_strings_kernel+0x110/0x110
[  484.393314][T31673]  ? strncpy_from_user+0x2a8/0x380
[  484.393392][T31673]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  484.408216][T31673]  __x64_sys_execveat+0xed/0x130
[  484.408248][T31673]  do_syscall_64+0x103/0x610
[  484.418805][T31673]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  484.418818][T31673] RIP: 0033:0x458da9
[  484.418837][T31673] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  484.430103][T31673] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  484.430118][T31673] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  484.430126][T31673] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  484.430141][T31673] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:06 executing program 1 (fault-call:8 fault-nth:7):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:06 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
open_by_handle_at(r1, &(0x7f0000000040)={0xb8, 0x10000, "94d590e8a71b415bef1fd73d59058d7cbb2b1a5ff66ddf05fb1f2335a76aa5ad6325d81616a65eb523e50cb084f282694a680a237ef58ab9878509a83f315aab29de7cfe4e3a652600abc95586d9feea5a5d8e818b59523377eb8ca8d0e6a40135856214caddc4adff94cc51f9ec92be4ea1ca53525e5c489544bb63621aba69aac37eba930e2c9ec87fff9fff275bf5f6c7cae6c633e64896012d7433ac28aa0916a6454476675a068dd2dc0777fba1"}, 0xaa03)

[  484.441045][T31673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  484.441070][T31673] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  484.557737][T31679] FAULT_INJECTION: forcing a failure.
[  484.557737][T31679] name failslab, interval 1, probability 0, space 0, times 0
[  484.572051][T31679] CPU: 1 PID: 31679 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  484.580039][T31679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  484.590111][T31679] Call Trace:
[  484.593430][T31679]  dump_stack+0x172/0x1f0
[  484.593456][T31679]  should_fail.cold+0xa/0x15
[  484.593480][T31679]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  484.593505][T31679]  ? ___might_sleep+0x163/0x280
[  484.593526][T31679]  __should_failslab+0x121/0x190
[  484.593545][T31679]  should_failslab+0x9/0x14
[  484.593563][T31679]  __kmalloc+0x2dc/0x740
[  484.593580][T31679]  ? refcount_inc_not_zero_checked+0x144/0x200
14:38:07 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102d)

[  484.593598][T31679]  ? refcount_dec_and_mutex_lock+0x90/0x90
[  484.593617][T31679]  ? security_prepare_creds+0x123/0x190
[  484.593638][T31679]  security_prepare_creds+0x123/0x190
[  484.602554][T31679]  prepare_creds+0x2f5/0x3f0
[  484.654227][T31679]  prepare_exec_creds+0x12/0xf0
[  484.659089][T31679]  __do_execve_file.isra.0+0x393/0x23f0
[  484.664660][T31679]  ? copy_strings_kernel+0x110/0x110
[  484.669962][T31679]  __x64_sys_execveat+0xed/0x130
[  484.674920][T31679]  do_syscall_64+0x103/0x610
[  484.679525][T31679]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  484.685421][T31679] RIP: 0033:0x458da9
[  484.689335][T31679] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  484.709048][T31679] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  484.717490][T31679] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  484.725462][T31679] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
14:38:07 executing program 0 (fault-call:4 fault-nth:27):
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  484.733441][T31679] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  484.741416][T31679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  484.749390][T31679] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:07 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:07 executing program 1 (fault-call:8 fault-nth:8):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:07 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f)

14:38:07 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0)
ioctl$TIOCGICOUNT(r1, 0x545d, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  484.995781][T31797] FAULT_INJECTION: forcing a failure.
[  484.995781][T31797] name failslab, interval 1, probability 0, space 0, times 0
[  485.008610][T31797] CPU: 1 PID: 31797 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  485.016591][T31797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  485.026645][T31797] Call Trace:
[  485.029946][T31797]  dump_stack+0x172/0x1f0
[  485.034291][T31797]  should_fail.cold+0xa/0x15
[  485.038900][T31797]  ? fault_create_debugfs_attr+0x1e0/0x1e0
14:38:07 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:07 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048)

[  485.044722][T31797]  ? ___might_sleep+0x163/0x280
[  485.049585][T31797]  __should_failslab+0x121/0x190
[  485.054535][T31797]  should_failslab+0x9/0x14
[  485.059050][T31797]  __kmalloc+0x2dc/0x740
[  485.063322][T31797]  ? retint_kernel+0x2d/0x2d
[  485.067945][T31797]  ? security_prepare_creds+0x123/0x190
[  485.073503][T31797]  security_prepare_creds+0x123/0x190
[  485.078882][T31797]  ? check_memory_region+0xc1/0x190
[  485.084104][T31797]  prepare_creds+0x2f5/0x3f0
[  485.088715][T31797]  prepare_exec_creds+0x12/0xf0
[  485.093581][T31797]  __do_execve_file.isra.0+0x393/0x23f0
[  485.099130][T31797]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  485.105395][T31797]  ? __phys_addr_symbol+0x30/0x70
[  485.110427][T31797]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  485.116175][T31797]  ? __check_object_size+0x3d/0x42f
[  485.121411][T31797]  ? copy_strings_kernel+0x110/0x110
[  485.126706][T31797]  ? strncpy_from_user+0x2a8/0x380
[  485.131832][T31797]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  485.138083][T31797]  __x64_sys_execveat+0xed/0x130
[  485.143039][T31797]  do_syscall_64+0x103/0x610
[  485.147639][T31797]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  485.153538][T31797] RIP: 0033:0x458da9
[  485.157478][T31797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  485.177140][T31797] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  485.185592][T31797] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
14:38:07 executing program 5:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x81, 0x4)
getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/197, &(0x7f00000001c0)=0xc5)
ioctl$TIOCSIG(r0, 0x40045436, 0x38)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  485.193567][T31797] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  485.201539][T31797] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  485.209518][T31797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  485.220016][T31797] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:07 executing program 1 (fault-call:8 fault-nth:9):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:07 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  485.292515][T31806] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  485.309801][T31806] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  485.331526][T31806] FAT-fs (loop2): Filesystem has been set read-only
14:38:07 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c)

[  485.419243][T31806] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  485.445917][T31806] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  485.483182][T31902] FAULT_INJECTION: forcing a failure.
[  485.483182][T31902] name failslab, interval 1, probability 0, space 0, times 0
[  485.496367][T31902] CPU: 1 PID: 31902 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  485.504367][T31902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  485.514428][T31902] Call Trace:
[  485.517743][T31902]  dump_stack+0x172/0x1f0
[  485.522097][T31902]  should_fail.cold+0xa/0x15
[  485.526699][T31902]  ? fault_create_debugfs_attr+0x1e0/0x1e0
14:38:07 executing program 3:
r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80080000000, 0x80)
bind$llc(r0, &(0x7f0000000040)={0x1a, 0x10f, 0xfffffffffffffffd, 0x6, 0x9, 0x0, @broadcast}, 0x10)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:07 executing program 5:
r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x2, 0x2000)
accept$alg(r0, 0x0, 0x0)
syz_init_net_socket$rose(0xb, 0x5, 0x0)

[  485.532609][T31902]  ? ___might_sleep+0x163/0x280
[  485.537466][T31902]  __should_failslab+0x121/0x190
[  485.542411][T31902]  should_failslab+0x9/0x14
[  485.546932][T31902]  kmem_cache_alloc+0x2b2/0x6f0
[  485.551794][T31902]  ? kasan_check_read+0x11/0x20
[  485.551817][T31902]  __alloc_file+0x27/0x300
[  485.551833][T31902]  alloc_empty_file+0x72/0x170
[  485.551855][T31902]  path_openat+0xef/0x46e0
[  485.551890][T31902]  ? save_stack+0xa9/0xd0
[  485.551914][T31902]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  485.551931][T31902]  ? __kmalloc+0x15c/0x740
[  485.551951][T31902]  ? security_prepare_creds+0x123/0x190
[  485.584455][T31902]  ? prepare_creds+0x2f5/0x3f0
[  485.594740][T31902]  ? prepare_exec_creds+0x12/0xf0
[  485.599786][T31902]  ? __do_execve_file.isra.0+0x393/0x23f0
[  485.605507][T31902]  ? __x64_sys_execveat+0xed/0x130
[  485.605524][T31902]  ? do_syscall_64+0x103/0x610
[  485.605540][T31902]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  485.605560][T31902]  ? __lock_acquire+0x548/0x3fb0
[  485.626396][T31902]  ? prepare_exec_creds+0x12/0xf0
[  485.626418][T31902]  do_filp_open+0x1a1/0x280
[  485.635934][T31902]  ? may_open_dev+0x100/0x100
[  485.640652][T31902]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  485.640670][T31902]  ? find_held_lock+0x35/0x130
[  485.640709][T31902]  ? mark_held_locks+0xa4/0xf0
[  485.652426][T31806] FAT-fs (loop2): Filesystem has been set read-only
[  485.655839][T31902]  ? debug_smp_processor_id+0x3c/0x280
[  485.655858][T31902]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  485.655878][T31902]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  485.673345][T31902]  ? lockdep_hardirqs_on+0x418/0x5d0
[  485.673381][T31902]  do_open_execat+0x137/0x690
[  485.673401][T31902]  ? unregister_binfmt+0x170/0x170
[  485.673418][T31902]  ? lock_downgrade+0x880/0x880
[  485.673436][T31902]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  485.673459][T31902]  ? kasan_check_read+0x11/0x20
[  485.688842][T31902]  ? do_raw_spin_unlock+0x57/0x270
[  485.688866][T31902]  __do_execve_file.isra.0+0x178d/0x23f0
[  485.688882][T31902]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  485.688916][T31902]  ? copy_strings_kernel+0x110/0x110
[  485.688938][T31902]  ? strncpy_from_user+0x2a8/0x380
[  485.737709][T31902]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  485.737733][T31902]  __x64_sys_execveat+0xed/0x130
[  485.737756][T31902]  do_syscall_64+0x103/0x610
[  485.737778][T31902]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  485.737790][T31902] RIP: 0033:0x458da9
[  485.737806][T31902] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  485.737815][T31902] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:08 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:08 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300)

14:38:08 executing program 1 (fault-call:8 fault-nth:10):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:08 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068)

14:38:08 executing program 5:
lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "44799dd7643c30a65f4b7d5d7859e2497b80a3"}, 0x14, 0x1)
prctl$PR_SET_TSC(0x1a, 0x2)
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2)

14:38:08 executing program 3:
pipe(&(0x7f0000000080))
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
sysfs$1(0x1, &(0x7f00000000c0)='\x00')
pipe2(&(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x84000)
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x8000, 0x4)

[  485.737830][T31902] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  485.737840][T31902] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  485.737849][T31902] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  485.737858][T31902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  485.737867][T31902] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  485.972130][T32037] FAULT_INJECTION: forcing a failure.
[  485.972130][T32037] name failslab, interval 1, probability 0, space 0, times 0
[  485.984958][T32037] CPU: 1 PID: 32037 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  485.992980][T32037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  486.003042][T32037] Call Trace:
[  486.006361][T32037]  dump_stack+0x172/0x1f0
[  486.010709][T32037]  should_fail.cold+0xa/0x15
[  486.015315][T32037]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  486.021152][T32037]  ? ___might_sleep+0x163/0x280
[  486.026020][T32037]  __should_failslab+0x121/0x190
[  486.030965][T32037]  should_failslab+0x9/0x14
[  486.035478][T32037]  kmem_cache_alloc+0x2b2/0x6f0
[  486.040338][T32037]  ? rcu_read_lock_sched_held+0x110/0x130
[  486.046078][T32037]  ? kmem_cache_alloc+0x32e/0x6f0
[  486.051114][T32037]  security_file_alloc+0x39/0x170
[  486.056156][T32037]  __alloc_file+0xac/0x300
[  486.060581][T32037]  alloc_empty_file+0x72/0x170
[  486.065367][T32037]  path_openat+0xef/0x46e0
[  486.069813][T32037]  ? save_stack+0xa9/0xd0
[  486.074149][T32037]  ? path_lookupat.isra.0+0x8d0/0x8d0
[  486.079528][T32037]  ? __kmalloc+0x15c/0x740
[  486.083951][T32037]  ? security_prepare_creds+0x123/0x190
[  486.089501][T32037]  ? prepare_creds+0x2f5/0x3f0
[  486.094276][T32037]  ? prepare_exec_creds+0x12/0xf0
[  486.099306][T32037]  ? __do_execve_file.isra.0+0x393/0x23f0
[  486.105043][T32037]  ? __x64_sys_execveat+0xed/0x130
[  486.110166][T32037]  ? do_syscall_64+0x103/0x610
[  486.114945][T32037]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  486.121017][T32037]  ? __lock_acquire+0x548/0x3fb0
[  486.125963][T32037]  ? prepare_exec_creds+0x12/0xf0
[  486.131000][T32037]  do_filp_open+0x1a1/0x280
[  486.135510][T32037]  ? may_open_dev+0x100/0x100
[  486.140191][T32037]  ? fs_reclaim_acquire.part.0+0x30/0x30
[  486.145827][T32037]  ? find_held_lock+0x35/0x130
[  486.150606][T32037]  ? __lock_acquire+0x548/0x3fb0
[  486.155550][T32037]  ? debug_smp_processor_id+0x3c/0x280
[  486.161016][T32037]  ? debug_smp_processor_id+0x3c/0x280
[  486.166500][T32037]  do_open_execat+0x137/0x690
[  486.171187][T32037]  ? unregister_binfmt+0x170/0x170
[  486.176311][T32037]  ? lock_downgrade+0x880/0x880
[  486.181175][T32037]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  486.187421][T32037]  ? kasan_check_read+0x11/0x20
[  486.192280][T32037]  ? do_raw_spin_unlock+0x57/0x270
[  486.197402][T32037]  __do_execve_file.isra.0+0x178d/0x23f0
[  486.203045][T32037]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  486.209313][T32037]  ? copy_strings_kernel+0x110/0x110
[  486.214611][T32037]  ? strncpy_from_user+0x2a8/0x380
[  486.219730][T32037]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  486.225981][T32037]  __x64_sys_execveat+0xed/0x130
[  486.230933][T32037]  do_syscall_64+0x103/0x610
[  486.235538][T32037]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  486.241431][T32037] RIP: 0033:0x458da9
[  486.245327][T32037] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  486.264944][T32037] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:08 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500)

14:38:08 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c)

14:38:08 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0)
ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000080))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
mknod(&(0x7f0000000000)='./file0\x00', 0x8020, 0x3ff)

14:38:08 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0x6e})
fcntl$setstatus(r0, 0x4, 0x0)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)
tee(r2, r2, 0x200000000005, 0x8)

14:38:08 executing program 1 (fault-call:8 fault-nth:11):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  486.273371][T32037] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  486.281344][T32037] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  486.289326][T32037] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  486.297304][T32037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  486.305280][T32037] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:08 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074)

[  486.447008][T32152] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  486.465024][T32158] FAULT_INJECTION: forcing a failure.
[  486.465024][T32158] name failslab, interval 1, probability 0, space 0, times 0
[  486.477790][T32158] CPU: 1 PID: 32158 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  486.478576][T32152] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  486.485767][T32158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  486.485775][T32158] Call Trace:
[  486.485803][T32158]  dump_stack+0x172/0x1f0
[  486.485832][T32158]  should_fail.cold+0xa/0x15
[  486.485857][T32158]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  486.485883][T32158]  ? ___might_sleep+0x163/0x280
[  486.528619][T32158]  __should_failslab+0x121/0x190
[  486.533567][T32158]  should_failslab+0x9/0x14
[  486.538081][T32158]  __kmalloc_track_caller+0x2d8/0x740
[  486.543459][T32158]  ? pointer+0xa30/0xa30
[  486.547704][T32158]  ? sched_exec+0x1cc/0x260
[  486.552206][T32158]  ? kasprintf+0xbb/0xf0
[  486.552224][T32158]  kvasprintf+0xc8/0x170
[  486.552239][T32158]  ? bust_spinlocks+0xe0/0xe0
[  486.552257][T32158]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  486.552269][T32158]  ? sched_exec+0x1cc/0x260
[  486.552289][T32158]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  486.556605][T32152] FAT-fs (loop2): Filesystem has been set read-only
[  486.560757][T32158]  ? lockdep_hardirqs_on+0x418/0x5d0
[  486.560776][T32158]  kasprintf+0xbb/0xf0
[  486.560794][T32158]  ? kvasprintf_const+0x190/0x190
[  486.575837][T32158]  ? nr_iowait+0x130/0x130
[  486.597526][T32158]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  486.597547][T32158]  ? kasan_check_read+0x11/0x20
[  486.597571][T32158]  __do_execve_file.isra.0+0x94b/0x23f0
[  486.597592][T32158]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  486.623612][T32158]  ? copy_strings_kernel+0x110/0x110
[  486.623629][T32158]  ? strncpy_from_user+0x2a8/0x380
[  486.623651][T32158]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  486.623672][T32158]  __x64_sys_execveat+0xed/0x130
[  486.623695][T32158]  do_syscall_64+0x103/0x610
[  486.623717][T32158]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  486.623729][T32158] RIP: 0033:0x458da9
[  486.623745][T32158] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  486.623760][T32158] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  486.640364][T32158] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  486.640373][T32158] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  486.640382][T32158] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  486.640391][T32158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  486.640411][T32158] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  486.801226][T32152] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  486.810976][T32152] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  486.828214][T32152] FAT-fs (loop2): Filesystem has been set read-only
14:38:09 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:09 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/206, &(0x7f0000000100)=0xce)

14:38:09 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getgid()
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x400000, 0x0)
ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000200)={0x9d, 0x8dd8, 0x1})
ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000003c0))
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = fcntl$dupfd(r0, 0x406, r2)
epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000180)={0x8})
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x1)
getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={<r5=>0x0, 0x6}, &(0x7f0000000280)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x5, 0x5, 0x8, 0x3, 0x40a0, r5}, &(0x7f0000000300)=0x20)
write$P9_RSTAT(r3, &(0x7f0000000340)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0xffff, 0x400, {0x80, 0x2, 0x4}, 0x24010000, 0x4, 0x9, 0x9, 0xb, '/dev/audio\x00', 0x9, 'nodev]GPL', 0xb, '/dev/audio\x00', 0xb, '/dev/audio\x00'}}, 0x64)

14:38:09 executing program 1 (fault-call:8 fault-nth:12):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:09 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600)

14:38:09 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a)

14:38:09 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)=0x1)

[  487.040268][T32275] FAULT_INJECTION: forcing a failure.
[  487.040268][T32275] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  487.054740][T32275] CPU: 1 PID: 32275 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  487.062736][T32275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  487.072797][T32275] Call Trace:
[  487.076106][T32275]  dump_stack+0x172/0x1f0
[  487.080471][T32275]  should_fail.cold+0xa/0x15
[  487.085081][T32275]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  487.090925][T32275]  ? ___might_sleep+0x163/0x280
[  487.095794][T32275]  should_fail_alloc_page+0x50/0x60
[  487.100996][T32275]  __alloc_pages_nodemask+0x1a1/0x8d0
[  487.106384][T32275]  ? debug_smp_processor_id+0x3c/0x280
[  487.111855][T32275]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  487.117602][T32275]  ? mark_held_locks+0xa4/0xf0
[  487.122381][T32275]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  487.127845][T32275]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  487.134096][T32275]  alloc_pages_current+0x107/0x210
14:38:09 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100)

[  487.139220][T32275]  __get_free_pages+0xc/0x40
[  487.143818][T32275]  pgd_alloc+0x8b/0x3f0
[  487.147983][T32275]  ? pgd_page_get_mm+0x40/0x40
[  487.152758][T32275]  ? lockdep_init_map+0x1be/0x6d0
[  487.157788][T32275]  ? lockdep_init_map+0x1be/0x6d0
[  487.162828][T32275]  mm_init+0x590/0x9b0
[  487.166907][T32275]  ? mmput+0x4c0/0x4c0
[  487.170995][T32275]  mm_alloc+0xa6/0xd0
[  487.174991][T32275]  __do_execve_file.isra.0+0xaa3/0x23f0
[  487.180549][T32275]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  487.186815][T32275]  ? copy_strings_kernel+0x110/0x110
[  487.192108][T32275]  ? strncpy_from_user+0x2a8/0x380
[  487.197230][T32275]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  487.203480][T32275]  __x64_sys_execveat+0xed/0x130
[  487.208431][T32275]  do_syscall_64+0x103/0x610
[  487.213033][T32275]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  487.218963][T32275] RIP: 0033:0x458da9
[  487.222890][T32275] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  487.244510][T32275] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  487.252932][T32275] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  487.262174][T32275] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  487.270146][T32275] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  487.278146][T32275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
14:38:09 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700)

14:38:09 executing program 1 (fault-call:8 fault-nth:13):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:09 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
connect$rose(r0, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c)

[  487.286122][T32275] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  487.432490][T32294] FAULT_INJECTION: forcing a failure.
[  487.432490][T32294] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  487.445941][T32294] CPU: 1 PID: 32294 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  487.453928][T32294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  487.463991][T32294] Call Trace:
[  487.467301][T32294]  dump_stack+0x172/0x1f0
[  487.471646][T32294]  should_fail.cold+0xa/0x15
[  487.476256][T32294]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  487.482078][T32294]  ? ___might_sleep+0x163/0x280
[  487.486949][T32294]  should_fail_alloc_page+0x50/0x60
[  487.492154][T32294]  __alloc_pages_nodemask+0x1a1/0x8d0
[  487.497577][T32294]  ? debug_smp_processor_id+0x3c/0x280
[  487.503052][T32294]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  487.508793][T32294]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  487.514259][T32294]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  487.519726][T32294]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  487.525981][T32294]  alloc_pages_current+0x107/0x210
[  487.531102][T32294]  __get_free_pages+0xc/0x40
[  487.535700][T32294]  pgd_alloc+0x8b/0x3f0
[  487.539864][T32294]  ? pgd_page_get_mm+0x40/0x40
[  487.544639][T32294]  ? lockdep_init_map+0x1be/0x6d0
[  487.549666][T32294]  ? lockdep_init_map+0x1be/0x6d0
[  487.554705][T32294]  mm_init+0x590/0x9b0
[  487.558782][T32294]  mm_alloc+0xa6/0xd0
[  487.562776][T32294]  __do_execve_file.isra.0+0xaa3/0x23f0
[  487.568326][T32294]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  487.574598][T32294]  ? copy_strings_kernel+0x110/0x110
[  487.579888][T32294]  ? strncpy_from_user+0x2a8/0x380
[  487.585016][T32294]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  487.591271][T32294]  __x64_sys_execveat+0xed/0x130
[  487.596219][T32294]  do_syscall_64+0x103/0x610
[  487.600824][T32294]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  487.606719][T32294] RIP: 0033:0x458da9
[  487.610617][T32294] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:38:10 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:10 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900)

14:38:10 executing program 1 (fault-call:8 fault-nth:14):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  487.630320][T32294] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  487.638749][T32294] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  487.646723][T32294] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  487.654700][T32294] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  487.662674][T32294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  487.670647][T32294] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:10 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200)

14:38:10 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4)

14:38:10 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00)

[  487.798495][T32316] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  487.812128][T32316] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:38:10 executing program 5:
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40})
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x10000, 0x0)
r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x80, 0x0)
ioctl$TIOCVHANGUP(r2, 0x5437, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000000c0)=""/180)
ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f0000000000))
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

[  487.860753][T32316] FAT-fs (loop2): Filesystem has been set read-only
[  487.880692][T32384] FAULT_INJECTION: forcing a failure.
[  487.880692][T32384] name failslab, interval 1, probability 0, space 0, times 0
[  487.893572][T32384] CPU: 1 PID: 32384 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
14:38:10 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)=""/102, 0x66)
ioctl$SIOCRSACCEPT(r0, 0x89e3)

[  487.901555][T32384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  487.911613][T32384] Call Trace:
[  487.914928][T32384]  dump_stack+0x172/0x1f0
[  487.919274][T32384]  should_fail.cold+0xa/0x15
[  487.923877][T32384]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  487.929700][T32384]  ? ___might_sleep+0x163/0x280
[  487.934565][T32384]  __should_failslab+0x121/0x190
[  487.939516][T32384]  should_failslab+0x9/0x14
[  487.944029][T32384]  kmem_cache_alloc+0x2b2/0x6f0
[  487.948914][T32384]  vm_area_alloc+0x20/0x110
[  487.953434][T32384]  __do_execve_file.isra.0+0xc34/0x23f0
[  487.953465][T32384]  ? copy_strings_kernel+0x110/0x110
[  487.953481][T32384]  ? strncpy_from_user+0x2a8/0x380
[  487.953501][T32384]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  487.953522][T32384]  __x64_sys_execveat+0xed/0x130
[  487.953544][T32384]  do_syscall_64+0x103/0x610
[  487.953572][T32384]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  487.964388][T32384] RIP: 0033:0x458da9
[  487.964404][T32384] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  487.964412][T32384] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  487.964428][T32384] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  487.964437][T32384] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  487.964446][T32384] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  487.964456][T32384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
14:38:10 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0)
getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={<r2=>0x0, 0x1, 0x10, 0x100000000, 0x7918}, &(0x7f0000000080)=0x18)
setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x200000000000000, 0x30}, 0xfffffffffffffcdc)

14:38:10 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00)

[  487.964465][T32384] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:10 executing program 1 (fault-call:8 fault-nth:15):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  488.112977][T32316] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
14:38:10 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x100)

[  488.167712][T32316] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  488.180900][T32531] FAULT_INJECTION: forcing a failure.
[  488.180900][T32531] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  488.194418][T32531] CPU: 1 PID: 32531 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  488.197720][T32316] FAT-fs (loop2): Filesystem has been set read-only
[  488.202395][T32531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  488.202403][T32531] Call Trace:
[  488.202430][T32531]  dump_stack+0x172/0x1f0
[  488.202457][T32531]  should_fail.cold+0xa/0x15
[  488.202479][T32531]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  488.237144][T32531]  ? ___might_sleep+0x163/0x280
[  488.242003][T32531]  should_fail_alloc_page+0x50/0x60
[  488.247203][T32531]  __alloc_pages_nodemask+0x1a1/0x8d0
[  488.252571][T32531]  ? mark_held_locks+0xa4/0xf0
[  488.257341][T32531]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  488.263071][T32531]  ? lockdep_hardirqs_on+0x418/0x5d0
[  488.268361][T32531]  ? retint_kernel+0x2d/0x2d
[  488.272954][T32531]  ? touch_atime+0x1b3/0x2a0
[  488.277540][T32531]  ? find_held_lock+0x35/0x130
[  488.282306][T32531]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  488.288574][T32531]  alloc_pages_current+0x107/0x210
[  488.293698][T32531]  get_zeroed_page+0x14/0x50
[  488.298285][T32531]  __pud_alloc+0x3b/0x250
[  488.302618][T32531]  __handle_mm_fault+0x7a5/0x3ec0
[  488.307651][T32531]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  488.313196][T32531]  ? find_held_lock+0x35/0x130
[  488.317958][T32531]  ? handle_mm_fault+0x322/0xb30
[  488.322912][T32531]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  488.329154][T32531]  ? kasan_check_read+0x11/0x20
[  488.334010][T32531]  handle_mm_fault+0x43f/0xb30
[  488.338782][T32531]  __get_user_pages+0x7b6/0x1a40
[  488.343733][T32531]  ? follow_page_mask+0x19a0/0x19a0
[  488.348939][T32531]  ? retint_kernel+0x2d/0x2d
[  488.353556][T32531]  get_user_pages_remote+0x21d/0x440
[  488.358854][T32531]  copy_strings.isra.0+0x3dc/0x890
[  488.363993][T32531]  ? remove_arg_zero+0x590/0x590
[  488.368930][T32531]  ? prepare_binprm+0x6aa/0x940
[  488.373778][T32531]  ? lock_downgrade+0x880/0x880
[  488.378624][T32531]  ? vma_link+0x117/0x180
[  488.382954][T32531]  ? install_exec_creds+0x180/0x180
[  488.389138][T32531]  copy_strings_kernel+0xa5/0x110
[  488.394172][T32531]  __do_execve_file.isra.0+0x10ef/0x23f0
[  488.399813][T32531]  ? copy_strings_kernel+0x110/0x110
[  488.405094][T32531]  ? strncpy_from_user+0x2a8/0x380
[  488.410213][T32531]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  488.416460][T32531]  __x64_sys_execveat+0xed/0x130
[  488.421401][T32531]  do_syscall_64+0x103/0x610
[  488.425998][T32531]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  488.431883][T32531] RIP: 0033:0x458da9
[  488.435783][T32531] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  488.455390][T32531] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  488.463799][T32531] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  488.471761][T32531] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  488.479727][T32531] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  488.487692][T32531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  488.495662][T32531] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:11 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:11 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000)

14:38:11 executing program 5:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2d, 0x7303a50ad3cb4b31)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:11 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00)

14:38:11 executing program 1 (fault-call:8 fault-nth:16):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:11 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
pipe2(&(0x7f0000000080)={<r0=>0xffffffffffffffff}, 0x800)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0)
setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0x8, [@multicast1, @local, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x30)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  488.721741][T32543] FAULT_INJECTION: forcing a failure.
[  488.721741][T32543] name failslab, interval 1, probability 0, space 0, times 0
[  488.737000][T32543] CPU: 0 PID: 32543 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  488.744990][T32543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  488.755141][T32543] Call Trace:
[  488.758462][T32543]  dump_stack+0x172/0x1f0
[  488.762816][T32543]  should_fail.cold+0xa/0x15
[  488.767428][T32543]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  488.773266][T32543]  ? ___might_sleep+0x163/0x280
[  488.778130][T32543]  __should_failslab+0x121/0x190
[  488.783077][T32543]  should_failslab+0x9/0x14
[  488.787591][T32543]  kmem_cache_alloc+0x2b2/0x6f0
[  488.792473][T32543]  ? alloc_pages_current+0x10f/0x210
[  488.797774][T32543]  __pmd_alloc+0xc9/0x460
[  488.802113][T32543]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  488.808372][T32543]  __handle_mm_fault+0x192a/0x3ec0
[  488.813508][T32543]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  488.819058][T32543]  ? find_held_lock+0x35/0x130
[  488.823834][T32543]  ? handle_mm_fault+0x322/0xb30
[  488.828792][T32543]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  488.828815][T32543]  ? kasan_check_read+0x11/0x20
[  488.828837][T32543]  handle_mm_fault+0x43f/0xb30
[  488.828858][T32543]  __get_user_pages+0x7b6/0x1a40
[  488.839943][T32543]  ? follow_page_mask+0x19a0/0x19a0
[  488.839979][T32543]  get_user_pages_remote+0x21d/0x440
[  488.840008][T32543]  copy_strings.isra.0+0x3dc/0x890
[  488.865335][T32543]  ? remove_arg_zero+0x590/0x590
[  488.870304][T32543]  ? prepare_binprm+0x6aa/0x940
[  488.875190][T32543]  ? retint_kernel+0x2d/0x2d
[  488.879875][T32543]  ? install_exec_creds+0x180/0x180
[  488.885085][T32543]  copy_strings_kernel+0xa5/0x110
[  488.890126][T32543]  __do_execve_file.isra.0+0x10ef/0x23f0
[  488.895781][T32543]  ? copy_strings_kernel+0x110/0x110
[  488.901074][T32543]  ? strncpy_from_user+0x2a8/0x380
[  488.906198][T32543]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  488.912447][T32543]  __x64_sys_execveat+0xed/0x130
[  488.917412][T32543]  do_syscall_64+0x103/0x610
[  488.922012][T32543]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  488.927906][T32543] RIP: 0033:0x458da9
[  488.931805][T32543] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  488.951430][T32543] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  488.959850][T32543] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
14:38:11 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00)

14:38:11 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00)

14:38:11 executing program 3:
prctl$PR_GET_TIMERSLACK(0x1e)
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xfffffffffffffffe, 0x0)
ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x6, 0x1, 0x5, {0x7fff, 0xc56, 0x5ca3, 0x5}})
setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0x101, 0x4)
getpeername$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c)
fstat(r1, &(0x7f0000000080))

14:38:11 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4c46)

[  488.967827][T32543] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  488.975800][T32543] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  488.983783][T32543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  488.991758][T32543] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:11 executing program 1 (fault-call:8 fault-nth:17):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  489.067065][T32566] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  489.096897][T32566] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:38:11 executing program 5:
r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200000, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpus\xf0\xc7d\vffective_m\x03:\xc9\xb7', 0x0, 0x0)
getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4)
r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e2)
ioctl$KDADDIO(r2, 0x4b34, 0x66f8)
ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000140))

[  489.147183][T32566] FAT-fs (loop2): Filesystem has been set read-only
[  489.199623][T32665] FAULT_INJECTION: forcing a failure.
[  489.199623][T32665] name failslab, interval 1, probability 0, space 0, times 0
[  489.221169][T32665] CPU: 0 PID: 32665 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  489.229175][T32665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  489.239243][T32665] Call Trace:
[  489.242561][T32665]  dump_stack+0x172/0x1f0
[  489.246903][T32665]  should_fail.cold+0xa/0x15
[  489.251506][T32665]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  489.258803][T32665]  ? ___might_sleep+0x163/0x280
[  489.263666][T32665]  __should_failslab+0x121/0x190
[  489.268607][T32665]  should_failslab+0x9/0x14
[  489.273117][T32665]  kmem_cache_alloc+0x2b2/0x6f0
[  489.277975][T32665]  ? alloc_pages_current+0x10f/0x210
[  489.283277][T32665]  __pmd_alloc+0xc9/0x460
[  489.287617][T32665]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  489.293875][T32665]  __handle_mm_fault+0x192a/0x3ec0
[  489.299007][T32665]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  489.304565][T32665]  ? find_held_lock+0x35/0x130
[  489.309339][T32665]  ? handle_mm_fault+0x322/0xb30
[  489.314306][T32665]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  489.320556][T32665]  ? kasan_check_read+0x11/0x20
[  489.325425][T32665]  handle_mm_fault+0x43f/0xb30
[  489.330201][T32665]  __get_user_pages+0x7b6/0x1a40
[  489.335172][T32665]  ? follow_page_mask+0x19a0/0x19a0
[  489.340405][T32665]  get_user_pages_remote+0x21d/0x440
[  489.345713][T32665]  copy_strings.isra.0+0x3dc/0x890
[  489.350838][T32665]  ? remove_arg_zero+0x590/0x590
[  489.355778][T32665]  ? prepare_binprm+0x6aa/0x940
[  489.360636][T32665]  ? lock_downgrade+0x880/0x880
[  489.365490][T32665]  ? vma_link+0x117/0x180
[  489.369834][T32665]  ? install_exec_creds+0x180/0x180
[  489.375043][T32665]  copy_strings_kernel+0xa5/0x110
[  489.380079][T32665]  __do_execve_file.isra.0+0x10ef/0x23f0
[  489.385731][T32665]  ? copy_strings_kernel+0x110/0x110
[  489.391016][T32665]  ? strncpy_from_user+0x2a8/0x380
[  489.396133][T32665]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  489.402401][T32665]  __x64_sys_execveat+0xed/0x130
[  489.407358][T32665]  do_syscall_64+0x103/0x610
[  489.411965][T32665]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  489.418029][T32665] RIP: 0033:0x458da9
[  489.421925][T32665] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  489.441531][T32665] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  489.449948][T32665] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  489.457920][T32665] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  489.465905][T32665] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  489.473889][T32665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  489.481865][T32665] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  489.585780][T32667] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  489.604804][T32667] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  489.630467][T32667] FAT-fs (loop2): Filesystem has been set read-only
14:38:12 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:12 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0)
setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040), 0x10)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:12 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xff00)

14:38:12 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00)

14:38:12 executing program 1 (fault-call:8 fault-nth:18):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:12 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x121881, 0x0)
ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0x5, 0x3, 0x4, 0x7f})

[  489.766553][  T308] FAULT_INJECTION: forcing a failure.
[  489.766553][  T308] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  489.780366][  T308] CPU: 1 PID: 308 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  489.788181][  T308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  489.798242][  T308] Call Trace:
[  489.801547][  T308]  dump_stack+0x172/0x1f0
[  489.805890][  T308]  should_fail.cold+0xa/0x15
[  489.810497][  T308]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  489.816315][  T308]  ? ___might_sleep+0x163/0x280
[  489.821198][  T308]  should_fail_alloc_page+0x50/0x60
[  489.826402][  T308]  __alloc_pages_nodemask+0x1a1/0x8d0
[  489.831782][  T308]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  489.837523][  T308]  ? kasan_check_write+0x14/0x20
[  489.842473][  T308]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  489.848725][  T308]  alloc_pages_current+0x107/0x210
[  489.853849][  T308]  pte_alloc_one+0x1b/0x1a0
[  489.858374][  T308]  __pte_alloc+0x20/0x310
[  489.862722][  T308]  __handle_mm_fault+0x3391/0x3ec0
[  489.867849][  T308]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  489.873407][  T308]  ? find_held_lock+0x35/0x130
[  489.878184][  T308]  ? handle_mm_fault+0x322/0xb30
[  489.883145][  T308]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  489.889399][  T308]  ? kasan_check_read+0x11/0x20
[  489.894270][  T308]  handle_mm_fault+0x43f/0xb30
[  489.899049][  T308]  __get_user_pages+0x7b6/0x1a40
[  489.904007][  T308]  ? follow_page_mask+0x19a0/0x19a0
[  489.909229][  T308]  get_user_pages_remote+0x21d/0x440
[  489.914535][  T308]  copy_strings.isra.0+0x3dc/0x890
[  489.919666][  T308]  ? remove_arg_zero+0x590/0x590
[  489.924610][  T308]  ? prepare_binprm+0x6aa/0x940
[  489.929470][  T308]  ? lock_downgrade+0x880/0x880
[  489.934326][  T308]  ? vma_link+0x117/0x180
[  489.938671][  T308]  ? install_exec_creds+0x180/0x180
[  489.943877][  T308]  copy_strings_kernel+0xa5/0x110
[  489.948932][  T308]  __do_execve_file.isra.0+0x10ef/0x23f0
[  489.954585][  T308]  ? copy_strings_kernel+0x110/0x110
[  489.959883][  T308]  ? strncpy_from_user+0x2a8/0x380
[  489.965009][  T308]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  489.971262][  T308]  __x64_sys_execveat+0xed/0x130
[  489.976220][  T308]  do_syscall_64+0x103/0x610
[  489.980823][  T308]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  489.986717][  T308] RIP: 0033:0x458da9
[  489.990618][  T308] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:38:12 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:12 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002)

14:38:12 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=<r1=>0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, <r2=>0x0})
r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0)
kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)={r3, r0, 0x6})
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00', 0x2)
fcntl$getownex(r3, 0x10, &(0x7f00000001c0))
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:12 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x101000)
ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040))
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  490.010230][  T308] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  490.018648][  T308] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  490.026625][  T308] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  490.034606][  T308] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  490.042581][  T308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  490.050559][  T308] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:12 executing program 1 (fault-call:8 fault-nth:19):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  490.121187][  T419] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  490.143272][  T419] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:38:12 executing program 3:
r0 = socket$rxrpc(0x21, 0x2, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'team0\x00', r1})
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x8, {0xffffffffffff0000}}, 0x18)

[  490.173949][  T419] FAT-fs (loop2): Filesystem has been set read-only
[  490.244377][  T437] FAULT_INJECTION: forcing a failure.
[  490.244377][  T437] name failslab, interval 1, probability 0, space 0, times 0
[  490.257273][  T437] CPU: 1 PID: 437 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  490.265082][  T437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  490.275149][  T437] Call Trace:
[  490.278505][  T437]  dump_stack+0x172/0x1f0
[  490.282853][  T437]  should_fail.cold+0xa/0x15
[  490.287474][  T437]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  490.293294][  T437]  ? ___might_sleep+0x163/0x280
[  490.298158][  T437]  __should_failslab+0x121/0x190
[  490.303101][  T437]  should_failslab+0x9/0x14
[  490.307700][  T437]  kmem_cache_alloc+0x2b2/0x6f0
[  490.312568][  T437]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  490.318832][  T437]  ptlock_alloc+0x20/0x70
[  490.323185][  T437]  pte_alloc_one+0x6d/0x1a0
[  490.327697][  T437]  __pte_alloc+0x20/0x310
[  490.332041][  T437]  __handle_mm_fault+0x3391/0x3ec0
[  490.337270][  T437]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  490.342837][  T437]  ? find_held_lock+0x35/0x130
[  490.347615][  T437]  ? handle_mm_fault+0x322/0xb30
[  490.352579][  T437]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  490.358845][  T437]  ? kasan_check_read+0x11/0x20
[  490.363709][  T437]  handle_mm_fault+0x43f/0xb30
[  490.368496][  T437]  __get_user_pages+0x7b6/0x1a40
[  490.373462][  T437]  ? follow_page_mask+0x19a0/0x19a0
[  490.378675][  T437]  ? tomoyo_load_policy+0xc9/0x268
[  490.383807][  T437]  get_user_pages_remote+0x21d/0x440
[  490.390648][  T437]  copy_strings.isra.0+0x3dc/0x890
[  490.395784][  T437]  ? remove_arg_zero+0x590/0x590
[  490.400741][  T437]  ? prepare_binprm+0x6aa/0x940
[  490.405613][  T437]  ? lock_downgrade+0x880/0x880
[  490.410471][  T437]  ? vma_link+0x117/0x180
[  490.414902][  T437]  ? install_exec_creds+0x180/0x180
[  490.420113][  T437]  copy_strings_kernel+0xa5/0x110
[  490.425158][  T437]  __do_execve_file.isra.0+0x10ef/0x23f0
[  490.430840][  T437]  ? copy_strings_kernel+0x110/0x110
[  490.436134][  T437]  ? strncpy_from_user+0x2a8/0x380
[  490.441260][  T437]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  490.447517][  T437]  __x64_sys_execveat+0xed/0x130
[  490.452472][  T437]  do_syscall_64+0x103/0x610
[  490.457071][  T437]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  490.463059][  T437] RIP: 0033:0x458da9
[  490.466960][  T437] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  490.486581][  T437] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  490.495004][  T437] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  490.502977][  T437] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  490.511036][  T437] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  490.519010][  T437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  490.526988][  T437] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  490.591998][  T419] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  490.612841][  T419] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  490.612857][  T419] FAT-fs (loop2): Filesystem has been set read-only
14:38:13 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:13 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2)
setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000000c0)={{0x2, @loopback, 0x4e23, 0x1, 'lc\x00', 0x10, 0xffff, 0x78}, {@loopback, 0x4e24, 0x4, 0xc8a, 0xffffffff80000000, 0x40}}, 0x44)

14:38:13 executing program 5:
r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x105000)
getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x100fe)
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)

14:38:13 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003)

14:38:13 executing program 1 (fault-call:8 fault-nth:20):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:13 executing program 3:
syz_init_net_socket$rose(0xb, 0x5, 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x16ab, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x800], 0x1, 0x8, 0xbf, 0x8, 0x180, 0x8, {0x80000000, 0x200, 0x8, 0xffffffffffffffff, 0x9, 0x10000, 0x5, 0x3153, 0x3, 0x2, 0x7fff, 0x1ff, 0x2cf3, 0x2, "243ba6a1b7d233478f978f1de7db6352819e666eeb58c08a7c3cd7a16e48a921"}})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  490.771668][  T544] FAULT_INJECTION: forcing a failure.
[  490.771668][  T544] name failslab, interval 1, probability 0, space 0, times 0
[  490.784524][  T544] CPU: 0 PID: 544 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  490.792343][  T544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  490.802416][  T544] Call Trace:
[  490.805724][  T544]  dump_stack+0x172/0x1f0
[  490.810073][  T544]  should_fail.cold+0xa/0x15
[  490.814680][  T544]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  490.820504][  T544]  ? ___might_sleep+0x163/0x280
[  490.825382][  T544]  __should_failslab+0x121/0x190
[  490.830336][  T544]  should_failslab+0x9/0x14
[  490.834860][  T544]  kmem_cache_alloc+0x2b2/0x6f0
[  490.839724][  T544]  ? __might_sleep+0x95/0x190
[  490.844424][  T544]  __anon_vma_prepare+0x62/0x3c0
[  490.849383][  T544]  ? __pte_alloc+0x1ba/0x310
[  490.853995][  T544]  __handle_mm_fault+0x34db/0x3ec0
[  490.859120][  T544]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  490.864707][  T544]  ? find_held_lock+0x35/0x130
[  490.869588][  T544]  ? handle_mm_fault+0x322/0xb30
[  490.874552][  T544]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  490.880805][  T544]  ? kasan_check_read+0x11/0x20
[  490.885672][  T544]  handle_mm_fault+0x43f/0xb30
[  490.890448][  T544]  __get_user_pages+0x7b6/0x1a40
[  490.895415][  T544]  ? follow_page_mask+0x19a0/0x19a0
[  490.900638][  T544]  get_user_pages_remote+0x21d/0x440
[  490.905948][  T544]  copy_strings.isra.0+0x3dc/0x890
[  490.911080][  T544]  ? remove_arg_zero+0x590/0x590
[  490.916021][  T544]  ? prepare_binprm+0x6aa/0x940
[  490.920874][  T544]  ? lock_downgrade+0x880/0x880
[  490.925728][  T544]  ? vma_link+0x117/0x180
[  490.930062][  T544]  ? install_exec_creds+0x180/0x180
[  490.935271][  T544]  copy_strings_kernel+0xa5/0x110
[  490.940312][  T544]  __do_execve_file.isra.0+0x10ef/0x23f0
[  490.945967][  T544]  ? copy_strings_kernel+0x110/0x110
[  490.951343][  T544]  ? strncpy_from_user+0x2a8/0x380
[  490.956475][  T544]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  490.962761][  T544]  __x64_sys_execveat+0xed/0x130
[  490.967715][  T544]  do_syscall_64+0x103/0x610
[  490.972317][  T544]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  490.978219][  T544] RIP: 0033:0x458da9
[  490.982118][  T544] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  491.001723][  T544] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  491.010142][  T544] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
14:38:13 executing program 1 (fault-call:8 fault-nth:21):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  491.018200][  T544] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  491.026173][  T544] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  491.034147][  T544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  491.042118][  T544] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:13 executing program 5:
r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2)
ioctl$RTC_AIE_OFF(r0, 0x7002)
r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00')
sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8268}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)

14:38:13 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004)

14:38:13 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r1=>0x0)
ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1)

14:38:13 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005)

[  491.209388][  T656] FAULT_INJECTION: forcing a failure.
[  491.209388][  T656] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  491.223043][  T656] CPU: 1 PID: 656 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  491.238178][  T656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  491.248240][  T656] Call Trace:
[  491.251552][  T656]  dump_stack+0x172/0x1f0
[  491.256682][  T656]  should_fail.cold+0xa/0x15
[  491.256699][  T656]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  491.256710][  T656]  ? ___might_sleep+0x163/0x280
[  491.256724][  T656]  should_fail_alloc_page+0x50/0x60
[  491.256733][  T656]  __alloc_pages_nodemask+0x1a1/0x8d0
[  491.256743][  T656]  ? __anon_vma_prepare+0x184/0x3c0
[  491.256754][  T656]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  491.256769][  T656]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  491.256777][  T656]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  491.256789][  T656]  alloc_pages_vma+0xdd/0x540
[  491.256802][  T656]  __handle_mm_fault+0x1dd4/0x3ec0
[  491.256815][  T656]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  491.256824][  T656]  ? find_held_lock+0x35/0x130
[  491.256834][  T656]  ? handle_mm_fault+0x322/0xb30
[  491.256847][  T656]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  491.256858][  T656]  ? kasan_check_read+0x11/0x20
[  491.256869][  T656]  handle_mm_fault+0x43f/0xb30
[  491.256881][  T656]  __get_user_pages+0x7b6/0x1a40
[  491.256901][  T656]  ? follow_page_mask+0x19a0/0x19a0
14:38:13 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='$\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='em1/.-\xb1\x00'], &(0x7f0000000280)=[&(0x7f00000001c0)='\x00\x00\x06\x00', &(0x7f0000000200)='mime_type\x00', &(0x7f0000000240)='wlan1md5sum\x00'])

[  491.256919][  T656]  get_user_pages_remote+0x21d/0x440
[  491.256935][  T656]  copy_strings.isra.0+0x3dc/0x890
[  491.256950][  T656]  ? remove_arg_zero+0x590/0x590
[  491.256958][  T656]  ? prepare_binprm+0x6aa/0x940
[  491.256966][  T656]  ? lock_downgrade+0x880/0x880
[  491.256973][  T656]  ? vma_link+0x117/0x180
[  491.256982][  T656]  ? install_exec_creds+0x180/0x180
[  491.256993][  T656]  copy_strings_kernel+0xa5/0x110
[  491.257004][  T656]  __do_execve_file.isra.0+0x10ef/0x23f0
[  491.257019][  T656]  ? copy_strings_kernel+0x110/0x110
[  491.257027][  T656]  ? strncpy_from_user+0x2a8/0x380
[  491.257038][  T656]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  491.257050][  T656]  __x64_sys_execveat+0xed/0x130
[  491.257062][  T656]  do_syscall_64+0x103/0x610
[  491.257073][  T656]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  491.257081][  T656] RIP: 0033:0x458da9
[  491.257090][  T656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  491.257095][  T656] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  491.257104][  T656] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  491.257109][  T656] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  491.257114][  T656] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  491.257119][  T656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  491.257124][  T656] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  491.406733][  T658] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  491.521888][  T658] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  491.535573][  T658] FAT-fs (loop2): Filesystem has been set read-only
[  491.601039][  T658] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  491.612028][  T658] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  491.622439][  T658] FAT-fs (loop2): Filesystem has been set read-only
14:38:14 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:14 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80000, 0x0)
r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
inotify_rm_watch(r1, r2)
r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb4, 0x8000)
setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000040), 0x4)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:14 executing program 1 (fault-call:8 fault-nth:22):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:14 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006)

14:38:14 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0)
getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/217, &(0x7f0000000140)=0xd9)

14:38:14 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00', 0xffffffffffffffff)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
fcntl$addseals(r0, 0x409, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  491.775694][  T783] FAULT_INJECTION: forcing a failure.
[  491.775694][  T783] name failslab, interval 1, probability 0, space 0, times 0
[  491.788774][  T783] CPU: 0 PID: 783 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  491.796600][  T783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  491.806666][  T783] Call Trace:
[  491.809981][  T783]  dump_stack+0x172/0x1f0
[  491.814335][  T783]  should_fail.cold+0xa/0x15
[  491.814370][  T783]  ? fault_create_debugfs_attr+0x1e0/0x1e0
14:38:14 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
getpeername(0xffffffffffffffff, &(0x7f0000000100)=@ll={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x80)
sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv4_newaddr={0x48, 0x14, 0xd3db04f82fecfbe1, 0x70bd28, 0x25dfdbfb, {0x2, 0x10, 0x420, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x80000000, 0x8, 0x800}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffffffd, 0xfffffffffffffffa, 0xe594}}, @IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x48}}, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  491.814405][  T783]  ? ___might_sleep+0x163/0x280
[  491.814436][  T783]  __should_failslab+0x121/0x190
[  491.834591][  T783]  should_failslab+0x9/0x14
[  491.839108][  T783]  kmem_cache_alloc+0x2b2/0x6f0
[  491.839130][  T783]  ? __anon_vma_prepare+0x73/0x3c0
[  491.839159][  T783]  __anon_vma_prepare+0x1b1/0x3c0
[  491.854113][  T783]  ? __pte_alloc+0x1ba/0x310
[  491.858716][  T783]  __handle_mm_fault+0x34db/0x3ec0
[  491.863842][  T783]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  491.869406][  T783]  ? find_held_lock+0x35/0x130
14:38:14 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x10000008000)
ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x5, 0x11, 0x14, 0x5, 0x0, 0x0, 0x1, 0xf6, 0x1}})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0)

[  491.873726][  T833] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  491.874181][  T783]  ? handle_mm_fault+0x322/0xb30
[  491.888144][  T783]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  491.894419][  T783]  ? kasan_check_read+0x11/0x20
[  491.899296][  T783]  handle_mm_fault+0x43f/0xb30
[  491.902025][  T833] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  491.904073][  T783]  __get_user_pages+0x7b6/0x1a40
[  491.904104][  T783]  ? follow_page_mask+0x19a0/0x19a0
[  491.904126][  T783]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  491.904151][  T783]  get_user_pages_remote+0x21d/0x440
[  491.935135][  T783]  copy_strings.isra.0+0x3dc/0x890
[  491.936671][  T833] FAT-fs (loop2): Filesystem has been set read-only
[  491.940265][  T783]  ? remove_arg_zero+0x590/0x590
[  491.940282][  T783]  ? prepare_binprm+0x6aa/0x940
[  491.940299][  T783]  ? lock_downgrade+0x880/0x880
[  491.940318][  T783]  ? vma_link+0x117/0x180
[  491.965889][  T783]  ? install_exec_creds+0x180/0x180
[  491.971099][  T783]  copy_strings_kernel+0xa5/0x110
14:38:14 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000005374f8e33d6480ccb9030038081f000000000000000000000020000200"/46], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2)
ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000100))
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc8, r2, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8b2}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x90}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff75}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x4004000)

[  491.976141][  T783]  __do_execve_file.isra.0+0x10ef/0x23f0
[  491.981793][  T783]  ? copy_strings_kernel+0x110/0x110
[  491.987085][  T783]  ? strncpy_from_user+0x2a8/0x380
[  491.992208][  T783]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  491.998468][  T783]  __x64_sys_execveat+0xed/0x130
[  492.003431][  T783]  do_syscall_64+0x103/0x610
[  492.008040][  T783]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  492.013935][  T783] RIP: 0033:0x458da9
14:38:14 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x400, 0x800)
setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x0, 0x2, 0x0, "49e13a72c583f2457b15845d4b659ceea636197563c71bf187dbcece48c112748aaac11a5caab816d541a0f36bd85239dea9009dd0d655e644a3900a9e8e00fb97b5be0217b67f0da4a68de2ef1a429d"}, 0xd8)
r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x14000, 0x0)
bind(r2, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x3, @loopback}}, 0x80)
r3 = dup(r0)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000000))

[  492.017832][  T783] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  492.037463][  T783] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  492.037480][  T783] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  492.037489][  T783] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  492.037498][  T783] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
14:38:14 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007)

14:38:14 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0)
ioctl$EVIOCGMTSLOTS(r1, 0x400445a0, &(0x7f00000000c0)=""/160)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x280000, 0x0)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000040)={0x9}, 0x1)
dup(r0)

[  492.037508][  T783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  492.037517][  T783] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  492.144824][  T833] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  492.173046][  T833] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  492.202277][  T833] FAT-fs (loop2): Filesystem has been set read-only
14:38:14 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:14 executing program 1 (fault-call:8 fault-nth:23):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  492.377115][ T1002] FAULT_INJECTION: forcing a failure.
[  492.377115][ T1002] name failslab, interval 1, probability 0, space 0, times 0
[  492.390919][ T1002] CPU: 1 PID: 1002 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  492.398845][ T1002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.408913][ T1002] Call Trace:
[  492.412232][ T1002]  dump_stack+0x172/0x1f0
[  492.416583][ T1002]  should_fail.cold+0xa/0x15
[  492.421188][ T1002]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  492.427007][ T1002]  ? ___might_sleep+0x163/0x280
[  492.431871][ T1002]  __should_failslab+0x121/0x190
[  492.436824][ T1002]  should_failslab+0x9/0x14
[  492.441337][ T1002]  kmem_cache_alloc_trace+0x2d1/0x760
[  492.446730][ T1002]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  492.452196][ T1002]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  492.458454][ T1002]  ? debug_smp_processor_id+0x3c/0x280
[  492.463939][ T1002]  tomoyo_find_next_domain+0x12c/0x1f8a
[  492.469493][ T1002]  ? mark_held_locks+0xf0/0xf0
[  492.474268][ T1002]  ? perf_trace_lock+0x510/0x510
[  492.479222][ T1002]  ? retint_kernel+0x2d/0x2d
[  492.483826][ T1002]  ? tomoyo_dump_page+0x510/0x510
[  492.488857][ T1002]  ? lock_acquire+0x16f/0x3f0
[  492.493550][ T1002]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  492.499383][ T1002]  tomoyo_bprm_check_security+0x12a/0x1b0
[  492.505112][ T1002]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  492.510939][ T1002]  security_bprm_check+0x69/0xb0
[  492.515905][ T1002]  search_binary_handler+0x77/0x570
[  492.521115][ T1002]  ? kasan_check_read+0x11/0x20
[  492.525976][ T1002]  __do_execve_file.isra.0+0x1394/0x23f0
[  492.531801][ T1002]  ? copy_strings_kernel+0x110/0x110
[  492.537093][ T1002]  ? strncpy_from_user+0x2a8/0x380
[  492.542218][ T1002]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  492.548477][ T1002]  __x64_sys_execveat+0xed/0x130
[  492.553433][ T1002]  do_syscall_64+0x103/0x610
[  492.558043][ T1002]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  492.563936][ T1002] RIP: 0033:0x458da9
[  492.567827][ T1002] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  492.587429][ T1002] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  492.595841][ T1002] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  492.603809][ T1002] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  492.611774][ T1002] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  492.619747][ T1002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
14:38:15 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
r1 = open(&(0x7f0000000040)='./file0\x00', 0x402, 0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, r1, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  492.627715][ T1002] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:15 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009)

14:38:15 executing program 1 (fault-call:8 fault-nth:24):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:15 executing program 3:
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0)
ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080))
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2)
r2 = getpgrp(0x0)
fcntl$setown(r1, 0x8, r2)
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001780)='/dev/sequencer2\x00', 0x400, 0x0)
socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0))
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=<r4=>0x0)
ptrace(0x420f, r4)
syz_init_net_socket$rose(0xb, 0x5, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000017c0)={0x7, 0x7, 0x4, 0x5, 0xfffffffffffffffe, 0x6f9, 0x7fff, 0x5, <r5=>0x0}, &(0x7f0000000000)=0xf5)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001840)={r5, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x0, 0x3, 0x8, 0x7fff}, &(0x7f0000001900)=0x98)

[  492.731521][ T1033] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  492.791621][ T1033] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  492.833272][ T1130] FAULT_INJECTION: forcing a failure.
[  492.833272][ T1130] name failslab, interval 1, probability 0, space 0, times 0
[  492.836271][ T1033] FAT-fs (loop2): Filesystem has been set read-only
[  492.846210][ T1130] CPU: 0 PID: 1130 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  492.860488][ T1130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.870540][ T1130] Call Trace:
[  492.873925][ T1130]  dump_stack+0x172/0x1f0
[  492.878270][ T1130]  should_fail.cold+0xa/0x15
[  492.882873][ T1130]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  492.888695][ T1130]  ? ___might_sleep+0x163/0x280
[  492.893558][ T1130]  __should_failslab+0x121/0x190
[  492.898504][ T1130]  should_failslab+0x9/0x14
[  492.903013][ T1130]  kmem_cache_alloc+0x2b2/0x6f0
[  492.907870][ T1130]  ? retint_kernel+0x2d/0x2d
[  492.912472][ T1130]  getname_kernel+0x53/0x370
[  492.917071][ T1130]  kern_path+0x20/0x40
[  492.921188][ T1130]  tomoyo_realpath_nofollow+0x74/0xdb
[  492.926572][ T1130]  ? tomoyo_realpath_from_path+0x730/0x730
[  492.932405][ T1130]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  492.938654][ T1130]  ? tomoyo_init_request_info+0x105/0x1d0
[  492.944405][ T1130]  tomoyo_find_next_domain+0x28c/0x1f8a
[  492.949961][ T1130]  ? mark_held_locks+0xf0/0xf0
[  492.954734][ T1130]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  492.960197][ T1130]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  492.965665][ T1130]  ? lockdep_hardirqs_on+0x418/0x5d0
[  492.970964][ T1130]  ? tomoyo_dump_page+0x510/0x510
[  492.975994][ T1130]  ? lock_acquire+0x16f/0x3f0
[  492.980680][ T1130]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  492.986511][ T1130]  tomoyo_bprm_check_security+0x12a/0x1b0
[  492.992237][ T1130]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  492.998057][ T1130]  security_bprm_check+0x69/0xb0
[  493.003007][ T1130]  search_binary_handler+0x77/0x570
[  493.008214][ T1130]  ? kasan_check_read+0x11/0x20
[  493.013080][ T1130]  __do_execve_file.isra.0+0x1394/0x23f0
[  493.018730][ T1130]  ? copy_strings_kernel+0x110/0x110
[  493.024022][ T1130]  ? strncpy_from_user+0x2a8/0x380
[  493.029140][ T1130]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  493.035410][ T1130]  __x64_sys_execveat+0xed/0x130
[  493.040369][ T1130]  do_syscall_64+0x103/0x610
[  493.044976][ T1130]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  493.050872][ T1130] RIP: 0033:0x458da9
[  493.054773][ T1130] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  493.074390][ T1130] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:15 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x20000)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000140)=0xe8)
ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000001c0)=<r3=>0x0)
ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000200)=r3)
ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000180)={0x3, @null, r2})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  493.082819][ T1130] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  493.090791][ T1130] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  493.098760][ T1130] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  493.106733][ T1130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  493.114704][ T1130] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:15 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7ff, 0x0)
write$capi20(r1, &(0x7f00000000c0)={0x10, 0xf1c, 0x5, 0x82, 0x2, 0x50}, 0x10)

14:38:15 executing program 1 (fault-call:8 fault-nth:25):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:15 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100a)

[  493.203978][ T1033] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  493.231663][ T1033] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:38:15 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x80000000000, 0x0)
bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x4e23, @broadcast}}}, 0x88)

[  493.271663][ T1033] FAT-fs (loop2): Filesystem has been set read-only
14:38:15 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
pipe(&(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = geteuid()
stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
write$FUSE_DIRENTPLUS(r1, &(0x7f0000000140)={0xa8, 0x0, 0x1, [{{0x3, 0x2, 0x230, 0xc5, 0x78, 0x5, {0x3, 0xa98, 0x2, 0x800, 0x7ff, 0x5, 0x10000, 0x2400010000, 0x8, 0x9, 0xfffffffffffffffb, r2, r3, 0x80000000, 0x80000001}}, {0x2, 0x0, 0x0, 0x6}}]}, 0xa8)
setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x6}, 0x8)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x400}, @sack_perm, @window={0x3, 0x81, 0x1}, @mss={0x2, 0xa}, @mss={0x2, 0x401}], 0x5)

14:38:15 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

[  493.440957][ T1155] FAULT_INJECTION: forcing a failure.
[  493.440957][ T1155] name failslab, interval 1, probability 0, space 0, times 0
[  493.453838][ T1155] CPU: 1 PID: 1155 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  493.461738][ T1155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  493.471804][ T1155] Call Trace:
[  493.475116][ T1155]  dump_stack+0x172/0x1f0
[  493.479470][ T1155]  should_fail.cold+0xa/0x15
[  493.484080][ T1155]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  493.489896][ T1155]  ? ___might_sleep+0x163/0x280
[  493.494765][ T1155]  __should_failslab+0x121/0x190
[  493.499711][ T1155]  should_failslab+0x9/0x14
[  493.504225][ T1155]  kmem_cache_alloc+0x2b2/0x6f0
[  493.509090][ T1155]  getname_kernel+0x53/0x370
[  493.513689][ T1155]  kern_path+0x20/0x40
[  493.517768][ T1155]  tomoyo_realpath_nofollow+0x74/0xdb
[  493.523148][ T1155]  ? tomoyo_realpath_from_path+0x730/0x730
[  493.528964][ T1155]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  493.535218][ T1155]  ? tomoyo_init_request_info+0x105/0x1d0
[  493.540953][ T1155]  tomoyo_find_next_domain+0x28c/0x1f8a
[  493.546522][ T1155]  ? tomoyo_dump_page+0x510/0x510
[  493.551553][ T1155]  ? lock_acquire+0x1ea/0x3f0
[  493.556252][ T1155]  tomoyo_bprm_check_security+0x12a/0x1b0
[  493.561973][ T1155]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  493.567795][ T1155]  security_bprm_check+0x69/0xb0
[  493.572743][ T1155]  search_binary_handler+0x77/0x570
[  493.577948][ T1155]  ? kasan_check_read+0x11/0x20
[  493.582839][ T1155]  __do_execve_file.isra.0+0x1394/0x23f0
[  493.588491][ T1155]  ? copy_strings_kernel+0x110/0x110
[  493.593781][ T1155]  ? strncpy_from_user+0x2a8/0x380
[  493.598913][ T1155]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  493.605171][ T1155]  __x64_sys_execveat+0xed/0x130
[  493.610122][ T1155]  do_syscall_64+0x103/0x610
[  493.614722][ T1155]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  493.620620][ T1155] RIP: 0033:0x458da9
14:38:15 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1017)

14:38:15 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0x10001, 0x1})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  493.624521][ T1155] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  493.644132][ T1155] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  493.652906][ T1155] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  493.660915][ T1155] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  493.668890][ T1155] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  493.668906][ T1155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
14:38:16 executing program 4:
r0 = memfd_create(&(0x7f0000000180)='/dev/null\x00', 0x3)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x42, 0x0)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x7fff, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:16 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7ff, 0x80000)
setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0)
openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0)

[  493.668916][ T1155] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:16 executing program 1 (fault-call:8 fault-nth:26):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  493.819704][ T1165] FAULT_INJECTION: forcing a failure.
[  493.819704][ T1165] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  493.832955][ T1165] CPU: 0 PID: 1165 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  493.840847][ T1165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  493.850903][ T1165] Call Trace:
[  493.854214][ T1165]  dump_stack+0x172/0x1f0
[  493.858572][ T1165]  should_fail.cold+0xa/0x15
[  493.863182][ T1165]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  493.869003][ T1165]  ? __lock_acquire+0x548/0x3fb0
[  493.873956][ T1165]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  493.880210][ T1165]  should_fail_alloc_page+0x50/0x60
[  493.885437][ T1165]  __alloc_pages_nodemask+0x1a1/0x8d0
[  493.890838][ T1165]  ? __alloc_pages_slowpath+0x28b0/0x28b0
[  493.896599][ T1165]  ? find_held_lock+0x35/0x130
[  493.901393][ T1165]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  493.907223][ T1165]  cache_grow_begin+0x9c/0x860
[  493.911996][ T1165]  ? getname_kernel+0x53/0x370
[  493.916769][ T1165]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  493.923025][ T1165]  kmem_cache_alloc+0x62d/0x6f0
[  493.927894][ T1165]  getname_kernel+0x53/0x370
[  493.932496][ T1165]  kern_path+0x20/0x40
[  493.936586][ T1165]  tomoyo_realpath_nofollow+0x74/0xdb
[  493.941968][ T1165]  ? tomoyo_realpath_from_path+0x730/0x730
[  493.947787][ T1165]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  493.954033][ T1165]  ? tomoyo_init_request_info+0x105/0x1d0
[  493.959763][ T1165]  tomoyo_find_next_domain+0x28c/0x1f8a
[  493.965320][ T1165]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  493.970802][ T1165]  ? tomoyo_dump_page+0x510/0x510
[  493.975846][ T1165]  tomoyo_bprm_check_security+0x12a/0x1b0
[  493.981569][ T1165]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  493.987387][ T1165]  security_bprm_check+0x69/0xb0
[  493.992346][ T1165]  search_binary_handler+0x77/0x570
[  493.997560][ T1165]  ? kasan_check_read+0x11/0x20
[  494.002429][ T1165]  __do_execve_file.isra.0+0x1394/0x23f0
[  494.008081][ T1165]  ? copy_strings_kernel+0x110/0x110
[  494.013378][ T1165]  ? strncpy_from_user+0x2a8/0x380
[  494.018505][ T1165]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  494.024762][ T1165]  __x64_sys_execveat+0xed/0x130
[  494.029711][ T1165]  do_syscall_64+0x103/0x610
[  494.034376][ T1165]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  494.040274][ T1165] RIP: 0033:0x458da9
[  494.044183][ T1165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
14:38:16 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = getpid()
fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  494.064045][ T1165] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  494.072463][ T1165] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  494.080475][ T1165] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  494.088534][ T1165] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  494.096508][ T1165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  494.104492][ T1165] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  494.171011][ T1184] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
14:38:16 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600e23f00000038001f00000be4000000000025fd2000020ea5304ffd969727968dcc9c5b47b22d2682b7492ca56b3810be8d408848f9c531af5d55df6458040e8f60e8050f6616a4e8f3755d037f3e2841a05edac8754a4bf0b807fce6784a7363c95939"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000040)={<r1=>0xffffffffffffffff})
ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000240)={0x3e, 0x8001, 0x80033})
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:16 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018)

14:38:16 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
socketpair(0x8, 0x0, 0x101, &(0x7f0000000000))

[  494.224973][ T1184] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
14:38:16 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x10000, 0x0)
getsockopt$rose(r1, 0x104, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4)
ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/17)
ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x8001)
syslog(0xf, &(0x7f0000000000)=""/218, 0xda)
socketpair(0x1b, 0x80000, 0xfffffffffffffff8, &(0x7f0000000100)={<r2=>0xffffffffffffffff})
setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140)={0xfffffffffffffff8}, 0x4)

[  494.287682][ T1184] FAT-fs (loop2): Filesystem has been set read-only
14:38:16 executing program 1 (fault-call:8 fault-nth:27):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  494.379373][ T1184] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  494.484406][ T1184] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000)
[  494.528687][ T1409] FAULT_INJECTION: forcing a failure.
[  494.528687][ T1409] name failslab, interval 1, probability 0, space 0, times 0
[  494.535031][ T1184] FAT-fs (loop2): Filesystem has been set read-only
[  494.541606][ T1409] CPU: 0 PID: 1409 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  494.555903][ T1409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  494.565961][ T1409] Call Trace:
[  494.569263][ T1409]  dump_stack+0x172/0x1f0
[  494.573608][ T1409]  should_fail.cold+0xa/0x15
[  494.578244][ T1409]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  494.584057][ T1409]  ? __task_pid_nr_ns+0x1b1/0x530
[  494.589096][ T1409]  __should_failslab+0x121/0x190
[  494.594033][ T1409]  should_failslab+0x9/0x14
[  494.598537][ T1409]  kmem_cache_alloc_trace+0x4b/0x760
[  494.603820][ T1409]  ? kasan_check_read+0x11/0x20
[  494.608677][ T1409]  proc_self_get_link+0x16f/0x1d0
[  494.613709][ T1409]  link_path_walk.part.0+0xeec/0x1340
[  494.619081][ T1409]  ? proc_ns_dir_readdir+0x570/0x570
[  494.624373][ T1409]  ? walk_component+0x2000/0x2000
[  494.629473][ T1409]  ? save_stack+0x45/0xd0
[  494.633802][ T1409]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  494.639602][ T1409]  ? getname_kernel+0x40/0x370
[  494.644378][ T1409]  path_lookupat.isra.0+0xe3/0x8d0
[  494.649491][ T1409]  ? do_syscall_64+0x103/0x610
[  494.654258][ T1409]  ? path_parentat.isra.0+0x160/0x160
[  494.659654][ T1409]  ? mark_held_locks+0xa4/0xf0
[  494.664423][ T1409]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  494.669879][ T1409]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  494.675335][ T1409]  ? lockdep_hardirqs_on+0x418/0x5d0
[  494.680624][ T1409]  ? retint_kernel+0x2d/0x2d
[  494.685211][ T1409]  ? trace_hardirqs_on_caller+0x6a/0x220
[  494.690852][ T1409]  filename_lookup+0x1b0/0x410
[  494.695615][ T1409]  ? nd_jump_link+0x1d0/0x1d0
[  494.700331][ T1409]  ? retint_kernel+0x2d/0x2d
[  494.704930][ T1409]  ? memcpy+0x46/0x50
[  494.708914][ T1409]  ? getname_kernel+0x223/0x370
[  494.713764][ T1409]  kern_path+0x36/0x40
[  494.717833][ T1409]  tomoyo_realpath_nofollow+0x74/0xdb
[  494.723200][ T1409]  ? tomoyo_realpath_from_path+0x730/0x730
[  494.729003][ T1409]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  494.735244][ T1409]  ? tomoyo_init_request_info+0x105/0x1d0
[  494.740989][ T1409]  tomoyo_find_next_domain+0x28c/0x1f8a
[  494.746534][ T1409]  ? mark_held_locks+0xf0/0xf0
[  494.751298][ T1409]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  494.756840][ T1409]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  494.762299][ T1409]  ? lockdep_hardirqs_on+0x418/0x5d0
[  494.767589][ T1409]  ? tomoyo_dump_page+0x510/0x510
[  494.772613][ T1409]  ? lock_acquire+0x16f/0x3f0
[  494.777287][ T1409]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  494.783096][ T1409]  tomoyo_bprm_check_security+0x12a/0x1b0
[  494.788814][ T1409]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  494.794624][ T1409]  security_bprm_check+0x69/0xb0
[  494.799564][ T1409]  search_binary_handler+0x77/0x570
[  494.804878][ T1409]  ? kasan_check_read+0x11/0x20
[  494.809737][ T1409]  __do_execve_file.isra.0+0x1394/0x23f0
[  494.815387][ T1409]  ? copy_strings_kernel+0x110/0x110
[  494.820674][ T1409]  ? strncpy_from_user+0x2a8/0x380
[  494.825789][ T1409]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  494.832037][ T1409]  __x64_sys_execveat+0xed/0x130
[  494.836983][ T1409]  do_syscall_64+0x103/0x610
[  494.841578][ T1409]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  494.847468][ T1409] RIP: 0033:0x458da9
[  494.851366][ T1409] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  494.870978][ T1409] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  494.879409][ T1409] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  494.887384][ T1409] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  494.895352][ T1409] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  494.903329][ T1409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  494.911301][ T1409] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:17 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:17 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027)

14:38:17 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00')
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={<r1=>0xffffffffffffffff}, 0x117, 0xe}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r1, 0x10, 0x0, @in={0x2, 0x4e23, @multicast2}}}, 0xa0)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)
ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x3, 0x3, @stop_pts=0x7})

14:38:17 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7fd50500000000000000f83d6480ccb903000600008498e23f00000038001f00000000000c0000000000200002"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)
r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x16800)
write$uinput_user_dev(r1, &(0x7f00000003c0)={'syz1\x00', {0x200, 0x9, 0x1f, 0x9}, 0x3d, [0x41ae76a2, 0xff, 0x0, 0x8, 0x8be2, 0x800, 0x6, 0x5f87, 0x2, 0x6, 0x0, 0x6, 0xfffffffffffffffa, 0xfff, 0x6, 0x5, 0x7fffffff, 0x2, 0x0, 0xffff, 0x3, 0x4, 0x218, 0x200, 0x0, 0x1, 0x3, 0x3, 0x44d, 0xfffffffffffffc00, 0x2, 0x1, 0x7fffffff, 0x2, 0x9, 0x9, 0x1000, 0x2, 0xc8, 0x0, 0x80000000, 0x7fff, 0x4, 0x10000, 0x8, 0x7ff, 0xfffffffffffff86e, 0x80000000, 0x8000, 0x4a, 0x7, 0x9, 0x1f, 0x2, 0x5, 0x2, 0x20f, 0x8af, 0x7ff, 0x2, 0x6, 0x8220, 0x1, 0xdf09], [0x3, 0x83, 0x8, 0x3, 0x4, 0xffffffffffffffc0, 0x80000001, 0x1, 0xffffffff00000000, 0x2, 0x3ff0, 0x849, 0x40, 0x80, 0x8, 0x4, 0x2, 0xfffffffffffffff8, 0x3, 0x4, 0x745, 0x0, 0xff, 0x0, 0x7f, 0x91, 0x0, 0x6, 0xffffffffffffff75, 0xffffffffffffff01, 0x70, 0x5dbf, 0x9, 0xffffffffffffffc1, 0x7, 0x0, 0x8001, 0x1, 0xf95e, 0x2f, 0x7, 0x100000000, 0x40, 0x1ff, 0x800, 0x4, 0x2, 0x3ff, 0x7fff, 0x1ff, 0x69, 0x3, 0x1, 0x7d, 0x1ff, 0x2, 0x3, 0x9, 0x10000, 0x3, 0xff, 0x9, 0x8000, 0xcf0], [0x749d, 0x7, 0x0, 0x5, 0x3, 0x8, 0xffffffff, 0x31, 0x5, 0x2, 0x6, 0x5, 0xd92, 0x9, 0xfff, 0x6, 0xfffffffffffffffd, 0x8, 0x60c, 0x10001, 0x2, 0x4, 0x55, 0x200, 0x40000, 0x0, 0x100000001, 0x47134f16, 0x100000000, 0x40, 0x3, 0x8, 0x2, 0x1, 0x0, 0xfffffffffffffff8, 0xffffffffffffff85, 0xfff, 0x2, 0x3f, 0x3, 0x8, 0x3, 0x4, 0x100, 0x6, 0xfffffffffffffff9, 0x2, 0x7f, 0x7, 0x0, 0x44d45640, 0x8, 0x5, 0x1, 0x643, 0x4, 0x1000, 0x5, 0x2, 0x2, 0x87c, 0x1, 0x2], [0x7fff, 0x51e, 0xd8a3, 0x4, 0x0, 0x9ae8, 0x9, 0x8, 0x4, 0x3, 0x0, 0xf0, 0x6, 0xffffffffffffffff, 0x3ff, 0x80, 0x20, 0xfffffffffffffe01, 0x7fffffff, 0xffffffff, 0x5, 0x6, 0x101, 0x1, 0x1d9, 0x0, 0x4a, 0x1, 0x1f, 0xed4e, 0x336e00000000, 0x40, 0x8, 0x0, 0x8, 0x4, 0x4, 0x473, 0x4, 0x2, 0x89, 0x8, 0x2, 0x7fffffff, 0x8001, 0x95, 0x5, 0x6, 0x82b0, 0xffffffff, 0x2, 0x5, 0x0, 0x4, 0x5, 0x3, 0x6, 0xffffffff, 0xffc00000000000, 0x81, 0x26cc, 0x800, 0x5]}, 0x45c)

14:38:17 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x105, 0xfffffffdfffffffe)
ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000040))

14:38:17 executing program 1 (fault-call:8 fault-nth:28):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  495.147728][ T1427] FAULT_INJECTION: forcing a failure.
[  495.147728][ T1427] name failslab, interval 1, probability 0, space 0, times 0
[  495.160631][ T1427] CPU: 1 PID: 1427 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  495.168534][ T1427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  495.178597][ T1427] Call Trace:
[  495.181922][ T1427]  dump_stack+0x172/0x1f0
[  495.186271][ T1427]  should_fail.cold+0xa/0x15
[  495.190877][ T1427]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  495.196696][ T1427]  ? __task_pid_nr_ns+0x1b1/0x530
[  495.201733][ T1427]  __should_failslab+0x121/0x190
[  495.206709][ T1427]  should_failslab+0x9/0x14
[  495.211229][ T1427]  kmem_cache_alloc_trace+0x4b/0x760
[  495.216526][ T1427]  ? kasan_check_read+0x11/0x20
[  495.221401][ T1427]  proc_self_get_link+0x16f/0x1d0
[  495.234176][ T1427]  link_path_walk.part.0+0xeec/0x1340
[  495.239560][ T1427]  ? proc_ns_dir_readdir+0x570/0x570
[  495.244859][ T1427]  ? walk_component+0x2000/0x2000
[  495.249893][ T1427]  ? save_stack+0x45/0xd0
[  495.254237][ T1427]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  495.261037][ T1427]  ? getname_kernel+0x40/0x370
[  495.265812][ T1427]  path_lookupat.isra.0+0xe3/0x8d0
[  495.270934][ T1427]  ? do_syscall_64+0x103/0x610
[  495.275711][ T1427]  ? path_parentat.isra.0+0x160/0x160
[  495.281093][ T1427]  ? mark_held_locks+0xa4/0xf0
[  495.285871][ T1427]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  495.291343][ T1427]  ? trace_hardirqs_on_thunk+0x1a/0x1c
14:38:17 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f)

14:38:17 executing program 5:
openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0)
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={<r1=>r0})
ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x1)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

[  495.296820][ T1427]  ? lockdep_hardirqs_on+0x418/0x5d0
[  495.302119][ T1427]  ? retint_kernel+0x2d/0x2d
[  495.306975][ T1427]  ? trace_hardirqs_on_caller+0x6a/0x220
[  495.312617][ T1427]  filename_lookup+0x1b0/0x410
[  495.317397][ T1427]  ? nd_jump_link+0x1d0/0x1d0
[  495.322104][ T1427]  ? getname_kernel+0x1c/0x370
[  495.326879][ T1427]  ? memcpy+0x46/0x50
[  495.330881][ T1427]  ? getname_kernel+0x223/0x370
[  495.335749][ T1427]  kern_path+0x36/0x40
[  495.340113][ T1427]  tomoyo_realpath_nofollow+0x74/0xdb
[  495.345495][ T1427]  ? tomoyo_realpath_from_path+0x730/0x730
[  495.351319][ T1427]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  495.357611][ T1427]  ? tomoyo_init_request_info+0x105/0x1d0
[  495.363350][ T1427]  tomoyo_find_next_domain+0x28c/0x1f8a
[  495.368922][ T1427]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  495.374411][ T1427]  ? tomoyo_dump_page+0x510/0x510
[  495.379458][ T1427]  ? lock_acquire+0x1f4/0x3f0
[  495.384150][ T1427]  tomoyo_bprm_check_security+0x12a/0x1b0
[  495.389886][ T1427]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  495.395712][ T1427]  security_bprm_check+0x69/0xb0
[  495.400659][ T1427]  search_binary_handler+0x77/0x570
[  495.405867][ T1427]  ? kasan_check_read+0x11/0x20
[  495.410737][ T1427]  __do_execve_file.isra.0+0x1394/0x23f0
[  495.416404][ T1427]  ? copy_strings_kernel+0x110/0x110
[  495.421705][ T1427]  ? strncpy_from_user+0x2a8/0x380
[  495.426835][ T1427]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  495.433087][ T1427]  __x64_sys_execveat+0xed/0x130
[  495.438040][ T1427]  do_syscall_64+0x103/0x610
[  495.442640][ T1427]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  495.448535][ T1427] RIP: 0033:0x458da9
[  495.452433][ T1427] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  495.472042][ T1427] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  495.480467][ T1427] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  495.488443][ T1427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
14:38:17 executing program 3:
clock_gettime(0x0, &(0x7f0000000040)={<r0=>0x0, <r1=>0x0})
rt_sigtimedwait(&(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={r0, r1+30000000}, 0x8)
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2)

[  495.496423][ T1427] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  495.504401][ T1427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  495.512383][ T1427] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:18 executing program 4:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000004005374f83d6480ccb903000600008498e23f00000038001f000000000000c422e8f15e26b300"], 0x2d)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="514e86f746ee813bdb978aacaf81590cb7d174eebd64f7711aa7f2b32c32668645e4361d7b8567cce060e46904eadd94594ceb8aea000a66156b6aa4826360b1b0cc163c437c2a5e9aea2a48d1c685b9d2e477f966507eaf255b579bc2738c8645a6404cc6bc7b6b746089260903c92c357cc31118373b853b06949f699eb5a57b0acf836fcf02db7c9638a6f9dac6235179c5e04099a7226de65d725f273d01421df6e29b6e268e6a7b3401806835035a", 0xb1, 0x2}, {&(0x7f00000001c0)="9dc578e2bdf37569672c958501fc2e767d7d5a2bb47b8d9049aa0c988d346886de67896e866349ef82ab4bfc6674bb083d9e85c140762b37e7767c3d7a1d1c900bef736f484ba7d4c59a239a1695bcfd36fdbf16623e73c7b21b32f29fc8a495e08e3f614d2d5ee8feeca0678e6cf05e5a23b6f54c69c43b4ea2ea4a4776ba823db02026c279cab6b54722eafcad5b77432e4abb34127d", 0x97, 0xdf}], 0x0, &(0x7f00000002c0)={[{@errors_withdraw='errors=withdraw'}], [{@pcr={'pcr', 0x3d, 0x33}}, {@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x00\x06\x00'}}, {@pcr={'pcr'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x36, 0x79, 0x39, 0x33, 0x75, 0x64, 0x31], 0x2d, [0x64, 0x66, 0x39, 0x39], 0x2d, [0x64, 0x32, 0x63, 0x37], 0x2d, [0x30, 0x7f, 0x61, 0x32], 0x2d, [0x77, 0x65, 0x37, 0x61, 0x63, 0x76, 0x3f]}}}]})
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:18 executing program 1 (fault-call:8 fault-nth:29):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:38:18 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048)

[  495.861837][ T1452] FAULT_INJECTION: forcing a failure.
[  495.861837][ T1452] name failslab, interval 1, probability 0, space 0, times 0
[  495.875503][ T1452] CPU: 1 PID: 1452 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  495.883399][ T1452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  495.893462][ T1452] Call Trace:
[  495.896768][ T1452]  dump_stack+0x172/0x1f0
[  495.901112][ T1452]  should_fail.cold+0xa/0x15
[  495.905715][ T1452]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  495.911531][ T1452]  ? ___might_sleep+0x163/0x280
[  495.916400][ T1452]  __should_failslab+0x121/0x190
[  495.921346][ T1452]  ? proc_i_callback+0x30/0x30
[  495.926124][ T1452]  should_failslab+0x9/0x14
[  495.930636][ T1452]  kmem_cache_alloc+0x2b2/0x6f0
[  495.935491][ T1452]  ? get_pid_task+0xc9/0x190
[  495.940091][ T1452]  ? find_held_lock+0x35/0x130
[  495.944860][ T1452]  ? proc_i_callback+0x30/0x30
[  495.949625][ T1452]  proc_alloc_inode+0x1c/0x1a0
[  495.954404][ T1452]  alloc_inode+0x66/0x190
[  495.958742][ T1452]  new_inode_pseudo+0x19/0xf0
[  495.963452][ T1452]  new_inode+0x1f/0x40
[  495.967532][ T1452]  proc_pid_make_inode+0x22/0x230
[  495.972571][ T1452]  proc_pident_instantiate+0x82/0x2a0
[  495.977953][ T1452]  proc_pident_lookup+0x1ad/0x210
[  495.982996][ T1452]  proc_tgid_base_lookup+0x2c/0x40
[  495.988115][ T1452]  __lookup_slow+0x27e/0x500
[  495.992716][ T1452]  ? vfs_unlink+0x560/0x560
[  495.997346][ T1452]  lookup_slow+0x58/0x80
[  496.001611][ T1452]  walk_component+0x74b/0x2000
[  496.006400][ T1452]  ? refcount_dec_not_one+0x1f0/0x1f0
14:38:18 executing program 2:
syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0)

14:38:18 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xb7f, 0x200)
ioctl$VT_DISALLOCATE(r1, 0x5608)

14:38:18 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0xf80, 0x80f6af, 0x1000, 0xfffffffffffffffe, 0x2, 0x6bd})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000840)={'bridge_slave_0\x00', <r2=>0x0})
ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000880)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x79, r2})
memfd_create(&(0x7f00000000c0)='/dev/audio\x00', 0x4)

14:38:18 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c)

[  496.011795][ T1452]  ? kasan_check_read+0x11/0x20
[  496.016659][ T1452]  ? path_init+0x18f0/0x18f0
[  496.021260][ T1452]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  496.027508][ T1452]  ? security_inode_permission+0xd5/0x110
[  496.033231][ T1452]  ? inode_permission+0xb4/0x570
[  496.033275][ T1452]  link_path_walk.part.0+0x594/0x1340
[  496.033297][ T1452]  ? walk_component+0x2000/0x2000
[  496.033314][ T1452]  ? save_stack+0x45/0xd0
[  496.033330][ T1452]  ? __kasan_kmalloc.constprop.0+0xcf/0xe0
[  496.033345][ T1452]  ? getname_kernel+0x40/0x370
[  496.033372][ T1452]  path_lookupat.isra.0+0xe3/0x8d0
[  496.033389][ T1452]  ? do_syscall_64+0x103/0x610
[  496.033414][ T1452]  ? path_parentat.isra.0+0x160/0x160
[  496.078812][ T1452]  ? mark_held_locks+0xa4/0xf0
[  496.083589][ T1452]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.089068][ T1452]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.094538][ T1452]  ? lockdep_hardirqs_on+0x418/0x5d0
[  496.099833][ T1452]  ? retint_kernel+0x2d/0x2d
[  496.100091][ T1445] gfs2: invalid mount option: pcr=00000000000000000051
[  496.104434][ T1452]  ? trace_hardirqs_on_caller+0x6a/0x220
[  496.104454][ T1452]  filename_lookup+0x1b0/0x410
[  496.104473][ T1452]  ? nd_jump_link+0x1d0/0x1d0
[  496.104506][ T1452]  ? simple_attr_release+0x50/0x50
[  496.104527][ T1452]  ? retint_kernel+0x2d/0x2d
[  496.104545][ T1452]  ? memcpy+0x46/0x50
[  496.104561][ T1452]  ? getname_kernel+0x223/0x370
[  496.104578][ T1452]  kern_path+0x36/0x40
[  496.104597][ T1452]  tomoyo_realpath_nofollow+0x74/0xdb
[  496.104614][ T1452]  ? tomoyo_realpath_from_path+0x730/0x730
[  496.104631][ T1452]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  496.104646][ T1452]  ? tomoyo_init_request_info+0x105/0x1d0
[  496.104668][ T1452]  tomoyo_find_next_domain+0x28c/0x1f8a
[  496.104685][ T1452]  ? mark_held_locks+0xf0/0xf0
[  496.104706][ T1452]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.104725][ T1452]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.104744][ T1452]  ? tomoyo_dump_page+0x510/0x510
[  496.104761][ T1452]  ? lock_acquire+0x16f/0x3f0
[  496.104778][ T1452]  ? tomoyo_bprm_check_security+0xe3/0x1b0
14:38:18 executing program 0:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17)
socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068)

[  496.104802][ T1452]  tomoyo_bprm_check_security+0x12a/0x1b0
[  496.104818][ T1452]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  496.104838][ T1452]  security_bprm_check+0x69/0xb0
[  496.104859][ T1452]  search_binary_handler+0x77/0x570
[  496.104876][ T1452]  ? kasan_check_read+0x11/0x20
[  496.104913][ T1452]  __do_execve_file.isra.0+0x1394/0x23f0
[  496.166107][ T1445] gfs2: can't parse mount arguments
[  496.166735][ T1452]  ? copy_strings_kernel+0x110/0x110
[  496.166759][ T1452]  ? strncpy_from_user+0x2a8/0x380
[  496.257070][ T1452]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
14:38:18 executing program 3:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x101002)
r2 = syz_open_dev$cec(&(0x7f0000000540)='/dev/cec#\x00', 0x2, 0x2)
accept4$ax25(r2, &(0x7f0000000580)={{0x3, @default}, [@default, @bcast, @null, @null, @default, @default]}, &(0x7f0000000600)=0x48, 0x800)
ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x17, 0x9, @scatter={0x3, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/30, 0x1e}, {&(0x7f0000000080)=""/146, 0x92}, {&(0x7f0000000140)=""/150, 0x96}]}, &(0x7f0000000240)="70d0314f250993e6fa9cb00caa32b9dbc8006fbade0436", &(0x7f0000000280)=""/107, 0x101, 0x10005, 0x3, &(0x7f0000000300)})
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r3 = open(&(0x7f00000003c0)='./file0\x00', 0x1c1200, 0x8)
setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000480)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, {&(0x7f0000000400)=""/54, 0x36}, &(0x7f0000000440), 0x6}, 0xa0)
unshare(0x40000)

[  496.263330][ T1452]  __x64_sys_execveat+0xed/0x130
[  496.268289][ T1452]  do_syscall_64+0x103/0x610
[  496.272895][ T1452]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  496.278795][ T1452] RIP: 0033:0x458da9
[  496.282700][ T1452] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  496.302316][ T1452] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  496.310748][ T1452] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  496.318728][ T1452] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  496.326703][ T1452] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  496.334684][ T1452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  496.342663][ T1452] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
14:38:18 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
prctl$PR_GET_TID_ADDRESS(0x28, 0xfffffffffffffffd)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)

14:38:18 executing program 1 (fault-call:8 fault-nth:30):
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r1, 0xff)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

[  496.480718][ T1445] gfs2: invalid mount option: pcr=00000000000000000051
[  496.522646][ T1589] FAULT_INJECTION: forcing a failure.
[  496.522646][ T1589] name failslab, interval 1, probability 0, space 0, times 0
[  496.535469][ T1589] CPU: 0 PID: 1589 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  496.543378][ T1589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  496.553439][ T1589] Call Trace:
[  496.556750][ T1589]  dump_stack+0x172/0x1f0
[  496.561090][ T1589]  should_fail.cold+0xa/0x15
[  496.565691][ T1589]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  496.571514][ T1589]  ? ___might_sleep+0x163/0x280
[  496.576390][ T1589]  __should_failslab+0x121/0x190
[  496.581350][ T1589]  should_failslab+0x9/0x14
[  496.585880][ T1589]  __kmalloc+0x2dc/0x740
[  496.590136][ T1589]  ? tomoyo_realpath_from_path+0xba/0x730
[  496.595870][ T1589]  ? rcu_read_lock_sched_held+0x110/0x130
[  496.601592][ T1589]  ? tomoyo_realpath_from_path+0xc7/0x730
[  496.607321][ T1589]  tomoyo_realpath_from_path+0xc7/0x730
[  496.612899][ T1589]  tomoyo_realpath_nofollow+0xc8/0xdb
[  496.618280][ T1589]  ? tomoyo_realpath_from_path+0x730/0x730
[  496.624125][ T1589]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  496.630384][ T1589]  ? tomoyo_init_request_info+0x105/0x1d0
[  496.636119][ T1589]  tomoyo_find_next_domain+0x28c/0x1f8a
[  496.641673][ T1589]  ? mark_held_locks+0xf0/0xf0
[  496.646459][ T1589]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.651930][ T1589]  ? tomoyo_dump_page+0x510/0x510
[  496.656968][ T1589]  ? lock_acquire+0x16f/0x3f0
[  496.659105][ T1445] gfs2: can't parse mount arguments
[  496.661670][ T1589]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  496.672679][ T1589]  tomoyo_bprm_check_security+0x12a/0x1b0
[  496.678409][ T1589]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  496.678432][ T1589]  security_bprm_check+0x69/0xb0
[  496.678455][ T1589]  search_binary_handler+0x77/0x570
[  496.694379][ T1589]  ? kasan_check_read+0x11/0x20
[  496.699257][ T1589]  __do_execve_file.isra.0+0x1394/0x23f0
[  496.704908][ T1589]  ? copy_strings_kernel+0x110/0x110
[  496.704925][ T1589]  ? strncpy_from_user+0x2a8/0x380
[  496.704945][ T1589]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  496.704966][ T1589]  __x64_sys_execveat+0xed/0x130
[  496.704988][ T1589]  do_syscall_64+0x103/0x610
[  496.705010][ T1589]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  496.737021][ T1589] RIP: 0033:0x458da9
[  496.740926][ T1589] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  496.760544][ T1589] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
14:38:18 executing program 5:
r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2)
r1 = dup(r0)
getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8)

[  496.768973][ T1589] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  496.776956][ T1589] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  496.784942][ T1589] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  496.792924][ T1589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  496.800906][ T1589] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  496.821907][ T1589] ERROR: Out of memory at tomoyo_realpath_from_path.
[  496.828920][ T1589] Kernel panic - not syncing: MAC Initialization failed.
[  496.836070][ T1589] CPU: 0 PID: 1589 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96
[  496.843982][ T1589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  496.854144][ T1589] Call Trace:
[  496.857459][ T1589]  dump_stack+0x172/0x1f0
[  496.861802][ T1589]  panic+0x2cb/0x65c
[  496.865712][ T1589]  ? __warn_printk+0xf3/0xf3
[  496.870325][ T1589]  ? tomoyo_realpath_from_path+0x394/0x730
[  496.876145][ T1589]  ? tomoyo_warn_oom.cold+0x24/0x43
[  496.881366][ T1589]  tomoyo_warn_oom.cold+0x35/0x43
[  496.886416][ T1589]  tomoyo_realpath_from_path+0x3a8/0x730
[  496.892076][ T1589]  tomoyo_realpath_nofollow+0xc8/0xdb
[  496.897462][ T1589]  ? tomoyo_realpath_from_path+0x730/0x730
[  496.903282][ T1589]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  496.909531][ T1589]  ? tomoyo_init_request_info+0x105/0x1d0
[  496.915268][ T1589]  tomoyo_find_next_domain+0x28c/0x1f8a
[  496.920854][ T1589]  ? mark_held_locks+0xf0/0xf0
[  496.925633][ T1589]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  496.931102][ T1589]  ? tomoyo_dump_page+0x510/0x510
[  496.936134][ T1589]  ? lock_acquire+0x16f/0x3f0
[  496.940814][ T1589]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  496.946632][ T1589]  tomoyo_bprm_check_security+0x12a/0x1b0
[  496.952374][ T1589]  ? tomoyo_bprm_check_security+0xe3/0x1b0
[  496.958195][ T1589]  security_bprm_check+0x69/0xb0
[  496.963141][ T1589]  search_binary_handler+0x77/0x570
[  496.968366][ T1589]  ? kasan_check_read+0x11/0x20
[  496.973234][ T1589]  __do_execve_file.isra.0+0x1394/0x23f0
[  496.978886][ T1589]  ? copy_strings_kernel+0x110/0x110
[  496.984182][ T1589]  ? strncpy_from_user+0x2a8/0x380
[  496.989304][ T1589]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  496.995561][ T1589]  __x64_sys_execveat+0xed/0x130
[  497.000527][ T1589]  do_syscall_64+0x103/0x610
[  497.005127][ T1589]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  497.011025][ T1589] RIP: 0033:0x458da9
[  497.014923][ T1589] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  497.034650][ T1589] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[  497.043071][ T1589] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9
[  497.051046][ T1589] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[  497.059024][ T1589] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000
[  497.067004][ T1589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4
[  497.074983][ T1589] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007
[  497.084651][ T1589] Kernel Offset: disabled
[  497.088983][ T1589] Rebooting in 86400 seconds..