0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bee00", 0x4012}) 2033/05/18 03:41:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x48000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) [ 714.616899] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 714.632311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 714.679353] IPVS: Unknown mcast interface: rose0ð [ 714.699603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 714.743009] IPVS: Unknown mcast interface: rose0ð 2033/05/18 03:41:26 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x60000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x100000000, 0xf6b, 0x2, 0xffffffffffff7fff, 0x0, 0x1000, 0x8, 0x9, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x100000000000}, 0x8) 2033/05/18 03:41:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x2000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x500, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178ba22b0200", 0x4012}) 2033/05/18 03:41:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000011000001000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:41:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 6 (fault-call:3 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 715.276270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 715.330152] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x200000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 715.363801] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0xfffffffffffff000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bc02b0200", 0x4012}) 2033/05/18 03:41:26 executing program 6 (fault-call:3 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x100000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 715.498227] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 715.584957] IPVS: Unknown mcast interface: rose0 [ 715.620998] IPVS: Unknown mcast interface: rose0 [ 715.643224] device bridge_slave_1 left promiscuous mode [ 715.648836] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.666287] IPVS: ftp: loaded support on port[0] = 21 [ 715.686160] device bridge_slave_0 left promiscuous mode [ 715.691863] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.778093] team0 (unregistering): Port device team_slave_1 removed [ 715.794344] team0 (unregistering): Port device team_slave_0 removed [ 715.806610] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 715.825613] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 715.918307] bond0 (unregistering): Released all slaves [ 716.959088] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.965885] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.973351] device bridge_slave_0 entered promiscuous mode [ 717.013678] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.020113] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.039932] device bridge_slave_1 entered promiscuous mode [ 717.105169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 717.144978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 717.304094] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 717.349356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 717.533798] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 717.542423] team0: Port device team_slave_0 added [ 717.589304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 717.596767] team0: Port device team_slave_1 added [ 717.659221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 717.728769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 717.802685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 717.809873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 717.818130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 717.861124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 717.868335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 717.876676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 718.311471] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.317982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 718.324678] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.331349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 718.339805] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 719.007157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 719.838121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 719.981315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 720.117914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 720.124189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 720.139432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 720.271974] 8021q: adding VLAN 0 to HW filter on device team0 [ 721.233565] FAULT_INJECTION: forcing a failure. [ 721.233565] name failslab, interval 1, probability 0, space 0, times 0 [ 721.244930] CPU: 0 PID: 14406 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 721.252207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.261556] Call Trace: [ 721.264148] dump_stack+0x1b9/0x294 [ 721.267780] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.272977] ? unwind_get_return_address+0x61/0xa0 [ 721.277912] ? __save_stack_trace+0x7e/0xd0 [ 721.282240] should_fail.cold.4+0xa/0x1a [ 721.286305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.291412] ? save_stack+0x43/0xd0 [ 721.295042] ? __kasan_slab_free+0x11a/0x170 [ 721.299451] ? kasan_slab_free+0xe/0x10 [ 721.303442] ? kmem_cache_free+0x86/0x2d0 [ 721.307593] ? do_sys_open+0x554/0x740 [ 721.311480] ? __x64_sys_open+0x7e/0xc0 [ 721.315454] ? do_syscall_64+0x1b1/0x800 [ 721.319516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.324891] ? find_held_lock+0x36/0x1c0 [ 721.328977] ? check_same_owner+0x320/0x320 [ 721.333299] ? rcu_is_watching+0x85/0x140 [ 721.337461] ? rcu_note_context_switch+0x710/0x710 [ 721.342406] __should_failslab+0x124/0x180 [ 721.346738] should_failslab+0x9/0x14 [ 721.350544] __kmalloc_track_caller+0x2c4/0x760 [ 721.355224] ? strncpy_from_user+0x500/0x500 [ 721.359722] ? strndup_user+0x77/0xd0 [ 721.363525] memdup_user+0x2c/0xa0 [ 721.367068] strndup_user+0x77/0xd0 [ 721.370700] ksys_mount+0x3c/0x140 [ 721.374253] __x64_sys_mount+0xbe/0x150 [ 721.378226] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.383262] do_syscall_64+0x1b1/0x800 [ 721.387151] ? finish_task_switch+0x1ca/0x840 [ 721.391653] ? syscall_return_slowpath+0x5c0/0x5c0 [ 721.396588] ? syscall_return_slowpath+0x30f/0x5c0 [ 721.401526] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 721.406984] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.411859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.417046] RIP: 0033:0x455a09 [ 721.420233] RSP: 002b:00007feb5411a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.427944] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 721.435214] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 721.442493] RBP: 0000000000000000 R08: 00007feb5411a820 R09: 0000000000000000 [ 721.449783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 721.457057] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 721.473997] gfs2: not a GFS2 filesystem 2033/05/18 03:41:32 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x710de96e12]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x6800000000000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x400000000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bc62b0200", 0x4012}) 2033/05/18 03:41:32 executing program 6 (fault-call:3 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 721.554173] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x40030000000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x200000000000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) [ 721.603445] IPVS: Unknown mcast interface: rose0 [ 721.616443] IPVS: Unknown mcast interface: rose0 [ 721.688837] FAULT_INJECTION: forcing a failure. [ 721.688837] name failslab, interval 1, probability 0, space 0, times 0 [ 721.695419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 721.700297] CPU: 0 PID: 14429 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 721.716089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.725456] Call Trace: [ 721.728061] dump_stack+0x1b9/0x294 [ 721.731816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.737281] ? __save_stack_trace+0x7e/0xd0 [ 721.741616] should_fail.cold.4+0xa/0x1a [ 721.745690] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.750807] ? save_stack+0x43/0xd0 [ 721.754441] ? kasan_kmalloc+0xc4/0xe0 [ 721.758419] ? __kmalloc_track_caller+0x14a/0x760 [ 721.763269] ? memdup_user+0x2c/0xa0 [ 721.766990] ? strndup_user+0x77/0xd0 [ 721.770836] ? graph_lock+0x170/0x170 [ 721.774646] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.780208] ? __sched_text_start+0x8/0x8 [ 721.784366] ? find_held_lock+0x36/0x1c0 [ 721.788483] ? check_same_owner+0x320/0x320 [ 721.792814] ? lock_release+0xa10/0xa10 [ 721.796811] ? rcu_note_context_switch+0x710/0x710 [ 721.801744] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 721.806781] ? __check_object_size+0x95/0x5d9 [ 721.811451] __should_failslab+0x124/0x180 [ 721.815790] should_failslab+0x9/0x14 [ 721.819593] __kmalloc_track_caller+0x2c4/0x760 [ 721.824267] ? strncpy_from_user+0x500/0x500 [ 721.828678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.834220] ? strndup_user+0x77/0xd0 [ 721.838025] memdup_user+0x2c/0xa0 [ 721.841570] strndup_user+0x77/0xd0 [ 721.845205] ksys_mount+0x73/0x140 [ 721.848747] __x64_sys_mount+0xbe/0x150 [ 721.852764] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 721.857785] do_syscall_64+0x1b1/0x800 [ 721.861675] ? syscall_return_slowpath+0x5c0/0x5c0 [ 721.866608] ? syscall_return_slowpath+0x30f/0x5c0 [ 721.871554] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 721.876924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.881778] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:41:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0xf000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bdb", 0x4012}) 2033/05/18 03:41:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x4000000, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 721.886965] RIP: 0033:0x455a09 [ 721.890171] RSP: 002b:00007feb5411a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.897897] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 721.905170] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 721.912438] RBP: 0000000000000000 R08: 00007feb5411a820 R09: 0000000000000000 [ 721.919791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 721.927060] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 721.971941] gfs2: not a GFS2 filesystem [ 721.980954] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x126ee90d71000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 6 (fault-call:3 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x2, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000140001000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:41:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x40000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) setuid(r1) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) fcntl$notify(r2, 0x402, 0x4) 2033/05/18 03:41:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000002ca00", 0x4012}) [ 722.464809] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 722.496940] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x2000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x20000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) [ 722.514331] IPVS: Unknown mcast interface: rose0 [ 722.582958] FAULT_INJECTION: forcing a failure. [ 722.582958] name failslab, interval 1, probability 0, space 0, times 0 [ 722.594541] CPU: 0 PID: 14456 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 722.601833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.611223] Call Trace: [ 722.613825] dump_stack+0x1b9/0x294 [ 722.617470] ? dump_stack_print_info.cold.2+0x52/0x52 [ 722.622885] ? kasan_check_write+0x14/0x20 [ 722.627131] ? finish_task_switch+0x28b/0x840 [ 722.631639] should_fail.cold.4+0xa/0x1a [ 722.635748] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.641139] ? __schedule+0x809/0x1e30 [ 722.645034] ? __sched_text_start+0x8/0x8 [ 722.649183] ? find_held_lock+0x36/0x1c0 [ 722.653265] ? check_same_owner+0x320/0x320 [ 722.657585] ? lock_release+0xa10/0xa10 [ 722.661737] ? check_same_owner+0x320/0x320 [ 722.666066] ? __check_object_size+0x95/0x5d9 [ 722.670745] __should_failslab+0x124/0x180 [ 722.674990] should_failslab+0x9/0x14 [ 722.678799] kmem_cache_alloc_trace+0x2cb/0x780 [ 722.683489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.689034] ? _copy_from_user+0xdf/0x150 [ 722.693191] copy_mount_options+0x5f/0x380 [ 722.697432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.702973] ksys_mount+0xd0/0x140 [ 722.706517] __x64_sys_mount+0xbe/0x150 [ 722.710494] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 722.715518] do_syscall_64+0x1b1/0x800 [ 722.719411] ? finish_task_switch+0x1ca/0x840 [ 722.723913] ? syscall_return_slowpath+0x5c0/0x5c0 [ 722.728845] ? syscall_return_slowpath+0x30f/0x5c0 [ 722.733789] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 722.739162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.744019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.749223] RIP: 0033:0x455a09 [ 722.752412] RSP: 002b:00007feb5411a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 722.763424] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 722.770715] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 722.777985] RBP: 0000000000000000 R08: 00007feb5411a820 R09: 0000000000000000 [ 722.785254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 722.792549] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 722.813072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 722.825168] gfs2: not a GFS2 filesystem 2033/05/18 03:41:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000100000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000ffffff9e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x51fa94183d, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bad2b0200", 0x4012}) 2033/05/18 03:41:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x74, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x2, &(0x7f0000000040)={0x0, 0x24, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) tkill(r0, 0x26) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:34 executing program 6 (fault-call:3 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 723.454826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 723.491384] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x68, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022ba600", 0x4012}) [ 723.526193] IPVS: Unknown mcast interface: rose0 [ 723.568767] FAULT_INJECTION: forcing a failure. [ 723.568767] name failslab, interval 1, probability 0, space 0, times 0 [ 723.581149] CPU: 1 PID: 14499 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 723.588434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.597794] Call Trace: [ 723.600396] dump_stack+0x1b9/0x294 [ 723.604039] ? dump_stack_print_info.cold.2+0x52/0x52 [ 723.609233] ? find_held_lock+0x36/0x1c0 [ 723.613307] should_fail.cold.4+0xa/0x1a [ 723.617508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.622624] ? kasan_check_read+0x11/0x20 [ 723.626779] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 723.631970] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 723.637172] ? find_held_lock+0x36/0x1c0 [ 723.641261] ? check_same_owner+0x320/0x320 [ 723.645596] ? rcu_note_context_switch+0x710/0x710 [ 723.650546] ? save_stack+0xa9/0xd0 [ 723.654195] __should_failslab+0x124/0x180 [ 723.658444] should_failslab+0x9/0x14 [ 723.662253] kmem_cache_alloc+0x2af/0x760 [ 723.666417] getname_flags+0xd0/0x5a0 [ 723.670236] user_path_at_empty+0x2d/0x50 [ 723.674391] do_mount+0x172/0x3070 [ 723.677943] ? copy_mount_string+0x40/0x40 [ 723.682183] ? rcu_pm_notify+0xc0/0xc0 [ 723.686088] ? copy_mount_options+0x5f/0x380 [ 723.690511] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.695538] ? kmem_cache_alloc_trace+0x616/0x780 [ 723.700398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.705944] ? _copy_from_user+0xdf/0x150 [ 723.710126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2033/05/18 03:41:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x2, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 723.715690] ? copy_mount_options+0x285/0x380 [ 723.720200] ksys_mount+0x12d/0x140 [ 723.723839] __x64_sys_mount+0xbe/0x150 [ 723.727822] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.732849] do_syscall_64+0x1b1/0x800 [ 723.736744] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 723.741611] ? syscall_return_slowpath+0x5c0/0x5c0 [ 723.746550] ? syscall_return_slowpath+0x30f/0x5c0 [ 723.751493] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 723.756864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.761721] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:41:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x40030000000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 723.766912] RIP: 0033:0x455a09 [ 723.770126] RSP: 002b:00007feb5411a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.777843] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 723.785120] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 723.792397] RBP: 0000000000000000 R08: 00007feb5411a820 R09: 0000000000000000 [ 723.799671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 723.806964] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:41:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bd22b0200", 0x4012}) [ 723.837157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 723.842897] gfs2: not a GFS2 filesystem [ 723.870885] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:35 executing program 6 (fault-call:3 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 723.885201] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x4000000000000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f00000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 723.983151] IPVS: Unknown mcast interface: rose0 [ 724.006612] IPVS: Unknown mcast interface: rose0 [ 724.011611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 724.118451] FAULT_INJECTION: forcing a failure. [ 724.118451] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.130295] CPU: 0 PID: 14541 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 724.137606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.146953] Call Trace: [ 724.149581] dump_stack+0x1b9/0x294 [ 724.153214] ? dump_stack_print_info.cold.2+0x52/0x52 [ 724.158413] should_fail.cold.4+0xa/0x1a [ 724.162997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.168287] ? debug_check_no_locks_freed+0x310/0x310 [ 724.173525] ? graph_lock+0x170/0x170 [ 724.177334] ? print_usage_bug+0xc0/0xc0 [ 724.181405] ? find_held_lock+0x36/0x1c0 [ 724.185474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.191015] ? should_fail+0x21b/0xbcd [ 724.194910] __alloc_pages_nodemask+0x34e/0xd70 [ 724.199627] ? kasan_check_read+0x11/0x20 [ 724.203776] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 724.208881] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 724.214082] ? find_held_lock+0x36/0x1c0 [ 724.218164] ? check_same_owner+0x320/0x320 [ 724.222489] cache_grow_begin+0x6e/0x6c0 [ 724.226561] kmem_cache_alloc+0x689/0x760 [ 724.230722] getname_flags+0xd0/0x5a0 [ 724.234546] user_path_at_empty+0x2d/0x50 [ 724.238714] do_mount+0x172/0x3070 [ 724.242260] ? copy_mount_string+0x40/0x40 [ 724.246504] ? rcu_pm_notify+0xc0/0xc0 [ 724.250403] ? copy_mount_options+0x5f/0x380 [ 724.254814] ? rcu_read_lock_sched_held+0x108/0x120 [ 724.259833] ? kmem_cache_alloc_trace+0x616/0x780 [ 724.264684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.270229] ? _copy_from_user+0xdf/0x150 [ 724.274384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.279919] ? copy_mount_options+0x285/0x380 [ 724.284421] ksys_mount+0x12d/0x140 [ 724.288048] __x64_sys_mount+0xbe/0x150 [ 724.292022] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 724.297039] do_syscall_64+0x1b1/0x800 [ 724.300926] ? finish_task_switch+0x1ca/0x840 [ 724.305422] ? syscall_return_slowpath+0x5c0/0x5c0 [ 724.310353] ? syscall_return_slowpath+0x30f/0x5c0 [ 724.315288] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 724.320679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.325549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.330737] RIP: 0033:0x455a09 [ 724.333924] RSP: 002b:00007feb5411a808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 724.341736] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 724.349695] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 724.356990] RBP: 0000000000000000 R08: 00007feb5411a820 R09: 0000000000000000 [ 724.364255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 724.371563] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:41:36 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:36 executing program 6 (fault-call:3 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000301000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bc700", 0x4012}) 2033/05/18 03:41:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x4000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365308e0300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x6000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) [ 725.003154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 725.055271] IPVS: Unknown mcast interface: rose0Ž 2033/05/18 03:41:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x34000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 725.082418] IPVS: Unknown mcast interface: rose0Ž 2033/05/18 03:41:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x4000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000f0ffffffffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000000000000fffe", 0x4012}) 2033/05/18 03:41:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 725.208880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:36 executing program 6 (fault-call:3 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 725.250706] IPVS: Unknown mcast interface: rose0 [ 725.284895] IPVS: Unknown mcast interface: rose0 [ 725.359140] device bridge_slave_1 left promiscuous mode [ 725.364865] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.397135] device bridge_slave_0 left promiscuous mode [ 725.402800] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.421255] IPVS: ftp: loaded support on port[0] = 21 [ 725.471638] team0 (unregistering): Port device team_slave_1 removed [ 725.485175] team0 (unregistering): Port device team_slave_0 removed [ 725.497697] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 725.516303] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 725.571239] bond0 (unregistering): Released all slaves [ 726.512151] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.518611] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.537988] device bridge_slave_0 entered promiscuous mode [ 726.603686] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.610101] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.617876] device bridge_slave_1 entered promiscuous mode [ 726.656351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 726.694473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 726.916481] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 727.007448] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 727.062923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 727.069888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 727.110743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 727.117720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 727.297655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 727.305152] team0: Port device team_slave_0 added [ 727.342012] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 727.349871] team0: Port device team_slave_1 added [ 727.410247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 727.496123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 727.556802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 727.564077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 727.574826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 727.643314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 727.650560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 727.658593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 728.048428] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.054843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 728.061508] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.067881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 728.075376] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 728.991145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 729.486564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 729.623135] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 729.758336] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 729.764786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.780328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.911632] 8021q: adding VLAN 0 to HW filter on device team0 [ 730.745736] FAULT_INJECTION: forcing a failure. [ 730.745736] name failslab, interval 1, probability 0, space 0, times 0 [ 730.757112] CPU: 0 PID: 14841 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 730.764392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.773762] Call Trace: [ 730.776371] dump_stack+0x1b9/0x294 [ 730.780018] ? dump_stack_print_info.cold.2+0x52/0x52 [ 730.785213] ? kernel_text_address+0x79/0xf0 [ 730.789627] ? __unwind_start+0x166/0x330 [ 730.793778] ? __kernel_text_address+0xd/0x40 [ 730.798290] should_fail.cold.4+0xa/0x1a [ 730.802360] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 730.807486] ? save_stack+0x43/0xd0 [ 730.811114] ? kasan_kmalloc+0xc4/0xe0 [ 730.815010] ? kasan_slab_alloc+0x12/0x20 [ 730.819157] ? kmem_cache_alloc+0x12e/0x760 [ 730.823478] ? alloc_vfsmnt+0xe0/0x9d0 [ 730.827363] ? vfs_kern_mount.part.34+0x88/0x4d0 [ 730.832147] ? find_held_lock+0x36/0x1c0 [ 730.836230] ? check_same_owner+0x320/0x320 [ 730.840555] ? rcu_note_context_switch+0x710/0x710 [ 730.845486] __should_failslab+0x124/0x180 [ 730.849727] should_failslab+0x9/0x14 [ 730.853532] __kmalloc_track_caller+0x2c4/0x760 [ 730.858231] ? kasan_check_read+0x11/0x20 [ 730.862396] ? do_raw_spin_unlock+0x9e/0x2e0 [ 730.866900] ? kstrdup_const+0x66/0x80 [ 730.870794] kstrdup+0x39/0x70 [ 730.874000] kstrdup_const+0x66/0x80 [ 730.877718] alloc_vfsmnt+0x1b3/0x9d0 [ 730.881521] ? mnt_free_id.isra.27+0x60/0x60 [ 730.885943] ? kasan_check_read+0x11/0x20 [ 730.890188] ? graph_lock+0x170/0x170 [ 730.893999] ? rcu_pm_notify+0xc0/0xc0 [ 730.897888] ? trace_hardirqs_off+0xd/0x10 [ 730.902124] ? putname+0xf2/0x130 [ 730.905581] ? putname+0xf2/0x130 [ 730.909036] ? find_held_lock+0x36/0x1c0 [ 730.913109] ? lock_downgrade+0x8e0/0x8e0 [ 730.917262] ? module_unload_free+0x5b0/0x5b0 [ 730.921780] ? lock_release+0xa10/0xa10 [ 730.925769] ? mpi_free.cold.1+0x19/0x19 [ 730.929840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.935387] vfs_kern_mount.part.34+0x88/0x4d0 [ 730.939979] ? may_umount+0xb0/0xb0 [ 730.943606] ? _raw_read_unlock+0x22/0x30 [ 730.947761] ? __get_fs_type+0x97/0xc0 [ 730.951650] do_mount+0x564/0x3070 [ 730.955197] ? copy_mount_string+0x40/0x40 [ 730.959445] ? rcu_pm_notify+0xc0/0xc0 [ 730.963339] ? copy_mount_options+0x5f/0x380 [ 730.967752] ? rcu_read_lock_sched_held+0x108/0x120 [ 730.972778] ? kmem_cache_alloc_trace+0x616/0x780 [ 730.977636] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 730.983183] ? _copy_from_user+0xdf/0x150 [ 730.987339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.992875] ? copy_mount_options+0x285/0x380 [ 730.997372] ksys_mount+0x12d/0x140 [ 731.001003] __x64_sys_mount+0xbe/0x150 [ 731.004978] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 731.009997] do_syscall_64+0x1b1/0x800 [ 731.013881] ? finish_task_switch+0x1ca/0x840 [ 731.018376] ? syscall_return_slowpath+0x5c0/0x5c0 [ 731.023305] ? syscall_return_slowpath+0x30f/0x5c0 [ 731.028238] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 731.033603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.038445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.043630] RIP: 0033:0x455a09 [ 731.046811] RSP: 002b:00007fd114f79808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 731.054619] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 731.061887] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 731.069152] RBP: 0000000000000000 R08: 00007fd114f79820 R09: 0000000000000000 [ 731.076417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 731.083705] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 731.102150] gfs2: not a GFS2 filesystem 2033/05/18 03:41:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:42 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x400000000000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x6c00, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000004", 0x4012}) 2033/05/18 03:41:42 executing program 6 (fault-call:3 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:42 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x5) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x450, 0xffffffff, 0x0, 0x210, 0xf0, 0xffffffff, 0xffffffff, 0x380, 0x380, 0x380, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x0, 0x766a}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d6, 0x3, 0x8, 0x2}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x5}}}, {{@ipv6={@empty, @mcast2={0xff, 0x2, [], 0x1}, [0x0, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0xffffffff, 0x0, 0xffffff00], 'ip6tnl0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x3e, 0x1ff, 0x6, 0x10}, 0x0, 0x148, 0x170, 0x0, {}, [@common=@unspec=@statistic={0x38, 'statistic\x00', 0x0, {0x0, 0x0, 0xfffffffffffffffb, 0x8, 0x7, 0x4}}, @common=@unspec=@nfacct={0x48, 'nfacct\x00', 0x0, {'syz1\x00', 0x7}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1, 0x96a, 0x7ff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r1 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x1, &(0x7f00000009c0)={{0x77359400}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r1, 0x1000000000016) 2033/05/18 03:41:42 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xfbffffff00000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 731.196281] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 731.233789] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 731.254194] IPVS: Unknown mcast interface: rose0 [ 731.342409] FAULT_INJECTION: forcing a failure. [ 731.342409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 731.354702] CPU: 0 PID: 14864 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 731.361979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.371329] Call Trace: [ 731.374062] dump_stack+0x1b9/0x294 [ 731.377703] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.382898] ? graph_lock+0x170/0x170 [ 731.386704] ? debug_check_no_locks_freed+0x310/0x310 [ 731.391905] should_fail.cold.4+0xa/0x1a [ 731.395977] ? print_usage_bug+0xc0/0xc0 [ 731.400044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.405154] ? debug_check_no_locks_freed+0x310/0x310 [ 731.410360] ? find_next_bit+0x104/0x130 [ 731.414434] ? kasan_check_write+0x14/0x20 [ 731.418671] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 731.423609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.429149] ? should_fail+0x21b/0xbcd [ 731.433045] __alloc_pages_nodemask+0x34e/0xd70 [ 731.437744] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 731.442768] ? find_held_lock+0x36/0x1c0 [ 731.446852] ? check_same_owner+0x320/0x320 [ 731.451179] cache_grow_begin+0x6e/0x6c0 [ 731.455251] kmem_cache_alloc_trace+0x6a5/0x780 [ 731.459931] ? kasan_check_write+0x14/0x20 [ 731.464171] ? do_raw_spin_lock+0xc1/0x200 [ 731.468425] sget_userns+0x1c7/0xf00 [ 731.472153] ? get_anon_bdev+0x2f0/0x2f0 [ 731.476235] ? destroy_unused_super.part.11+0x110/0x110 [ 731.481599] ? __alloc_pages_nodemask+0xacf/0xd70 [ 731.486443] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 731.491468] ? kasan_check_read+0x11/0x20 [ 731.495622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.501160] ? cap_capable+0x1f9/0x260 [ 731.505056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.510593] ? security_capable+0x99/0xc0 [ 731.514746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.520369] ? ns_capable_common+0x13f/0x170 [ 731.524784] ? get_anon_bdev+0x2f0/0x2f0 [ 731.528844] sget+0x10b/0x150 [ 731.531955] ? fuse_get_root_inode+0x190/0x190 [ 731.536537] mount_nodev+0x33/0x110 [ 731.540164] fuse_mount+0x2c/0x40 [ 731.543618] mount_fs+0xae/0x328 [ 731.546991] vfs_kern_mount.part.34+0xd4/0x4d0 [ 731.551576] ? may_umount+0xb0/0xb0 [ 731.555201] ? _raw_read_unlock+0x22/0x30 [ 731.559346] ? __get_fs_type+0x97/0xc0 [ 731.563239] do_mount+0x564/0x3070 [ 731.566792] ? copy_mount_string+0x40/0x40 [ 731.571029] ? rcu_pm_notify+0xc0/0xc0 [ 731.574941] ? copy_mount_options+0x5f/0x380 [ 731.579349] ? rcu_read_lock_sched_held+0x108/0x120 [ 731.584381] ? kmem_cache_alloc_trace+0x616/0x780 [ 731.589249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.594791] ? _copy_from_user+0xdf/0x150 [ 731.598972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.604522] ? copy_mount_options+0x285/0x380 [ 731.609021] ksys_mount+0x12d/0x140 [ 731.612660] __x64_sys_mount+0xbe/0x150 [ 731.616722] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 731.621741] do_syscall_64+0x1b1/0x800 [ 731.625629] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 731.630473] ? syscall_return_slowpath+0x5c0/0x5c0 [ 731.635406] ? syscall_return_slowpath+0x30f/0x5c0 [ 731.640437] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 731.645808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.650660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.655848] RIP: 0033:0x455a09 [ 731.659031] RSP: 002b:00007fd114f79808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 731.666752] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 731.674027] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 731.681296] RBP: 0000000000000000 R08: 00007fd114f79820 R09: 0000000000000000 [ 731.688649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 731.695922] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:41:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0xf0, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x2000000000000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bc200", 0x4012}) 2033/05/18 03:41:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 6 (fault-call:3 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:43 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000180)={0xf000000000000000, 0xceac}) clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r1 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r1, 0x1000000000016) 2033/05/18 03:41:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x710de96e12]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x400300, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 732.279079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 732.306149] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x60, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 732.367601] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bfffffdfd00", 0x4012}) 2033/05/18 03:41:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x4, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 732.453412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 732.537341] IPVS: Unknown mcast interface: rose0 [ 732.584474] IPVS: Unknown mcast interface: rose0 [ 732.636816] device bridge_slave_1 left promiscuous mode [ 732.642524] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.662203] device bridge_slave_0 left promiscuous mode [ 732.667836] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.744368] team0 (unregistering): Port device team_slave_1 removed [ 732.758046] team0 (unregistering): Port device team_slave_0 removed [ 732.771921] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 732.846804] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 732.904262] bond0 (unregistering): Released all slaves 2033/05/18 03:41:44 executing program 6 (fault-call:3 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0xfffffffc, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x126ee90d71000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xe000000100000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x201, 0x2) r3 = eventfd(0x80000000000020) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000001c0)={0x102000, &(0x7f0000000180), 0x2, r3, 0x2}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x14) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4}, 0x10, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0700007e820000000900000000000000", @ANYRES64=r5, @ANYRES64=r6/1000+10000, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0400002001000000020000e003030000df3e334437de850d"], 0x48}, 0x1}, 0x20008004) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x38) r7 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x64d22dd7, 0x40000) ioctl$KVM_S390_INTERRUPT_CPU(r7, 0x4010ae94, &(0x7f0000000080)={0x550e, 0x6d19, 0x2}) tkill(r0, 0x1000000000016) 2033/05/18 03:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000700", 0x4012}) [ 733.244743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 733.276435] IPVS: Unknown mcast interface: rose0 [ 733.305609] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x100000000000000, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x100000000000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022be0", 0x4012}) 2033/05/18 03:41:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 733.424443] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 733.485423] IPVS: Unknown mcast interface: rose0 [ 733.500796] IPVS: Unknown mcast interface: rose0 [ 733.538438] IPVS: ftp: loaded support on port[0] = 21 [ 734.621065] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.627554] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.649212] device bridge_slave_0 entered promiscuous mode [ 734.720178] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.726608] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.734439] device bridge_slave_1 entered promiscuous mode [ 734.773489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 734.843842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 735.052121] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 735.092390] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 735.131519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 735.138444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 735.206309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 735.213291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 735.448841] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 735.457045] team0: Port device team_slave_0 added [ 735.494125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 735.501648] team0: Port device team_slave_1 added [ 735.539274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 735.580225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 735.620988] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 735.628263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.637721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 735.679079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 735.686346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.702119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 736.090151] bridge0: port 2(bridge_slave_1) entered blocking state [ 736.096681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 736.103442] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.109939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 736.117760] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 737.057157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 737.540718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 737.675257] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 737.813916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 737.820305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 737.828329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 737.967504] 8021q: adding VLAN 0 to HW filter on device team0 [ 738.850820] FAULT_INJECTION: forcing a failure. [ 738.850820] name failslab, interval 1, probability 0, space 0, times 0 [ 738.862650] CPU: 0 PID: 15216 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 738.869927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.879291] Call Trace: [ 738.881888] dump_stack+0x1b9/0x294 [ 738.885520] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.890716] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 738.895915] should_fail.cold.4+0xa/0x1a [ 738.900163] ? is_bpf_text_address+0xd7/0x170 [ 738.904662] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.909776] ? unwind_get_return_address+0x61/0xa0 [ 738.914712] ? __save_stack_trace+0x7e/0xd0 [ 738.919033] ? graph_lock+0x170/0x170 [ 738.922840] ? find_held_lock+0x36/0x1c0 [ 738.926925] ? __lock_is_held+0xb5/0x140 [ 738.931003] ? check_same_owner+0x320/0x320 [ 738.935416] ? rcu_note_context_switch+0x710/0x710 [ 738.940351] __should_failslab+0x124/0x180 [ 738.944600] should_failslab+0x9/0x14 [ 738.948420] kmem_cache_alloc_trace+0x2cb/0x780 [ 738.953090] ? __kmalloc_node+0x33/0x70 [ 738.957065] ? __kmalloc_node+0x33/0x70 [ 738.961050] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.966073] __memcg_init_list_lru_node+0x17d/0x2c0 [ 738.971113] ? kvfree_rcu+0x20/0x20 [ 738.974744] ? __kmalloc_node+0x47/0x70 [ 738.978823] __list_lru_init+0x456/0x790 [ 738.982903] ? list_lru_destroy+0x4c0/0x4c0 [ 738.987240] ? mark_held_locks+0xc9/0x160 [ 738.991418] ? __raw_spin_lock_init+0x1c/0x100 [ 738.996114] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.001161] ? __lockdep_init_map+0x105/0x590 [ 739.005677] ? lockdep_init_map+0x9/0x10 [ 739.009763] sget_userns+0x73a/0xf00 [ 739.013488] ? get_anon_bdev+0x2f0/0x2f0 [ 739.017583] ? destroy_unused_super.part.11+0x110/0x110 [ 739.022953] ? __alloc_pages_nodemask+0xacf/0xd70 [ 739.027804] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 739.032826] ? kasan_check_read+0x11/0x20 [ 739.036979] ? cap_capable+0x1f9/0x260 [ 739.040885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.046421] ? security_capable+0x99/0xc0 [ 739.050586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.056134] ? ns_capable_common+0x13f/0x170 [ 739.060546] ? get_anon_bdev+0x2f0/0x2f0 [ 739.064620] sget+0x10b/0x150 [ 739.067730] ? fuse_get_root_inode+0x190/0x190 [ 739.072313] mount_nodev+0x33/0x110 [ 739.075941] fuse_mount+0x2c/0x40 [ 739.079396] mount_fs+0xae/0x328 [ 739.082766] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.087351] ? may_umount+0xb0/0xb0 [ 739.091062] ? _raw_read_unlock+0x22/0x30 [ 739.096148] ? __get_fs_type+0x97/0xc0 [ 739.100047] do_mount+0x564/0x3070 [ 739.103609] ? copy_mount_string+0x40/0x40 [ 739.107878] ? rcu_pm_notify+0xc0/0xc0 [ 739.111774] ? copy_mount_options+0x5f/0x380 [ 739.116187] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.121207] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.126065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.131605] ? _copy_from_user+0xdf/0x150 [ 739.135760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.141308] ? copy_mount_options+0x285/0x380 [ 739.145981] ksys_mount+0x12d/0x140 [ 739.149618] __x64_sys_mount+0xbe/0x150 [ 739.153588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.158617] do_syscall_64+0x1b1/0x800 [ 739.162506] ? finish_task_switch+0x1ca/0x840 [ 739.167001] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.173501] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.178437] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.183808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.188653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.193837] RIP: 0033:0x455a09 [ 739.197021] RSP: 002b:00007fe1e462b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.204732] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 739.211996] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 739.219267] RBP: 0000000000000000 R08: 00007fe1e462b820 R09: 0000000000000000 [ 739.226543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 739.233807] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 739.252606] gfs2: not a GFS2 filesystem 2033/05/18 03:41:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bc32b0200", 0x4012}) 2033/05/18 03:41:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x4c00, 0x0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:50 executing program 6 (fault-call:3 fault-nth:13): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:50 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) [ 739.322459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 739.368138] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xfbffffff, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xffffff7f, {0x2}}, 0x20}, 0x1}, 0x0) [ 739.391402] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bbd", 0x4012}) 2033/05/18 03:41:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000cad00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 739.474625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 739.492718] FAULT_INJECTION: forcing a failure. [ 739.492718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 739.504575] CPU: 0 PID: 15239 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 739.511854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.521260] Call Trace: [ 739.523964] dump_stack+0x1b9/0x294 [ 739.527624] ? dump_stack_print_info.cold.2+0x52/0x52 [ 739.532819] ? graph_lock+0x170/0x170 [ 739.536626] ? debug_check_no_locks_freed+0x310/0x310 [ 739.541842] should_fail.cold.4+0xa/0x1a [ 739.545910] ? print_usage_bug+0xc0/0xc0 [ 739.550064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.555178] ? debug_check_no_locks_freed+0x310/0x310 [ 739.560396] ? find_next_bit+0x104/0x130 [ 739.564475] ? kasan_check_write+0x14/0x20 [ 739.568718] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 739.573655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.579195] ? should_fail+0x21b/0xbcd [ 739.583100] __alloc_pages_nodemask+0x34e/0xd70 [ 739.587779] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 739.592804] ? find_held_lock+0x36/0x1c0 [ 739.596885] ? check_same_owner+0x320/0x320 [ 739.601221] cache_grow_begin+0x6e/0x6c0 [ 739.605296] kmem_cache_alloc_trace+0x6a5/0x780 [ 739.609991] ? kasan_check_write+0x14/0x20 [ 739.614234] ? do_raw_spin_lock+0xc1/0x200 [ 739.618479] sget_userns+0x1c7/0xf00 [ 739.622190] ? get_anon_bdev+0x2f0/0x2f0 [ 739.626268] ? destroy_unused_super.part.11+0x110/0x110 [ 739.631637] ? __alloc_pages_nodemask+0xacf/0xd70 [ 739.636502] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 739.641525] ? kasan_check_read+0x11/0x20 [ 739.645690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.651248] ? cap_capable+0x1f9/0x260 [ 739.655145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.660687] ? security_capable+0x99/0xc0 [ 739.664860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.670651] ? ns_capable_common+0x13f/0x170 [ 739.675075] ? get_anon_bdev+0x2f0/0x2f0 [ 739.679148] sget+0x10b/0x150 [ 739.682274] ? fuse_get_root_inode+0x190/0x190 [ 739.686858] mount_nodev+0x33/0x110 [ 739.690490] fuse_mount+0x2c/0x40 [ 739.693956] mount_fs+0xae/0x328 [ 739.697332] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.701918] ? may_umount+0xb0/0xb0 [ 739.705545] ? _raw_read_unlock+0x22/0x30 [ 739.709792] ? __get_fs_type+0x97/0xc0 [ 739.713714] do_mount+0x564/0x3070 [ 739.717435] ? do_raw_spin_unlock+0x9e/0x2e0 [ 739.721850] ? copy_mount_string+0x40/0x40 [ 739.726089] ? rcu_pm_notify+0xc0/0xc0 [ 739.729993] ? copy_mount_options+0x5f/0x380 [ 739.734404] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.739432] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.744283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.749830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.755369] ? copy_mount_options+0x285/0x380 [ 739.759871] ksys_mount+0x12d/0x140 [ 739.763502] __x64_sys_mount+0xbe/0x150 [ 739.767478] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.772500] do_syscall_64+0x1b1/0x800 [ 739.776404] ? finish_task_switch+0x1ca/0x840 [ 739.780907] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.785840] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.790862] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.796235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.801091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.806278] RIP: 0033:0x455a09 [ 739.809467] RSP: 002b:00007fe1e462b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.817177] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:41:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xe0000001, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 739.824454] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 739.831734] RBP: 0000000000000000 R08: 00007fe1e462b820 R09: 0000000000000000 [ 739.839011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 739.846296] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 739.861636] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6c, {0x2}}, 0x20}, 0x1}, 0x0) [ 739.892737] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x2000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bffffffff87c000", 0x4012}) [ 739.960705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 740.036422] IPVS: Unknown mcast interface: rose0 [ 740.075214] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x1000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x3f00000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000000140070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:41:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bbe2b0200", 0x4012}) 2033/05/18 03:41:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:51 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:51 executing program 6 (fault-call:3 fault-nth:14): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 740.370300] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 740.422588] IPVS: Unknown mcast interface: rose0Ž 2033/05/18 03:41:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000001]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 740.447376] IPVS: Unknown mcast interface: rose0Ž [ 740.664352] device bridge_slave_1 left promiscuous mode [ 740.669996] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.709191] device bridge_slave_0 left promiscuous mode [ 740.714930] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.790855] team0 (unregistering): Port device team_slave_1 removed [ 740.805431] team0 (unregistering): Port device team_slave_0 removed [ 740.817902] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 740.877663] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 740.971319] bond0 (unregistering): Released all slaves 2033/05/18 03:41:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0xfffffffb, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x2000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bbb00", 0x4012}) 2033/05/18 03:41:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000000), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:52 executing program 6 (fault-call:3 fault-nth:15): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 741.355919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 741.402329] IPVS: Unknown mcast interface: rose0 [ 741.422075] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x10000e0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xef7f0000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bc72b0200", 0x4012}) 2033/05/18 03:41:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 741.514235] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 741.598587] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x3d1894fa51000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x3000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 741.624953] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b014e00", 0x4012}) [ 741.666984] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:41:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000100000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 741.705786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x200000000000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 741.772590] IPVS: Unknown mcast interface: rose0 [ 741.803355] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:53 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f00000001c0)='./file0\x00', 0x1045, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0xff, 0x200) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000280)={0x2, 0x7}) r1 = gettid() ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f00000002c0)={[], 0x2, 0x8, 0x1, 0x0, 0x0, 0x4, 0xf000, [], 0x6}) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r2, 0x7) clone(0x8000, &(0x7f0000000100)="5c2f8010973b15ea2fc2e4ec8ffd370fea82fc092ab7c967", &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r1, 0x1000000000012) [ 742.900305] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.906786] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.939090] device bridge_slave_0 entered promiscuous mode [ 743.014439] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.020933] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.045007] device bridge_slave_1 entered promiscuous mode [ 743.096523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 743.165342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 743.313783] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 743.411111] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 743.513465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 743.520487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 743.645549] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 743.664180] team0: Port device team_slave_0 added [ 743.706201] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 743.714639] team0: Port device team_slave_1 added [ 743.751455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 743.792922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 743.831871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 743.839193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 743.854700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 743.886128] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 743.893439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 743.902050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 744.298126] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.304654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 744.311445] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.317852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 744.325502] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 744.543136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 745.754591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 745.895383] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 746.036633] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 746.043117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 746.050732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 746.189927] 8021q: adding VLAN 0 to HW filter on device team0 [ 747.082595] FAULT_INJECTION: forcing a failure. [ 747.082595] name failslab, interval 1, probability 0, space 0, times 0 [ 747.094579] CPU: 1 PID: 15633 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 747.101959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.111406] Call Trace: [ 747.114007] dump_stack+0x1b9/0x294 [ 747.117655] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.122855] ? finish_task_switch+0x1ca/0x840 [ 747.127387] ? finish_task_switch+0x182/0x840 [ 747.131894] should_fail.cold.4+0xa/0x1a [ 747.136078] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.141191] ? __schedule+0x809/0x1e30 [ 747.145090] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 747.149859] ? do_mount+0x564/0x3070 [ 747.153595] ? __sched_text_start+0x8/0x8 [ 747.157750] ? find_held_lock+0x36/0x1c0 [ 747.161825] ? __lock_is_held+0xb5/0x140 [ 747.165900] ? check_same_owner+0x320/0x320 [ 747.170231] __should_failslab+0x124/0x180 [ 747.174471] should_failslab+0x9/0x14 [ 747.178277] kmem_cache_alloc_trace+0x2cb/0x780 [ 747.182949] ? __kmalloc_node+0x33/0x70 [ 747.186931] ? __kmalloc_node+0x33/0x70 [ 747.190910] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.195938] __memcg_init_list_lru_node+0x17d/0x2c0 [ 747.200959] ? kvfree_rcu+0x20/0x20 [ 747.204605] ? __kmalloc_node+0x47/0x70 [ 747.208588] __list_lru_init+0x456/0x790 [ 747.212652] ? list_lru_destroy+0x4c0/0x4c0 [ 747.217001] ? mark_held_locks+0xc9/0x160 [ 747.221156] ? __raw_spin_lock_init+0x1c/0x100 [ 747.225740] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 747.230761] ? __lockdep_init_map+0x105/0x590 [ 747.235264] ? lockdep_init_map+0x9/0x10 [ 747.239351] sget_userns+0x73a/0xf00 [ 747.243070] ? get_anon_bdev+0x2f0/0x2f0 [ 747.247142] ? destroy_unused_super.part.11+0x110/0x110 [ 747.252595] ? __alloc_pages_nodemask+0xacf/0xd70 [ 747.257451] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 747.262501] ? kasan_check_read+0x11/0x20 [ 747.266655] ? cap_capable+0x1f9/0x260 [ 747.270562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.276102] ? security_capable+0x99/0xc0 [ 747.280257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.285794] ? ns_capable_common+0x13f/0x170 [ 747.290205] ? get_anon_bdev+0x2f0/0x2f0 [ 747.294267] sget+0x10b/0x150 [ 747.297379] ? fuse_get_root_inode+0x190/0x190 [ 747.301964] mount_nodev+0x33/0x110 [ 747.305595] fuse_mount+0x2c/0x40 [ 747.309065] mount_fs+0xae/0x328 [ 747.312445] vfs_kern_mount.part.34+0xd4/0x4d0 [ 747.317126] ? may_umount+0xb0/0xb0 [ 747.320757] ? _raw_read_unlock+0x22/0x30 [ 747.324904] ? __get_fs_type+0x97/0xc0 [ 747.328796] do_mount+0x564/0x3070 [ 747.332347] ? copy_mount_string+0x40/0x40 [ 747.336586] ? rcu_pm_notify+0xc0/0xc0 [ 747.340498] ? copy_mount_options+0x5f/0x380 [ 747.344930] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.349949] ? kmem_cache_alloc_trace+0x616/0x780 [ 747.354885] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.360426] ? _copy_from_user+0xdf/0x150 [ 747.364674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.370213] ? copy_mount_options+0x285/0x380 [ 747.374819] ksys_mount+0x12d/0x140 [ 747.378452] __x64_sys_mount+0xbe/0x150 [ 747.382431] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 747.387565] do_syscall_64+0x1b1/0x800 [ 747.391455] ? finish_task_switch+0x1ca/0x840 [ 747.395954] ? syscall_return_slowpath+0x5c0/0x5c0 [ 747.400887] ? syscall_return_slowpath+0x30f/0x5c0 [ 747.405827] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 747.411200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.416058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.421360] RIP: 0033:0x455a09 [ 747.424553] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:41:58 executing program 6 (fault-call:3 fault-nth:16): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xc0ffffff, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0700", 0x4012}) 2033/05/18 03:41:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x20000000, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000007fffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f00000018c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x0, 0x3, 0x4000000000000000, 0x3, 0x3f, 0x5, 0x29, 0x38, 0x1e, 0x3, 0x9, 0x20, 0x2, 0x3, 0x2, 0x325}, [{0x6, 0x20, 0x1730, 0x4, 0x1, 0xda, 0xffffffff, 0x401}], "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a58) [ 747.432264] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 747.439534] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 747.446797] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 747.454153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 747.461423] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 747.478288] gfs2: not a GFS2 filesystem [ 747.526130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400000000000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 747.581566] IPVS: Unknown mcast interface: rose0 [ 747.596470] IPVS: Unknown mcast interface: rose0 2033/05/18 03:41:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000400300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x74000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 747.653215] FAULT_INJECTION: forcing a failure. [ 747.653215] name failslab, interval 1, probability 0, space 0, times 0 [ 747.664547] CPU: 1 PID: 15657 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 747.672017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.681391] Call Trace: [ 747.684018] dump_stack+0x1b9/0x294 [ 747.687779] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.693016] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 747.698252] should_fail.cold.4+0xa/0x1a [ 747.702331] ? is_bpf_text_address+0xd7/0x170 [ 747.706839] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.712072] ? unwind_get_return_address+0x61/0xa0 [ 747.717030] ? __save_stack_trace+0x7e/0xd0 [ 747.721453] ? graph_lock+0x170/0x170 [ 747.725351] ? find_held_lock+0x36/0x1c0 [ 747.729426] ? __lock_is_held+0xb5/0x140 [ 747.733509] ? check_same_owner+0x320/0x320 [ 747.737842] ? rcu_note_context_switch+0x710/0x710 [ 747.742784] __should_failslab+0x124/0x180 [ 747.747035] should_failslab+0x9/0x14 [ 747.750845] kmem_cache_alloc_trace+0x2cb/0x780 [ 747.755524] ? __kmalloc_node+0x33/0x70 [ 747.759500] ? __kmalloc_node+0x33/0x70 [ 747.763481] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.768514] __memcg_init_list_lru_node+0x17d/0x2c0 [ 747.773543] ? kvfree_rcu+0x20/0x20 [ 747.777198] ? __kmalloc_node+0x47/0x70 [ 747.781184] __list_lru_init+0x456/0x790 [ 747.785252] ? list_lru_destroy+0x4c0/0x4c0 [ 747.789578] ? mark_held_locks+0xc9/0x160 [ 747.793754] ? __raw_spin_lock_init+0x1c/0x100 [ 747.798344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 747.803369] ? __lockdep_init_map+0x105/0x590 [ 747.807872] ? lockdep_init_map+0x9/0x10 [ 747.811944] sget_userns+0x73a/0xf00 [ 747.815687] ? get_anon_bdev+0x2f0/0x2f0 [ 747.819777] ? destroy_unused_super.part.11+0x110/0x110 [ 747.825149] ? __alloc_pages_nodemask+0xacf/0xd70 [ 747.830026] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 747.835057] ? kasan_check_read+0x11/0x20 [ 747.839237] ? cap_capable+0x1f9/0x260 [ 747.843137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.848679] ? security_capable+0x99/0xc0 [ 747.852952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.858518] ? ns_capable_common+0x13f/0x170 [ 747.862931] ? get_anon_bdev+0x2f0/0x2f0 [ 747.867001] sget+0x10b/0x150 [ 747.870119] ? fuse_get_root_inode+0x190/0x190 [ 747.874704] mount_nodev+0x33/0x110 [ 747.878464] fuse_mount+0x2c/0x40 [ 747.881956] mount_fs+0xae/0x328 [ 747.885438] vfs_kern_mount.part.34+0xd4/0x4d0 [ 747.890127] ? may_umount+0xb0/0xb0 [ 747.893756] ? _raw_read_unlock+0x22/0x30 [ 747.897934] ? __get_fs_type+0x97/0xc0 [ 747.901828] do_mount+0x564/0x3070 [ 747.905370] ? do_raw_spin_unlock+0x9e/0x2e0 [ 747.909805] ? copy_mount_string+0x40/0x40 [ 747.914043] ? rcu_pm_notify+0xc0/0xc0 [ 747.917944] ? copy_mount_options+0x5f/0x380 [ 747.922356] ? rcu_read_lock_sched_held+0x108/0x120 [ 747.927378] ? kmem_cache_alloc_trace+0x616/0x780 [ 747.932316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.937867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.943406] ? copy_mount_options+0x285/0x380 [ 747.947997] ksys_mount+0x12d/0x140 [ 747.951627] __x64_sys_mount+0xbe/0x150 [ 747.955604] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 747.960625] do_syscall_64+0x1b1/0x800 [ 747.964517] ? finish_task_switch+0x1ca/0x840 [ 747.969018] ? syscall_return_slowpath+0x5c0/0x5c0 [ 747.973954] ? syscall_return_slowpath+0x30f/0x5c0 [ 747.978895] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 747.984266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.989130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.994335] RIP: 0033:0x455a09 [ 747.997522] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 748.005234] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 748.012531] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 748.019802] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 748.027154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 748.034424] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:41:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178ba42b0200", 0x4012}) 2033/05/18 03:41:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x5, {0x2}}, 0x20}, 0x1}, 0x0) [ 748.051262] IPVS: Unknown mcast interface: rose0 [ 748.056160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 748.079093] gfs2: not a GFS2 filesystem [ 748.092224] IPVS: Unknown mcast interface: rose0 [ 748.177065] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:41:59 executing program 6 (fault-call:3 fault-nth:17): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:41:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530f0ffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b180300", 0x4012}) 2033/05/18 03:41:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000001201000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:41:59 executing program 7: clone(0x210, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='\x00', &(0x7f0000000240)="ea", &(0x7f00000002c0)='^\x00'], &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r0, 0x1000000000016) 2033/05/18 03:41:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x400000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 748.456800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 748.478660] IPVS: Unknown mcast interface: rose0ðÿÿÿ [ 748.502854] IPVS: Unknown mcast interface: rose0ðÿÿÿ 2033/05/18 03:41:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000e0]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf0ffffffffffff, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:41:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:41:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bad", 0x4012}) [ 748.610390] FAULT_INJECTION: forcing a failure. [ 748.610390] name failslab, interval 1, probability 0, space 0, times 0 [ 748.621730] CPU: 1 PID: 15703 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 748.629017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.638422] Call Trace: [ 748.641038] dump_stack+0x1b9/0x294 [ 748.644704] ? dump_stack_print_info.cold.2+0x52/0x52 [ 748.649964] ? __save_stack_trace+0x7e/0xd0 [ 748.651848] IPVS: Unknown mcast interface: rose0 [ 748.654311] should_fail.cold.4+0xa/0x1a [ 748.663234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 748.668364] ? save_stack+0x43/0xd0 [ 748.672009] ? kasan_kmalloc+0xc4/0xe0 [ 748.675923] ? kmem_cache_alloc_trace+0x152/0x780 [ 748.680783] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 748.682614] IPVS: Unknown mcast interface: rose0 [ 748.685988] ? __list_lru_init+0x456/0x790 [ 748.686005] ? sget_userns+0x73a/0xf00 [ 748.686024] ? graph_lock+0x170/0x170 [ 748.686040] ? vfs_kern_mount.part.34+0xd4/0x4d0 2033/05/18 03:41:59 executing program 7: clone(0x201, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4800, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x1000, 0x10, 0xfffffffffffffffa, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x7f, 0x7, [0x8000, 0x4, 0x2, 0x21fb, 0x4b, 0x8, 0x894]}, 0x16) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r2 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r2, 0x1000000000016) [ 748.686054] ? do_mount+0x564/0x3070 [ 748.686067] ? ksys_mount+0x12d/0x140 [ 748.686080] ? __x64_sys_mount+0xbe/0x150 [ 748.686094] ? do_syscall_64+0x1b1/0x800 [ 748.686110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.686127] ? find_held_lock+0x36/0x1c0 [ 748.686150] ? __lock_is_held+0xb5/0x140 [ 748.736720] ? check_same_owner+0x320/0x320 [ 748.741068] ? rcu_note_context_switch+0x710/0x710 [ 748.746033] __should_failslab+0x124/0x180 [ 748.750458] should_failslab+0x9/0x14 [ 748.754285] kmem_cache_alloc_trace+0x2cb/0x780 2033/05/18 03:41:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365301b0400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 748.758970] ? __kmalloc_node+0x33/0x70 [ 748.762964] ? __kmalloc_node+0x33/0x70 [ 748.766971] ? rcu_read_lock_sched_held+0x108/0x120 [ 748.772008] __memcg_init_list_lru_node+0x17d/0x2c0 [ 748.777054] ? kvfree_rcu+0x20/0x20 [ 748.780702] ? __kmalloc_node+0x47/0x70 [ 748.784703] __list_lru_init+0x456/0x790 [ 748.788791] ? list_lru_destroy+0x4c0/0x4c0 [ 748.793138] ? mark_held_locks+0xc9/0x160 [ 748.797312] ? __raw_spin_lock_init+0x1c/0x100 [ 748.801925] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.806971] ? __lockdep_init_map+0x105/0x590 [ 748.811497] ? lockdep_init_map+0x9/0x10 [ 748.815596] sget_userns+0x73a/0xf00 [ 748.819341] ? get_anon_bdev+0x2f0/0x2f0 [ 748.823420] ? destroy_unused_super.part.11+0x110/0x110 [ 748.829138] ? __alloc_pages_nodemask+0xacf/0xd70 [ 748.833995] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 748.839030] ? kasan_check_read+0x11/0x20 [ 748.843191] ? cap_capable+0x1f9/0x260 [ 748.847097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.852724] ? security_capable+0x99/0xc0 [ 748.856924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.862472] ? ns_capable_common+0x13f/0x170 [ 748.866977] ? get_anon_bdev+0x2f0/0x2f0 [ 748.871135] sget+0x10b/0x150 [ 748.874342] ? fuse_get_root_inode+0x190/0x190 [ 748.878934] mount_nodev+0x33/0x110 [ 748.882565] fuse_mount+0x2c/0x40 [ 748.886025] mount_fs+0xae/0x328 [ 748.889402] vfs_kern_mount.part.34+0xd4/0x4d0 [ 748.893992] ? may_umount+0xb0/0xb0 [ 748.897623] ? _raw_read_unlock+0x22/0x30 [ 748.901778] ? __get_fs_type+0x97/0xc0 [ 748.905678] do_mount+0x564/0x3070 [ 748.909238] ? copy_mount_string+0x40/0x40 [ 748.913484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 748.918252] ? retint_kernel+0x10/0x10 [ 748.922169] ? copy_mount_options+0x1e3/0x380 [ 748.927402] ? copy_mount_options+0x1f0/0x380 [ 748.931915] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 748.936770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.942316] ? copy_mount_options+0x285/0x380 [ 748.946826] ksys_mount+0x12d/0x140 [ 748.950466] __x64_sys_mount+0xbe/0x150 [ 748.954468] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 748.959497] do_syscall_64+0x1b1/0x800 [ 748.963408] ? finish_task_switch+0x1ca/0x840 [ 748.967996] ? syscall_return_slowpath+0x5c0/0x5c0 [ 748.972934] ? syscall_return_slowpath+0x30f/0x5c0 [ 748.977882] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 748.983264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.988120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.993925] RIP: 0033:0x455a09 [ 748.997115] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 749.004840] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 749.012219] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 749.019496] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 749.026770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 749.034061] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 749.057509] IPVS: Unknown mcast interface: rose0 [ 749.065201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 749.070492] gfs2: not a GFS2 filesystem [ 749.099418] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:00 executing program 6 (fault-call:3 fault-nth:18): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x51fa94183d, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bd400", 0x4012}) 2033/05/18 03:42:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7400000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x410280, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x74, r1, 0x200, 0x70bd25, 0x25dfdbfd, {0x8}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x8000}, 0x4040000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80802) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000180)=@ipx={0x4, 0x8, 0x50e, "f6fa15f3a60d", 0x8000}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="3916f30460e5b2807780ab86e5023ce5346ea6e8262f98229e89455c3c40761a550d10b892f736a56171b0ab589847cd0054ca60c6752e696747eaf52db6cd2153f0f85f9f9f5acd6b7404c32b9546fdd90505187745795906c1fd862403427a882f38e96a3fa57b", 0x68}, {&(0x7f0000000280)="3490d1841414b41dcf845ef1c4b61f72a03bcebd15494f521b7407b2141af4b41273355787ea19815ba7f8582296939782b11d34ecd071c8b0de92b7384ed05046761d1d0d5743f2b8c6bd73d669148bb83e95af899e089ec234c8", 0x5b}], 0x2, 0x0, 0x0, 0x14}, 0x4000001) r3 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r3, 0x1000000000016) 2033/05/18 03:42:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6, {0x2}}, 0x20}, 0x1}, 0x0) [ 749.197811] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 749.235659] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 749.276280] IPVS: Unknown mcast interface: rose0 [ 749.304656] FAULT_INJECTION: forcing a failure. [ 749.304656] name failslab, interval 1, probability 0, space 0, times 0 [ 749.316239] CPU: 1 PID: 15748 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 749.323541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.332993] Call Trace: [ 749.335610] dump_stack+0x1b9/0x294 [ 749.339261] ? dump_stack_print_info.cold.2+0x52/0x52 [ 749.344474] ? __save_stack_trace+0x7e/0xd0 [ 749.348818] should_fail.cold.4+0xa/0x1a [ 749.352905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 749.358022] ? save_stack+0x43/0xd0 [ 749.361659] ? kasan_kmalloc+0xc4/0xe0 [ 749.365581] ? kmem_cache_alloc_trace+0x152/0x780 [ 749.370438] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 749.375635] ? __list_lru_init+0x456/0x790 [ 749.379880] ? sget_userns+0x73a/0xf00 [ 749.383775] ? graph_lock+0x170/0x170 [ 749.387581] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 749.392343] ? do_mount+0x564/0x3070 [ 749.396061] ? ksys_mount+0x12d/0x140 [ 749.399951] ? __x64_sys_mount+0xbe/0x150 [ 749.404117] ? do_syscall_64+0x1b1/0x800 [ 749.408194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.413572] ? find_held_lock+0x36/0x1c0 [ 749.417646] ? __lock_is_held+0xb5/0x140 [ 749.421730] ? check_same_owner+0x320/0x320 [ 749.426063] ? rcu_note_context_switch+0x710/0x710 [ 749.431006] __should_failslab+0x124/0x180 [ 749.435250] should_failslab+0x9/0x14 [ 749.439058] kmem_cache_alloc_trace+0x2cb/0x780 [ 749.443733] ? __kmalloc_node+0x33/0x70 [ 749.447714] ? __kmalloc_node+0x33/0x70 [ 749.451698] ? rcu_read_lock_sched_held+0x108/0x120 [ 749.456727] __memcg_init_list_lru_node+0x17d/0x2c0 [ 749.461755] ? kvfree_rcu+0x20/0x20 [ 749.465391] ? __kmalloc_node+0x47/0x70 [ 749.469508] __list_lru_init+0x456/0x790 [ 749.473588] ? list_lru_destroy+0x4c0/0x4c0 [ 749.478005] ? mark_held_locks+0xc9/0x160 [ 749.482170] ? __raw_spin_lock_init+0x1c/0x100 [ 749.486764] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 749.491879] ? __lockdep_init_map+0x105/0x590 [ 749.496467] ? lockdep_init_map+0x9/0x10 [ 749.500535] sget_userns+0x73a/0xf00 [ 749.504257] ? get_anon_bdev+0x2f0/0x2f0 [ 749.508350] ? destroy_unused_super.part.11+0x110/0x110 [ 749.513721] ? __alloc_pages_nodemask+0xacf/0xd70 [ 749.518576] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 749.523622] ? kasan_check_read+0x11/0x20 [ 749.527782] ? cap_capable+0x1f9/0x260 [ 749.531679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.537262] ? security_capable+0x99/0xc0 [ 749.541877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.547421] ? ns_capable_common+0x13f/0x170 [ 749.551842] ? get_anon_bdev+0x2f0/0x2f0 [ 749.555908] sget+0x10b/0x150 [ 749.559021] ? fuse_get_root_inode+0x190/0x190 [ 749.563604] mount_nodev+0x33/0x110 [ 749.567235] fuse_mount+0x2c/0x40 [ 749.570691] mount_fs+0xae/0x328 [ 749.574091] vfs_kern_mount.part.34+0xd4/0x4d0 [ 749.578676] ? may_umount+0xb0/0xb0 [ 749.582307] ? _raw_read_unlock+0x22/0x30 [ 749.586457] ? __get_fs_type+0x97/0xc0 [ 749.590441] do_mount+0x564/0x3070 [ 749.593982] ? do_raw_spin_unlock+0x9e/0x2e0 [ 749.598401] ? copy_mount_string+0x40/0x40 [ 749.602642] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 749.607683] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 749.612453] ? retint_kernel+0x10/0x10 [ 749.616353] ? copy_mount_options+0x1f0/0x380 [ 749.620856] ? copy_mount_options+0x206/0x380 [ 749.625361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.630903] ? copy_mount_options+0x285/0x380 [ 749.635408] ksys_mount+0x12d/0x140 [ 749.639044] __x64_sys_mount+0xbe/0x150 [ 749.643022] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 749.648053] do_syscall_64+0x1b1/0x800 [ 749.651951] ? syscall_return_slowpath+0x5c0/0x5c0 [ 749.656908] ? syscall_return_slowpath+0x30f/0x5c0 [ 749.661848] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 749.667222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.672080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.677536] RIP: 0033:0x455a09 [ 749.680753] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 749.688556] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 749.695832] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000343c400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022beb00", 0x4012}) 2033/05/18 03:42:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 749.703105] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 749.710374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 749.717646] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 749.742475] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 749.789508] gfs2: not a GFS2 filesystem [ 749.804386] IPVS: Unknown mcast interface: rose0 [ 749.837793] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:01 executing program 6 (fault-call:3 fault-nth:19): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x100000000000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000600", 0x4012}) 2033/05/18 03:42:01 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_rr_get_interval(r0, &(0x7f0000000300)) unlink(&(0x7f00000000c0)='./file0\x00') r1 = gettid() clone(0x4000, &(0x7f0000000000)="b160cf46e4cdd51eb2199dba010df8678291cbfd120b0190fba7691bb1ff1496e07735b8f36248452ab8f04243365898dfea01", &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000180)="5cbd9dd8d314327c95ea4e4eecce14cb3ea201cb37df76e4da2ca41c781c1d6b73b03110f24bf383dcbbb15e0d104fe91a296ac709d0d540d7f2ab6fb91b5f53ee9838a43926dbefc7933bf1c0268d1739f19774aba10b7c1ae5ed1122ff90b65db4a17384ba77669af6fb26d25960bf5df1f75cda9028e21282077f499d8b48233f2b68ba5a787ef56999b2ef883ddb68848309d7d9dc4d520222bde4607cf78b4f3a0857732a620f15099e61b2304b5eb2b12687287d3895bb56632c7fb9b53cd87cdfba6ff2f3298f91b86a5d") r2 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x80000) accept$inet(r2, 0x0, &(0x7f00000002c0)) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r1, 0x1000000000016) 2033/05/18 03:42:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfcffffff, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000223000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 750.186776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 750.237466] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 750.260610] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x60000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 750.302191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 750.318291] FAULT_INJECTION: forcing a failure. [ 750.318291] name failslab, interval 1, probability 0, space 0, times 0 [ 750.329613] CPU: 1 PID: 15790 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 750.336893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.346282] Call Trace: 2033/05/18 03:42:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 750.349157] dump_stack+0x1b9/0x294 [ 750.352813] ? dump_stack_print_info.cold.2+0x52/0x52 [ 750.358024] ? __save_stack_trace+0x7e/0xd0 [ 750.362428] should_fail.cold.4+0xa/0x1a [ 750.366509] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 750.371743] ? save_stack+0x43/0xd0 [ 750.375387] ? kasan_kmalloc+0xc4/0xe0 [ 750.379285] ? kmem_cache_alloc_trace+0x152/0x780 [ 750.384139] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 750.389342] ? __list_lru_init+0x456/0x790 [ 750.393699] ? sget_userns+0x73a/0xf00 [ 750.397874] ? graph_lock+0x170/0x170 [ 750.401689] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 750.406458] ? do_mount+0x564/0x3070 [ 750.410186] ? ksys_mount+0x12d/0x140 [ 750.414006] ? __x64_sys_mount+0xbe/0x150 [ 750.418176] ? do_syscall_64+0x1b1/0x800 [ 750.422242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.427615] ? find_held_lock+0x36/0x1c0 [ 750.431683] ? __lock_is_held+0xb5/0x140 [ 750.435766] ? check_same_owner+0x320/0x320 [ 750.440101] ? rcu_note_context_switch+0x710/0x710 [ 750.445046] __should_failslab+0x124/0x180 [ 750.449293] should_failslab+0x9/0x14 [ 750.453102] kmem_cache_alloc_trace+0x2cb/0x780 [ 750.457786] ? __kmalloc_node+0x33/0x70 [ 750.461797] ? __kmalloc_node+0x33/0x70 [ 750.465890] ? rcu_read_lock_sched_held+0x108/0x120 [ 750.471038] __memcg_init_list_lru_node+0x17d/0x2c0 [ 750.476067] ? kvfree_rcu+0x20/0x20 [ 750.479798] ? __kmalloc_node+0x47/0x70 [ 750.483791] __list_lru_init+0x456/0x790 [ 750.487861] ? list_lru_destroy+0x4c0/0x4c0 [ 750.492189] ? mark_held_locks+0xc9/0x160 [ 750.496344] ? __raw_spin_lock_init+0x1c/0x100 [ 750.500930] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 750.505955] ? __lockdep_init_map+0x105/0x590 [ 750.510464] ? lockdep_init_map+0x9/0x10 [ 750.514534] sget_userns+0x73a/0xf00 [ 750.518249] ? get_anon_bdev+0x2f0/0x2f0 [ 750.522320] ? destroy_unused_super.part.11+0x110/0x110 [ 750.527691] ? __alloc_pages_nodemask+0xacf/0xd70 [ 750.532632] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 750.537657] ? kasan_check_read+0x11/0x20 [ 750.541897] ? cap_capable+0x1f9/0x260 [ 750.545882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.551427] ? security_capable+0x99/0xc0 [ 750.555595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.561223] ? ns_capable_common+0x13f/0x170 [ 750.565638] ? get_anon_bdev+0x2f0/0x2f0 [ 750.569810] sget+0x10b/0x150 [ 750.572927] ? fuse_get_root_inode+0x190/0x190 [ 750.577510] mount_nodev+0x33/0x110 [ 750.581142] fuse_mount+0x2c/0x40 [ 750.584602] mount_fs+0xae/0x328 [ 750.587977] vfs_kern_mount.part.34+0xd4/0x4d0 [ 750.592583] ? may_umount+0xb0/0xb0 [ 750.596214] ? _raw_read_unlock+0x22/0x30 2033/05/18 03:42:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000c01000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) [ 750.600363] ? __get_fs_type+0x97/0xc0 [ 750.604255] do_mount+0x564/0x3070 [ 750.607814] ? interrupt_entry+0xb1/0xf0 [ 750.611881] ? copy_mount_string+0x40/0x40 [ 750.616120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.620881] ? retint_kernel+0x10/0x10 [ 750.624782] ? copy_mount_options+0x1e3/0x380 [ 750.629284] ? write_comp_data+0x22/0x70 [ 750.633357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.638901] ? copy_mount_options+0x285/0x380 [ 750.643408] ksys_mount+0x12d/0x140 [ 750.647043] __x64_sys_mount+0xbe/0x150 [ 750.651024] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 750.656051] do_syscall_64+0x1b1/0x800 [ 750.659943] ? finish_task_switch+0x1ca/0x840 [ 750.664444] ? syscall_return_slowpath+0x5c0/0x5c0 [ 750.669379] ? syscall_return_slowpath+0x30f/0x5c0 [ 750.674320] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 750.679693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.684552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.689746] RIP: 0033:0x455a09 [ 750.692937] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000000000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 750.700650] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 750.708009] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 750.715571] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 750.722844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 750.730138] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178ba72b0200", 0x4012}) [ 750.754903] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 750.781972] IPVS: Unknown mcast interface: rose0 [ 750.795613] gfs2: not a GFS2 filesystem [ 750.801577] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:02 executing program 6 (fault-call:3 fault-nth:20): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365307fffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:02 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000840)='./file0\x00', 0x1043, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x44000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20020080}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, r1, 0x404, 0x70bd28, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffc83}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}]}, 0x9c}, 0x1}, 0x810) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r2 = gettid() execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000840), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) tkill(r2, 0x1000000000016) 2033/05/18 03:42:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x126ee90d71000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x3d1894fa51000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bb72b0200", 0x4012}) 2033/05/18 03:42:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x48000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xdd080000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 751.256451] IPVS: Unknown mcast interface: rose0ÿÿÿ [ 751.279499] IPVS: Unknown mcast interface: rose0ÿÿÿ [ 751.333473] FAULT_INJECTION: forcing a failure. [ 751.333473] name failslab, interval 1, probability 0, space 0, times 0 [ 751.344902] CPU: 0 PID: 15839 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 751.352198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.361554] Call Trace: [ 751.364156] dump_stack+0x1b9/0x294 [ 751.367821] ? dump_stack_print_info.cold.2+0x52/0x52 [ 751.373029] ? __save_stack_trace+0x7e/0xd0 [ 751.377400] should_fail.cold.4+0xa/0x1a [ 751.381479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 751.386607] ? save_stack+0x43/0xd0 [ 751.390256] ? kasan_kmalloc+0xc4/0xe0 [ 751.394155] ? kmem_cache_alloc_trace+0x152/0x780 [ 751.399053] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 751.404357] ? __list_lru_init+0x456/0x790 [ 751.408601] ? sget_userns+0x73a/0xf00 [ 751.412497] ? graph_lock+0x170/0x170 [ 751.416300] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 751.421058] ? do_mount+0x564/0x3070 [ 751.424771] ? ksys_mount+0x12d/0x140 [ 751.428751] ? __x64_sys_mount+0xbe/0x150 [ 751.432902] ? do_syscall_64+0x1b1/0x800 [ 751.436967] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.442337] ? find_held_lock+0x36/0x1c0 [ 751.446479] ? __lock_is_held+0xb5/0x140 [ 751.450559] ? check_same_owner+0x320/0x320 [ 751.454906] ? rcu_note_context_switch+0x710/0x710 [ 751.459854] __should_failslab+0x124/0x180 [ 751.464116] should_failslab+0x9/0x14 [ 751.467927] kmem_cache_alloc_trace+0x2cb/0x780 [ 751.472605] ? __kmalloc_node+0x33/0x70 [ 751.476585] ? __kmalloc_node+0x33/0x70 [ 751.480569] ? rcu_read_lock_sched_held+0x108/0x120 [ 751.485606] __memcg_init_list_lru_node+0x17d/0x2c0 [ 751.490729] ? kvfree_rcu+0x20/0x20 [ 751.494380] ? __kmalloc_node+0x47/0x70 [ 751.498395] __list_lru_init+0x456/0x790 [ 751.502467] ? list_lru_destroy+0x4c0/0x4c0 [ 751.506803] ? mark_held_locks+0xc9/0x160 [ 751.510958] ? __raw_spin_lock_init+0x1c/0x100 [ 751.515641] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 751.520692] ? __lockdep_init_map+0x105/0x590 [ 751.525210] ? lockdep_init_map+0x9/0x10 [ 751.529287] sget_userns+0x73a/0xf00 2033/05/18 03:42:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfffffffc, {0x2}}, 0x20}, 0x1}, 0x0) [ 751.533097] ? get_anon_bdev+0x2f0/0x2f0 [ 751.537237] ? destroy_unused_super.part.11+0x110/0x110 [ 751.542715] ? __alloc_pages_nodemask+0xacf/0xd70 [ 751.547572] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 751.552604] ? kasan_check_read+0x11/0x20 [ 751.556763] ? cap_capable+0x1f9/0x260 [ 751.560663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.566228] ? security_capable+0x99/0xc0 [ 751.570405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.575958] ? ns_capable_common+0x13f/0x170 [ 751.580378] ? get_anon_bdev+0x2f0/0x2f0 2033/05/18 03:42:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7, {0x2}}, 0x20}, 0x1}, 0x0) [ 751.584465] sget+0x10b/0x150 [ 751.587592] ? fuse_get_root_inode+0x190/0x190 [ 751.592186] mount_nodev+0x33/0x110 [ 751.595822] fuse_mount+0x2c/0x40 [ 751.599286] mount_fs+0xae/0x328 [ 751.602670] vfs_kern_mount.part.34+0xd4/0x4d0 [ 751.607263] ? may_umount+0xb0/0xb0 [ 751.610896] ? _raw_read_unlock+0x22/0x30 [ 751.615080] ? __get_fs_type+0x97/0xc0 [ 751.618982] do_mount+0x564/0x3070 [ 751.622529] ? do_raw_spin_unlock+0x9e/0x2e0 [ 751.626949] ? copy_mount_string+0x40/0x40 [ 751.631194] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 751.637012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 751.641783] ? retint_kernel+0x10/0x10 [ 751.645684] ? copy_mount_options+0x1a1/0x380 [ 751.650198] ? copy_mount_options+0x1cc/0x380 [ 751.654789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.660330] ? copy_mount_options+0x285/0x380 [ 751.664833] ksys_mount+0x12d/0x140 [ 751.668646] __x64_sys_mount+0xbe/0x150 [ 751.672627] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 751.677655] do_syscall_64+0x1b1/0x800 [ 751.681549] ? finish_task_switch+0x1ca/0x840 [ 751.686050] ? syscall_return_slowpath+0x5c0/0x5c0 [ 751.690994] ? syscall_return_slowpath+0x30f/0x5c0 [ 751.695938] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 751.701514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 751.706376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.711567] RIP: 0033:0x455a09 [ 751.714759] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 751.722482] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178be60300", 0x4012}) 2033/05/18 03:42:02 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x40030000000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000001]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 751.729753] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 751.737117] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 751.744393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 751.751668] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 751.780294] IPVS: Unknown mcast interface: rose0 [ 751.781622] gfs2: not a GFS2 filesystem [ 751.827559] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:03 executing program 6 (fault-call:3 fault-nth:21): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000000000000014e", 0x4012}) 2033/05/18 03:42:03 executing program 7: clone(0x200, &(0x7f0000000240), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x1043, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000775000)) unlink(&(0x7f00000000c0)='./file0\x00') r0 = gettid() execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000840), &(0x7f0000000180)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000009c0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000980)) mknod(&(0x7f0000000080)='./file0\x00', 0x1026, 0x6) tkill(r0, 0x1000000000016) 2033/05/18 03:42:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000401000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xc0ffffff00000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x20000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 752.213185] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 752.244616] IPVS: Unknown mcast interface: rose0 [ 752.265152] FAULT_INJECTION: forcing a failure. [ 752.265152] name failslab, interval 1, probability 0, space 0, times 0 [ 752.276713] CPU: 0 PID: 15887 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 752.283997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.293357] Call Trace: [ 752.295957] dump_stack+0x1b9/0x294 [ 752.299594] ? dump_stack_print_info.cold.2+0x52/0x52 [ 752.304793] ? __save_stack_trace+0x7e/0xd0 [ 752.309183] should_fail.cold.4+0xa/0x1a [ 752.313262] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 752.318367] ? save_stack+0x43/0xd0 [ 752.321995] ? kasan_kmalloc+0xc4/0xe0 [ 752.325889] ? kmem_cache_alloc_trace+0x152/0x780 [ 752.331260] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 752.336453] ? __list_lru_init+0x456/0x790 [ 752.340689] ? sget_userns+0x73a/0xf00 [ 752.344579] ? graph_lock+0x170/0x170 [ 752.348384] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 752.353142] ? do_mount+0x564/0x3070 [ 752.356858] ? ksys_mount+0x12d/0x140 [ 752.360681] ? __x64_sys_mount+0xbe/0x150 [ 752.364836] ? do_syscall_64+0x1b1/0x800 [ 752.368911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.374288] ? find_held_lock+0x36/0x1c0 [ 752.378365] ? __lock_is_held+0xb5/0x140 [ 752.382543] ? check_same_owner+0x320/0x320 [ 752.386887] ? rcu_note_context_switch+0x710/0x710 [ 752.391863] __should_failslab+0x124/0x180 [ 752.396149] should_failslab+0x9/0x14 [ 752.399993] kmem_cache_alloc_trace+0x2cb/0x780 [ 752.404777] ? __kmalloc_node+0x33/0x70 [ 752.408781] ? __kmalloc_node+0x33/0x70 [ 752.412768] ? rcu_read_lock_sched_held+0x108/0x120 [ 752.417891] __memcg_init_list_lru_node+0x17d/0x2c0 [ 752.422921] ? kvfree_rcu+0x20/0x20 [ 752.426676] ? __kmalloc_node+0x47/0x70 [ 752.430747] __list_lru_init+0x456/0x790 [ 752.434834] ? list_lru_destroy+0x4c0/0x4c0 [ 752.439171] ? mark_held_locks+0xc9/0x160 [ 752.443341] ? __raw_spin_lock_init+0x1c/0x100 [ 752.447933] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 752.452963] ? __lockdep_init_map+0x105/0x590 [ 752.457476] ? lockdep_init_map+0x9/0x10 [ 752.461569] sget_userns+0x73a/0xf00 2033/05/18 03:42:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf0ffffff00000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 752.465307] ? get_anon_bdev+0x2f0/0x2f0 [ 752.469471] ? destroy_unused_super.part.11+0x110/0x110 [ 752.474852] ? __alloc_pages_nodemask+0xacf/0xd70 [ 752.479749] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 752.484788] ? kasan_check_read+0x11/0x20 [ 752.488949] ? cap_capable+0x1f9/0x260 [ 752.492858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.498416] ? security_capable+0x99/0xc0 [ 752.502585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.508136] ? ns_capable_common+0x13f/0x170 2033/05/18 03:42:03 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000200000000000004010007080000000001000000000100"], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0000810000000000000000000000000000000000"], 0x1) [ 752.512558] ? get_anon_bdev+0x2f0/0x2f0 [ 752.516632] sget+0x10b/0x150 [ 752.519753] ? fuse_get_root_inode+0x190/0x190 [ 752.524346] mount_nodev+0x33/0x110 [ 752.527983] fuse_mount+0x2c/0x40 [ 752.531445] mount_fs+0xae/0x328 [ 752.534831] vfs_kern_mount.part.34+0xd4/0x4d0 [ 752.539421] ? may_umount+0xb0/0xb0 [ 752.543056] ? _raw_read_unlock+0x22/0x30 [ 752.547234] ? __get_fs_type+0x97/0xc0 [ 752.551165] do_mount+0x564/0x3070 [ 752.554726] ? copy_mount_string+0x40/0x40 [ 752.558975] ? trace_hardirqs_on_thunk+0x1a/0x1c 2033/05/18 03:42:03 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) read(r0, &(0x7f0000000680)=""/251, 0x2428) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x47) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000007700400000000000efff00000000000000000000000000000000000000008b336cab24615cdafa81e400000000000000000000000000000000000000000000000000000000000000000000080000"], 0x6c) [ 752.563746] ? retint_kernel+0x10/0x10 [ 752.567645] ? copy_mount_options+0x213/0x380 [ 752.572171] ? write_comp_data+0x70/0x70 [ 752.576366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.581913] ? copy_mount_options+0x285/0x380 [ 752.586459] ksys_mount+0x12d/0x140 [ 752.590101] __x64_sys_mount+0xbe/0x150 [ 752.594168] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 752.599194] do_syscall_64+0x1b1/0x800 [ 752.603092] ? finish_task_switch+0x1ca/0x840 [ 752.607598] ? syscall_return_slowpath+0x5c0/0x5c0 [ 752.612535] ? syscall_return_slowpath+0x30f/0x5c0 [ 752.617484] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 752.622892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.627857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.633050] RIP: 0033:0x455a09 [ 752.636252] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 752.644234] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 752.651522] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 752.658809] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 2033/05/18 03:42:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x34000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 752.666086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 752.673368] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 752.688657] nla_parse: 5 callbacks suppressed [ 752.688666] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 752.717331] gfs2: not a GFS2 filesystem [ 752.726753] IPVS: Unknown mcast interface: rose0` [ 752.749215] IPVS: Unknown mcast interface: rose0` 2033/05/18 03:42:04 executing program 6 (fault-call:3 fault-nth:22): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0247e22f05d02c99240970") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper={0x630b}], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper={0x630c}], 0x0, 0x0, &(0x7f000000df36)}) 2033/05/18 03:42:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000f0ffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xfbffffff00000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000100", 0x4012}) 2033/05/18 03:42:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 752.916610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f00000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xffffffc0, {0x2}}, 0x20}, 0x1}, 0x0) [ 752.966083] IPVS: Unknown mcast interface: rose0 [ 752.978815] IPVS: Unknown mcast interface: rose0 [ 753.046797] FAULT_INJECTION: forcing a failure. [ 753.046797] name failslab, interval 1, probability 0, space 0, times 0 [ 753.058337] CPU: 0 PID: 15931 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 753.065621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.074978] Call Trace: [ 753.077577] dump_stack+0x1b9/0x294 [ 753.081211] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.086413] ? __save_stack_trace+0x7e/0xd0 [ 753.091530] should_fail.cold.4+0xa/0x1a [ 753.095603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 753.100713] ? save_stack+0x43/0xd0 [ 753.104343] ? kasan_kmalloc+0xc4/0xe0 [ 753.108231] ? kmem_cache_alloc_trace+0x152/0x780 [ 753.113188] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 753.118382] ? __list_lru_init+0x456/0x790 [ 753.122673] ? sget_userns+0x73a/0xf00 [ 753.126571] ? graph_lock+0x170/0x170 [ 753.130378] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 753.135141] ? do_mount+0x564/0x3070 [ 753.138862] ? ksys_mount+0x12d/0x140 [ 753.142668] ? __x64_sys_mount+0xbe/0x150 [ 753.146825] ? do_syscall_64+0x1b1/0x800 [ 753.150953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.156338] ? find_held_lock+0x36/0x1c0 [ 753.160416] ? __lock_is_held+0xb5/0x140 [ 753.164676] ? check_same_owner+0x320/0x320 [ 753.169097] ? rcu_note_context_switch+0x710/0x710 [ 753.174079] __should_failslab+0x124/0x180 [ 753.178326] should_failslab+0x9/0x14 [ 753.182129] kmem_cache_alloc_trace+0x2cb/0x780 [ 753.186804] ? __kmalloc_node+0x33/0x70 [ 753.190788] ? __kmalloc_node+0x33/0x70 [ 753.194770] ? rcu_read_lock_sched_held+0x108/0x120 [ 753.199801] __memcg_init_list_lru_node+0x17d/0x2c0 [ 753.204952] ? kvfree_rcu+0x20/0x20 [ 753.208593] ? __kmalloc_node+0x47/0x70 [ 753.212583] __list_lru_init+0x456/0x790 [ 753.216651] ? list_lru_destroy+0x4c0/0x4c0 [ 753.220977] ? mark_held_locks+0xc9/0x160 [ 753.225146] ? __raw_spin_lock_init+0x1c/0x100 [ 753.229733] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 753.235029] ? __lockdep_init_map+0x105/0x590 [ 753.239545] ? lockdep_init_map+0x9/0x10 [ 753.243612] sget_userns+0x73a/0xf00 [ 753.247326] ? get_anon_bdev+0x2f0/0x2f0 [ 753.251400] ? destroy_unused_super.part.11+0x110/0x110 [ 753.256767] ? __alloc_pages_nodemask+0xacf/0xd70 [ 753.262517] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 753.267551] ? kasan_check_read+0x11/0x20 [ 753.271806] ? cap_capable+0x1f9/0x260 [ 753.275708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.281513] ? security_capable+0x99/0xc0 [ 753.285671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.291218] ? ns_capable_common+0x13f/0x170 2033/05/18 03:42:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2275, 0x80fd01) [ 753.297057] ? get_anon_bdev+0x2f0/0x2f0 [ 753.301124] sget+0x10b/0x150 [ 753.304240] ? fuse_get_root_inode+0x190/0x190 [ 753.308825] mount_nodev+0x33/0x110 [ 753.312457] fuse_mount+0x2c/0x40 [ 753.315917] mount_fs+0xae/0x328 [ 753.319292] vfs_kern_mount.part.34+0xd4/0x4d0 [ 753.323891] ? may_umount+0xb0/0xb0 [ 753.327527] ? _raw_read_unlock+0x22/0x30 [ 753.331676] ? __get_fs_type+0x97/0xc0 [ 753.335570] do_mount+0x564/0x3070 [ 753.339121] ? copy_mount_string+0x40/0x40 [ 753.343360] ? rcu_pm_notify+0xc0/0xc0 [ 753.347271] ? copy_mount_options+0x5f/0x380 [ 753.351683] ? rcu_read_lock_sched_held+0x108/0x120 [ 753.356719] ? kmem_cache_alloc_trace+0x616/0x780 [ 753.363326] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 753.368973] ? _copy_from_user+0xdf/0x150 [ 753.373136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.378677] ? copy_mount_options+0x285/0x380 [ 753.383178] ksys_mount+0x12d/0x140 [ 753.386815] __x64_sys_mount+0xbe/0x150 [ 753.390886] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 753.395911] do_syscall_64+0x1b1/0x800 [ 753.399801] ? finish_task_switch+0x1ca/0x840 [ 753.404324] ? syscall_return_slowpath+0x5c0/0x5c0 [ 753.409263] ? syscall_return_slowpath+0x30f/0x5c0 [ 753.414203] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 753.419573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 753.424518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.429710] RIP: 0033:0x455a09 [ 753.432898] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 753.440637] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xe0000001, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 753.447917] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 753.455274] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 753.462642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 753.469923] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 753.496248] gfs2: not a GFS2 filesystem [ 753.496657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 753.541640] IPVS: Unknown mcast interface: rose0 [ 753.561293] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:04 executing program 6 (fault-call:3 fault-nth:23): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:04 executing program 7: r0 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'bcsh0\x00', 0x3}) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000040)={'bcsh0\x00', 0xfffffffffffffffe}) 2033/05/18 03:42:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfcffffff00000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000001201000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022be100", 0x4012}) [ 753.780156] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x81000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xe000000100000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000f59000), 0x4) sendto$inet(r1, &(0x7f00000000c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) sendto$inet(r1, &(0x7f0000000440)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f53036c3cc3396fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd94bbfe810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191d71a236ce3666aa7ed8790364a8664", 0x82, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4", 0x11, 0x81, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r1, &(0x7f0000000500)="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", 0x1ae, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2033/05/18 03:42:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 753.845752] IPVS: Unknown mcast interface: rose0 [ 753.856640] IPVS: Unknown mcast interface: rose0 [ 753.880183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 753.911831] FAULT_INJECTION: forcing a failure. [ 753.911831] name failslab, interval 1, probability 0, space 0, times 0 [ 753.923194] CPU: 1 PID: 15969 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 753.930484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.939849] Call Trace: [ 753.942467] dump_stack+0x1b9/0x294 [ 753.946116] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.951320] ? kernel_text_address+0x79/0xf0 [ 753.955749] ? __unwind_start+0x166/0x330 [ 753.959916] should_fail.cold.4+0xa/0x1a [ 753.963988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 753.969113] ? graph_lock+0x170/0x170 [ 753.972934] ? save_stack+0x43/0xd0 [ 753.976565] ? kasan_kmalloc+0xc4/0xe0 [ 753.980464] ? __kmalloc+0x14e/0x760 [ 753.984182] ? __list_lru_init+0xdd/0x790 [ 753.988341] ? find_held_lock+0x36/0x1c0 [ 753.992413] ? __lock_is_held+0xb5/0x140 [ 753.996521] ? check_same_owner+0x320/0x320 [ 754.000860] ? rcu_note_context_switch+0x710/0x710 [ 754.005836] __should_failslab+0x124/0x180 [ 754.010086] should_failslab+0x9/0x14 [ 754.013896] kmem_cache_alloc_node_trace+0x26f/0x770 [ 754.019001] ? mark_held_locks+0xc9/0x160 [ 754.023164] ? __raw_spin_lock_init+0x1c/0x100 [ 754.027753] __kmalloc_node+0x33/0x70 [ 754.031561] kvmalloc_node+0x6b/0x100 [ 754.035369] __list_lru_init+0x559/0x790 [ 754.039438] ? list_lru_destroy+0x4c0/0x4c0 [ 754.043770] ? mark_held_locks+0xc9/0x160 [ 754.047922] ? __raw_spin_lock_init+0x1c/0x100 [ 754.052512] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 754.057537] ? lockdep_init_map+0x9/0x10 [ 754.061604] sget_userns+0x767/0xf00 [ 754.065341] ? get_anon_bdev+0x2f0/0x2f0 [ 754.069412] ? destroy_unused_super.part.11+0x110/0x110 [ 754.074787] ? __alloc_pages_nodemask+0xacf/0xd70 [ 754.079640] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 754.084676] ? kasan_check_read+0x11/0x20 [ 754.088829] ? cap_capable+0x1f9/0x260 [ 754.092727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.098264] ? security_capable+0x99/0xc0 [ 754.102416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.107958] ? ns_capable_common+0x13f/0x170 [ 754.112373] ? get_anon_bdev+0x2f0/0x2f0 [ 754.116435] sget+0x10b/0x150 [ 754.119569] ? fuse_get_root_inode+0x190/0x190 [ 754.124152] mount_nodev+0x33/0x110 [ 754.127780] fuse_mount+0x2c/0x40 [ 754.131234] mount_fs+0xae/0x328 [ 754.134605] vfs_kern_mount.part.34+0xd4/0x4d0 [ 754.139211] ? may_umount+0xb0/0xb0 [ 754.142838] ? _raw_read_unlock+0x22/0x30 [ 754.147071] ? __get_fs_type+0x97/0xc0 [ 754.150961] do_mount+0x564/0x3070 [ 754.154514] ? copy_mount_string+0x40/0x40 [ 754.158748] ? rcu_pm_notify+0xc0/0xc0 [ 754.163008] ? copy_mount_options+0x5f/0x380 [ 754.167418] ? rcu_read_lock_sched_held+0x108/0x120 [ 754.172452] ? kmem_cache_alloc_trace+0x616/0x780 [ 754.177303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.182844] ? _copy_from_user+0xdf/0x150 [ 754.186998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.192540] ? copy_mount_options+0x285/0x380 [ 754.197044] ksys_mount+0x12d/0x140 [ 754.200686] __x64_sys_mount+0xbe/0x150 [ 754.204666] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 754.209690] do_syscall_64+0x1b1/0x800 [ 754.213578] ? finish_task_switch+0x1ca/0x840 [ 754.218077] ? syscall_return_slowpath+0x5c0/0x5c0 [ 754.223012] ? syscall_return_slowpath+0x30f/0x5c0 [ 754.227950] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 754.233326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.238180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.243370] RIP: 0033:0x455a09 [ 754.246563] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 754.254273] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530fffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000e0]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 754.261648] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 754.268917] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 754.276184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 754.283452] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b03e600", 0x4012}) [ 754.317813] gfs2: not a GFS2 filesystem [ 754.324321] IPVS: Unknown mcast interface: rose0ÿÿð [ 754.333575] IPVS: Unknown mcast interface: rose0ÿÿð 2033/05/18 03:42:05 executing program 6 (fault-call:3 fault-nth:24): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300cad00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 7: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000317000), 0xffc) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2033/05/18 03:42:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400300, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b007400", 0x4012}) 2033/05/18 03:42:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000001501000070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7a000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 754.479245] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xfffffffb, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6800000000000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 754.534120] IPVS: Unknown mcast interface: rose0 ­ [ 754.552335] IPVS: Unknown mcast interface: rose0 ­ 2033/05/18 03:42:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 754.602962] FAULT_INJECTION: forcing a failure. [ 754.602962] name failslab, interval 1, probability 0, space 0, times 0 [ 754.614284] CPU: 1 PID: 16012 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 754.621574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.628723] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 754.630938] Call Trace: [ 754.630971] dump_stack+0x1b9/0x294 [ 754.630995] ? dump_stack_print_info.cold.2+0x52/0x52 [ 754.631017] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 754.631047] should_fail.cold.4+0xa/0x1a [ 754.660138] ? is_bpf_text_address+0xd7/0x170 [ 754.664737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 754.669854] ? unwind_get_return_address+0x61/0xa0 [ 754.674791] ? __save_stack_trace+0x7e/0xd0 [ 754.679211] ? graph_lock+0x170/0x170 [ 754.683024] ? find_held_lock+0x36/0x1c0 [ 754.687193] ? __lock_is_held+0xb5/0x140 [ 754.691279] ? check_same_owner+0x320/0x320 [ 754.695617] ? rcu_note_context_switch+0x710/0x710 [ 754.700561] __should_failslab+0x124/0x180 [ 754.704808] should_failslab+0x9/0x14 [ 754.708481] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 754.708618] kmem_cache_alloc_trace+0x2cb/0x780 [ 754.721665] ? __kmalloc_node+0x33/0x70 [ 754.725641] ? __kmalloc_node+0x33/0x70 [ 754.729623] ? rcu_read_lock_sched_held+0x108/0x120 [ 754.734648] __memcg_init_list_lru_node+0x17d/0x2c0 [ 754.739683] ? kvfree_rcu+0x20/0x20 [ 754.743316] ? __kmalloc_node+0x47/0x70 [ 754.747299] __list_lru_init+0x456/0x790 [ 754.751372] ? list_lru_destroy+0x4c0/0x4c0 [ 754.755708] ? mark_held_locks+0xc9/0x160 [ 754.759863] ? __raw_spin_lock_init+0x1c/0x100 [ 754.764467] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 754.769494] ? lockdep_init_map+0x9/0x10 [ 754.773565] sget_userns+0x767/0xf00 [ 754.774941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 754.777281] ? get_anon_bdev+0x2f0/0x2f0 [ 754.777305] ? destroy_unused_super.part.11+0x110/0x110 [ 754.777322] ? __alloc_pages_nodemask+0xacf/0xd70 [ 754.777338] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 754.777356] ? kasan_check_read+0x11/0x20 [ 754.809289] ? cap_capable+0x1f9/0x260 [ 754.813188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.818729] ? security_capable+0x99/0xc0 [ 754.822908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.828452] ? ns_capable_common+0x13f/0x170 [ 754.832872] ? get_anon_bdev+0x2f0/0x2f0 [ 754.836942] sget+0x10b/0x150 [ 754.840062] ? fuse_get_root_inode+0x190/0x190 [ 754.844649] mount_nodev+0x33/0x110 [ 754.847672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 754.848298] fuse_mount+0x2c/0x40 [ 754.848316] mount_fs+0xae/0x328 [ 754.848336] vfs_kern_mount.part.34+0xd4/0x4d0 [ 754.848357] ? may_umount+0xb0/0xb0 [ 754.871934] ? _raw_read_unlock+0x22/0x30 [ 754.876116] ? __get_fs_type+0x97/0xc0 [ 754.880014] do_mount+0x564/0x3070 [ 754.883559] ? copy_mount_string+0x40/0x40 [ 754.887796] ? rcu_pm_notify+0xc0/0xc0 [ 754.891784] ? copy_mount_options+0x5f/0x380 [ 754.896195] ? rcu_read_lock_sched_held+0x108/0x120 [ 754.901221] ? kmem_cache_alloc_trace+0x616/0x780 [ 754.906079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 754.911624] ? _copy_from_user+0xdf/0x150 [ 754.915805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.921350] ? copy_mount_options+0x285/0x380 [ 754.926502] ksys_mount+0x12d/0x140 [ 754.930138] __x64_sys_mount+0xbe/0x150 [ 754.934111] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 754.939164] do_syscall_64+0x1b1/0x800 [ 754.943057] ? finish_task_switch+0x1ca/0x840 [ 754.947563] ? syscall_return_slowpath+0x5c0/0x5c0 [ 754.952507] ? syscall_return_slowpath+0x30f/0x5c0 [ 754.957449] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 754.962823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.967877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.973075] RIP: 0033:0x455a09 [ 754.976281] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 754.983997] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 754.991265] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4000000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x9effffff, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x1000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x8dd, {0x2}}, 0x20}, 0x1}, 0x0) [ 754.998535] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 755.006384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 755.013740] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 755.063107] gfs2: not a GFS2 filesystem 2033/05/18 03:42:06 executing program 6 (fault-call:3 fault-nth:25): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000080)=0x54) 2033/05/18 03:42:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6c00000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000100000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x200000000000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178ba02b0200", 0x4012}) 2033/05/18 03:42:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365309effffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 755.278163] IPVS: Unknown mcast interface: rose0žÿÿÿ 2033/05/18 03:42:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x1000000, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x200000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 755.332786] IPVS: ftp: loaded support on port[0] = 21 [ 755.344581] IPVS: Unknown mcast interface: rose0žÿÿÿ 2033/05/18 03:42:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 755.400794] FAULT_INJECTION: forcing a failure. [ 755.400794] name failslab, interval 1, probability 0, space 0, times 0 [ 755.412129] CPU: 0 PID: 16058 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 755.419417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.428871] Call Trace: [ 755.431481] dump_stack+0x1b9/0x294 [ 755.435137] ? dump_stack_print_info.cold.2+0x52/0x52 [ 755.440444] ? __save_stack_trace+0x7e/0xd0 [ 755.444800] should_fail.cold.4+0xa/0x1a [ 755.448892] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 755.454020] ? save_stack+0x43/0xd0 [ 755.457664] ? kasan_kmalloc+0xc4/0xe0 [ 755.461657] ? kmem_cache_alloc_trace+0x152/0x780 [ 755.462665] IPVS: Unknown mcast interface: rose0 [ 755.466615] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 755.466630] ? __list_lru_init+0x456/0x790 [ 755.466645] ? sget_userns+0x73a/0xf00 [ 755.466661] ? graph_lock+0x170/0x170 [ 755.466678] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 755.466692] ? do_mount+0x564/0x3070 [ 755.466705] ? ksys_mount+0x12d/0x140 2033/05/18 03:42:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 755.466718] ? __x64_sys_mount+0xbe/0x150 [ 755.466730] ? do_syscall_64+0x1b1/0x800 [ 755.466751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.487970] IPVS: Unknown mcast interface: rose0 [ 755.488747] ? find_held_lock+0x36/0x1c0 [ 755.488771] ? __lock_is_held+0xb5/0x140 [ 755.488805] ? check_same_owner+0x320/0x320 [ 755.488843] ? rcu_note_context_switch+0x710/0x710 [ 755.488866] __should_failslab+0x124/0x180 [ 755.541098] should_failslab+0x9/0x14 [ 755.545025] kmem_cache_alloc_trace+0x2cb/0x780 [ 755.549734] ? __kmalloc_node+0x33/0x70 [ 755.553728] ? __kmalloc_node+0x33/0x70 [ 755.558078] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.564431] __memcg_init_list_lru_node+0x17d/0x2c0 [ 755.569469] ? kvfree_rcu+0x20/0x20 [ 755.573111] ? __kmalloc_node+0x47/0x70 [ 755.577097] __list_lru_init+0x456/0x790 [ 755.581172] ? list_lru_destroy+0x4c0/0x4c0 [ 755.585505] ? mark_held_locks+0xc9/0x160 [ 755.589666] ? __raw_spin_lock_init+0x1c/0x100 [ 755.594261] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 755.599321] ? __lockdep_init_map+0x105/0x590 [ 755.603840] ? lockdep_init_map+0x9/0x10 [ 755.607918] sget_userns+0x73a/0xf00 [ 755.611642] ? get_anon_bdev+0x2f0/0x2f0 [ 755.615725] ? destroy_unused_super.part.11+0x110/0x110 [ 755.621100] ? __alloc_pages_nodemask+0xacf/0xd70 [ 755.625960] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 755.631006] ? kasan_check_read+0x11/0x20 [ 755.635173] ? cap_capable+0x1f9/0x260 [ 755.639083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.644728] ? security_capable+0x99/0xc0 [ 755.648906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.654566] ? ns_capable_common+0x13f/0x170 [ 755.659008] ? get_anon_bdev+0x2f0/0x2f0 [ 755.663088] sget+0x10b/0x150 [ 755.666217] ? fuse_get_root_inode+0x190/0x190 [ 755.670834] mount_nodev+0x33/0x110 [ 755.674482] fuse_mount+0x2c/0x40 [ 755.677955] mount_fs+0xae/0x328 [ 755.681341] vfs_kern_mount.part.34+0xd4/0x4d0 [ 755.686025] ? may_umount+0xb0/0xb0 [ 755.689665] ? _raw_read_unlock+0x22/0x30 [ 755.693829] ? __get_fs_type+0x97/0xc0 [ 755.697833] do_mount+0x564/0x3070 [ 755.701389] ? do_raw_spin_unlock+0x9e/0x2e0 [ 755.705866] ? copy_mount_string+0x40/0x40 [ 755.710134] ? rcu_pm_notify+0xc0/0xc0 [ 755.714042] ? copy_mount_options+0x5f/0x380 [ 755.718459] ? rcu_read_lock_sched_held+0x108/0x120 [ 755.723577] ? kmem_cache_alloc_trace+0x616/0x780 [ 755.728444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.734008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.739555] ? copy_mount_options+0x285/0x380 [ 755.744090] ksys_mount+0x12d/0x140 [ 755.747734] __x64_sys_mount+0xbe/0x150 [ 755.751718] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 755.756752] do_syscall_64+0x1b1/0x800 [ 755.760919] ? finish_task_switch+0x1ca/0x840 [ 755.765426] ? syscall_return_slowpath+0x5c0/0x5c0 [ 755.770384] ? syscall_return_slowpath+0x30f/0x5c0 [ 755.775326] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 755.780879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.785735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.790924] RIP: 0033:0x455a09 [ 755.794113] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xfbffffff, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 755.801851] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 755.809298] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 755.816581] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 755.823880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 755.831325] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 755.875462] IPVS: Unknown mcast interface: rose0 [ 755.893500] gfs2: not a GFS2 filesystem [ 755.918104] IPVS: Unknown mcast interface: rose0 [ 756.023953] IPVS: ftp: loaded support on port[0] = 21 2033/05/18 03:42:07 executing program 6 (fault-call:3 fault-nth:26): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000900", 0x4012}) 2033/05/18 03:42:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x600000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x4, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:07 executing program 7: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ed, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000001, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x7f, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000800, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 756.174337] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4c000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 756.209522] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0xfffffffd, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bb3", 0x4012}) 2033/05/18 03:42:07 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x7c6b, 0xc60c1) mount(&(0x7f0000000840)='./file0/file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='proc\x00', 0x40020, 0x0) [ 756.316558] FAULT_INJECTION: forcing a failure. [ 756.316558] name failslab, interval 1, probability 0, space 0, times 0 [ 756.328271] CPU: 1 PID: 16108 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 756.335556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.344918] Call Trace: [ 756.347526] dump_stack+0x1b9/0x294 [ 756.351173] ? dump_stack_print_info.cold.2+0x52/0x52 [ 756.356379] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 756.361590] should_fail.cold.4+0xa/0x1a [ 756.365749] ? is_bpf_text_address+0xd7/0x170 [ 756.370351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 756.375563] ? unwind_get_return_address+0x61/0xa0 [ 756.380514] ? __save_stack_trace+0x7e/0xd0 [ 756.384933] ? graph_lock+0x170/0x170 [ 756.388832] ? find_held_lock+0x36/0x1c0 [ 756.392900] ? __lock_is_held+0xb5/0x140 [ 756.396974] ? check_same_owner+0x320/0x320 [ 756.401300] ? rcu_note_context_switch+0x710/0x710 [ 756.406238] __should_failslab+0x124/0x180 [ 756.410486] should_failslab+0x9/0x14 [ 756.414297] kmem_cache_alloc_trace+0x2cb/0x780 [ 756.418969] ? __kmalloc_node+0x33/0x70 [ 756.422946] ? __kmalloc_node+0x33/0x70 [ 756.427013] ? rcu_read_lock_sched_held+0x108/0x120 [ 756.432057] __memcg_init_list_lru_node+0x17d/0x2c0 [ 756.437092] ? kvfree_rcu+0x20/0x20 [ 756.440740] ? __kmalloc_node+0x47/0x70 [ 756.444726] __list_lru_init+0x456/0x790 [ 756.448795] ? list_lru_destroy+0x4c0/0x4c0 [ 756.453136] ? mark_held_locks+0xc9/0x160 [ 756.457291] ? __raw_spin_lock_init+0x1c/0x100 [ 756.461879] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 756.466900] ? lockdep_init_map+0x9/0x10 [ 756.470966] sget_userns+0x767/0xf00 [ 756.474680] ? get_anon_bdev+0x2f0/0x2f0 [ 756.478750] ? destroy_unused_super.part.11+0x110/0x110 [ 756.484117] ? __alloc_pages_nodemask+0xacf/0xd70 [ 756.488984] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 756.494010] ? kasan_check_read+0x11/0x20 [ 756.498180] ? cap_capable+0x1f9/0x260 [ 756.502085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.507647] ? security_capable+0x99/0xc0 [ 756.511802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.517342] ? ns_capable_common+0x13f/0x170 [ 756.521753] ? get_anon_bdev+0x2f0/0x2f0 [ 756.525822] sget+0x10b/0x150 [ 756.528947] ? fuse_get_root_inode+0x190/0x190 [ 756.533531] mount_nodev+0x33/0x110 [ 756.537183] fuse_mount+0x2c/0x40 [ 756.540638] mount_fs+0xae/0x328 [ 756.544007] vfs_kern_mount.part.34+0xd4/0x4d0 [ 756.548591] ? may_umount+0xb0/0xb0 [ 756.552233] ? _raw_read_unlock+0x22/0x30 [ 756.556384] ? __get_fs_type+0x97/0xc0 [ 756.560290] do_mount+0x564/0x3070 [ 756.563843] ? copy_mount_string+0x40/0x40 [ 756.568082] ? rcu_pm_notify+0xc0/0xc0 [ 756.571980] ? copy_mount_options+0x5f/0x380 [ 756.576391] ? rcu_read_lock_sched_held+0x108/0x120 [ 756.581409] ? kmem_cache_alloc_trace+0x616/0x780 [ 756.586263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.591804] ? _copy_from_user+0xdf/0x150 [ 756.595957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.601495] ? copy_mount_options+0x285/0x380 [ 756.605995] ksys_mount+0x12d/0x140 [ 756.609626] __x64_sys_mount+0xbe/0x150 [ 756.613602] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 756.618797] do_syscall_64+0x1b1/0x800 [ 756.622700] ? finish_task_switch+0x1ca/0x840 [ 756.627209] ? syscall_return_slowpath+0x5c0/0x5c0 [ 756.632149] ? syscall_return_slowpath+0x30f/0x5c0 [ 756.637085] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 756.642575] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.647474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.652767] RIP: 0033:0x455a09 [ 756.655954] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0xa, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 756.663666] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 756.670938] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 756.678393] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 756.686705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 756.693975] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 756.775542] IPVS: Unknown mcast interface: rose0 [ 756.815801] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:08 executing program 6 (fault-call:3 fault-nth:27): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6800, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x710de96e12]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000180)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000838fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) futex(&(0x7f0000012ffc), 0x0, 0x0, &(0x7f0000000000), &(0x7f00003cfffc), 0x0) [ 756.852358] gfs2: not a GFS2 filesystem 2033/05/18 03:42:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bc3", 0x4012}) 2033/05/18 03:42:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x8, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530ac0c00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 756.925300] IPVS: Unknown mcast interface: rose0¬ 2033/05/18 03:42:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf0ffff, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x17, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 756.973462] IPVS: Unknown mcast interface: rose0¬ [ 757.029142] FAULT_INJECTION: forcing a failure. [ 757.029142] name failslab, interval 1, probability 0, space 0, times 0 [ 757.040628] CPU: 1 PID: 16148 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 757.048018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.057471] Call Trace: [ 757.060083] dump_stack+0x1b9/0x294 [ 757.063736] ? dump_stack_print_info.cold.2+0x52/0x52 [ 757.068943] ? kernel_text_address+0x79/0xf0 [ 757.073355] ? __unwind_start+0x166/0x330 [ 757.077519] should_fail.cold.4+0xa/0x1a [ 757.081620] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 757.086994] ? graph_lock+0x170/0x170 [ 757.090811] ? save_stack+0x43/0xd0 [ 757.094448] ? kasan_kmalloc+0xc4/0xe0 [ 757.098485] ? __kmalloc+0x14e/0x760 [ 757.102211] ? __list_lru_init+0xdd/0x790 [ 757.111198] ? find_held_lock+0x36/0x1c0 [ 757.115281] ? __lock_is_held+0xb5/0x140 [ 757.119361] ? check_same_owner+0x320/0x320 [ 757.123693] ? rcu_note_context_switch+0x710/0x710 [ 757.128813] __should_failslab+0x124/0x180 [ 757.133070] should_failslab+0x9/0x14 [ 757.136883] kmem_cache_alloc_node_trace+0x26f/0x770 [ 757.142001] ? mark_held_locks+0xc9/0x160 [ 757.146253] ? __raw_spin_lock_init+0x1c/0x100 [ 757.150849] __kmalloc_node+0x33/0x70 [ 757.154662] kvmalloc_node+0x6b/0x100 [ 757.158476] __list_lru_init+0x559/0x790 [ 757.162567] ? list_lru_destroy+0x4c0/0x4c0 [ 757.166910] ? mark_held_locks+0xc9/0x160 [ 757.171070] ? __raw_spin_lock_init+0x1c/0x100 [ 757.175660] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 757.180686] ? lockdep_init_map+0x9/0x10 [ 757.184755] sget_userns+0x767/0xf00 [ 757.188479] ? get_anon_bdev+0x2f0/0x2f0 [ 757.192558] ? destroy_unused_super.part.11+0x110/0x110 [ 757.197930] ? __alloc_pages_nodemask+0xacf/0xd70 [ 757.202787] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 757.207811] ? kasan_check_read+0x11/0x20 [ 757.211964] ? cap_capable+0x1f9/0x260 [ 757.215865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.221404] ? security_capable+0x99/0xc0 [ 757.225603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.231144] ? ns_capable_common+0x13f/0x170 [ 757.235567] ? get_anon_bdev+0x2f0/0x2f0 [ 757.239631] sget+0x10b/0x150 [ 757.242743] ? fuse_get_root_inode+0x190/0x190 [ 757.247358] mount_nodev+0x33/0x110 [ 757.251001] fuse_mount+0x2c/0x40 [ 757.254478] mount_fs+0xae/0x328 [ 757.257854] vfs_kern_mount.part.34+0xd4/0x4d0 [ 757.262449] ? may_umount+0xb0/0xb0 [ 757.266105] ? _raw_read_unlock+0x22/0x30 [ 757.270275] ? __get_fs_type+0x97/0xc0 [ 757.274182] do_mount+0x564/0x3070 [ 757.277748] ? do_raw_spin_unlock+0x9e/0x2e0 [ 757.282176] ? copy_mount_string+0x40/0x40 [ 757.286422] ? rcu_pm_notify+0xc0/0xc0 [ 757.290430] ? copy_mount_options+0x5f/0x380 [ 757.294846] ? rcu_read_lock_sched_held+0x108/0x120 [ 757.299869] ? kmem_cache_alloc_trace+0x616/0x780 [ 757.304719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 757.310265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.315813] ? copy_mount_options+0x285/0x380 [ 757.320318] ksys_mount+0x12d/0x140 [ 757.323959] __x64_sys_mount+0xbe/0x150 [ 757.327943] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 757.333004] do_syscall_64+0x1b1/0x800 [ 757.336919] ? finish_task_switch+0x1ca/0x840 [ 757.341442] ? syscall_return_slowpath+0x5c0/0x5c0 [ 757.346380] ? syscall_return_slowpath+0x30f/0x5c0 [ 757.351321] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 757.356697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.361553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.366918] RIP: 0033:0x455a09 [ 757.370368] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000007", 0x4012}) [ 757.378105] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 757.385391] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 757.392764] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 757.400126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 757.407415] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4800, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x3, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 757.505796] IPVS: Unknown mcast interface: rose0 [ 757.527703] IPVS: Unknown mcast interface: rose0 [ 757.606608] gfs2: not a GFS2 filesystem 2033/05/18 03:42:09 executing program 6 (fault-call:3 fault-nth:28): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2b, 0x0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xdd08, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b006c00", 0x4012}) 2033/05/18 03:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)="2f0409004bddd9de91be10eebf000ee9a90f798058439ed554af1f02acc7edbcd7a071fb35331ce39c5a0000000000000000080000000000000000000aaad955a3c93f9d248b46a7c99eb35b406bf918ff01739e56187b2db8f1074424745271062042fb3808186e0a837132f9108c583073a4ca94b3e4e58717fe2b659fa3903c7b73bd66b83f5ecc0a7361257896883f1b43ff4ec0a1e336b92f705461af0b60825a7834ffd0a7339d85c51b8db7b4c0e4f40953dd2d9f2110f04c9fdf8489eaa996", 0xc3, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) fremovexattr(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="6f73782e2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00c79bb646abd771ed01d115f0c167dc44922de3c50a7360da24d0bfc17f4c258714e1638f77bbb970b950b603c52469e8775afe2ba2833ba80488a0f49784d51a12e5f771ebe502d09682988ae70d8db97b08b07b48764e760f4b941816e4a8d814f4c24fb56a50b27ae08cabc24ebb88454545c86891a2988f7e424772286b86b7d1595928670dcce264f954f8b70d30bda6cb289bac1a3d7600015877d5eba7c938"]) [ 757.879352] IPVS: Unknown mcast interface: rose0 [ 757.884364] nla_parse: 9 callbacks suppressed [ 757.884374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 757.944810] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x600, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="3b2ae3ff60dc2fc7e7d459419f8aae335f01f54f7274db94eb80cb788a5c53d2ed7a2c659ccc0e768bba345a7292942083ab2d84bf37fdeabc8da1c4f7137d7db198b4d7e4e4e07c4814e308cc0984b33c3e73e285af0eaedd0d0940e297e315bcb4ad3ad7d538ce4b44ea2a4ee1e18616911cb44b51a86f0621b158ecfeb930c90e27e2fcb7ee8a8d4dc830574653805a15f03152d6e33534fb3f31d9038babf1db1e808c485531a68693be30894861a3f6c0ac2932d4c86252f59bd47238daccaeafe568", 0xc5, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x10) [ 758.029556] FAULT_INJECTION: forcing a failure. [ 758.029556] name failslab, interval 1, probability 0, space 0, times 0 [ 758.040910] CPU: 0 PID: 16189 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 758.048205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.057569] Call Trace: [ 758.060205] dump_stack+0x1b9/0x294 [ 758.063853] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.069067] ? __save_stack_trace+0x7e/0xd0 [ 758.073408] should_fail.cold.4+0xa/0x1a [ 758.077489] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.082617] ? save_stack+0x43/0xd0 [ 758.086251] ? kasan_kmalloc+0xc4/0xe0 [ 758.090144] ? kmem_cache_alloc_trace+0x152/0x780 [ 758.095003] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 758.100197] ? __list_lru_init+0x456/0x790 [ 758.104440] ? sget_userns+0x767/0xf00 [ 758.108335] ? graph_lock+0x170/0x170 [ 758.112326] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 758.117089] ? do_mount+0x564/0x3070 [ 758.120820] ? ksys_mount+0x12d/0x140 [ 758.124633] ? __x64_sys_mount+0xbe/0x150 [ 758.128882] ? do_syscall_64+0x1b1/0x800 [ 758.133054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.138431] ? find_held_lock+0x36/0x1c0 [ 758.142504] ? __lock_is_held+0xb5/0x140 [ 758.146854] ? check_same_owner+0x320/0x320 [ 758.151277] ? rcu_note_context_switch+0x710/0x710 [ 758.156218] __should_failslab+0x124/0x180 [ 758.160471] should_failslab+0x9/0x14 [ 758.164281] kmem_cache_alloc_trace+0x2cb/0x780 [ 758.168980] ? __kmalloc_node+0x33/0x70 [ 758.172969] ? __kmalloc_node+0x33/0x70 2033/05/18 03:42:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 758.177062] ? rcu_read_lock_sched_held+0x108/0x120 [ 758.182118] __memcg_init_list_lru_node+0x17d/0x2c0 [ 758.189448] ? kvfree_rcu+0x20/0x20 [ 758.193096] ? __kmalloc_node+0x47/0x70 [ 758.197092] __list_lru_init+0x456/0x790 [ 758.201174] ? list_lru_destroy+0x4c0/0x4c0 [ 758.205506] ? mark_held_locks+0xc9/0x160 [ 758.209670] ? __raw_spin_lock_init+0x1c/0x100 [ 758.214261] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 758.219290] ? lockdep_init_map+0x9/0x10 [ 758.223363] sget_userns+0x767/0xf00 [ 758.227187] ? get_anon_bdev+0x2f0/0x2f0 [ 758.231345] ? destroy_unused_super.part.11+0x110/0x110 [ 758.237293] ? __alloc_pages_nodemask+0xacf/0xd70 [ 758.242155] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 758.247187] ? kasan_check_read+0x11/0x20 [ 758.251346] ? cap_capable+0x1f9/0x260 [ 758.255544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.261087] ? security_capable+0x99/0xc0 [ 758.265434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.271077] ? ns_capable_common+0x13f/0x170 [ 758.275587] ? get_anon_bdev+0x2f0/0x2f0 [ 758.279685] sget+0x10b/0x150 [ 758.282891] ? fuse_get_root_inode+0x190/0x190 [ 758.287573] mount_nodev+0x33/0x110 [ 758.291220] fuse_mount+0x2c/0x40 [ 758.294705] mount_fs+0xae/0x328 [ 758.298079] vfs_kern_mount.part.34+0xd4/0x4d0 [ 758.302676] ? may_umount+0xb0/0xb0 [ 758.306308] ? _raw_read_unlock+0x22/0x30 [ 758.310551] ? __get_fs_type+0x97/0xc0 [ 758.314583] do_mount+0x564/0x3070 [ 758.318135] ? copy_mount_string+0x40/0x40 [ 758.322374] ? rcu_pm_notify+0xc0/0xc0 [ 758.326275] ? copy_mount_options+0x5f/0x380 [ 758.330689] ? rcu_read_lock_sched_held+0x108/0x120 [ 758.335727] ? kmem_cache_alloc_trace+0x616/0x780 [ 758.340676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.346311] ? _copy_from_user+0xdf/0x150 [ 758.350475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.356024] ? copy_mount_options+0x285/0x380 [ 758.360706] ksys_mount+0x12d/0x140 [ 758.364361] __x64_sys_mount+0xbe/0x150 [ 758.368344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 758.373472] do_syscall_64+0x1b1/0x800 [ 758.377384] ? finish_task_switch+0x1ca/0x840 [ 758.381896] ? syscall_return_slowpath+0x5c0/0x5c0 [ 758.387660] ? syscall_return_slowpath+0x30f/0x5c0 [ 758.392621] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 758.397998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.402856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.408325] RIP: 0033:0x455a09 [ 758.411604] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 758.419409] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 758.426687] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 758.433995] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 758.441273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 758.448654] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 758.465377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:09 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x1000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 758.481877] IPVS: Unknown mcast interface: rose0 [ 758.494228] IPVS: Unknown mcast interface: rose0 [ 758.511272] audit: type=1326 audit(2000000529.664:191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16203 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 [ 758.540993] gfs2: not a GFS2 filesystem [ 758.964610] audit: type=1326 audit(2000000530.117:192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16203 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0x0 2033/05/18 03:42:10 executing program 6 (fault-call:3 fault-nth:29): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 7: r0 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000000)="006cf61aad7bf3794218e0fc4eebc9fc708404b4f02386784543290856047c60434e1c337edb32f652dd", 0x2a) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x80000000004, 0x11, r0, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(pcrypt(ccm(aes))))\x00'}, 0x58) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d}, 0x10) mq_timedsend(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)) 2033/05/18 03:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xfffffffb, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b02ca00", 0x4012}) 2033/05/18 03:42:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xffffff9e, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000cac00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 759.080778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x17, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 759.139008] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x34000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 759.159801] IPVS: Unknown mcast interface: rose0 [ 759.195157] FAULT_INJECTION: forcing a failure. [ 759.195157] name failslab, interval 1, probability 0, space 0, times 0 [ 759.206524] CPU: 0 PID: 16226 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 759.213809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.223176] Call Trace: [ 759.225789] dump_stack+0x1b9/0x294 [ 759.229435] ? dump_stack_print_info.cold.2+0x52/0x52 [ 759.234657] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 759.239871] should_fail.cold.4+0xa/0x1a 2033/05/18 03:42:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x500000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 759.243958] ? is_bpf_text_address+0xd7/0x170 [ 759.248479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 759.253610] ? unwind_get_return_address+0x61/0xa0 [ 759.258560] ? __save_stack_trace+0x7e/0xd0 [ 759.262893] ? graph_lock+0x170/0x170 [ 759.266711] ? find_held_lock+0x36/0x1c0 [ 759.270784] ? __lock_is_held+0xb5/0x140 [ 759.274867] ? check_same_owner+0x320/0x320 [ 759.279204] ? rcu_note_context_switch+0x710/0x710 [ 759.284147] __should_failslab+0x124/0x180 [ 759.288419] should_failslab+0x9/0x14 [ 759.292241] kmem_cache_alloc_trace+0x2cb/0x780 [ 759.296927] ? __kmalloc_node+0x33/0x70 [ 759.300924] ? __kmalloc_node+0x33/0x70 [ 759.304917] ? rcu_read_lock_sched_held+0x108/0x120 [ 759.309952] __memcg_init_list_lru_node+0x17d/0x2c0 [ 759.314986] ? kvfree_rcu+0x20/0x20 [ 759.318639] ? __kmalloc_node+0x47/0x70 [ 759.322634] __list_lru_init+0x456/0x790 [ 759.326712] ? list_lru_destroy+0x4c0/0x4c0 [ 759.331046] ? mark_held_locks+0xc9/0x160 [ 759.335213] ? __raw_spin_lock_init+0x1c/0x100 [ 759.339808] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 759.344846] ? lockdep_init_map+0x9/0x10 [ 759.348928] sget_userns+0x767/0xf00 [ 759.352664] ? get_anon_bdev+0x2f0/0x2f0 [ 759.356781] ? destroy_unused_super.part.11+0x110/0x110 [ 759.362251] ? __alloc_pages_nodemask+0xacf/0xd70 [ 759.367122] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 759.372157] ? kasan_check_read+0x11/0x20 [ 759.376323] ? cap_capable+0x1f9/0x260 [ 759.381187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.386741] ? security_capable+0x99/0xc0 [ 759.390906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.396459] ? ns_capable_common+0x13f/0x170 [ 759.400908] ? get_anon_bdev+0x2f0/0x2f0 [ 759.404978] sget+0x10b/0x150 [ 759.408184] ? fuse_get_root_inode+0x190/0x190 [ 759.412775] mount_nodev+0x33/0x110 [ 759.416410] fuse_mount+0x2c/0x40 [ 759.419875] mount_fs+0xae/0x328 [ 759.423255] vfs_kern_mount.part.34+0xd4/0x4d0 [ 759.427855] ? may_umount+0xb0/0xb0 [ 759.431516] ? _raw_read_unlock+0x22/0x30 [ 759.435676] ? __get_fs_type+0x97/0xc0 [ 759.439580] do_mount+0x564/0x3070 2033/05/18 03:42:10 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={"7465616d30000000000000000200", &(0x7f0000000100)=@ethtool_perm_addr={0x20, 0x6, "e76455424203"}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x3b, @dev={0xac, 0x14, 0x14, 0x15}, 0x4e22, 0x4, 'sed\x00', 0x4, 0x80000000, 0x76}, 0x2c) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) [ 759.443130] ? do_raw_spin_unlock+0x9e/0x2e0 [ 759.447573] ? copy_mount_string+0x40/0x40 [ 759.451824] ? rcu_pm_notify+0xc0/0xc0 [ 759.455730] ? copy_mount_options+0x5f/0x380 [ 759.460151] ? rcu_read_lock_sched_held+0x108/0x120 [ 759.465179] ? kmem_cache_alloc_trace+0x616/0x780 [ 759.470044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.475599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.481145] ? copy_mount_options+0x285/0x380 [ 759.485659] ksys_mount+0x12d/0x140 [ 759.489304] __x64_sys_mount+0xbe/0x150 [ 759.493292] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 759.498325] do_syscall_64+0x1b1/0x800 [ 759.502237] ? finish_task_switch+0x1ca/0x840 [ 759.506761] ? syscall_return_slowpath+0x5c0/0x5c0 [ 759.511700] ? syscall_return_slowpath+0x30f/0x5c0 [ 759.516651] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 759.522025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.526882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.532074] RIP: 0033:0x455a09 [ 759.535261] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0xfffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 759.542972] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 759.550326] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 759.557598] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 759.564896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 759.572172] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bd12b0200", 0x4012}) 2033/05/18 03:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x51fa94183d, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 759.617133] IPVS: Unknown mcast interface: rose0 [ 759.624130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 759.638242] gfs2: not a GFS2 filesystem [ 759.650298] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:10 executing program 6 (fault-call:3 fault-nth:30): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300cac00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b9400", 0x4012}) 2033/05/18 03:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:10 executing program 7: r0 = socket(0x1e, 0x1, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)=0x8) 2033/05/18 03:42:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6c000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 759.803839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:11 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x4008000, 0x0, 0xfffffc55) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) ioprio_get$uid(0x3, r1) sendto$inet(r0, &(0x7f0000000000)="18", 0x1, 0x0, &(0x7f0000000040)={0x2}, 0x10) 2033/05/18 03:42:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 759.854966] IPVS: Unknown mcast interface: rose0 ¬ 2033/05/18 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x20000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 759.904714] IPVS: Unknown mcast interface: rose0 ¬ [ 759.913558] FAULT_INJECTION: forcing a failure. [ 759.913558] name failslab, interval 1, probability 0, space 0, times 0 [ 759.924980] CPU: 0 PID: 16280 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 759.932281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.941652] Call Trace: [ 759.944274] dump_stack+0x1b9/0x294 [ 759.947944] ? dump_stack_print_info.cold.2+0x52/0x52 [ 759.953157] ? __save_stack_trace+0x7e/0xd0 [ 759.957503] should_fail.cold.4+0xa/0x1a [ 759.961581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 759.966786] ? save_stack+0x43/0xd0 [ 759.970425] ? kasan_kmalloc+0xc4/0xe0 [ 759.974373] ? kmem_cache_alloc_trace+0x152/0x780 [ 759.979250] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 759.984470] ? __list_lru_init+0x456/0x790 [ 759.988763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 759.988980] ? sget_userns+0x767/0xf00 [ 760.001522] ? graph_lock+0x170/0x170 2033/05/18 03:42:11 executing program 7: r0 = msgget$private(0x0, 0x7e) msgsnd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="265a000000801995e7ae5ac3e180d743ce5d643996f3f6b9dbff6bb41ece85c452c115b2d1b824e0c51ba1e1995ae150d19f9d6f27fd828e257bc5104fae80dec3cef0440ff0d58b7bb185e533c4d0277adeb1e4b9ccd1b8063330c32127aaa7343a79a8934b77cb1d2692cec63d"], 0x8, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) msgsnd(r0, &(0x7f0000c40ff8)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/119}, 0x7f, 0x3, 0x2800) msgrcv(r0, &(0x7f0000981000), 0x8, 0x0, 0x0) [ 760.005339] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 760.010129] ? do_mount+0x564/0x3070 [ 760.013859] ? ksys_mount+0x12d/0x140 [ 760.017666] ? __x64_sys_mount+0xbe/0x150 [ 760.021827] ? do_syscall_64+0x1b1/0x800 [ 760.025899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.031273] ? find_held_lock+0x36/0x1c0 [ 760.035354] ? __lock_is_held+0xb5/0x140 [ 760.039438] ? check_same_owner+0x320/0x320 [ 760.043863] ? rcu_note_context_switch+0x710/0x710 [ 760.048827] __should_failslab+0x124/0x180 2033/05/18 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf0ffffff, {0x2}}, 0x20}, 0x1}, 0x0) [ 760.053096] should_failslab+0x9/0x14 [ 760.057085] kmem_cache_alloc_trace+0x2cb/0x780 [ 760.061946] ? __kmalloc_node+0x33/0x70 [ 760.065935] ? __kmalloc_node+0x33/0x70 [ 760.069922] ? rcu_read_lock_sched_held+0x108/0x120 [ 760.074954] __memcg_init_list_lru_node+0x17d/0x2c0 [ 760.079983] ? kvfree_rcu+0x20/0x20 [ 760.083645] ? __kmalloc_node+0x47/0x70 [ 760.085402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 760.087629] __list_lru_init+0x456/0x790 [ 760.087648] ? list_lru_destroy+0x4c0/0x4c0 2033/05/18 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 760.087665] ? mark_held_locks+0xc9/0x160 [ 760.087683] ? __raw_spin_lock_init+0x1c/0x100 [ 760.087700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 760.087722] ? lockdep_init_map+0x9/0x10 [ 760.122579] sget_userns+0x767/0xf00 [ 760.126304] ? get_anon_bdev+0x2f0/0x2f0 [ 760.130382] ? destroy_unused_super.part.11+0x110/0x110 [ 760.135932] ? __alloc_pages_nodemask+0xacf/0xd70 [ 760.140784] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 760.145812] ? kasan_check_read+0x11/0x20 [ 760.149975] ? cap_capable+0x1f9/0x260 [ 760.153884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.159446] ? security_capable+0x99/0xc0 [ 760.163618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.166945] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 760.169166] ? ns_capable_common+0x13f/0x170 [ 760.169185] ? get_anon_bdev+0x2f0/0x2f0 [ 760.169200] sget+0x10b/0x150 [ 760.169219] ? fuse_get_root_inode+0x190/0x190 [ 760.169234] mount_nodev+0x33/0x110 [ 760.169248] fuse_mount+0x2c/0x40 [ 760.169266] mount_fs+0xae/0x328 2033/05/18 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xef7f, {0x2}}, 0x20}, 0x1}, 0x0) [ 760.205351] vfs_kern_mount.part.34+0xd4/0x4d0 [ 760.209967] ? may_umount+0xb0/0xb0 [ 760.213603] ? _raw_read_unlock+0x22/0x30 [ 760.217759] ? __get_fs_type+0x97/0xc0 [ 760.221938] do_mount+0x564/0x3070 [ 760.225505] ? do_raw_spin_unlock+0x9e/0x2e0 [ 760.229932] ? copy_mount_string+0x40/0x40 [ 760.234181] ? rcu_pm_notify+0xc0/0xc0 [ 760.238111] ? copy_mount_options+0x5f/0x380 [ 760.242537] ? rcu_read_lock_sched_held+0x108/0x120 [ 760.247571] ? kmem_cache_alloc_trace+0x616/0x780 [ 760.248720] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 760.252535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.252557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.252572] ? copy_mount_options+0x285/0x380 [ 760.252591] ksys_mount+0x12d/0x140 [ 760.252608] __x64_sys_mount+0xbe/0x150 [ 760.252621] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 760.252639] do_syscall_64+0x1b1/0x800 [ 760.294436] ? finish_task_switch+0x1ca/0x840 [ 760.299140] ? syscall_return_slowpath+0x5c0/0x5c0 [ 760.304103] ? syscall_return_slowpath+0x30f/0x5c0 [ 760.309063] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 760.314465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 760.319341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.324634] RIP: 0033:0x455a09 [ 760.327839] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 760.335560] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 760.342861] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 760.350148] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 760.357518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 760.364981] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 760.430914] gfs2: not a GFS2 filesystem 2033/05/18 03:42:12 executing program 6 (fault-call:3 fault-nth:31): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x60, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xfbffffff00000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530c4430300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022be1", 0x4012}) 2033/05/18 03:42:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0xaf01, &(0x7f00001e3000)) r2 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00008ffff8)={0x0, r2}) dup2(r1, r2) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)) [ 760.903207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4c, {0x2}}, 0x20}, 0x1}, 0x0) [ 760.966385] IPVS: Unknown mcast interface: rose0ÄC [ 760.990267] IPVS: Unknown mcast interface: rose0ÄC [ 761.051240] FAULT_INJECTION: forcing a failure. [ 761.051240] name failslab, interval 1, probability 0, space 0, times 0 [ 761.062748] CPU: 0 PID: 16321 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 761.070030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.079395] Call Trace: [ 761.081989] dump_stack+0x1b9/0x294 [ 761.085638] ? dump_stack_print_info.cold.2+0x52/0x52 [ 761.091635] ? __save_stack_trace+0x7e/0xd0 [ 761.095971] should_fail.cold.4+0xa/0x1a [ 761.100044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 761.105172] ? save_stack+0x43/0xd0 [ 761.108823] ? kasan_kmalloc+0xc4/0xe0 [ 761.112713] ? kmem_cache_alloc_trace+0x152/0x780 [ 761.117556] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 761.122748] ? __list_lru_init+0x456/0x790 [ 761.126985] ? sget_userns+0x767/0xf00 [ 761.131025] ? graph_lock+0x170/0x170 [ 761.134950] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 761.139733] ? do_mount+0x564/0x3070 [ 761.143502] ? ksys_mount+0x12d/0x140 [ 761.147408] ? __x64_sys_mount+0xbe/0x150 [ 761.152163] ? do_syscall_64+0x1b1/0x800 [ 761.156272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.161653] ? find_held_lock+0x36/0x1c0 [ 761.165739] ? __lock_is_held+0xb5/0x140 [ 761.170027] ? check_same_owner+0x320/0x320 [ 761.174509] ? rcu_note_context_switch+0x710/0x710 [ 761.180072] __should_failslab+0x124/0x180 [ 761.185371] should_failslab+0x9/0x14 [ 761.190345] kmem_cache_alloc_trace+0x2cb/0x780 [ 761.195494] ? __kmalloc_node+0x33/0x70 [ 761.199789] ? __kmalloc_node+0x33/0x70 [ 761.204270] ? rcu_read_lock_sched_held+0x108/0x120 [ 761.210732] __memcg_init_list_lru_node+0x17d/0x2c0 [ 761.216227] ? kvfree_rcu+0x20/0x20 [ 761.220331] ? __kmalloc_node+0x47/0x70 [ 761.224319] __list_lru_init+0x456/0x790 [ 761.228397] ? list_lru_destroy+0x4c0/0x4c0 [ 761.232986] ? mark_held_locks+0xc9/0x160 [ 761.237142] ? __raw_spin_lock_init+0x1c/0x100 [ 761.241810] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 761.247408] ? lockdep_init_map+0x9/0x10 [ 761.251492] sget_userns+0x767/0xf00 [ 761.255227] ? get_anon_bdev+0x2f0/0x2f0 [ 761.259307] ? destroy_unused_super.part.11+0x110/0x110 [ 761.264699] ? __alloc_pages_nodemask+0xacf/0xd70 [ 761.269603] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 761.274719] ? kasan_check_read+0x11/0x20 [ 761.278877] ? cap_capable+0x1f9/0x260 [ 761.282777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.288324] ? security_capable+0x99/0xc0 [ 761.292483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.298026] ? ns_capable_common+0x13f/0x170 [ 761.302446] ? get_anon_bdev+0x2f0/0x2f0 [ 761.306509] sget+0x10b/0x150 [ 761.309625] ? fuse_get_root_inode+0x190/0x190 [ 761.314311] mount_nodev+0x33/0x110 [ 761.317996] fuse_mount+0x2c/0x40 [ 761.321463] mount_fs+0xae/0x328 [ 761.324843] vfs_kern_mount.part.34+0xd4/0x4d0 [ 761.329521] ? may_umount+0xb0/0xb0 [ 761.333158] ? _raw_read_unlock+0x22/0x30 [ 761.337317] ? __get_fs_type+0x97/0xc0 [ 761.341230] do_mount+0x564/0x3070 [ 761.344794] ? copy_mount_string+0x40/0x40 [ 761.349046] ? rcu_pm_notify+0xc0/0xc0 [ 761.352965] ? copy_mount_options+0x5f/0x380 [ 761.357378] ? rcu_read_lock_sched_held+0x108/0x120 [ 761.363101] ? kmem_cache_alloc_trace+0x616/0x780 [ 761.367955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.373499] ? _copy_from_user+0xdf/0x150 [ 761.377663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.383220] ? copy_mount_options+0x285/0x380 [ 761.387728] ksys_mount+0x12d/0x140 [ 761.391360] __x64_sys_mount+0xbe/0x150 [ 761.395342] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 761.400374] do_syscall_64+0x1b1/0x800 [ 761.404268] ? finish_task_switch+0x1ca/0x840 [ 761.408777] ? syscall_return_slowpath+0x5c0/0x5c0 [ 761.413727] ? syscall_return_slowpath+0x30f/0x5c0 [ 761.418669] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 761.424038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 761.429004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.434193] RIP: 0033:0x455a09 [ 761.437481] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 761.445280] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:12 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x76) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl(r2, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") ioctl$TCSETSW(r1, 0x5403, &(0x7f0000002000)) 2033/05/18 03:42:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bee", 0x4012}) [ 761.452641] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 761.460031] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 761.467404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 761.474676] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xffffffff00000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 761.544130] gfs2: not a GFS2 filesystem [ 761.613566] IPVS: Unknown mcast interface: rose0 [ 761.659735] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:12 executing program 6 (fault-call:3 fault-nth:32): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530fffffffffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bec", 0x4012}) 2033/05/18 03:42:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7a00000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) finit_module(r0, &(0x7f0000000000)='@\x00', 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x400, 0x1) r2 = getpgid(0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000001c0)={[], 0x2, 0x8, 0x7, 0x7ff, 0x10001, r2}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000040)={0x0, 0xfffffffffffffffe}) dup2(r0, r0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000400), &(0x7f0000000500)=0x4) 2033/05/18 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4c00, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) [ 761.779417] IPVS: Unknown mcast interface: rose0ÿÿÿÿÿÿð [ 761.817223] IPVS: Unknown mcast interface: rose0ÿÿÿÿÿÿð [ 761.866376] FAULT_INJECTION: forcing a failure. [ 761.866376] name failslab, interval 1, probability 0, space 0, times 0 [ 761.877870] CPU: 0 PID: 16368 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 761.885156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.894518] Call Trace: [ 761.897126] dump_stack+0x1b9/0x294 [ 761.900772] ? dump_stack_print_info.cold.2+0x52/0x52 [ 761.905981] ? __save_stack_trace+0x7e/0xd0 [ 761.910330] should_fail.cold.4+0xa/0x1a [ 761.914416] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 761.919542] ? save_stack+0x43/0xd0 [ 761.923199] ? kasan_kmalloc+0xc4/0xe0 [ 761.927105] ? kmem_cache_alloc_trace+0x152/0x780 [ 761.932078] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 761.937278] ? __list_lru_init+0x456/0x790 [ 761.941523] ? sget_userns+0x767/0xf00 [ 761.945420] ? graph_lock+0x170/0x170 [ 761.949226] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 761.954086] ? do_mount+0x564/0x3070 [ 761.957809] ? ksys_mount+0x12d/0x140 [ 761.961611] ? __x64_sys_mount+0xbe/0x150 [ 761.965761] ? do_syscall_64+0x1b1/0x800 [ 761.969827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.975457] ? find_held_lock+0x36/0x1c0 [ 761.979525] ? __lock_is_held+0xb5/0x140 [ 761.983609] ? check_same_owner+0x320/0x320 [ 761.988023] ? rcu_note_context_switch+0x710/0x710 [ 761.992959] __should_failslab+0x124/0x180 [ 761.997463] should_failslab+0x9/0x14 [ 762.001282] kmem_cache_alloc_trace+0x2cb/0x780 [ 762.005958] ? __kmalloc_node+0x33/0x70 [ 762.009960] ? __kmalloc_node+0x33/0x70 [ 762.013944] ? rcu_read_lock_sched_held+0x108/0x120 [ 762.018972] __memcg_init_list_lru_node+0x17d/0x2c0 [ 762.024696] ? kvfree_rcu+0x20/0x20 [ 762.029199] ? __kmalloc_node+0x47/0x70 [ 762.033186] __list_lru_init+0x456/0x790 [ 762.037290] ? list_lru_destroy+0x4c0/0x4c0 [ 762.041635] ? mark_held_locks+0xc9/0x160 [ 762.045810] ? __raw_spin_lock_init+0x1c/0x100 [ 762.050401] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 762.055425] ? lockdep_init_map+0x9/0x10 [ 762.059495] sget_userns+0x767/0xf00 [ 762.063212] ? get_anon_bdev+0x2f0/0x2f0 [ 762.067374] ? destroy_unused_super.part.11+0x110/0x110 [ 762.072762] ? __alloc_pages_nodemask+0xacf/0xd70 [ 762.077616] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 762.082659] ? kasan_check_read+0x11/0x20 [ 762.086837] ? cap_capable+0x1f9/0x260 [ 762.090735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.096317] ? security_capable+0x99/0xc0 [ 762.100475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.106033] ? ns_capable_common+0x13f/0x170 [ 762.110453] ? get_anon_bdev+0x2f0/0x2f0 [ 762.114522] sget+0x10b/0x150 [ 762.117634] ? fuse_get_root_inode+0x190/0x190 [ 762.122218] mount_nodev+0x33/0x110 [ 762.125937] fuse_mount+0x2c/0x40 [ 762.129397] mount_fs+0xae/0x328 [ 762.132771] vfs_kern_mount.part.34+0xd4/0x4d0 [ 762.137635] ? may_umount+0xb0/0xb0 [ 762.141294] ? _raw_read_unlock+0x22/0x30 [ 762.145458] ? __get_fs_type+0x97/0xc0 [ 762.149358] do_mount+0x564/0x3070 [ 762.152903] ? copy_mount_string+0x40/0x40 [ 762.157140] ? rcu_pm_notify+0xc0/0xc0 [ 762.161038] ? copy_mount_options+0x5f/0x380 [ 762.165450] ? rcu_read_lock_sched_held+0x108/0x120 [ 762.170474] ? kmem_cache_alloc_trace+0x616/0x780 [ 762.175337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.180976] ? copy_mount_options+0x285/0x380 [ 762.185478] ksys_mount+0x12d/0x140 [ 762.189122] __x64_sys_mount+0xbe/0x150 [ 762.193104] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 762.198131] do_syscall_64+0x1b1/0x800 [ 762.202140] ? syscall_return_slowpath+0x5c0/0x5c0 [ 762.207631] ? syscall_return_slowpath+0x30f/0x5c0 [ 762.212920] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 762.218314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.223259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.228456] RIP: 0033:0x455a09 [ 762.231646] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.239372] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 762.246643] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 762.254003] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 762.261289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2033/05/18 03:42:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) close(r1) 2033/05/18 03:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x18, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022ba3", 0x4012}) [ 762.268561] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 762.337879] IPVS: length: 4096 != 8 [ 762.371280] IPVS: length: 4096 != 8 [ 762.444865] gfs2: not a GFS2 filesystem 2033/05/18 03:42:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000000000000006c", 0x4012}) 2033/05/18 03:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000000000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6c00, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000fffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/audio\x00', 0x14000, 0x0) pipe2(&(0x7f0000000640), 0x84800) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x442, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000700)=0x295) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) getpeername$inet6(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000200)={'bcsh0\x00', 0xcd}) r5 = syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x0, r2, r3, 0x8, 0x880000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0xd7, @mcast1={0xff, 0x1, [], 0x1}, 0x400}}, [0x7, 0x6c6c, 0x4, 0x7, 0xfffffffffffffff7, 0x1, 0x3, 0x171, 0x5, 0x1, 0x7fff, 0x6264, 0x80000000, 0x8, 0x7ff]}, &(0x7f0000000340)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000080)={r6, 0x7}, 0x8) poll(&(0x7f0000000140), 0xa6, 0x1) 2033/05/18 03:42:13 executing program 6 (fault-call:3 fault-nth:33): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf00, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 7: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)=0x1) r1 = socket$inet6(0x10, 0x1, 0x80003cf) sendmsg(r1, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0xb1, &(0x7f0000000080)=[{&(0x7f0000001300)="5500000018007fafb7a41cb22da280000206000000a843096c37236939000900210003004b00ca8a9848a3090000006b7b31afdc1375a4ff671138d5053c3403992fc05c5afb83de4411006827c43ab8220000bf0c", 0x55}], 0x1, &(0x7f0000002040)}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x10001, 0x80000) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) [ 762.555401] IPVS: Unknown mcast interface: rose0 [ 762.575490] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xfbffffff, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1300, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 762.659935] FAULT_INJECTION: forcing a failure. [ 762.659935] name failslab, interval 1, probability 0, space 0, times 0 [ 762.671312] CPU: 0 PID: 16413 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 762.678590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.687950] Call Trace: [ 762.690554] dump_stack+0x1b9/0x294 [ 762.694263] ? dump_stack_print_info.cold.2+0x52/0x52 [ 762.699478] ? __save_stack_trace+0x7e/0xd0 [ 762.703825] should_fail.cold.4+0xa/0x1a [ 762.707905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 762.713037] ? save_stack+0x43/0xd0 [ 762.716455] IPVS: Unknown mcast interface: rose0 [ 762.716675] ? kasan_kmalloc+0xc4/0xe0 [ 762.716694] ? kmem_cache_alloc_trace+0x152/0x780 [ 762.730171] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 762.735383] ? __list_lru_init+0x456/0x790 [ 762.737911] IPVS: Unknown mcast interface: rose0 [ 762.739671] ? sget_userns+0x767/0xf00 [ 762.739691] ? graph_lock+0x170/0x170 [ 762.739706] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 762.739718] ? do_mount+0x564/0x3070 [ 762.739734] ? ksys_mount+0x12d/0x140 [ 762.764503] ? __x64_sys_mount+0xbe/0x150 [ 762.768753] ? do_syscall_64+0x1b1/0x800 [ 762.772829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.778228] ? find_held_lock+0x36/0x1c0 [ 762.782310] ? __lock_is_held+0xb5/0x140 [ 762.786512] ? check_same_owner+0x320/0x320 [ 762.790852] ? rcu_note_context_switch+0x710/0x710 [ 762.795794] __should_failslab+0x124/0x180 [ 762.800492] should_failslab+0x9/0x14 [ 762.804314] kmem_cache_alloc_trace+0x2cb/0x780 [ 762.808990] ? __kmalloc_node+0x33/0x70 [ 762.812973] ? __kmalloc_node+0x33/0x70 [ 762.816959] ? rcu_read_lock_sched_held+0x108/0x120 [ 762.821995] __memcg_init_list_lru_node+0x17d/0x2c0 [ 762.827020] ? kvfree_rcu+0x20/0x20 [ 762.830776] ? __kmalloc_node+0x47/0x70 [ 762.834760] __list_lru_init+0x456/0x790 [ 762.838752] IPVS: Unknown mcast interface: rose0­ [ 762.838830] ? list_lru_destroy+0x4c0/0x4c0 [ 762.848063] ? mark_held_locks+0xc9/0x160 [ 762.852234] ? __raw_spin_lock_init+0x1c/0x100 [ 762.856826] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 762.858881] IPVS: Unknown mcast interface: rose0­ [ 762.861852] ? lockdep_init_map+0x9/0x10 [ 762.861872] sget_userns+0x767/0xf00 [ 762.861885] ? get_anon_bdev+0x2f0/0x2f0 [ 762.861907] ? destroy_unused_super.part.11+0x110/0x110 [ 762.861927] ? __alloc_pages_nodemask+0xacf/0xd70 [ 762.888841] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 762.893868] ? kasan_check_read+0x11/0x20 [ 762.898029] ? cap_capable+0x1f9/0x260 [ 762.901932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.907483] ? security_capable+0x99/0xc0 [ 762.911765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.917317] ? ns_capable_common+0x13f/0x170 [ 762.921748] ? get_anon_bdev+0x2f0/0x2f0 [ 762.925820] sget+0x10b/0x150 [ 762.928941] ? fuse_get_root_inode+0x190/0x190 [ 762.933533] mount_nodev+0x33/0x110 [ 762.937172] fuse_mount+0x2c/0x40 [ 762.940635] mount_fs+0xae/0x328 [ 762.944012] vfs_kern_mount.part.34+0xd4/0x4d0 [ 762.948778] ? may_umount+0xb0/0xb0 [ 762.952407] ? _raw_read_unlock+0x22/0x30 [ 762.956558] ? __get_fs_type+0x97/0xc0 [ 762.960449] do_mount+0x564/0x3070 [ 762.964008] ? copy_mount_string+0x40/0x40 [ 762.968245] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 762.973274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 762.978035] ? retint_kernel+0x10/0x10 [ 762.981947] ? copy_mount_options+0x1f0/0x380 [ 762.986442] ? copy_mount_options+0x1f6/0x380 [ 762.990942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.996482] ? copy_mount_options+0x285/0x380 [ 763.001008] ksys_mount+0x12d/0x140 [ 763.004728] __x64_sys_mount+0xbe/0x150 [ 763.008706] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 763.013728] do_syscall_64+0x1b1/0x800 [ 763.017617] ? finish_task_switch+0x1ca/0x840 [ 763.022116] ? syscall_return_slowpath+0x5c0/0x5c0 [ 763.027069] ? syscall_return_slowpath+0x30f/0x5c0 [ 763.032007] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 763.037374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.042224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.047410] RIP: 0033:0x455a09 [ 763.050593] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000100"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x300, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x2, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530ad0c00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 763.058303] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 763.065574] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 763.072840] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 763.080108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 763.087392] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:14 executing program 6 (fault-call:3 fault-nth:34): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x3, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b1200", 0x4012}) 2033/05/18 03:42:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x34000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:14 executing program 7: r0 = socket$inet(0x2, 0xa, 0xfff) accept4$inet(r0, 0x0, &(0x7f00000000c0), 0x80000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) ioctl(r1, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r2 = socket$inet(0x10, 0x3, 0xc) r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8, 0x300) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000140)={0x3ff, 0x800, 0xffffffffffff73d9, 0x8, 0x4, 0x6}, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020907031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 763.160645] gfs2: not a GFS2 filesystem [ 763.205960] nla_parse: 9 callbacks suppressed [ 763.205969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 763.259259] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. [ 763.268721] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xef7f000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x3d1894fa51000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x10000e0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 763.299769] IPVS: Unknown mcast interface: rose0 [ 763.314868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. 2033/05/18 03:42:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001120070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) [ 763.343955] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 763.403443] FAULT_INJECTION: forcing a failure. [ 763.403443] name failslab, interval 1, probability 0, space 0, times 0 [ 763.414781] CPU: 0 PID: 16453 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 763.422062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.431419] Call Trace: [ 763.434020] dump_stack+0x1b9/0x294 [ 763.437655] ? dump_stack_print_info.cold.2+0x52/0x52 [ 763.442855] ? __save_stack_trace+0x7e/0xd0 [ 763.447197] should_fail.cold.4+0xa/0x1a [ 763.451274] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 763.456387] ? save_stack+0x43/0xd0 [ 763.460020] ? kasan_kmalloc+0xc4/0xe0 [ 763.463911] ? kmem_cache_alloc_trace+0x152/0x780 [ 763.468773] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 763.473966] ? __list_lru_init+0x456/0x790 [ 763.478213] ? sget_userns+0x767/0xf00 [ 763.482106] ? graph_lock+0x170/0x170 [ 763.485914] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 763.490675] ? do_mount+0x564/0x3070 [ 763.494389] ? ksys_mount+0x12d/0x140 [ 763.498201] ? __x64_sys_mount+0xbe/0x150 [ 763.502351] ? do_syscall_64+0x1b1/0x800 [ 763.506420] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.511791] ? find_held_lock+0x36/0x1c0 [ 763.515860] ? __lock_is_held+0xb5/0x140 [ 763.519935] ? check_same_owner+0x320/0x320 [ 763.524443] ? rcu_note_context_switch+0x710/0x710 [ 763.529389] __should_failslab+0x124/0x180 [ 763.533636] should_failslab+0x9/0x14 [ 763.537439] kmem_cache_alloc_trace+0x2cb/0x780 [ 763.542110] ? __kmalloc_node+0x33/0x70 [ 763.546109] ? __kmalloc_node+0x33/0x70 [ 763.550147] ? rcu_read_lock_sched_held+0x108/0x120 [ 763.555521] __memcg_init_list_lru_node+0x17d/0x2c0 [ 763.560564] ? kvfree_rcu+0x20/0x20 [ 763.564200] ? __kmalloc_node+0x47/0x70 [ 763.568188] __list_lru_init+0x456/0x790 [ 763.572262] ? list_lru_destroy+0x4c0/0x4c0 [ 763.576682] ? mark_held_locks+0xc9/0x160 [ 763.580849] ? __raw_spin_lock_init+0x1c/0x100 [ 763.585437] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 763.590479] ? lockdep_init_map+0x9/0x10 [ 763.594548] sget_userns+0x767/0xf00 [ 763.598264] ? get_anon_bdev+0x2f0/0x2f0 [ 763.602352] ? destroy_unused_super.part.11+0x110/0x110 [ 763.607731] ? __alloc_pages_nodemask+0xacf/0xd70 [ 763.612577] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 763.617600] ? kasan_check_read+0x11/0x20 [ 763.621752] ? cap_capable+0x1f9/0x260 [ 763.625653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.631197] ? security_capable+0x99/0xc0 [ 763.635352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.640905] ? ns_capable_common+0x13f/0x170 [ 763.645316] ? get_anon_bdev+0x2f0/0x2f0 [ 763.649378] sget+0x10b/0x150 [ 763.652506] ? fuse_get_root_inode+0x190/0x190 [ 763.657088] mount_nodev+0x33/0x110 [ 763.660754] fuse_mount+0x2c/0x40 [ 763.664217] mount_fs+0xae/0x328 [ 763.667596] vfs_kern_mount.part.34+0xd4/0x4d0 [ 763.672182] ? may_umount+0xb0/0xb0 [ 763.675819] ? _raw_read_unlock+0x22/0x30 [ 763.679975] ? __get_fs_type+0x97/0xc0 [ 763.683885] do_mount+0x564/0x3070 [ 763.687436] ? copy_mount_string+0x40/0x40 [ 763.691673] ? rcu_pm_notify+0xc0/0xc0 [ 763.695571] ? copy_mount_options+0x5f/0x380 [ 763.699982] ? rcu_read_lock_sched_held+0x108/0x120 [ 763.705005] ? kmem_cache_alloc_trace+0x616/0x780 [ 763.709859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.715408] ? _copy_from_user+0xdf/0x150 [ 763.719571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.725147] ? copy_mount_options+0x285/0x380 [ 763.729665] ksys_mount+0x12d/0x140 [ 763.733299] __x64_sys_mount+0xbe/0x150 [ 763.737289] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 763.742312] do_syscall_64+0x1b1/0x800 [ 763.746207] ? finish_task_switch+0x1ca/0x840 [ 763.750722] ? syscall_return_slowpath+0x5c0/0x5c0 [ 763.755655] ? syscall_return_slowpath+0x30f/0x5c0 [ 763.760610] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 763.766068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.770935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.776128] RIP: 0033:0x455a09 [ 763.779314] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 763.787026] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 763.794298] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x20000008912, &(0x7f00000000c0)="0057fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2e, 0x119, 0x0, 0x0, {0x2}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary='\n'}]}]}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bae", 0x4012}) [ 763.801567] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 763.808834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 763.816105] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 763.866785] IPVS: Unknown mcast interface: rose0 [ 763.882768] openvswitch: netlink: Message has 4 unknown bytes. [ 763.909632] gfs2: not a GFS2 filesystem [ 763.915127] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:15 executing program 6 (fault-call:3 fault-nth:35): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xffffff7f00000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x126ee90d71000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:15 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000081002800000d010000600700000043dc403e696779703bca1be5754c325917e1154168a9ce4f693b23e2526e64c765eff12d0006d553add3a39b703647f93cf431d1f98d493c9e67664a98b6cc5f82bc5d04186c3d7d3b7683f6986e039b1863834538eb0754b1d1a28b9f24f1f4efea3bafbffaa867ba90012ae2e47fdcb7d2b2cc085575dd2c2d41d816e06d3e8b46b22b6d135a2dfbbfeff2"], &(0x7f0000000000)={0x1, 0x2, [0x199, 0x1cd, 0x6d5, 0x864]}) 2033/05/18 03:42:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xe000000100000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022be9", 0x4012}) [ 764.013507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 764.056262] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) r1 = dup2(r0, r0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="8842932c6fc1fd68cb2fb42f5b50bf315347686013b626b9ebe3df9739d802ff") getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2033/05/18 03:42:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x74, {0x2}}, 0x20}, 0x1}, 0x0) [ 764.093289] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x40030000000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bdf", 0x4012}) [ 764.167364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x68, {0x2}}, 0x20}, 0x1}, 0x0) [ 764.263134] IPVS: Unknown mcast interface: rose0 [ 764.321351] IPVS: Unknown mcast interface: rose0 [ 764.329255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 764.329332] FAULT_INJECTION: forcing a failure. [ 764.329332] name failslab, interval 1, probability 0, space 0, times 0 [ 764.349078] CPU: 1 PID: 16509 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 764.356358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.365720] Call Trace: [ 764.368326] dump_stack+0x1b9/0x294 [ 764.371977] ? dump_stack_print_info.cold.2+0x52/0x52 [ 764.377183] ? __save_stack_trace+0x7e/0xd0 [ 764.381610] should_fail.cold.4+0xa/0x1a [ 764.385685] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 764.390800] ? save_stack+0x43/0xd0 [ 764.394428] ? kasan_kmalloc+0xc4/0xe0 [ 764.398321] ? kmem_cache_alloc_trace+0x152/0x780 [ 764.403261] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 764.408463] ? __list_lru_init+0x456/0x790 [ 764.412724] ? sget_userns+0x767/0xf00 [ 764.416621] ? graph_lock+0x170/0x170 [ 764.420425] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 764.425273] ? do_mount+0x564/0x3070 [ 764.428994] ? ksys_mount+0x12d/0x140 [ 764.432891] ? __x64_sys_mount+0xbe/0x150 [ 764.437046] ? do_syscall_64+0x1b1/0x800 [ 764.441199] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.446579] ? find_held_lock+0x36/0x1c0 [ 764.450770] ? __lock_is_held+0xb5/0x140 [ 764.454859] ? check_same_owner+0x320/0x320 [ 764.459218] ? rcu_note_context_switch+0x710/0x710 [ 764.464246] __should_failslab+0x124/0x180 [ 764.468581] should_failslab+0x9/0x14 [ 764.472387] kmem_cache_alloc_trace+0x2cb/0x780 [ 764.477058] ? __kmalloc_node+0x33/0x70 [ 764.481119] ? __kmalloc_node+0x33/0x70 [ 764.485100] ? rcu_read_lock_sched_held+0x108/0x120 [ 764.490126] __memcg_init_list_lru_node+0x17d/0x2c0 [ 764.495148] ? kvfree_rcu+0x20/0x20 [ 764.498780] ? __kmalloc_node+0x47/0x70 [ 764.502763] __list_lru_init+0x456/0x790 [ 764.506831] ? list_lru_destroy+0x4c0/0x4c0 [ 764.511164] ? mark_held_locks+0xc9/0x160 [ 764.515319] ? __raw_spin_lock_init+0x1c/0x100 [ 764.519911] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 764.524947] ? lockdep_init_map+0x9/0x10 [ 764.529012] sget_userns+0x767/0xf00 [ 764.532745] ? get_anon_bdev+0x2f0/0x2f0 [ 764.536825] ? destroy_unused_super.part.11+0x110/0x110 [ 764.542212] ? __alloc_pages_nodemask+0xacf/0xd70 [ 764.547064] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 764.552088] ? kasan_check_read+0x11/0x20 [ 764.556252] ? cap_capable+0x1f9/0x260 [ 764.560155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.565713] ? security_capable+0x99/0xc0 [ 764.569871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.575418] ? ns_capable_common+0x13f/0x170 [ 764.579834] ? get_anon_bdev+0x2f0/0x2f0 [ 764.583917] sget+0x10b/0x150 [ 764.587027] ? fuse_get_root_inode+0x190/0x190 [ 764.591611] mount_nodev+0x33/0x110 [ 764.595244] fuse_mount+0x2c/0x40 [ 764.598705] mount_fs+0xae/0x328 [ 764.602087] vfs_kern_mount.part.34+0xd4/0x4d0 [ 764.606675] ? may_umount+0xb0/0xb0 [ 764.610330] ? _raw_read_unlock+0x22/0x30 [ 764.614482] ? __get_fs_type+0x97/0xc0 [ 764.618638] do_mount+0x564/0x3070 [ 764.622287] ? do_raw_spin_unlock+0x9e/0x2e0 [ 764.626707] ? copy_mount_string+0x40/0x40 [ 764.631299] ? rcu_pm_notify+0xc0/0xc0 [ 764.635197] ? copy_mount_options+0x5f/0x380 [ 764.639610] ? rcu_read_lock_sched_held+0x108/0x120 [ 764.644634] ? kmem_cache_alloc_trace+0x616/0x780 [ 764.649489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.655040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.660602] ? copy_mount_options+0x285/0x380 [ 764.665110] ksys_mount+0x12d/0x140 [ 764.668743] __x64_sys_mount+0xbe/0x150 [ 764.672824] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 764.677858] do_syscall_64+0x1b1/0x800 [ 764.681750] ? finish_task_switch+0x1ca/0x840 [ 764.686343] ? syscall_return_slowpath+0x5c0/0x5c0 [ 764.691890] ? syscall_return_slowpath+0x30f/0x5c0 [ 764.696827] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 764.702199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.707050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.712420] RIP: 0033:0x455a09 [ 764.715620] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.723346] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 764.730736] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 764.738018] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 764.745301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 764.752592] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 764.795759] gfs2: not a GFS2 filesystem 2033/05/18 03:42:16 executing program 6 (fault-call:3 fault-nth:36): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x10000e0, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") fremovexattr(r0, &(0x7f0000002640)=@random={'user.', '\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000002700)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002740)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002840)=0xffffffffffffffa2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002880)={0x0, 0x0, 0x0}, &(0x7f00000028c0)=0xc) sendmsg$netlink(r1, &(0x7f0000002940)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f00000026c0)=[{&(0x7f0000000240)={0x110, 0x22, 0x1, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x100, 0x1d, [@generic="9ce0468aab4349ea78517c1d680ee15efb98a9445f9e56f6acd7e798849cbcf5dde1378172f0e130de01fa0feee456fdfe33ee21ad2221afb65576563a3a64960d2f56be584029626bacb0ee8a23d3c0c79697763e72d2552d6b727e45950cf86027b3c61928e464f2ee451664becd81aa26346dbaa8425ddcc30053eb4326411723ad999d41adf106ad1f2128cd2e1466f80f32f2c513e5a29afec5e733225dcd99b44edeabcd9415784540081f652985d1bf9d889e43281dffda0ce765", @typed={0x4, 0x63}, @typed={0x8, 0x5d, @uid=r2}, @generic="c1027e3a7145508a3688456b8747e8f9c69934684fa0d6e1266df98a3a7a7a8b2d81ff56a91e29b9fa8a298f59dc7fc6"]}]}, 0x110}, {&(0x7f0000000380)={0x22bc, 0x28, 0x422, 0x70bd2d, 0x25dfdbfe, "", [@typed={0x3c, 0x5e, @binary="1be9165280b0e2bf93d8a1cae1a5e5231ddafc87678319ed8d68f12da72fdd1f0b7574de4f25d5a7fbe642aa9e1af51b66196581992c"}, @generic="f966a13b86b5f2ea311fdc780fae07c7d0b87273713a8f5a317e2f6f4124a218c13c32af7e5c93772ab01a3a546ba05186571451bd84f0fe9ea575fcd008476beb03e4053ca4726991f3b9064a2c1ce4fd46fa275b87d72d7ad92b3874252a0cba64c58c6a4a6e235eb74e667b6a23bff5bf8ef676fee62a0748933796", @typed={0x14, 0x6b, @ipv6=@ipv4={[], [0xff, 0xff]}}, @nested={0x1028, 0xf, [@generic="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", @generic="c2da1a74097a5682a814c715fe1f69057cb0256ea9b176290691d62169c13d9db47a6ad8"]}, @generic="d0b47ca4779c342f332a7d2e29f27a61d46ba72d437e979015c7036dfd1348509ec42c8206bafff20182f2bd531513891f958e", @nested={0x114, 0x18, [@typed={0x8, 0x82, @ipv4=@loopback=0x7f000001}, @generic="ba92d7b9cc4da2365e5012c6f7f47052be3682f9ac1c6093ab14aecac719ac24cc37642e32c122028c617a1b751527147d00cbb5de36edc5f25f62358bd8250158a06af6ace58432f071692ad453e860a27e93fbba86dac4e2b1f3bddc0c64e9f829f757af64beb493d991cc6bf90b63d9175b7be63a4c55ae9f8a9946e8b043515c9237913c69f30e25c1be2ca55377fa53393b4e0ef75e94bb091b3424cf4d9e2ae83cded151b1c44c23a9b5a97c8ecb4a1ee412b20b2672", @typed={0x8, 0x7, @u32=0x5}, @typed={0x40, 0x41, @binary="dd43c163dfb04c369078f16311e7530ec29a28f041de32c2f59e1bfd1c9bb3999cd40f1fde9d068849b10603db2e63b83657f5ee319e112b57"}, @typed={0x4, 0x8a}]}, @generic="bb720774dcc4e0338166aec7864f742bd38db1f13b1669d431104fbc563588913c1ae8c5c60e3b1abe6a05461b40984388b999f762814a34ef59d60f81da692f4cbac341c3d645db6993017952b7aab43097e3d195972ae29dd702fc942e5469577e6c2c7896e8f84bcd", @typed={0x4, 0x28}, @generic="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"]}, 0x22bc}, {&(0x7f0000002980)=ANY=[@ANYBLOB="5c0000003a0021042bbd7000fcdbdf2508008e00", @ANYRES32=r0, @ANYBLOB="22cb56b660176349f27621e8dd31a6c34657b180c6a9c263d99b0000000000009064a524df2d5812904a4adb9300ef467f088106dd4a5ba1cbffb37d4d445b2c0023000084e427fe541f"], 0x5c}], 0x3, &(0x7f0000002900)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20, 0x4004010}, 0x40000) ioctl$TCSETSF(r1, 0xc0045401, &(0x7f0000000040)) 2033/05/18 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfffffff0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001020070020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bac", 0x4012}) [ 764.946663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 764.974517] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 765.004217] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4c00000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 7: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000200)="951660b9101ad0bff9c4370339bb337db64e8138297a0d99887928f48983377f2dbbac08e2c8553b57920f858c119b8d2a16b603e0c6a9425522c016dfd5f54a6f1f6e91785a0b7d800f9ee5690c3416983a307e85b1dda5edbd1f127b8714431f69838fd4134428798b705c8b0b01678933a8c70924de4fe25802700b468311132454ba346cf9aa2216", 0x8a) r1 = request_key(&(0x7f0000002000)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a}, &(0x7f0000001fee)="3a74fac5670000002f5c0300000000000000", 0x0) keyctl$negate(0xd, r1, 0x1eb5be46, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={"73797a5f74756e0000000f00", 0x0}) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newneigh={0x30, 0x1c, 0x331, 0x0, 0x0, {0xa, 0x0, 0x0, r3}, [@NDA_DST_IPV6={0x14, 0x1, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x30}, 0x1}, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f0000000040)) 2033/05/18 03:42:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 765.101208] FAULT_INJECTION: forcing a failure. [ 765.101208] name failslab, interval 1, probability 0, space 0, times 0 [ 765.112776] CPU: 0 PID: 16541 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 765.120058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.129424] Call Trace: [ 765.132030] dump_stack+0x1b9/0x294 [ 765.135668] ? dump_stack_print_info.cold.2+0x52/0x52 [ 765.141136] ? __save_stack_trace+0x7e/0xd0 [ 765.145492] should_fail.cold.4+0xa/0x1a [ 765.149572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 765.154687] ? save_stack+0x43/0xd0 [ 765.158350] ? kasan_kmalloc+0xc4/0xe0 [ 765.162276] ? kmem_cache_alloc_trace+0x152/0x780 [ 765.167127] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 765.172415] ? __list_lru_init+0x456/0x790 [ 765.176781] ? sget_userns+0x767/0xf00 [ 765.180692] ? graph_lock+0x170/0x170 [ 765.184525] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 765.189324] ? do_mount+0x564/0x3070 [ 765.193058] ? ksys_mount+0x12d/0x140 [ 765.196880] ? __x64_sys_mount+0xbe/0x150 [ 765.201073] ? do_syscall_64+0x1b1/0x800 [ 765.205151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.210541] ? find_held_lock+0x36/0x1c0 [ 765.214631] ? __lock_is_held+0xb5/0x140 [ 765.218734] ? check_same_owner+0x320/0x320 [ 765.223084] ? rcu_note_context_switch+0x710/0x710 [ 765.223241] IPVS: Unknown mcast interface: rose0 [ 765.228057] __should_failslab+0x124/0x180 [ 765.228093] should_failslab+0x9/0x14 [ 765.228112] kmem_cache_alloc_trace+0x2cb/0x780 [ 765.228141] __memcg_init_list_lru_node+0x17d/0x2c0 [ 765.250608] ? kvfree_rcu+0x20/0x20 [ 765.254256] ? __kmalloc_node+0x47/0x70 [ 765.258355] __list_lru_init+0x456/0x790 [ 765.262526] ? list_lru_destroy+0x4c0/0x4c0 [ 765.266534] IPVS: Unknown mcast interface: rose0 [ 765.266863] ? mark_held_locks+0xc9/0x160 [ 765.275850] ? __raw_spin_lock_init+0x1c/0x100 [ 765.280449] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 765.285518] ? lockdep_init_map+0x9/0x10 [ 765.289596] sget_userns+0x767/0xf00 [ 765.293337] ? get_anon_bdev+0x2f0/0x2f0 [ 765.297418] ? destroy_unused_super.part.11+0x110/0x110 [ 765.302788] ? __alloc_pages_nodemask+0xacf/0xd70 [ 765.307640] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 765.312669] ? kasan_check_read+0x11/0x20 [ 765.316825] ? cap_capable+0x1f9/0x260 [ 765.320723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.326266] ? security_capable+0x99/0xc0 [ 765.330431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.335988] ? ns_capable_common+0x13f/0x170 [ 765.340416] ? get_anon_bdev+0x2f0/0x2f0 [ 765.344487] sget+0x10b/0x150 [ 765.347609] ? fuse_get_root_inode+0x190/0x190 [ 765.352202] mount_nodev+0x33/0x110 [ 765.355864] fuse_mount+0x2c/0x40 [ 765.359324] mount_fs+0xae/0x328 [ 765.362704] vfs_kern_mount.part.34+0xd4/0x4d0 [ 765.367292] ? may_umount+0xb0/0xb0 [ 765.370923] ? _raw_read_unlock+0x22/0x30 [ 765.375075] ? __get_fs_type+0x97/0xc0 [ 765.379059] do_mount+0x564/0x3070 [ 765.382608] ? do_raw_spin_unlock+0x9e/0x2e0 [ 765.387028] ? copy_mount_string+0x40/0x40 [ 765.391273] ? rcu_pm_notify+0xc0/0xc0 [ 765.395176] ? copy_mount_options+0x5f/0x380 [ 765.399586] ? rcu_read_lock_sched_held+0x108/0x120 [ 765.404605] ? kmem_cache_alloc_trace+0x616/0x780 [ 765.409454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.415004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.420542] ? copy_mount_options+0x285/0x380 [ 765.425042] ksys_mount+0x12d/0x140 [ 765.428676] __x64_sys_mount+0xbe/0x150 [ 765.432650] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 765.437671] do_syscall_64+0x1b1/0x800 [ 765.441565] ? finish_task_switch+0x1ca/0x840 [ 765.446068] ? syscall_return_slowpath+0x5c0/0x5c0 [ 765.451000] ? syscall_return_slowpath+0x30f/0x5c0 [ 765.455939] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 765.461316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.466165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.471351] RIP: 0033:0x455a09 [ 765.474535] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 765.482330] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 765.489596] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000f0ffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 7: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) r1 = shmget$private(0x0, 0x2000, 0x78001800, &(0x7f000074d000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f00000000c0)=""/4096) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 2033/05/18 03:42:16 executing program 7: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8, 0x200a80) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14}}]}, 0x24}, 0x1}, 0x0) [ 765.496864] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 765.504129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 765.511397] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 765.523286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 765.577169] gfs2: not a GFS2 filesystem 2033/05/18 03:42:16 executing program 6 (fault-call:3 fault-nth:37): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000600)="0047fc2f07d82c99240970") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00') getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x1, &(0x7f00000000c0)=0x4) clock_settime(0x7, &(0x7f0000000100)={0x77359400}) 2033/05/18 03:42:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022be6", 0x4012}) 2033/05/18 03:42:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xfffffffb, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xe0000001, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x2000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001001570020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) [ 765.650901] IPVS: Unknown mcast interface: rose0 [ 765.665398] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 765.715669] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bca00", 0x4012}) 2033/05/18 03:42:16 executing program 7: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4880, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) clone(0x40000, &(0x7f0000000080), &(0x7f000084effc), &(0x7f00000000c0), &(0x7f0000000140)) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008190"]}, 0x108) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2033/05/18 03:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x20000000, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xe000000100000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfffffffffffff000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000fffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 765.832235] FAULT_INJECTION: forcing a failure. [ 765.832235] name failslab, interval 1, probability 0, space 0, times 0 [ 765.844007] CPU: 0 PID: 16581 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 765.851299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.860838] Call Trace: [ 765.863441] dump_stack+0x1b9/0x294 [ 765.867095] ? dump_stack_print_info.cold.2+0x52/0x52 [ 765.872401] ? debug_check_no_locks_freed+0x310/0x310 [ 765.875737] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x100000000000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 765.877622] should_fail.cold.4+0xa/0x1a [ 765.877655] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 765.877674] ? graph_lock+0x170/0x170 [ 765.877698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.900938] ? graph_lock+0x170/0x170 [ 765.904761] ? graph_lock+0x170/0x170 [ 765.909316] ? ida_get_new_above+0x490/0xa10 [ 765.913748] ? save_stack+0x43/0xd0 [ 765.917396] ? find_held_lock+0x36/0x1c0 [ 765.919304] IPVS: Unknown mcast interface: rose0 [ 765.921470] ? __lock_is_held+0xb5/0x140 [ 765.921503] ? check_same_owner+0x320/0x320 [ 765.921525] ? rcu_note_context_switch+0x710/0x710 [ 765.921543] __should_failslab+0x124/0x180 [ 765.943956] should_failslab+0x9/0x14 [ 765.947764] __kmalloc+0x2c8/0x760 [ 765.951315] ? up_read+0x110/0x110 [ 765.954867] ? down_read+0x1b0/0x1b0 [ 765.958597] ? match_number.isra.0+0xb6/0x260 [ 765.963119] match_number.isra.0+0xb6/0x260 [ 765.967547] ? match_strdup+0xa0/0xa0 [ 765.971377] ? match_wildcard+0x3c0/0x3c0 [ 765.975559] match_int+0x23/0x30 [ 765.978974] fuse_fill_super+0x812/0x1e20 [ 765.983133] ? fuse_get_root_inode+0x190/0x190 [ 765.987810] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 765.992926] ? kasan_check_read+0x11/0x20 [ 765.997083] ? cap_capable+0x1f9/0x260 [ 766.000989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.006536] ? security_capable+0x99/0xc0 [ 766.010695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.016236] ? ns_capable_common+0x13f/0x170 [ 766.020657] ? get_anon_bdev+0x2f0/0x2f0 [ 766.024743] ? sget+0x113/0x150 [ 766.028035] ? fuse_get_root_inode+0x190/0x190 [ 766.032620] mount_nodev+0x6b/0x110 [ 766.036249] fuse_mount+0x2c/0x40 [ 766.039706] mount_fs+0xae/0x328 [ 766.043079] vfs_kern_mount.part.34+0xd4/0x4d0 [ 766.047669] ? may_umount+0xb0/0xb0 [ 766.051314] ? _raw_read_unlock+0x22/0x30 [ 766.055638] ? __get_fs_type+0x97/0xc0 [ 766.059534] do_mount+0x564/0x3070 [ 766.063087] ? copy_mount_string+0x40/0x40 [ 766.067429] ? rcu_pm_notify+0xc0/0xc0 [ 766.071537] ? copy_mount_options+0x5f/0x380 [ 766.075956] ? rcu_read_lock_sched_held+0x108/0x120 [ 766.080980] ? kmem_cache_alloc_trace+0x616/0x780 [ 766.085841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.091489] ? _copy_from_user+0xdf/0x150 [ 766.095650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.101236] ? copy_mount_options+0x285/0x380 [ 766.105920] ksys_mount+0x12d/0x140 [ 766.109579] __x64_sys_mount+0xbe/0x150 [ 766.113558] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 766.118768] do_syscall_64+0x1b1/0x800 [ 766.122658] ? finish_task_switch+0x1ca/0x840 [ 766.127167] ? syscall_return_slowpath+0x5c0/0x5c0 [ 766.132106] ? syscall_return_slowpath+0x30f/0x5c0 [ 766.137046] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 766.142417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.147269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.152458] RIP: 0033:0x455a09 [ 766.155660] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 766.163483] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 766.170854] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 766.178131] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 766.185490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 766.192766] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 766.229733] gfs2: not a GFS2 filesystem 2033/05/18 03:42:17 executing program 6 (fault-call:3 fault-nth:38): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x200000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xfffff000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bffff1f00", 0x4012}) 2033/05/18 03:42:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x40) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x3659) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x4, 0x4, 0x200, "30b2aaf4b7a3b4ef2f8e547d8c04e1dc9b8de24f35f4225f76b7c5d780a58b5b"}) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x40, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000001400)=@getlink={0x48, 0x12, 0x201, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, [@IFLA_INFO_KIND={0x4, 0x1, 'eth1eth0em1%lo!lokeyringppp0,\'\x00'}]}]}, 0x48}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400300, @multicast1=0xe0000001}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 766.349843] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x68000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 766.377201] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xe0000001, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000018}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:17 executing program 7: exit(0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='@vboxnet0,wlan1\x00', &(0x7f0000000100)='/dev/urandom\x00', &(0x7f0000000140)='highspeed\x00'], &(0x7f0000000380)=[&(0x7f00000001c0)='highspeed\x00', &(0x7f0000000200)='/dev/urandom\x00', &(0x7f0000000240)='securityvboxnet1em1\x00', &(0x7f0000000280)='vboxnet0\x00', &(0x7f00000002c0)='highspeed\x00', &(0x7f0000000300)='highspeed\x00', &(0x7f0000000340)='bdev.vboxnet1--$\x00']) getpeername$llc(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x10) socket$rds(0x15, 0x5, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000500)={r0, r0, 0x100000000, 0x5, &(0x7f0000000440)="e237e71f1668fdaa09bc23da50edb91fc2dd679fe7cd30e74659d2d76d5d4734e30a646559f87588c552a6bb8bac425eea807d13db20b28b0ee31c4e8214a8fd9299f993c85a5623e57863655e84645d509d63545614ab280cd71d955410ec3473d3be4e507a8bfd9dee0294b7f120ebbd0721423226d6bcc95c2574a1fefc4e67dad8c5fbd5f6ed0deca468840a5437b06cf245ca1bd13d7ed3bdf099865ee84a64da1fe8aafb0dd0d0", 0x9, 0x7e4, 0x200, 0x1, 0x400, 0xfffffffffffffffd, 0x6, "6473c20cf5e7b7a24940d9c240875ca19f2a70b16bbca733bbf2898db2cb345bf5d84f2fdb4448f00e6b2f8455d1fd212924e890b34cafcbd81b1f0f78e3377d92a0d20ad898efc45be1eb8aaceaaa352345d079f4b885fc66a367d7a7bbf76d4e"}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8840220}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, r1, 0x4, 0x70bd29, 0x25dfdbfd, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x40) write$rdma_cm(r0, &(0x7f0000002800)=@create_id={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000027c0)={0xffffffff}, 0x106, 0x8}}, 0x20) write$rdma_cm(r0, &(0x7f0000002840)=@join_ip_mcast={0x10, 0x30, 0xfa00, {&(0x7f0000000700)={0xffffffff}, 0x2, {0xa, 0x4e23, 0xf9, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, r2}}, 0x38) epoll_pwait(r0, &(0x7f0000002880)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x5, &(0x7f0000002900)={0x5d27}, 0x8) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002940)='/dev/autofs\x00', 0x4400, 0x0) r5 = shmget$private(0x0, 0x1000, 0x78000934, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000002980)=""/235) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000002a80)=0x8, 0x4) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000002ac0)={0x0, 0x3, 0x3ff, 0x3, 0x6}) bind$llc(r4, &(0x7f0000002b00)={0x1a, 0x325, 0x95, 0x3f, 0x1ff, 0x8}, 0x10) socketpair$ax25(0x3, 0x5, 0x1, &(0x7f0000002b40)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000002b80)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}}, &(0x7f0000002c40)=0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000002c80)={r6, 0xffffffffffffffed}, 0x8) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000002cc0)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000002d00)={r6, 0x77, "53cb33a8b013cd98b17932e3aabbc5111253084013814b27df1c1a31c0cf68a9e379aadd37070642c8761dbc09e2e4541e93838eb8ac2f004526d17f7894b569d74a9b599e9ae7b2ca452a1cd84dc2afd714669a42c4b0f0f685ddf2af950d5c9c5bd08a9d2023a695683fe61564f1bf9604c747f9b070"}, &(0x7f0000002d80)=0x7f) write$rdma_cm(r0, &(0x7f0000002e00)=@leave_mcast={0x11, 0x10, 0xfa00, {&(0x7f0000002dc0), r3}}, 0x18) r8 = syz_open_dev$vcsa(&(0x7f0000002e40)='/dev/vcsa#\x00', 0x6, 0x101000) ioctl$KVM_GET_XCRS(r8, 0x8188aea6, &(0x7f0000002e80)={0x1, 0x7fff, [{0x5, 0x0, 0x5f4}]}) mkdirat(r8, &(0x7f0000002ec0)='./file0\x00', 0x8) ioctl$fiemap(r8, 0xc020660b, &(0x7f0000002f00)={0x1, 0x7f, 0x6, 0x101, 0x1, [{0x5, 0x2, 0xe7, 0x0, 0x0, 0x1}]}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000002f80)={r7, 0x1, 0x3, [0x87da, 0xfffffffffffffffb, 0xc45]}, &(0x7f0000002fc0)=0xe) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000003000)={r6, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}, 0x10001, 0x400, 0x400, 0x1, 0x59}, &(0x7f00000030c0)=0x98) 2033/05/18 03:42:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b004c00", 0x4012}) 2033/05/18 03:42:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 766.517577] IPVS: Unknown mcast interface: rose0 [ 766.550863] IPVS: Unknown mcast interface: rose0 [ 766.584124] FAULT_INJECTION: forcing a failure. [ 766.584124] name failslab, interval 1, probability 0, space 0, times 0 [ 766.595665] CPU: 0 PID: 16642 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 766.602952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.612331] Call Trace: [ 766.615112] dump_stack+0x1b9/0x294 [ 766.618773] ? dump_stack_print_info.cold.2+0x52/0x52 [ 766.623976] ? __save_stack_trace+0x7e/0xd0 [ 766.628311] should_fail.cold.4+0xa/0x1a [ 766.632417] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 766.637533] ? save_stack+0x43/0xd0 [ 766.641162] ? kasan_kmalloc+0xc4/0xe0 [ 766.645326] ? kmem_cache_alloc_trace+0x152/0x780 [ 766.650354] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 766.655554] ? __list_lru_init+0x456/0x790 [ 766.659795] ? sget_userns+0x767/0xf00 [ 766.663722] ? graph_lock+0x170/0x170 [ 766.667526] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 766.672286] ? do_mount+0x564/0x3070 [ 766.676004] ? ksys_mount+0x12d/0x140 [ 766.679817] ? __x64_sys_mount+0xbe/0x150 [ 766.684070] ? do_syscall_64+0x1b1/0x800 [ 766.688135] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.693508] ? find_held_lock+0x36/0x1c0 [ 766.697575] ? __lock_is_held+0xb5/0x140 [ 766.701752] ? check_same_owner+0x320/0x320 [ 766.706089] ? rcu_note_context_switch+0x710/0x710 [ 766.711216] __should_failslab+0x124/0x180 [ 766.715456] should_failslab+0x9/0x14 [ 766.719434] kmem_cache_alloc_trace+0x2cb/0x780 [ 766.724121] ? __kmalloc_node+0x33/0x70 [ 766.728096] ? __kmalloc_node+0x33/0x70 [ 766.732076] ? rcu_read_lock_sched_held+0x108/0x120 [ 766.737111] __memcg_init_list_lru_node+0x17d/0x2c0 [ 766.742225] ? kvfree_rcu+0x20/0x20 [ 766.745860] ? __kmalloc_node+0x47/0x70 [ 766.749849] __list_lru_init+0x456/0x790 [ 766.753915] ? list_lru_destroy+0x4c0/0x4c0 [ 766.758240] ? mark_held_locks+0xc9/0x160 [ 766.762402] ? __raw_spin_lock_init+0x1c/0x100 [ 766.766991] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 766.772014] ? lockdep_init_map+0x9/0x10 [ 766.776082] sget_userns+0x767/0xf00 [ 766.779805] ? get_anon_bdev+0x2f0/0x2f0 [ 766.783882] ? destroy_unused_super.part.11+0x110/0x110 [ 766.789252] ? __alloc_pages_nodemask+0xacf/0xd70 [ 766.794101] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 766.799126] ? kasan_check_read+0x11/0x20 [ 766.803277] ? cap_capable+0x1f9/0x260 [ 766.807173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.812708] ? security_capable+0x99/0xc0 [ 766.816873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.822411] ? ns_capable_common+0x13f/0x170 [ 766.826824] ? get_anon_bdev+0x2f0/0x2f0 [ 766.830891] sget+0x10b/0x150 [ 766.834089] ? fuse_get_root_inode+0x190/0x190 [ 766.838674] mount_nodev+0x33/0x110 [ 766.842301] fuse_mount+0x2c/0x40 [ 766.845758] mount_fs+0xae/0x328 [ 766.849133] vfs_kern_mount.part.34+0xd4/0x4d0 [ 766.853717] ? may_umount+0xb0/0xb0 [ 766.857370] ? _raw_read_unlock+0x22/0x30 [ 766.861526] ? __get_fs_type+0x97/0xc0 [ 766.865418] do_mount+0x564/0x3070 [ 766.868963] ? do_raw_spin_unlock+0x9e/0x2e0 [ 766.873381] ? copy_mount_string+0x40/0x40 [ 766.877717] ? rcu_pm_notify+0xc0/0xc0 [ 766.881705] ? copy_mount_options+0x5f/0x380 [ 766.886201] ? rcu_read_lock_sched_held+0x108/0x120 [ 766.891221] ? kmem_cache_alloc_trace+0x616/0x780 [ 766.896069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.901617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.907157] ? copy_mount_options+0x285/0x380 [ 766.911658] ksys_mount+0x12d/0x140 [ 766.915289] __x64_sys_mount+0xbe/0x150 [ 766.919441] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 766.924556] do_syscall_64+0x1b1/0x800 [ 766.928451] ? finish_task_switch+0x1ca/0x840 [ 766.932958] ? syscall_return_slowpath+0x5c0/0x5c0 [ 766.937907] ? syscall_return_slowpath+0x30f/0x5c0 [ 766.942886] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 766.948257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.953211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.958421] RIP: 0033:0x455a09 [ 766.961612] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 766.969323] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 766.977373] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 766.984641] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 766.991909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 766.999275] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 767.020342] gfs2: not a GFS2 filesystem [ 767.266438] device bridge_slave_1 left promiscuous mode [ 767.272128] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.356509] device bridge_slave_0 left promiscuous mode [ 767.362159] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.427309] team0 (unregistering): Port device team_slave_1 removed [ 767.444628] team0 (unregistering): Port device team_slave_0 removed [ 767.458392] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 767.569941] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 767.611843] bond0 (unregistering): Released all slaves 2033/05/18 03:42:18 executing program 6 (fault-call:3 fault-nth:39): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xffffff7f, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:18 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000001a}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x5000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530008e0300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00000000000400", 0x4012}) 2033/05/18 03:42:18 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xfd, {}, 0x0, 0x2}, 0xe) [ 767.742385] IPVS: Unknown mcast interface: rose0 [ 767.782515] IPVS: Unknown mcast interface: rose0 [ 767.792280] FAULT_INJECTION: forcing a failure. [ 767.792280] name failslab, interval 1, probability 0, space 0, times 0 [ 767.803644] CPU: 1 PID: 16674 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 767.810922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.820284] Call Trace: [ 767.822977] dump_stack+0x1b9/0x294 [ 767.826623] ? dump_stack_print_info.cold.2+0x52/0x52 [ 767.832092] ? is_bpf_text_address+0xd7/0x170 [ 767.836604] should_fail.cold.4+0xa/0x1a [ 767.840682] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 767.845803] ? graph_lock+0x170/0x170 [ 767.849640] ? save_stack+0xa9/0xd0 [ 767.853300] ? find_held_lock+0x36/0x1c0 [ 767.857384] ? __lock_is_held+0xb5/0x140 [ 767.861475] ? check_same_owner+0x320/0x320 [ 767.865807] ? trace_hardirqs_off+0xd/0x10 [ 767.870060] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 767.875183] ? rcu_note_context_switch+0x710/0x710 [ 767.880128] ? debug_check_no_obj_freed+0x2ff/0x584 [ 767.885163] __should_failslab+0x124/0x180 [ 767.889412] should_failslab+0x9/0x14 [ 767.893269] __kmalloc+0x2c8/0x760 [ 767.896830] ? match_strdup+0x5e/0xa0 [ 767.900661] match_strdup+0x5e/0xa0 [ 767.904296] fuse_match_uint+0x1a/0x60 [ 767.908193] fuse_fill_super+0x455/0x1e20 [ 767.912356] ? fuse_get_root_inode+0x190/0x190 [ 767.916948] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 767.921976] ? kasan_check_read+0x11/0x20 [ 767.926133] ? cap_capable+0x1f9/0x260 2033/05/18 03:42:18 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x800) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0xfffffffffffffffb, 0x2, 0x8}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") prctl$intptr(0x2f, 0x4) 2033/05/18 03:42:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000fffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x700, {0x2}}, 0x20}, 0x1}, 0x0) [ 767.930125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.935669] ? security_capable+0x99/0xc0 [ 767.939854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.945401] ? ns_capable_common+0x13f/0x170 [ 767.949820] ? get_anon_bdev+0x2f0/0x2f0 [ 767.953891] ? sget+0x113/0x150 [ 767.957183] ? fuse_get_root_inode+0x190/0x190 [ 767.961776] mount_nodev+0x6b/0x110 [ 767.965417] fuse_mount+0x2c/0x40 [ 767.968892] mount_fs+0xae/0x328 [ 767.972441] vfs_kern_mount.part.34+0xd4/0x4d0 [ 767.977153] ? may_umount+0xb0/0xb0 [ 767.980796] ? _raw_read_unlock+0x22/0x30 [ 767.985046] ? __get_fs_type+0x97/0xc0 [ 767.988954] do_mount+0x564/0x3070 [ 767.992512] ? copy_mount_string+0x40/0x40 [ 767.996772] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 768.001803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.006572] ? retint_kernel+0x10/0x10 [ 768.010478] ? copy_mount_options+0x1d9/0x380 [ 768.014990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.020532] ? copy_mount_options+0x285/0x380 [ 768.025037] ksys_mount+0x12d/0x140 [ 768.028675] __x64_sys_mount+0xbe/0x150 [ 768.032657] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 768.037686] do_syscall_64+0x1b1/0x800 [ 768.041579] ? finish_task_switch+0x1ca/0x840 [ 768.046082] ? syscall_return_slowpath+0x5c0/0x5c0 [ 768.051021] ? syscall_return_slowpath+0x30f/0x5c0 [ 768.055960] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 768.061332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.066187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.071377] RIP: 0033:0x455a09 [ 768.074573] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:42:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x4, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bb400", 0x4012}) [ 768.082286] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 768.089555] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 768.096851] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 768.104139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 768.111410] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 768.129282] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7fef, {0x2}}, 0x20}, 0x1}, 0x0) [ 768.153800] IPVS: Unknown mcast interface: rose0 [ 768.171615] gfs2: not a GFS2 filesystem 2033/05/18 03:42:19 executing program 6 (fault-call:3 fault-nth:40): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x2000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000004}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bffffffe400", 0x4012}) 2033/05/18 03:42:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000370020000000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x700000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 7: r0 = socket$kcm(0x29, 0x7, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x77) 2033/05/18 03:42:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000cac00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 768.273487] nla_parse: 7 callbacks suppressed [ 768.273496] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 768.361590] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:19 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000080)={0x0, 0x3f, 0x6, 0x4, 0x5, [{0x54ddd398, 0x2, 0x1}, {0x1, 0xb36, 0x6, 0x0, 0x0, 0xc06}, {0x2, 0x1, 0xb0, 0x0, 0x0, 0x100}, {0xf2, 0xff, 0x5, 0x0, 0x0, 0x84}, {0x1, 0x0, 0x3ff, 0x0, 0x0, 0x1000}]}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f0000000300)="de0b0f46072ee6e80fc72e0e000f090f2d26c3110f21e50f239566b8010000000f23d00f21f866350000000c0f23f8f010957e71", 0x34}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x1, 0x0, 0x2000, &(0x7f0000011000/0x2000)=nil}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2100, 0x0) getpeername$unix(r3, &(0x7f0000000200), &(0x7f0000000280)=0x6e) 2033/05/18 03:42:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x200000000000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}]}, 0x60}, 0x1}, 0x0) [ 768.404189] IPVS: Unknown mcast interface: rose0 [ 768.411169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 768.506485] FAULT_INJECTION: forcing a failure. [ 768.506485] name failslab, interval 1, probability 0, space 0, times 0 [ 768.517969] CPU: 0 PID: 16713 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 768.525257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.534634] Call Trace: [ 768.537249] dump_stack+0x1b9/0x294 [ 768.540903] ? dump_stack_print_info.cold.2+0x52/0x52 [ 768.546115] ? debug_check_no_locks_freed+0x310/0x310 [ 768.551325] should_fail.cold.4+0xa/0x1a 2033/05/18 03:42:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x8100000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:19 executing program 7: setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000500)=0x6, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000400)={0x0, 0x2}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={r0, 0x5, 0x30, 0x3ff, 0x6}, &(0x7f00000004c0)=0x18) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x12, 0x2, @tid=r1}) inotify_init() r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4}) bind(0xffffffffffffffff, &(0x7f0000000200)=@un=@file={0x1, './file0\x00'}, 0x22e) mq_notify(r2, &(0x7f00000001c0)={0x0, 0x14, 0x0, @tid=r1}) ftruncate(r2, 0x3ff) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000180)=0xb) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000280)={{0x73, @multicast2=0xe0000002, 0x4e24, 0x2, 'dh\x00', 0x2, 0x4, 0xe}, {@multicast1=0xe0000001, 0x4e21, 0x10003, 0x81, 0x20, 0x8}}, 0x44) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) [ 768.555404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 768.560518] ? graph_lock+0x170/0x170 [ 768.564335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.569882] ? graph_lock+0x170/0x170 [ 768.573695] ? graph_lock+0x170/0x170 [ 768.577505] ? ida_get_new_above+0x490/0xa10 [ 768.581928] ? save_stack+0x43/0xd0 [ 768.585655] ? find_held_lock+0x36/0x1c0 [ 768.589754] ? __lock_is_held+0xb5/0x140 [ 768.593874] ? check_same_owner+0x320/0x320 [ 768.598210] ? rcu_note_context_switch+0x710/0x710 [ 768.603155] __should_failslab+0x124/0x180 [ 768.607406] should_failslab+0x9/0x14 [ 768.611220] __kmalloc+0x2c8/0x760 [ 768.614784] ? up_read+0x110/0x110 [ 768.618329] ? down_read+0x1b0/0x1b0 [ 768.622054] ? match_number.isra.0+0xb6/0x260 [ 768.626560] match_number.isra.0+0xb6/0x260 [ 768.630889] ? match_strdup+0xa0/0xa0 [ 768.634743] ? match_wildcard+0x3c0/0x3c0 [ 768.638904] match_int+0x23/0x30 [ 768.642277] fuse_fill_super+0x812/0x1e20 [ 768.646437] ? fuse_get_root_inode+0x190/0x190 [ 768.651029] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 768.656055] ? kasan_check_read+0x11/0x20 [ 768.660207] ? cap_capable+0x1f9/0x260 [ 768.664104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.669645] ? security_capable+0x99/0xc0 [ 768.673847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.679388] ? ns_capable_common+0x13f/0x170 [ 768.683833] ? get_anon_bdev+0x2f0/0x2f0 [ 768.688026] ? sget+0x113/0x150 [ 768.691315] ? fuse_get_root_inode+0x190/0x190 [ 768.695898] mount_nodev+0x6b/0x110 [ 768.699534] fuse_mount+0x2c/0x40 [ 768.702995] mount_fs+0xae/0x328 [ 768.706371] vfs_kern_mount.part.34+0xd4/0x4d0 [ 768.710959] ? may_umount+0xb0/0xb0 [ 768.714585] ? _raw_read_unlock+0x22/0x30 [ 768.718730] ? __get_fs_type+0x97/0xc0 [ 768.722627] do_mount+0x564/0x3070 [ 768.726172] ? copy_mount_string+0x40/0x40 [ 768.730406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.735168] ? retint_kernel+0x10/0x10 [ 768.739078] ? copy_mount_options+0x1a1/0x380 [ 768.743584] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 768.748447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.753984] ? copy_mount_options+0x285/0x380 [ 768.758484] ksys_mount+0x12d/0x140 [ 768.762116] __x64_sys_mount+0xbe/0x150 [ 768.766091] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 768.771108] do_syscall_64+0x1b1/0x800 [ 768.775001] ? syscall_return_slowpath+0x5c0/0x5c0 [ 768.779934] ? syscall_return_slowpath+0x30f/0x5c0 [ 768.784869] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 768.790240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.795093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.800279] RIP: 0033:0x455a09 [ 768.803465] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 768.811178] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 768.818447] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 768.825716] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 768.832986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 768.840315] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x1000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 768.855810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 768.872126] IPVS: Unknown mcast interface: rose0 [ 768.899083] gfs2: not a GFS2 filesystem [ 768.903282] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:20 executing program 6 (fault-call:3 fault-nth:41): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6000000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000400", 0x4012}) 2033/05/18 03:42:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8ece}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000001280)='cgroup.procs\x00', 0x2, 0x0) r2 = socket(0x200000000002, 0x1, 0x0) pread64(r1, &(0x7f0000000100)=""/218, 0x6, 0x0) dup2(r2, r1) 2033/05/18 03:42:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0001300}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x2, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 769.645420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 769.696101] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x710de96e12, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x4000000]}}]}, 0x60}, 0x1}, 0x0) [ 769.717502] IPVS: Unknown mcast interface: rose0 [ 769.758104] FAULT_INJECTION: forcing a failure. [ 769.758104] name failslab, interval 1, probability 0, space 0, times 0 [ 769.769481] CPU: 1 PID: 16762 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 769.776767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.786129] Call Trace: [ 769.788732] dump_stack+0x1b9/0x294 [ 769.792374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 769.797588] should_fail.cold.4+0xa/0x1a [ 769.801666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 769.806785] ? graph_lock+0x170/0x170 [ 769.810589] ? lock_downgrade+0x8e0/0x8e0 [ 769.814736] ? kasan_check_write+0x14/0x20 [ 769.818976] ? find_held_lock+0x36/0x1c0 [ 769.823052] ? __lock_is_held+0xb5/0x140 [ 769.827137] ? check_same_owner+0x320/0x320 [ 769.831469] ? rcu_note_context_switch+0x710/0x710 [ 769.836407] __should_failslab+0x124/0x180 [ 769.840659] should_failslab+0x9/0x14 [ 769.844469] kmem_cache_alloc_trace+0x2cb/0x780 [ 769.856793] ? match_wildcard+0x3c0/0x3c0 [ 769.860954] ? trace_hardirqs_on+0xd/0x10 [ 769.865129] fuse_fill_super+0xc92/0x1e20 [ 769.869313] ? fuse_get_root_inode+0x190/0x190 [ 769.873914] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 769.878953] ? kasan_check_read+0x11/0x20 [ 769.883119] ? cap_capable+0x1f9/0x260 [ 769.887032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.892599] ? security_capable+0x99/0xc0 [ 769.896761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.902311] ? ns_capable_common+0x13f/0x170 [ 769.906749] ? get_anon_bdev+0x2f0/0x2f0 [ 769.910822] ? sget+0x113/0x150 [ 769.914117] ? fuse_get_root_inode+0x190/0x190 [ 769.918714] mount_nodev+0x6b/0x110 [ 769.922365] fuse_mount+0x2c/0x40 [ 769.925839] mount_fs+0xae/0x328 [ 769.929322] vfs_kern_mount.part.34+0xd4/0x4d0 [ 769.934450] ? may_umount+0xb0/0xb0 [ 769.938095] ? _raw_read_unlock+0x22/0x30 [ 769.942256] ? __get_fs_type+0x97/0xc0 [ 769.946171] do_mount+0x564/0x3070 [ 769.949735] ? copy_mount_string+0x40/0x40 [ 769.953981] ? rcu_pm_notify+0xc0/0xc0 [ 769.957920] ? copy_mount_options+0x5f/0x380 [ 769.962526] ? rcu_read_lock_sched_held+0x108/0x120 [ 769.967562] ? kmem_cache_alloc_trace+0x616/0x780 [ 769.972427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 769.978043] ? _copy_from_user+0xdf/0x150 [ 769.982254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.987812] ? copy_mount_options+0x285/0x380 [ 769.992326] ksys_mount+0x12d/0x140 [ 769.995965] __x64_sys_mount+0xbe/0x150 [ 769.999946] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 770.004975] do_syscall_64+0x1b1/0x800 [ 770.008964] ? finish_task_switch+0x1ca/0x840 [ 770.013825] ? syscall_return_slowpath+0x5c0/0x5c0 [ 770.018779] ? syscall_return_slowpath+0x30f/0x5c0 [ 770.023724] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 770.029122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.034075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.039265] RIP: 0033:0x455a09 [ 770.042457] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 770.050184] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x40000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 7: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0xac61c2b, 0x4200) ioctl$TIOCSCTTY(r0, 0x540e, 0x80000000) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x8000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x77, "4c1aa3a437cd79176f27cd7f0aa1c62fa10c1b6b069bbc37cedf907cc7e5224965f88a261e8e76589b67ed32628ab67de12a9d254372183ebba9fd3176a4ab063205850fa3d4705269df84a04c5249d885de441d8fbbe72eb45a7f6c42ddd4e88f17fb3465d49bb42eb9980786f341f613f4714b13c34a"}, &(0x7f0000000100)=0x9b) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x82f9, 0x65, 0xef63, "f478a1fd5adb9f4f5e31f3d4abc8a2efbf63342c67bccf10179ef68ecf3659eb19bf8a52984dca2d34bc35a3f19faaa7696d0f6e6c22fe47d72f181557162ad7923ae7e088c39ac35f0e267f6c22e668"}, 0xd8) keyctl$get_keyring_id(0x0, 0x0, 0x4) socket$inet(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)={0x2004}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x3e3, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2033/05/18 03:42:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x100000000000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x2000000]}}]}, 0x60}, 0x1}, 0x0) [ 770.057457] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 770.064844] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 770.072126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 770.079406] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 770.106335] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 770.132220] gfs2: not a GFS2 filesystem [ 770.143323] IPVS: Unknown mcast interface: rose0 [ 770.163248] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:21 executing program 6 (fault-call:3 fault-nth:42): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") close(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x4e22, 0x3, @empty, 0x3}, 0x7, [0x2, 0x7fff, 0xf2, 0x100000000, 0x6, 0x3, 0x2, 0x7]}, 0x5c) 2033/05/18 03:42:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bc300", 0x4012}) 2033/05/18 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x3f00, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x400000000000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x10000e0]}}]}, 0x60}, 0x1}, 0x0) [ 770.422346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:21 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x2, 0xc) r2 = syz_open_pts(0xffffffffffffffff, 0x40) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000080)={0x5, 0x7, 0x1000, 0xffffffff, 0x5}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0xdc, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180)="583353d0f6e7136ae5befa8a40d6a51b67c6209624a357a84e1af32f863c62f34ad583ac20a502f5640f0ad1f2007f0f870eb910218dea205723dda00651f208936c1c4d1b88620491b9ad08f5033b855c9e7a60705bd5e91c46447cdf6d9f6777ee", 0x62, 0x7}, {&(0x7f0000000200)="6249153eb833d99844e6368aafdb7ab8e5acc2a212146f9771688102ea2d2fd254a66eb036e47b22acea935371abaddb7a9f3f151151793b25f1b1b02c066a9cb17c56ff56e799c3fad4bf9bbc921ef2a53fd071f125291daddb9d616b343ecba7398a04e2c3f74c536e6a5efa02f68a94dec64e2237be6a04c5fca4d3d969eed9f2fee0059c5187ed8abc2b2ec9d186ae6bd67f2df6952b5c66df128dcb8dbf815a2c21e6baa01579c75b204f0088da9a86ca16f64672625236a5b113ec897af2b3127e55a5cad84ce63d71df822fb973463aa7f7", 0xd5, 0x3}, {&(0x7f0000000300)="b641983195268a2862b0aa25635bfd4ba0ee68dbacdd1698f22585bf23b310f8f9ccb238aad1ab5e40b044413a1ba5a757dbe07beecb753e868accf623fa4da808a2013fbc0d3c868bc2b7115e80e45dd7c6e26911d36d8848276193161815791552a855ab8211aed3b5e965efe66da84ebd53c7a2c54846f4335657b93c732c41483b621e605bec8af25d01b71185d96f2f29a9f0c1b57214a3662084afb20b6a43338ed66675c3b10b8e4c987cbe6434d916a0cc854e", 0xb7, 0x3}, {&(0x7f00000003c0)="8953a35daa76c6a7e90fee8f864c5c9999a6bcbb3a2e9a350e9e5c67559949b071b143f1f4f32cdb8596cd0935a061878cd842a6b6598dba47d1676060f4939a717699b9f8162d20da6ba57b9ab241235705bd9382e4a240a7a4ccab354c0c7e96aecd428801d2c16ad7a1d8c9cba026e9d3a71d9d245b87c4c5dae57c13388c109f52c7fcded6e0fed647318709db7e31b35dca968c2197dfeadd8cdcb5c0a5ca9c31785f28e7fbcb81757d4c63e7efb59275e970279271f1c78e8d405450dcdda44203d66a2829ebdb87ff270cee9ca073fddb1dc2f347ca23feff9f62f472209287c49c5efbfe972f66a9f81e89cc6e", 0xf1, 0x3}, {&(0x7f00000004c0)="0976a68ad40385c9718a2e6e903a", 0xe, 0x8}, {&(0x7f0000000500), 0x0, 0x8e}], 0x1100000, &(0x7f0000000600)={[{@fsync_mode_strict='fsync_mode=strict', 0x2c}, {@flush_merge='flush_merge', 0x2c}, {@resgid={'resgid', 0x3d}, 0x2c}]}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0x200, 0xc, [0x3, 0x4, 0x8000]}) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000085e1f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 2033/05/18 03:42:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x2000000000000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf0, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x400000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 770.489012] IPVS: Unknown mcast interface: rose0 [ 770.506198] IPVS: Unknown mcast interface: rose0 [ 770.543781] FAULT_INJECTION: forcing a failure. [ 770.543781] name failslab, interval 1, probability 0, space 0, times 0 [ 770.555211] CPU: 1 PID: 16804 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 770.562499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.571860] Call Trace: [ 770.574462] dump_stack+0x1b9/0x294 [ 770.578103] ? dump_stack_print_info.cold.2+0x52/0x52 [ 770.583308] ? rcu_is_watching+0x85/0x140 [ 770.587477] ? rcu_bh_force_quiescent_state+0x20/0x20 2033/05/18 03:42:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000007fffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 770.592685] should_fail.cold.4+0xa/0x1a [ 770.596782] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.601991] ? kernel_text_address+0x79/0xf0 [ 770.606516] ? __unwind_start+0x166/0x330 [ 770.610703] ? __kernel_text_address+0xd/0x40 [ 770.615212] ? graph_lock+0x170/0x170 [ 770.619032] ? __save_stack_trace+0x7e/0xd0 [ 770.623467] ? find_held_lock+0x36/0x1c0 [ 770.627545] ? __lock_is_held+0xb5/0x140 [ 770.631627] ? check_same_owner+0x320/0x320 [ 770.635972] ? rcu_note_context_switch+0x710/0x710 [ 770.638180] IPVS: Unknown mcast interface: rose0 [ 770.640920] __should_failslab+0x124/0x180 [ 770.640943] should_failslab+0x9/0x14 [ 770.640961] __kmalloc+0x2c8/0x760 [ 770.640983] ? match_number.isra.0+0xb6/0x260 [ 770.641008] match_number.isra.0+0xb6/0x260 [ 770.641026] ? match_strdup+0xa0/0xa0 [ 770.659358] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 770.661819] ? match_wildcard+0x3c0/0x3c0 [ 770.661840] ? trace_hardirqs_on+0xd/0x10 [ 770.661862] match_octal+0x26/0x30 [ 770.661880] fuse_fill_super+0x615/0x1e20 2033/05/18 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7a, {0x2}}, 0x20}, 0x1}, 0x0) [ 770.661908] ? fuse_get_root_inode+0x190/0x190 [ 770.683342] IPVS: Unknown mcast interface: rose0 [ 770.686882] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 770.686903] ? kasan_check_read+0x11/0x20 [ 770.686922] ? cap_capable+0x1f9/0x260 [ 770.686944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.686959] ? security_capable+0x99/0xc0 [ 770.686977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.686995] ? ns_capable_common+0x13f/0x170 [ 770.736888] ? get_anon_bdev+0x2f0/0x2f0 [ 770.740965] ? sget+0x113/0x150 2033/05/18 03:42:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000f0ffffffffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 770.744264] ? fuse_get_root_inode+0x190/0x190 [ 770.748855] mount_nodev+0x6b/0x110 [ 770.752492] fuse_mount+0x2c/0x40 [ 770.755964] mount_fs+0xae/0x328 [ 770.759353] vfs_kern_mount.part.34+0xd4/0x4d0 [ 770.763949] ? may_umount+0xb0/0xb0 [ 770.767682] ? _raw_read_unlock+0x22/0x30 [ 770.771869] ? __get_fs_type+0x97/0xc0 [ 770.775779] do_mount+0x564/0x3070 [ 770.779334] ? do_raw_spin_unlock+0x9e/0x2e0 [ 770.783765] ? copy_mount_string+0x40/0x40 [ 770.788014] ? rcu_pm_notify+0xc0/0xc0 [ 770.791923] ? copy_mount_options+0x5f/0x380 [ 770.796344] ? rcu_read_lock_sched_held+0x108/0x120 [ 770.801383] ? kmem_cache_alloc_trace+0x616/0x780 [ 770.806240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 770.811791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.817336] ? copy_mount_options+0x285/0x380 [ 770.821839] ksys_mount+0x12d/0x140 [ 770.825476] __x64_sys_mount+0xbe/0x150 [ 770.829458] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 770.834484] do_syscall_64+0x1b1/0x800 [ 770.838383] ? syscall_return_slowpath+0x5c0/0x5c0 [ 770.843325] ? syscall_return_slowpath+0x30f/0x5c0 [ 770.848274] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 770.853674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.858531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.863719] RIP: 0033:0x455a09 [ 770.866906] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 770.874706] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 770.881997] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xfbffffff00000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 770.889294] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 770.896574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 770.903939] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 770.925372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 770.933782] gfs2: not a GFS2 filesystem [ 770.964686] IPVS: Unknown mcast interface: rose0 [ 770.992715] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:22 executing program 6 (fault-call:3 fault-nth:43): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40100, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0xc9, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000387e3e67fba129c1e96a9f0061104c000000000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x1, 0xfb, &(0x7f0000000100)=""/251, 0x41f00, 0x1}, 0x48) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000200)) 2033/05/18 03:42:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000600", 0x4012}) 2033/05/18 03:42:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x4000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4800000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x100000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 771.070885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x20000000, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x9effffff00000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00000400", 0x4012}) 2033/05/18 03:42:22 executing program 7: r0 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00008f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$sock_ipx_SIOCAIPXITFCRT(r2, 0x89e0, &(0x7f0000a84ffc)) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="340000001300090f000000000000000000000000", @ANYBLOB="140000000000000014001600100001800c00070008000000"], 0x2}, 0x1}, 0x0) [ 771.159504] IPVS: Unknown mcast interface: rose0 [ 771.206799] IPVS: Unknown mcast interface: rose0 [ 771.224355] FAULT_INJECTION: forcing a failure. [ 771.224355] name failslab, interval 1, probability 0, space 0, times 0 [ 771.235698] CPU: 1 PID: 16848 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 771.242978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.252406] Call Trace: [ 771.254995] dump_stack+0x1b9/0x294 [ 771.258628] ? dump_stack_print_info.cold.2+0x52/0x52 [ 771.263813] should_fail.cold.4+0xa/0x1a [ 771.267867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 771.272973] ? trace_hardirqs_on+0xd/0x10 [ 771.277113] ? graph_lock+0x170/0x170 [ 771.280929] ? graph_lock+0x170/0x170 [ 771.284726] ? find_held_lock+0x36/0x1c0 [ 771.288788] ? __lock_is_held+0xb5/0x140 [ 771.292852] ? check_same_owner+0x320/0x320 [ 771.297184] ? rcu_note_context_switch+0x710/0x710 [ 771.302117] __should_failslab+0x124/0x180 [ 771.306355] should_failslab+0x9/0x14 [ 771.310145] kmem_cache_alloc_trace+0x2cb/0x780 [ 771.314813] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 771.319909] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 771.324917] wb_congested_get_create+0x1ca/0x450 [ 771.329677] ? wb_wakeup_delayed+0xf0/0xf0 [ 771.333919] ? __lockdep_init_map+0x105/0x590 [ 771.338413] wb_init+0x62e/0x9e0 [ 771.341784] ? bdi_put+0x180/0x180 [ 771.345320] ? mark_held_locks+0xc9/0x160 [ 771.349469] ? do_mount+0x564/0x3070 [ 771.353178] ? __raw_spin_lock_init+0x1c/0x100 [ 771.357751] ? mark_held_locks+0xc9/0x160 [ 771.361907] ? __raw_spin_lock_init+0x1c/0x100 [ 771.366492] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 771.371501] ? lockdep_init_map+0x9/0x10 [ 771.375562] bdi_init+0x353/0x510 [ 771.379025] ? wb_init+0x9e0/0x9e0 [ 771.382566] ? bdi_alloc_node+0x67/0xe0 [ 771.386529] ? bdi_alloc_node+0x67/0xe0 [ 771.390489] ? rcu_read_lock_sched_held+0x108/0x120 [ 771.395493] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 771.400754] ? _raw_spin_unlock+0x22/0x30 [ 771.404891] bdi_alloc_node+0x81/0xe0 [ 771.408681] super_setup_bdi_name+0x8b/0x220 [ 771.413074] ? kill_block_super+0x100/0x100 [ 771.417381] ? rcu_read_lock_sched_held+0x108/0x120 [ 771.422384] ? kmem_cache_alloc_trace+0x616/0x780 [ 771.427214] ? match_wildcard+0x3c0/0x3c0 [ 771.431350] ? trace_hardirqs_on+0xd/0x10 [ 771.435489] fuse_fill_super+0xe6e/0x1e20 [ 771.439630] ? fuse_get_root_inode+0x190/0x190 [ 771.444202] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 771.449209] ? kasan_check_read+0x11/0x20 [ 771.453344] ? cap_capable+0x1f9/0x260 [ 771.457225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 771.462748] ? security_capable+0x99/0xc0 [ 771.466887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 771.472424] ? ns_capable_common+0x13f/0x170 [ 771.476825] ? get_anon_bdev+0x2f0/0x2f0 [ 771.480874] ? sget+0x113/0x150 [ 771.484158] ? fuse_get_root_inode+0x190/0x190 [ 771.488729] mount_nodev+0x6b/0x110 [ 771.492343] fuse_mount+0x2c/0x40 [ 771.495785] mount_fs+0xae/0x328 [ 771.499154] vfs_kern_mount.part.34+0xd4/0x4d0 [ 771.503724] ? may_umount+0xb0/0xb0 [ 771.507338] ? _raw_read_unlock+0x22/0x30 [ 771.511474] ? __get_fs_type+0x97/0xc0 [ 771.515352] do_mount+0x564/0x3070 [ 771.518878] ? copy_mount_string+0x40/0x40 [ 771.523100] ? rcu_pm_notify+0xc0/0xc0 [ 771.526977] ? copy_mount_options+0x5f/0x380 [ 771.531385] ? rcu_read_lock_sched_held+0x108/0x120 [ 771.536404] ? kmem_cache_alloc_trace+0x616/0x780 [ 771.541241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 771.546766] ? _copy_from_user+0xdf/0x150 [ 771.550904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 771.556434] ? copy_mount_options+0x285/0x380 [ 771.560954] ksys_mount+0x12d/0x140 [ 771.564582] __x64_sys_mount+0xbe/0x150 [ 771.568543] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 771.573548] do_syscall_64+0x1b1/0x800 [ 771.577448] ? finish_task_switch+0x1ca/0x840 [ 771.581950] ? syscall_return_slowpath+0x5c0/0x5c0 [ 771.586867] ? syscall_return_slowpath+0x30f/0x5c0 [ 771.591786] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 771.597140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.601974] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:42:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 771.607162] RIP: 0033:0x455a09 [ 771.610348] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 771.618043] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 771.625299] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 771.632555] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 771.639809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 771.647064] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xe000000100000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 771.665291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0xfbffffff, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 771.765960] IPVS: Unknown mcast interface: rose0 [ 771.802585] IPVS: Unknown mcast interface: rose0 [ 771.868894] gfs2: not a GFS2 filesystem 2033/05/18 03:42:23 executing program 6 (fault-call:3 fault-nth:44): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x4]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:23 executing program 7: r0 = syz_open_dev$random(&(0x7f0000000540)='/dev/random\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x105800, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000280)={r2, r3, 0x6}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') r5 = accept4$packet(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000004c0)=0x14, 0x80800) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000500)={0x0, @loopback, @loopback}, &(0x7f0000000580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000001c0)={'team0\x00', r7}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000680)={0x0, @dev}, &(0x7f00000006c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000700)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000066c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f00000067c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000006b80)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000006bc0)={'rose0\x00', 0x0}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000380)=0x2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000006c00)={'team0\x00', 0x0}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000340)='highspeed\x00', 0xa) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000006c40)={@local, @rand_addr, 0x0}, &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006dc0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000006ec0)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000075c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x12802000}, 0xc, &(0x7f0000007580)={&(0x7f0000006f00)={0x664, r4, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r6}, {0x254, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x97}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x584d}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x4c, 0x4, [{0x90, 0x88, 0x4}, {0x40, 0x6, 0xd7f4, 0x8c}, {0x6, 0x6a3f, 0x7fff, 0x4}, {0xfffffffffffff332, 0x800, 0x8, 0x2}, {0x9, 0x3, 0x81e, 0x1}, {0x1, 0x200, 0x8, 0x2}, {0x8, 0x1, 0x3, 0xf}, {0x4, 0x5, 0x5, 0x9}, {0xffff, 0x6, 0x90a, 0x9}]}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x6}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}}]}}, {{0x8, 0x1, r10}, {0xf8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}}]}}, {{0x8, 0x1, r12}, {0x22c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffffffc000000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r14}, {0x4, 0x2}}, {{0x8, 0x1, r15}, {0xac, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1e}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}]}, 0x664}, 0x1, 0x0, 0x0, 0x4008881}, 0x40000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x100000000000000, 0xfffffffffffff0c5, 0x8, 0xde7, 0x8, 0x9, 0x80000000, 0x1c00000, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={r16, @in={{0x2, 0x4e23}}, [0x6000000000, 0x100000001, 0x2, 0x6, 0x4, 0x9, 0x0, 0x9, 0x3da2290c, 0x100000001, 0x5, 0x1e, 0x3, 0x5, 0x3]}, &(0x7f0000000180)=0x100) poll(&(0x7f0000000980)=[{r0}], 0x1, 0x1f) 2033/05/18 03:42:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x400300, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000000000000000a", 0x4012}) 2033/05/18 03:42:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 771.937597] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4000, {0x2}}, 0x20}, 0x1}, 0x0) [ 771.978280] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x4, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x34000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bb300", 0x4012}) 2033/05/18 03:42:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 7: r0 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)='ppp1\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000100)=""/98, 0x62) r1 = socket$pptp(0x18, 0x1, 0x2) pipe2(&(0x7f0000000200), 0x84800) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x5, 0x10000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0)=0x81, 0x4) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1) 2033/05/18 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf00000000000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 772.142723] FAULT_INJECTION: forcing a failure. [ 772.142723] name failslab, interval 1, probability 0, space 0, times 0 [ 772.154235] CPU: 0 PID: 16897 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 772.161522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.171078] Call Trace: [ 772.173688] dump_stack+0x1b9/0x294 [ 772.177356] ? dump_stack_print_info.cold.2+0x52/0x52 [ 772.182580] should_fail.cold.4+0xa/0x1a [ 772.186663] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 772.191911] ? graph_lock+0x170/0x170 [ 772.195728] ? lock_downgrade+0x8e0/0x8e0 [ 772.200181] ? kasan_check_write+0x14/0x20 [ 772.204670] ? find_held_lock+0x36/0x1c0 [ 772.208752] ? __lock_is_held+0xb5/0x140 [ 772.212922] ? dce_v8_0_crtc_irq+0x2a0/0x3f0 [ 772.217349] ? check_same_owner+0x320/0x320 [ 772.221684] ? rcu_note_context_switch+0x710/0x710 [ 772.226626] __should_failslab+0x124/0x180 [ 772.230876] should_failslab+0x9/0x14 [ 772.234768] kmem_cache_alloc_trace+0x2cb/0x780 [ 772.239463] ? match_wildcard+0x3c0/0x3c0 [ 772.243621] ? trace_hardirqs_on+0xd/0x10 [ 772.247785] fuse_fill_super+0xc92/0x1e20 [ 772.251950] ? fuse_get_root_inode+0x190/0x190 [ 772.256538] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 772.261562] ? kasan_check_read+0x11/0x20 [ 772.265717] ? cap_capable+0x1f9/0x260 [ 772.269617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.275177] ? security_capable+0x99/0xc0 [ 772.279444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.285011] ? ns_capable_common+0x13f/0x170 [ 772.289436] ? get_anon_bdev+0x2f0/0x2f0 [ 772.293505] ? sget+0x113/0x150 [ 772.296793] ? fuse_get_root_inode+0x190/0x190 [ 772.301404] mount_nodev+0x6b/0x110 [ 772.305049] fuse_mount+0x2c/0x40 [ 772.308527] mount_fs+0xae/0x328 [ 772.311903] vfs_kern_mount.part.34+0xd4/0x4d0 [ 772.316496] ? may_umount+0xb0/0xb0 [ 772.320132] ? _raw_read_unlock+0x22/0x30 [ 772.324287] ? __get_fs_type+0x97/0xc0 [ 772.328190] do_mount+0x564/0x3070 [ 772.331876] ? copy_mount_string+0x40/0x40 [ 772.336117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 772.340888] ? retint_kernel+0x10/0x10 [ 772.344873] ? copy_mount_options+0x1e3/0x380 [ 772.349898] ? copy_mount_options+0x1f0/0x380 [ 772.354403] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 772.359257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.364798] ? copy_mount_options+0x285/0x380 [ 772.369302] ksys_mount+0x12d/0x140 [ 772.372952] __x64_sys_mount+0xbe/0x150 [ 772.376949] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 772.382001] do_syscall_64+0x1b1/0x800 [ 772.385896] ? finish_task_switch+0x1ca/0x840 [ 772.390398] ? syscall_return_slowpath+0x5c0/0x5c0 [ 772.395329] ? syscall_return_slowpath+0x30f/0x5c0 [ 772.400333] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 772.405808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.410661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.415867] RIP: 0033:0x455a09 [ 772.419056] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 772.426857] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 772.434131] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 772.441493] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 772.448791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 772.456152] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 772.478817] IPVS: Unknown mcast interface: rose0 [ 772.505926] IPVS: Unknown mcast interface: rose0 [ 772.544940] gfs2: not a GFS2 filesystem 2033/05/18 03:42:23 executing program 6 (fault-call:3 fault-nth:45): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xdd08000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x200000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x40030000000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178be32b0200", 0x4012}) 2033/05/18 03:42:23 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)="6367726f75702e70726f63730021630b32398b2ec43ffdadf0feb0209fdece5e3a4ec8b4c744", 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x1fffffff, 0x4) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 2033/05/18 03:42:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000ad0c00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 772.688007] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x300000000000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:23 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) capset(&(0x7f0000001140)={0x19980330}, &(0x7f00009b3000)) fcntl$setlease(r0, 0x400, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') sendfile(r0, r1, &(0x7f00005d4ff8), 0x2000000000000ff) 2033/05/18 03:42:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xffffff7f]}}]}, 0x60}, 0x1}, 0x0) [ 772.748530] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x4000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0300", 0x4012}) [ 772.881578] FAULT_INJECTION: forcing a failure. [ 772.881578] name failslab, interval 1, probability 0, space 0, times 0 [ 772.892877] CPU: 1 PID: 16946 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 772.900249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.909631] Call Trace: [ 772.912240] dump_stack+0x1b9/0x294 [ 772.915887] ? dump_stack_print_info.cold.2+0x52/0x52 [ 772.921658] should_fail.cold.4+0xa/0x1a [ 772.925740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 772.930960] ? fuse_mount+0x2c/0x40 [ 772.934606] ? mount_fs+0xae/0x328 [ 772.938154] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 772.942919] ? do_mount+0x564/0x3070 [ 772.946643] ? ksys_mount+0x12d/0x140 [ 772.950456] ? __x64_sys_mount+0xbe/0x150 [ 772.954620] ? do_syscall_64+0x1b1/0x800 [ 772.958782] ? graph_lock+0x170/0x170 [ 772.962598] ? find_held_lock+0x36/0x1c0 [ 772.966667] ? find_held_lock+0x36/0x1c0 [ 772.970742] ? __lock_is_held+0xb5/0x140 [ 772.974834] ? check_same_owner+0x320/0x320 [ 772.979206] ? rcu_note_context_switch+0x710/0x710 [ 772.984152] ? kasan_check_read+0x11/0x20 [ 772.988313] __should_failslab+0x124/0x180 [ 772.992570] should_failslab+0x9/0x14 [ 772.996400] kmem_cache_alloc_node_trace+0x26f/0x770 [ 773.001530] ? _raw_spin_unlock+0x22/0x30 [ 773.005791] bdi_alloc_node+0x67/0xe0 [ 773.009610] super_setup_bdi_name+0x8b/0x220 [ 773.014037] ? kill_block_super+0x100/0x100 [ 773.018368] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.023390] ? kmem_cache_alloc_trace+0x616/0x780 [ 773.028241] ? match_wildcard+0x3c0/0x3c0 [ 773.032396] ? trace_hardirqs_on+0xd/0x10 [ 773.036555] fuse_fill_super+0xe6e/0x1e20 [ 773.040720] ? fuse_get_root_inode+0x190/0x190 [ 773.045414] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 773.050445] ? kasan_check_read+0x11/0x20 [ 773.054604] ? cap_capable+0x1f9/0x260 [ 773.058506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.064138] ? security_capable+0x99/0xc0 [ 773.068293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.073849] ? ns_capable_common+0x13f/0x170 [ 773.078358] ? get_anon_bdev+0x2f0/0x2f0 [ 773.082427] ? sget+0x113/0x150 [ 773.085725] ? fuse_get_root_inode+0x190/0x190 [ 773.090332] mount_nodev+0x6b/0x110 [ 773.094161] fuse_mount+0x2c/0x40 [ 773.097640] mount_fs+0xae/0x328 [ 773.101018] vfs_kern_mount.part.34+0xd4/0x4d0 [ 773.105609] ? may_umount+0xb0/0xb0 [ 773.109243] ? _raw_read_unlock+0x22/0x30 [ 773.113500] ? __get_fs_type+0x97/0xc0 [ 773.117395] do_mount+0x564/0x3070 [ 773.120945] ? do_raw_spin_unlock+0x9e/0x2e0 [ 773.125360] ? copy_mount_string+0x40/0x40 [ 773.129613] ? rcu_pm_notify+0xc0/0xc0 [ 773.133515] ? copy_mount_options+0x5f/0x380 [ 773.137939] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.142964] ? kmem_cache_alloc_trace+0x616/0x780 [ 773.147824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.153384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.159035] ? copy_mount_options+0x285/0x380 [ 773.163540] ksys_mount+0x12d/0x140 [ 773.167438] __x64_sys_mount+0xbe/0x150 [ 773.171419] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 773.176461] do_syscall_64+0x1b1/0x800 [ 773.180361] ? finish_task_switch+0x1ca/0x840 [ 773.184868] ? syscall_return_slowpath+0x5c0/0x5c0 [ 773.189817] ? syscall_return_slowpath+0x30f/0x5c0 [ 773.194764] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 773.200163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.205022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.210392] RIP: 0033:0x455a09 [ 773.213583] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 773.221332] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 773.228797] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 773.236177] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 773.243455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 773.250730] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 773.276250] IPVS: Unknown mcast interface: rose0 [ 773.285041] gfs2: not a GFS2 filesystem [ 773.291933] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:24 executing program 6 (fault-call:3 fault-nth:46): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7400, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2cc70b36c547337211", 0x2d}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='.\x00', 0x6, 0x2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="1efcb0f66fe9b254b3e44eb97da5a08cb7e3e53c6994cc108d4acbbbd3fc1eebd8e599736590ee863c107250419c9f9b8a6e845abb2c3e9d09e2e775356a902195b393fff013232762569aa1ad26cda2b0239912b9c03ec3191efca867f31319f8c566b25f16a859a5ceedc7dbd497581876eb8587c2d0ed3314ab6ebd092214596c354bc6c4f451c01b775d49", 0x8d, 0x5}, {&(0x7f0000000280)="a0fa3d0f4b80afeed10d68e48e5fad74224c7b1f1237e47b72038a01a1a4feb1ac3ff0b2e82c89867b7d425d018d26c48bea72295512ccbf9f2a6393fc0ea55a3f", 0x41, 0x1}], 0x800000, &(0x7f0000000300)=ANY=[@ANYBLOB="747a3d5554432c74696d655f6f66667365743d007f3b3c3733782c7573682c636865636b3d7374726963742c6769643d353535372c000000"]) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0xffffffffffffffff, 0x1, 0x1, 0x4, &(0x7f0000000340)=[0x0, 0x0], 0x2}, 0x20) connect$unix(r0, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 2033/05/18 03:42:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xfbffffff]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xffffff7f, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bc42b0200", 0x4012}) 2033/05/18 03:42:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 773.368647] nla_parse: 5 callbacks suppressed [ 773.368656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:24 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002240)={&(0x7f0000000000)={0x10, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000002200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14ea2b26e8388948c35c6a9db053a647a903063c4e675877fb1aa7c871373e8cab292566f892075a26e3434f1a6be36bf95dbccf8cf244558e115297948220e0e9cac3e7ba52b01f7e4d658eb59b858a6043101c82ce312caeea847b6e74302fcac93e763da95393210db739ae16db8b4d503c28085ddeaa78d790e15c1754e76b721a92e282c4baaedfa5ce589dc9c985518d79e0707ca4eabce81d52f6a017dd3576bc7ccb330ee42ed14595e21d9c79df2d", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}, 0x1}, 0x0) getsockname$unix(r1, &(0x7f0000000040), &(0x7f0000000140)=0x6e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000480)) r4 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)='sha1\x00', 0xfffffffffffffffa) socketpair(0x8, 0xe, 0x7f, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r5, &(0x7f0000000380)=""/197, 0xc5) keyctl$clear(0x7, r4) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000240)={r2}, 0x8) 2033/05/18 03:42:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 773.434943] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xe0000001]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0xf, {0x2}}, 0x20}, 0x1}, 0x0) [ 773.464263] IPVS: Unknown mcast interface: rose0 [ 773.511219] FAULT_INJECTION: forcing a failure. [ 773.511219] name failslab, interval 1, probability 0, space 0, times 0 [ 773.522659] CPU: 0 PID: 16985 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 773.529944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.539312] Call Trace: [ 773.541909] dump_stack+0x1b9/0x294 [ 773.545544] ? dump_stack_print_info.cold.2+0x52/0x52 [ 773.550745] should_fail.cold.4+0xa/0x1a [ 773.554811] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 773.559917] ? fuse_mount+0x2c/0x40 [ 773.563546] ? mount_fs+0xae/0x328 [ 773.567088] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 773.571845] ? do_mount+0x564/0x3070 [ 773.575554] ? ksys_mount+0x12d/0x140 [ 773.579356] ? __x64_sys_mount+0xbe/0x150 [ 773.583596] ? do_syscall_64+0x1b1/0x800 [ 773.587664] ? graph_lock+0x170/0x170 [ 773.591466] ? find_held_lock+0x36/0x1c0 [ 773.596056] ? find_held_lock+0x36/0x1c0 [ 773.600123] ? __lock_is_held+0xb5/0x140 [ 773.604198] ? check_same_owner+0x320/0x320 [ 773.608529] ? rcu_note_context_switch+0x710/0x710 [ 773.613462] ? kasan_check_read+0x11/0x20 [ 773.617619] __should_failslab+0x124/0x180 [ 773.621860] should_failslab+0x9/0x14 [ 773.625668] kmem_cache_alloc_node_trace+0x26f/0x770 [ 773.630778] ? _raw_spin_unlock+0x22/0x30 [ 773.634935] bdi_alloc_node+0x67/0xe0 [ 773.638742] super_setup_bdi_name+0x8b/0x220 [ 773.643168] ? kill_block_super+0x100/0x100 [ 773.647499] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.652523] ? kmem_cache_alloc_trace+0x616/0x780 [ 773.657369] ? match_wildcard+0x3c0/0x3c0 [ 773.661523] ? trace_hardirqs_on+0xd/0x10 [ 773.665680] fuse_fill_super+0xe6e/0x1e20 [ 773.669930] ? fuse_get_root_inode+0x190/0x190 [ 773.674522] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 773.679646] ? kasan_check_read+0x11/0x20 [ 773.683801] ? cap_capable+0x1f9/0x260 [ 773.687697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.693234] ? security_capable+0x99/0xc0 [ 773.697391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.702930] ? ns_capable_common+0x13f/0x170 [ 773.707344] ? get_anon_bdev+0x2f0/0x2f0 [ 773.711402] ? sget+0x113/0x150 [ 773.714685] ? fuse_get_root_inode+0x190/0x190 [ 773.719269] mount_nodev+0x6b/0x110 [ 773.722896] fuse_mount+0x2c/0x40 [ 773.726348] mount_fs+0xae/0x328 [ 773.729724] vfs_kern_mount.part.34+0xd4/0x4d0 [ 773.734311] ? may_umount+0xb0/0xb0 [ 773.737938] ? _raw_read_unlock+0x22/0x30 [ 773.742104] ? __get_fs_type+0x97/0xc0 [ 773.745997] do_mount+0x564/0x3070 [ 773.749538] ? do_raw_spin_unlock+0x9e/0x2e0 [ 773.753951] ? copy_mount_string+0x40/0x40 [ 773.758186] ? rcu_pm_notify+0xc0/0xc0 [ 773.762082] ? copy_mount_options+0x5f/0x380 [ 773.766490] ? rcu_read_lock_sched_held+0x108/0x120 [ 773.771517] ? kmem_cache_alloc_trace+0x616/0x780 [ 773.776367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.781918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.787468] ? copy_mount_options+0x285/0x380 [ 773.791969] ksys_mount+0x12d/0x140 [ 773.795605] __x64_sys_mount+0xbe/0x150 [ 773.799578] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 773.804599] do_syscall_64+0x1b1/0x800 [ 773.808584] ? finish_task_switch+0x1ca/0x840 [ 773.813087] ? syscall_return_slowpath+0x5c0/0x5c0 [ 773.818020] ? syscall_return_slowpath+0x30f/0x5c0 [ 773.822968] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 773.828358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.833325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.838531] RIP: 0033:0x455a09 [ 773.841721] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 773.849522] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000ffffff9e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000000007fffffff", 0x4012}) [ 773.856807] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 773.864078] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 773.871348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 773.878618] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070020c00000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) [ 773.925880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 773.953689] gfs2: not a GFS2 filesystem [ 773.979450] IPVS: Unknown mcast interface: rose0 [ 774.001908] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:25 executing program 6 (fault-call:3 fault-nth:47): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bfdfdffff00", 0x4012}) 2033/05/18 03:42:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x51fa94183d]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x3f000000, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000fffffffffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x400300, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x8100, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000400)=""/128) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$KVM_X86_SET_MCE(r1, 0x4008ae89, &(0x7f0000000140)={0x2, 0x480}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000200)={'veth0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f00000001c0)={0x2, &(0x7f0000000480)=[{}, {}]}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x97, 0x7, 0x9, 0x9}, {0x8, 0x7, 0x1, 0x7ff}]}, 0x10) [ 774.345302] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 774.371309] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x400300]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x6000, {0x2}}, 0x20}, 0x1}, 0x0) [ 774.410988] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b6e0100", 0x4012}) 2033/05/18 03:42:25 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@local, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002600)=0xe8) r0 = socket(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) [ 774.450720] FAULT_INJECTION: forcing a failure. [ 774.450720] name failslab, interval 1, probability 0, space 0, times 0 [ 774.462081] CPU: 0 PID: 17026 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 774.469399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.478778] Call Trace: [ 774.481388] dump_stack+0x1b9/0x294 [ 774.485045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 774.490441] should_fail.cold.4+0xa/0x1a [ 774.494534] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:42:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 774.499661] ? trace_hardirqs_on+0xd/0x10 [ 774.503932] ? graph_lock+0x170/0x170 [ 774.507779] ? graph_lock+0x170/0x170 [ 774.511609] ? find_held_lock+0x36/0x1c0 [ 774.515716] ? __lock_is_held+0xb5/0x140 [ 774.519899] ? check_same_owner+0x320/0x320 [ 774.524255] ? rcu_note_context_switch+0x710/0x710 [ 774.529223] __should_failslab+0x124/0x180 [ 774.533483] should_failslab+0x9/0x14 [ 774.537327] kmem_cache_alloc_trace+0x2cb/0x780 [ 774.540115] IPVS: Unknown mcast interface: rose0 [ 774.542024] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 774.542046] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 774.542068] wb_congested_get_create+0x1ca/0x450 [ 774.542089] ? wb_wakeup_delayed+0xf0/0xf0 [ 774.542104] ? __lockdep_init_map+0x105/0x590 [ 774.542121] wb_init+0x62e/0x9e0 [ 774.573846] ? bdi_put+0x180/0x180 [ 774.577418] ? mark_held_locks+0xc9/0x160 [ 774.581588] ? do_mount+0x564/0x3070 [ 774.585314] ? __raw_spin_lock_init+0x1c/0x100 [ 774.589909] ? mark_held_locks+0xc9/0x160 [ 774.594065] ? __raw_spin_lock_init+0x1c/0x100 [ 774.598656] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 774.603684] ? lockdep_init_map+0x9/0x10 [ 774.607763] bdi_init+0x353/0x510 [ 774.611230] ? wb_init+0x9e0/0x9e0 [ 774.614783] ? bdi_alloc_node+0x67/0xe0 [ 774.618762] ? bdi_alloc_node+0x67/0xe0 [ 774.622743] ? rcu_read_lock_sched_held+0x108/0x120 [ 774.627771] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 774.633057] ? _raw_spin_unlock+0x22/0x30 [ 774.637218] bdi_alloc_node+0x81/0xe0 [ 774.641044] super_setup_bdi_name+0x8b/0x220 [ 774.645462] ? kill_block_super+0x100/0x100 [ 774.649802] ? rcu_read_lock_sched_held+0x108/0x120 [ 774.654829] ? kmem_cache_alloc_trace+0x616/0x780 [ 774.659675] ? match_wildcard+0x3c0/0x3c0 [ 774.663831] ? trace_hardirqs_on+0xd/0x10 [ 774.667990] fuse_fill_super+0xe6e/0x1e20 [ 774.672197] ? fuse_get_root_inode+0x190/0x190 [ 774.676793] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 774.681841] ? kasan_check_read+0x11/0x20 [ 774.686179] ? cap_capable+0x1f9/0x260 [ 774.690078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.695642] ? security_capable+0x99/0xc0 [ 774.699811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.705360] ? ns_capable_common+0x13f/0x170 [ 774.709783] ? get_anon_bdev+0x2f0/0x2f0 [ 774.713851] ? sget+0x113/0x150 [ 774.717142] ? fuse_get_root_inode+0x190/0x190 [ 774.721848] mount_nodev+0x6b/0x110 [ 774.725568] fuse_mount+0x2c/0x40 [ 774.729033] mount_fs+0xae/0x328 [ 774.732411] vfs_kern_mount.part.34+0xd4/0x4d0 [ 774.737003] ? may_umount+0xb0/0xb0 [ 774.740642] ? _raw_read_unlock+0x22/0x30 [ 774.744791] ? __get_fs_type+0x97/0xc0 [ 774.748709] do_mount+0x564/0x3070 [ 774.752260] ? do_raw_spin_unlock+0x9e/0x2e0 [ 774.756681] ? copy_mount_string+0x40/0x40 [ 774.760952] ? rcu_pm_notify+0xc0/0xc0 [ 774.764896] ? copy_mount_options+0x5f/0x380 [ 774.769329] ? rcu_read_lock_sched_held+0x108/0x120 [ 774.774366] ? kmem_cache_alloc_trace+0x616/0x780 [ 774.779313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.784865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.790424] ? copy_mount_options+0x285/0x380 [ 774.794937] ksys_mount+0x12d/0x140 [ 774.798664] __x64_sys_mount+0xbe/0x150 [ 774.802729] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 774.807761] do_syscall_64+0x1b1/0x800 [ 774.811758] ? finish_task_switch+0x1ca/0x840 [ 774.816263] ? syscall_return_slowpath+0x5c0/0x5c0 [ 774.821214] ? syscall_return_slowpath+0x30f/0x5c0 [ 774.826195] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 774.831572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.836513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.841706] RIP: 0033:0x455a09 [ 774.844898] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 774.852609] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 774.859879] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 774.867187] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 774.874456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 774.881727] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 774.896428] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:26 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x1040000000032, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001280)=[{&(0x7f0000000040)=""/122, 0x7a}], 0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000100)=""/133) 2033/05/18 03:42:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x2, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 774.901408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 774.936568] gfs2: not a GFS2 filesystem 2033/05/18 03:42:26 executing program 6 (fault-call:3 fault-nth:48): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$getflags(r0, 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev_snmp6\x00') fstat(r1, &(0x7f0000000240)) 2033/05/18 03:42:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xfffffffb, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000c087ffffffff", 0x4012}) 2033/05/18 03:42:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x500, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x1000000]}}]}, 0x60}, 0x1}, 0x0) [ 775.325546] IPVS: Unknown mcast interface: rose0 [ 775.332218] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x20000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x10000e0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 775.385139] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x7a00, {0x2}}, 0x20}, 0x1}, 0x0) [ 775.443595] FAULT_INJECTION: forcing a failure. [ 775.443595] name failslab, interval 1, probability 0, space 0, times 0 [ 775.454968] CPU: 1 PID: 17061 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 775.476320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.485688] Call Trace: [ 775.488299] dump_stack+0x1b9/0x294 2033/05/18 03:42:26 executing program 7: r0 = inotify_init1(0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="006ffc2f07d82c99240970") fcntl$setown(r0, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x9}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x0, 0x0, 0x2, 0x2}, &(0x7f00000001c0)=0x18) r3 = fcntl$getown(r0, 0x9) ptrace$setopts(0x4200, r3, 0xf40, 0x20) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) mknod(&(0x7f0000000000)='./file0\x00', 0xa121, 0x9) ptrace$setopts(0x420d, r4, 0x8, 0x0) 2033/05/18 03:42:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 775.491951] ? dump_stack_print_info.cold.2+0x52/0x52 [ 775.497174] should_fail.cold.4+0xa/0x1a [ 775.501261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 775.506390] ? graph_lock+0x170/0x170 [ 775.510214] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 775.515438] ? find_held_lock+0x36/0x1c0 [ 775.519541] ? __lock_is_held+0xb5/0x140 [ 775.523648] ? check_same_owner+0x320/0x320 [ 775.528009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.533605] ? rcu_note_context_switch+0x710/0x710 [ 775.538561] __should_failslab+0x124/0x180 [ 775.542825] should_failslab+0x9/0x14 [ 775.546645] kmem_cache_alloc_trace+0x2cb/0x780 [ 775.551422] ? __raw_spin_lock_init+0x1c/0x100 [ 775.556027] device_create_groups_vargs+0xa7/0x270 [ 775.560972] device_create_vargs+0x46/0x60 [ 775.565221] bdi_register_va.part.10+0xbb/0x9b0 [ 775.569906] ? cgwb_kill+0x630/0x630 [ 775.573635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.579179] ? bdi_init+0x416/0x510 [ 775.582813] ? wb_init+0x9e0/0x9e0 [ 775.586358] ? bdi_alloc_node+0x67/0xe0 [ 775.590351] ? bdi_alloc_node+0x67/0xe0 [ 775.594333] ? rcu_read_lock_sched_held+0x108/0x120 [ 775.599379] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 775.604686] ? _raw_spin_unlock+0x22/0x30 [ 775.608879] bdi_register_va+0x68/0x80 [ 775.612782] super_setup_bdi_name+0x123/0x220 [ 775.617287] ? kill_block_super+0x100/0x100 [ 775.621619] ? kmem_cache_alloc_trace+0x616/0x780 [ 775.626467] ? match_wildcard+0x3c0/0x3c0 [ 775.630711] ? trace_hardirqs_on+0xd/0x10 [ 775.635094] fuse_fill_super+0xe6e/0x1e20 [ 775.639354] ? fuse_get_root_inode+0x190/0x190 [ 775.643948] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 775.648993] ? kasan_check_read+0x11/0x20 [ 775.653149] ? cap_capable+0x1f9/0x260 [ 775.657071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.662639] ? security_capable+0x99/0xc0 [ 775.666886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.672429] ? ns_capable_common+0x13f/0x170 [ 775.676865] ? get_anon_bdev+0x2f0/0x2f0 [ 775.681020] ? sget+0x113/0x150 [ 775.684326] ? fuse_get_root_inode+0x190/0x190 [ 775.688916] mount_nodev+0x6b/0x110 [ 775.692549] fuse_mount+0x2c/0x40 [ 775.696014] mount_fs+0xae/0x328 [ 775.699389] vfs_kern_mount.part.34+0xd4/0x4d0 [ 775.703976] ? retint_kernel+0x10/0x10 [ 775.707868] ? may_umount+0xb0/0xb0 [ 775.711510] do_mount+0x564/0x3070 [ 775.715060] ? do_raw_spin_unlock+0x9e/0x2e0 [ 775.719481] ? copy_mount_string+0x40/0x40 [ 775.723721] ? rcu_pm_notify+0xc0/0xc0 [ 775.727625] ? copy_mount_options+0x5f/0x380 [ 775.732045] ? rcu_read_lock_sched_held+0x108/0x120 [ 775.737074] ? kmem_cache_alloc_trace+0x616/0x780 [ 775.741930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.747481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.753109] ? copy_mount_options+0x285/0x380 [ 775.757619] ksys_mount+0x12d/0x140 [ 775.761258] __x64_sys_mount+0xbe/0x150 [ 775.765241] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 775.770264] do_syscall_64+0x1b1/0x800 [ 775.774161] ? finish_task_switch+0x1ca/0x840 [ 775.778667] ? syscall_return_slowpath+0x5c0/0x5c0 [ 775.783787] ? syscall_return_slowpath+0x30f/0x5c0 [ 775.788726] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 775.794122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.799067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.804261] RIP: 0033:0x455a09 [ 775.807453] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 775.815171] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 775.822533] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 775.829826] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 775.837103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2033/05/18 03:42:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xffffff7f00000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bb0", 0x4012}) [ 775.844398] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 775.861459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 775.888805] IPVS: Unknown mcast interface: rose0 [ 775.903617] gfs2: not a GFS2 filesystem [ 775.912974] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:27 executing program 6 (fault-call:3 fault-nth:49): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530009effffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00000000ffffffc3", 0x4012}) 2033/05/18 03:42:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x20000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:27 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000340)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000001c0)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0xffffffffffffff9c, 0x3, 0x1, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00'}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000380)={0xfff, 0xfffffffffffffff7}) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x4000) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x5}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000440)={r6, 0xe9, "80a9738a0187b6b4557eb8170b40bad1735082df9ea4617e95eecc26cbf8ac9c4b4bc60b7bec041cd0b8cb5af8edf8ef798fe6718a442d5c01c4c604b0cb000795c6b0cfdd0f614e5d27a5d851e7b67df2fa21ee5cc4dce86d1bc7d991d43a6b78e717e18678b06518262a104e42fa287d56be6872c27a5e1a8c6ea807ab3abf8418d0d3eea1d45d74d96e5e5f629ecaa1e6013526e9ec0d8e1aec2b4ec131a27bf6aac4d4df1a5668b6259193e6e36cbaaaa852212724beae6c5f8c5d7ee3a98eb7c3f04045c736fce4b29cf8d6de48805732fb91b2ffe286ac2189cf37b45dd29058e76ae163c45a"}, &(0x7f0000000540)=0xf1) 2033/05/18 03:42:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x4, {0x2}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x2000000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 776.081662] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 776.122820] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xfbffffff00000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x48, {0x2}}, 0x20}, 0x1}, 0x0) [ 776.151344] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:27 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) getsockname$llc(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000080)='veth1_to_bridge\x00', 0x3ff}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0465"], 0x2) [ 776.205714] FAULT_INJECTION: forcing a failure. [ 776.205714] name failslab, interval 1, probability 0, space 0, times 0 [ 776.217143] CPU: 1 PID: 17112 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 776.224481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.233895] Call Trace: [ 776.236620] dump_stack+0x1b9/0x294 [ 776.240275] ? dump_stack_print_info.cold.2+0x52/0x52 [ 776.245494] should_fail.cold.4+0xa/0x1a [ 776.249590] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:42:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 7: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$netlink(r1, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x4, 0x2b}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x3}}, 0xe8) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x7}, 0x1c) rt_sigaction(0x2b, &(0x7f0000000000)={0x9, {0x3}, 0x4, 0x2ed}, &(0x7f0000000040), 0x8, &(0x7f00000000c0)) [ 776.254708] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 776.259736] ? __lockdep_init_map+0x105/0x590 [ 776.264344] ? graph_lock+0x170/0x170 [ 776.268162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.273898] ? put_dec_trunc8+0x273/0x300 [ 776.278149] ? find_held_lock+0x36/0x1c0 [ 776.282340] ? __lock_is_held+0xb5/0x140 [ 776.286427] ? check_same_owner+0x320/0x320 [ 776.290776] ? device_pm_sleep_init+0xe8/0x200 [ 776.295382] ? rcu_note_context_switch+0x710/0x710 [ 776.300375] __should_failslab+0x124/0x180 [ 776.304654] should_failslab+0x9/0x14 [ 776.308650] __kmalloc_track_caller+0x2c4/0x760 [ 776.313337] ? pointer+0xa10/0xa10 [ 776.317155] ? kvasprintf_const+0x67/0x190 [ 776.321402] kvasprintf+0xa9/0x130 [ 776.324960] ? bust_spinlocks+0xe0/0xe0 [ 776.328963] ? rcu_read_lock_sched_held+0x108/0x120 [ 776.334085] kvasprintf_const+0x67/0x190 [ 776.338163] kobject_set_name_vargs+0x5b/0x150 [ 776.342761] device_create_groups_vargs+0x1ce/0x270 [ 776.347813] device_create_vargs+0x46/0x60 [ 776.352070] bdi_register_va.part.10+0xbb/0x9b0 [ 776.356758] ? cgwb_kill+0x630/0x630 [ 776.360492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.366047] ? bdi_init+0x416/0x510 [ 776.369690] ? wb_init+0x9e0/0x9e0 [ 776.373260] ? bdi_alloc_node+0x67/0xe0 [ 776.377254] ? bdi_alloc_node+0x67/0xe0 [ 776.381241] ? rcu_read_lock_sched_held+0x108/0x120 [ 776.386271] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 776.391648] ? _raw_spin_unlock+0x22/0x30 [ 776.395821] bdi_register_va+0x68/0x80 [ 776.399722] super_setup_bdi_name+0x123/0x220 [ 776.404231] ? kill_block_super+0x100/0x100 [ 776.408569] ? kmem_cache_alloc_trace+0x616/0x780 [ 776.413425] ? match_wildcard+0x3c0/0x3c0 [ 776.417585] ? trace_hardirqs_on+0xd/0x10 [ 776.421749] fuse_fill_super+0xe6e/0x1e20 [ 776.425912] ? fuse_get_root_inode+0x190/0x190 [ 776.430511] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 776.435555] ? kasan_check_read+0x11/0x20 [ 776.439718] ? cap_capable+0x1f9/0x260 [ 776.443634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.449269] ? security_capable+0x99/0xc0 [ 776.453536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.459089] ? ns_capable_common+0x13f/0x170 [ 776.463523] ? get_anon_bdev+0x2f0/0x2f0 [ 776.467596] ? sget+0x113/0x150 [ 776.471071] ? fuse_get_root_inode+0x190/0x190 [ 776.475770] mount_nodev+0x6b/0x110 [ 776.479409] fuse_mount+0x2c/0x40 [ 776.482874] mount_fs+0xae/0x328 [ 776.486253] vfs_kern_mount.part.34+0xd4/0x4d0 [ 776.490845] ? may_umount+0xb0/0xb0 [ 776.494477] ? _raw_read_unlock+0x22/0x30 [ 776.498634] ? __get_fs_type+0x97/0xc0 [ 776.502537] do_mount+0x564/0x3070 [ 776.506088] ? do_raw_spin_unlock+0x9e/0x2e0 [ 776.510512] ? copy_mount_string+0x40/0x40 [ 776.514755] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 776.519784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 776.524553] ? retint_kernel+0x10/0x10 [ 776.528454] ? copy_mount_options+0x1f0/0x380 [ 776.532955] ? copy_mount_options+0x1fa/0x380 [ 776.537461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.543008] ? copy_mount_options+0x285/0x380 [ 776.547520] ksys_mount+0x12d/0x140 [ 776.551158] __x64_sys_mount+0xbe/0x150 [ 776.555140] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 776.560170] do_syscall_64+0x1b1/0x800 [ 776.564067] ? finish_task_switch+0x1ca/0x840 [ 776.568577] ? syscall_return_slowpath+0x5c0/0x5c0 [ 776.573535] ? syscall_return_slowpath+0x30f/0x5c0 [ 776.578477] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 776.583862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.588721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.593913] RIP: 0033:0x455a09 [ 776.597104] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 776.604837] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 776.612111] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 776.619385] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 776.626658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 776.633937] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xe0000001, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x2000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 776.651145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 776.697073] gfs2: not a GFS2 filesystem [ 776.700610] IPVS: Unknown mcast interface: rose0 [ 776.723274] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:28 executing program 6 (fault-call:3 fault-nth:50): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:28 executing program 7: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x81) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r1, 0x200, 0x70bd2c, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9c65}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) r3 = dup3(r2, r2, 0x80000) r4 = semget$private(0x0, 0x0, 0x60) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0xa, 0x807, 0x1, &(0x7f0000000740)) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000006c0)={{0x4, r5, r6, r7, r8, 0x0, 0x8}, 0x2, 0x6, 0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) 2033/05/18 03:42:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b8306000400000000000100007002000c000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xfbffffff, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bd6", 0x4012}) 2033/05/18 03:42:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x2]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x2000000000000000, {0x2}}, 0x20}, 0x1}, 0x0) [ 777.089431] IPVS: Unknown mcast interface: rose0 [ 777.094411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 777.114935] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x8100, {0x2}}, 0x20}, 0x1}, 0x0) [ 777.168322] FAULT_INJECTION: forcing a failure. [ 777.168322] name failslab, interval 1, probability 0, space 0, times 0 [ 777.179792] CPU: 1 PID: 17147 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 777.187166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.196664] Call Trace: [ 777.199275] dump_stack+0x1b9/0x294 [ 777.203030] ? dump_stack_print_info.cold.2+0x52/0x52 [ 777.208422] should_fail.cold.4+0xa/0x1a [ 777.212604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 777.217822] ? graph_lock+0x170/0x170 [ 777.221659] ? find_held_lock+0x36/0x1c0 [ 777.225746] ? __lock_is_held+0xb5/0x140 [ 777.229923] ? check_same_owner+0x320/0x320 [ 777.234468] ? rcu_note_context_switch+0x710/0x710 [ 777.239602] ? check_same_owner+0x320/0x320 [ 777.243952] __should_failslab+0x124/0x180 [ 777.248388] should_failslab+0x9/0x14 [ 777.252198] __kmalloc_track_caller+0x2c4/0x760 [ 777.256886] ? debug_check_no_locks_freed+0x310/0x310 [ 777.262092] ? kasan_check_write+0x14/0x20 [ 777.266341] ? __mutex_lock+0x7d9/0x17f0 [ 777.270502] ? kstrdup_const+0x66/0x80 [ 777.274435] kstrdup+0x39/0x70 [ 777.277637] kstrdup_const+0x66/0x80 [ 777.281452] __kernfs_new_node+0xa8/0x580 [ 777.285610] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 777.290473] ? lock_downgrade+0x8e0/0x8e0 [ 777.294659] kernfs_new_node+0x80/0xf0 [ 777.298683] kernfs_create_dir_ns+0x3d/0x140 [ 777.303281] sysfs_create_dir_ns+0xbe/0x1d0 [ 777.307704] kobject_add_internal+0x354/0xac0 [ 777.312651] ? kobj_ns_type_registered+0x60/0x60 [ 777.317456] ? lock_downgrade+0x8e0/0x8e0 [ 777.321624] ? refcount_add_not_zero+0x320/0x320 [ 777.326397] ? kasan_check_read+0x11/0x20 [ 777.330650] kobject_add+0x13a/0x190 [ 777.334471] ? kset_create_and_add+0x190/0x190 [ 777.339071] ? mutex_unlock+0xd/0x10 [ 777.342801] device_add+0x3a5/0x16d0 [ 777.346544] ? device_private_init+0x230/0x230 [ 777.351133] ? kfree+0x1e9/0x260 [ 777.354519] ? kfree_const+0x5e/0x70 [ 777.358281] device_create_groups_vargs+0x1ff/0x270 [ 777.363313] device_create_vargs+0x46/0x60 [ 777.367587] bdi_register_va.part.10+0xbb/0x9b0 [ 777.372269] ? cgwb_kill+0x630/0x630 [ 777.375994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.381535] ? bdi_init+0x416/0x510 [ 777.385166] ? wb_init+0x9e0/0x9e0 [ 777.388714] ? bdi_alloc_node+0x67/0xe0 [ 777.392780] ? bdi_alloc_node+0x67/0xe0 [ 777.396759] ? rcu_read_lock_sched_held+0x108/0x120 [ 777.401785] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 777.407072] ? _raw_spin_unlock+0x22/0x30 [ 777.411227] bdi_register_va+0x68/0x80 [ 777.415231] super_setup_bdi_name+0x123/0x220 [ 777.419739] ? kill_block_super+0x100/0x100 [ 777.424072] ? kmem_cache_alloc_trace+0x616/0x780 [ 777.428924] ? match_wildcard+0x3c0/0x3c0 [ 777.433076] ? trace_hardirqs_on+0xd/0x10 [ 777.437237] fuse_fill_super+0xe6e/0x1e20 [ 777.441398] ? fuse_get_root_inode+0x190/0x190 [ 777.446006] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 777.451210] ? kasan_check_read+0x11/0x20 [ 777.455363] ? cap_capable+0x1f9/0x260 [ 777.459263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.464907] ? security_capable+0x99/0xc0 [ 777.469071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.474611] ? ns_capable_common+0x13f/0x170 [ 777.479043] ? get_anon_bdev+0x2f0/0x2f0 [ 777.483114] ? sget+0x113/0x150 [ 777.486772] ? fuse_get_root_inode+0x190/0x190 [ 777.491458] mount_nodev+0x6b/0x110 [ 777.495125] fuse_mount+0x2c/0x40 [ 777.498589] mount_fs+0xae/0x328 [ 777.501966] vfs_kern_mount.part.34+0xd4/0x4d0 [ 777.506579] ? may_umount+0xb0/0xb0 [ 777.510215] ? _raw_read_unlock+0x22/0x30 [ 777.514368] ? __get_fs_type+0x97/0xc0 [ 777.518265] do_mount+0x564/0x3070 [ 777.521816] ? do_raw_spin_unlock+0x9e/0x2e0 [ 777.526242] ? copy_mount_string+0x40/0x40 [ 777.530483] ? rcu_pm_notify+0xc0/0xc0 [ 777.534427] ? copy_mount_options+0x5f/0x380 [ 777.538847] ? rcu_read_lock_sched_held+0x108/0x120 [ 777.543878] ? kmem_cache_alloc_trace+0x616/0x780 [ 777.548745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.554300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.559846] ? copy_mount_options+0x285/0x380 [ 777.564355] ksys_mount+0x12d/0x140 [ 777.567994] __x64_sys_mount+0xbe/0x150 [ 777.571984] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 777.577019] do_syscall_64+0x1b1/0x800 [ 777.581001] ? finish_task_switch+0x1ca/0x840 [ 777.585505] ? syscall_return_slowpath+0x5c0/0x5c0 [ 777.590453] ? syscall_return_slowpath+0x30f/0x5c0 [ 777.595396] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 777.600777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.605637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.610930] RIP: 0033:0x455a09 2033/05/18 03:42:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x34000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 777.614123] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 777.621837] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 777.629200] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 777.636474] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 777.643747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 777.651206] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 777.658712] kobject_add_internal failed for 0:42 (error: -12 parent: bdi) 2033/05/18 03:42:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="df"], 0x1) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0x5, 0x40, 0x0, 0x3, 0x84}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0x9, 0x9, 0x2, 0x9, 0x81}, &(0x7f0000000280)=0x14) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000300)=[{0x4, 0x8, 0x100000000, 0x4, @time={r3, r4+30000000}, {}, {0xfffffffffffffffb, 0xfffffffffffffffc}, @queue={0x5, {0x8000, 0x401}}}, {0x9, 0x1000, 0xfffffffffffffffa, 0x7, @tick=0xf0, {0x0, 0x2000000000}, {0x0, 0x3ff}, @control={0x7, 0x5}}], 0x60) 2033/05/18 03:42:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0xfffffffb]}}]}, 0x60}, 0x1}, 0x0) [ 777.677355] IPVS: Unknown mcast interface: rose0 [ 777.682525] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 777.691640] gfs2: not a GFS2 filesystem 2033/05/18 03:42:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000034900", 0x4012}) [ 777.722932] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:29 executing program 6 (fault-call:3 fault-nth:51): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xe000000100000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530007fffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 7: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="220000002000070700be0000090007010a0000ff0c00000000200010050013800100", 0x22) r1 = getpid() r2 = fcntl$getown(r0, 0x9) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$VT_RELDISP(r3, 0x5605) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r3, r0, 0x2}) 2033/05/18 03:42:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000031800", 0x4012}) 2033/05/18 03:42:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x40030000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x7592da12}}, 0x20}, 0x1}, 0x0) [ 777.886225] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x3}}, 0x20}, 0x1}, 0x0) [ 777.918638] IPVS: Unknown mcast interface: rose0 [ 777.946525] FAULT_INJECTION: forcing a failure. [ 777.946525] name failslab, interval 1, probability 0, space 0, times 0 [ 777.957814] CPU: 1 PID: 17192 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 777.965990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.975437] Call Trace: [ 777.978045] dump_stack+0x1b9/0x294 [ 777.981783] ? dump_stack_print_info.cold.2+0x52/0x52 [ 777.987084] should_fail.cold.4+0xa/0x1a [ 777.991253] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 777.996379] ? graph_lock+0x170/0x170 [ 778.000214] ? find_held_lock+0x36/0x1c0 [ 778.004294] ? __lock_is_held+0xb5/0x140 [ 778.008385] ? check_same_owner+0x320/0x320 [ 778.012722] ? rcu_note_context_switch+0x710/0x710 [ 778.018098] ? check_same_owner+0x320/0x320 [ 778.022432] __should_failslab+0x124/0x180 [ 778.026683] should_failslab+0x9/0x14 [ 778.031100] __kmalloc_track_caller+0x2c4/0x760 [ 778.035796] ? debug_check_no_locks_freed+0x310/0x310 [ 778.041006] ? kasan_check_write+0x14/0x20 2033/05/18 03:42:29 executing program 7: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x0, 0x80000001}) [ 778.045247] ? __mutex_lock+0x7d9/0x17f0 [ 778.049330] ? kstrdup_const+0x66/0x80 [ 778.053473] kstrdup+0x39/0x70 [ 778.056698] kstrdup_const+0x66/0x80 [ 778.060427] __kernfs_new_node+0xa8/0x580 [ 778.064593] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 778.069375] ? lock_downgrade+0x8e0/0x8e0 [ 778.073554] kernfs_new_node+0x80/0xf0 [ 778.077461] kernfs_create_dir_ns+0x3d/0x140 [ 778.081894] sysfs_create_dir_ns+0xbe/0x1d0 [ 778.086230] kobject_add_internal+0x354/0xac0 [ 778.090742] ? kobj_ns_type_registered+0x60/0x60 2033/05/18 03:42:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8915, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) read$eventfd(r2, &(0x7f00000002c0), 0x318) [ 778.095523] ? lock_downgrade+0x8e0/0x8e0 [ 778.099803] ? refcount_add_not_zero+0x320/0x320 [ 778.104695] ? kasan_check_read+0x11/0x20 [ 778.108864] kobject_add+0x13a/0x190 [ 778.112623] ? kset_create_and_add+0x190/0x190 [ 778.117348] ? mutex_unlock+0xd/0x10 [ 778.121213] device_add+0x3a5/0x16d0 [ 778.125060] ? device_private_init+0x230/0x230 [ 778.129657] ? kfree+0x1e9/0x260 [ 778.133050] ? kfree_const+0x5e/0x70 [ 778.136872] device_create_groups_vargs+0x1ff/0x270 [ 778.141910] device_create_vargs+0x46/0x60 2033/05/18 03:42:29 executing program 7: syz_emit_ethernet(0x66, &(0x7f0000000080)={@random="85a970b0146b", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000], 0x1}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x6, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4], 0x1}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, 0x0) [ 778.146255] bdi_register_va.part.10+0xbb/0x9b0 [ 778.150948] ? cgwb_kill+0x630/0x630 [ 778.154699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.160331] ? bdi_init+0x416/0x510 [ 778.163987] ? wb_init+0x9e0/0x9e0 [ 778.167621] ? bdi_alloc_node+0x67/0xe0 [ 778.171778] ? bdi_alloc_node+0x67/0xe0 [ 778.175762] ? rcu_read_lock_sched_held+0x108/0x120 [ 778.180797] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 778.186088] ? _raw_spin_unlock+0x22/0x30 [ 778.190287] bdi_register_va+0x68/0x80 2033/05/18 03:42:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 778.194203] super_setup_bdi_name+0x123/0x220 [ 778.198731] ? kill_block_super+0x100/0x100 [ 778.203074] ? kmem_cache_alloc_trace+0x616/0x780 [ 778.207937] ? match_wildcard+0x3c0/0x3c0 [ 778.212188] ? trace_hardirqs_on+0xd/0x10 [ 778.216364] fuse_fill_super+0xe6e/0x1e20 [ 778.220533] ? fuse_get_root_inode+0x190/0x190 [ 778.225134] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 778.230165] ? kasan_check_read+0x11/0x20 [ 778.234324] ? cap_capable+0x1f9/0x260 [ 778.238336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.243985] ? security_capable+0x99/0xc0 2033/05/18 03:42:29 executing program 7: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nfsfs\x00') socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x615}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMBIC(r2, 0x5414, &(0x7f0000000080)) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x3, @broadcast=0xffffffff}}, 0x1e) [ 778.248144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.253801] ? ns_capable_common+0x13f/0x170 [ 778.258411] ? get_anon_bdev+0x2f0/0x2f0 [ 778.262483] ? sget+0x113/0x150 [ 778.265792] ? fuse_get_root_inode+0x190/0x190 [ 778.270395] mount_nodev+0x6b/0x110 [ 778.274208] fuse_mount+0x2c/0x40 [ 778.277673] mount_fs+0xae/0x328 [ 778.281069] vfs_kern_mount.part.34+0xd4/0x4d0 [ 778.285661] ? may_umount+0xb0/0xb0 [ 778.289384] ? _raw_read_unlock+0x22/0x30 [ 778.293539] ? __get_fs_type+0x97/0xc0 [ 778.297440] do_mount+0x564/0x3070 [ 778.301081] ? do_raw_spin_unlock+0x9e/0x2e0 [ 778.305517] ? copy_mount_string+0x40/0x40 [ 778.309762] ? rcu_pm_notify+0xc0/0xc0 [ 778.313692] ? copy_mount_options+0x5f/0x380 [ 778.318292] ? rcu_read_lock_sched_held+0x108/0x120 [ 778.323340] ? kmem_cache_alloc_trace+0x616/0x780 [ 778.328206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.333777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.339321] ? copy_mount_options+0x285/0x380 [ 778.343834] ksys_mount+0x12d/0x140 2033/05/18 03:42:29 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) acct(&(0x7f0000000180)='./file0\x00') acct(0x0) [ 778.347563] __x64_sys_mount+0xbe/0x150 [ 778.351549] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 778.356575] do_syscall_64+0x1b1/0x800 [ 778.360479] ? finish_task_switch+0x1ca/0x840 [ 778.364989] ? syscall_return_slowpath+0x5c0/0x5c0 [ 778.369930] ? syscall_return_slowpath+0x30f/0x5c0 [ 778.374971] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 778.380362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.385224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.390501] RIP: 0033:0x455a09 [ 778.391625] Process accounting resumed [ 778.393689] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 778.393705] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 778.393714] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 778.393723] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 778.393732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 778.393740] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 778.393929] kobject_add_internal failed for 0:42 (error: -12 parent: bdi) [ 778.446443] Process accounting resumed 2033/05/18 03:42:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x3d1894fa51000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000300)="0047fc2f00d82c9924097087ddb3022f9e82161c777f5740c708c01c43da4a28eea4b4f474bff09b91adc89e0a7ed150f59766a130d0939bb90dcabd9a1e43156f4f49a782683f17b2dd7c2ca5d9319ec4a48cac05ef3728b7e3d52c5e034fa7d46568bf5cc6458caa30cc9993ff4e36875966be49f79c8e77f5a3788ca45d45300bbb6d505c95966d6e69c2a3c8ba417dd3da14d7") io_setup(0x1, &(0x7f0000000040)=0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom(r2, &(0x7f0000000100)=""/89, 0x59, 0x0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80) io_getevents(r1, 0x1, 0x800000000000021, &(0x7f00000001c0)=[{}], &(0x7f0000000080)={0x0, 0x1c9c380}) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) 2033/05/18 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x5e}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00 \x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 6 (fault-call:3 fault-nth:52): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 778.471969] IPVS: Unknown mcast interface: rose0 [ 778.477375] gfs2: not a GFS2 filesystem [ 778.497794] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bb32b0200", 0x4012}) 2033/05/18 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6800000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x100000000000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xfbffffff]}}]}, 0x60}, 0x1}, 0x0) [ 778.647904] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bd3", 0x4012}) 2033/05/18 03:42:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x400000000000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 778.685521] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 778.707645] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 778.726696] FAULT_INJECTION: forcing a failure. [ 778.726696] name failslab, interval 1, probability 0, space 0, times 0 [ 778.738005] CPU: 1 PID: 17246 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 778.745494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.754855] Call Trace: 2033/05/18 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x2000000000000000}}, 0x20}, 0x1}, 0x0) [ 778.757458] dump_stack+0x1b9/0x294 [ 778.761106] ? dump_stack_print_info.cold.2+0x52/0x52 [ 778.766333] should_fail.cold.4+0xa/0x1a [ 778.770411] ? __kmalloc_track_caller+0x14a/0x760 [ 778.775269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 778.780388] ? device_add+0x3a5/0x16d0 [ 778.784333] ? device_create_groups_vargs+0x1ff/0x270 [ 778.789533] ? device_create_vargs+0x46/0x60 [ 778.793954] ? bdi_register_va.part.10+0xbb/0x9b0 [ 778.798805] ? bdi_register_va+0x68/0x80 [ 778.802881] ? super_setup_bdi_name+0x123/0x220 [ 778.807566] ? fuse_fill_super+0xe6e/0x1e20 [ 778.811985] ? graph_lock+0x170/0x170 [ 778.815906] ? do_mount+0x564/0x3070 [ 778.819638] ? ksys_mount+0x12d/0x140 [ 778.823442] ? __x64_sys_mount+0xbe/0x150 [ 778.827624] ? do_syscall_64+0x1b1/0x800 [ 778.831713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.837193] ? find_held_lock+0x36/0x1c0 [ 778.841263] ? __lock_is_held+0xb5/0x140 [ 778.845434] ? check_same_owner+0x320/0x320 [ 778.849767] ? rcu_note_context_switch+0x710/0x710 [ 778.854709] ? rcu_read_lock_sched_held+0x108/0x120 [ 778.859737] __should_failslab+0x124/0x180 [ 778.863980] should_failslab+0x9/0x14 [ 778.867792] kmem_cache_alloc+0x2af/0x760 [ 778.871946] ? memcpy+0x45/0x50 [ 778.875231] ? kstrdup+0x59/0x70 [ 778.878614] __kernfs_new_node+0xe7/0x580 [ 778.882785] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 778.887555] ? lock_downgrade+0x8e0/0x8e0 [ 778.891745] kernfs_new_node+0x80/0xf0 [ 778.895671] kernfs_create_dir_ns+0x3d/0x140 [ 778.900277] sysfs_create_dir_ns+0xbe/0x1d0 [ 778.904647] kobject_add_internal+0x354/0xac0 [ 778.909257] ? kobj_ns_type_registered+0x60/0x60 [ 778.914027] ? lock_downgrade+0x8e0/0x8e0 [ 778.918186] ? refcount_add_not_zero+0x320/0x320 [ 778.923609] ? kasan_check_read+0x11/0x20 [ 778.927766] kobject_add+0x13a/0x190 [ 778.931502] ? kset_create_and_add+0x190/0x190 [ 778.936118] ? mutex_unlock+0xd/0x10 [ 778.939851] device_add+0x3a5/0x16d0 [ 778.943666] ? device_private_init+0x230/0x230 [ 778.948254] ? kfree+0x1e9/0x260 [ 778.951836] ? kfree_const+0x5e/0x70 2033/05/18 03:42:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000ac0c00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 778.955650] device_create_groups_vargs+0x1ff/0x270 [ 778.960683] device_create_vargs+0x46/0x60 [ 778.964946] bdi_register_va.part.10+0xbb/0x9b0 [ 778.969620] ? cgwb_kill+0x630/0x630 [ 778.973372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.979089] ? bdi_init+0x416/0x510 [ 778.982720] ? wb_init+0x9e0/0x9e0 [ 778.986624] ? bdi_alloc_node+0x67/0xe0 [ 778.990689] ? bdi_alloc_node+0x67/0xe0 [ 778.994686] ? rcu_read_lock_sched_held+0x108/0x120 [ 778.999730] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 779.005017] ? _raw_spin_unlock+0x22/0x30 [ 779.009182] bdi_register_va+0x68/0x80 [ 779.013083] super_setup_bdi_name+0x123/0x220 [ 779.017585] ? kill_block_super+0x100/0x100 [ 779.021919] ? kmem_cache_alloc_trace+0x616/0x780 [ 779.026872] ? match_wildcard+0x3c0/0x3c0 [ 779.031026] ? trace_hardirqs_on+0xd/0x10 [ 779.035288] fuse_fill_super+0xe6e/0x1e20 [ 779.040060] ? fuse_get_root_inode+0x190/0x190 [ 779.044652] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 779.049685] ? kasan_check_read+0x11/0x20 [ 779.053854] ? cap_capable+0x1f9/0x260 [ 779.057765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.063340] ? security_capable+0x99/0xc0 [ 779.067611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.073152] ? ns_capable_common+0x13f/0x170 [ 779.077570] ? get_anon_bdev+0x2f0/0x2f0 [ 779.081637] ? sget+0x113/0x150 [ 779.084923] ? fuse_get_root_inode+0x190/0x190 [ 779.089514] mount_nodev+0x6b/0x110 [ 779.093150] fuse_mount+0x2c/0x40 [ 779.096608] mount_fs+0xae/0x328 [ 779.099981] vfs_kern_mount.part.34+0xd4/0x4d0 [ 779.104570] ? may_umount+0xb0/0xb0 [ 779.108199] ? _raw_read_unlock+0x22/0x30 [ 779.112349] ? __get_fs_type+0x97/0xc0 [ 779.116243] do_mount+0x564/0x3070 [ 779.119795] ? do_raw_spin_unlock+0x9e/0x2e0 [ 779.121816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 779.124324] ? copy_mount_string+0x40/0x40 [ 779.124341] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 779.124358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.124382] ? retint_kernel+0x10/0x10 [ 779.150975] ? copy_mount_options+0x1f0/0x380 2033/05/18 03:42:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6000000}}, 0x20}, 0x1}, 0x0) [ 779.155593] ? copy_mount_options+0x202/0x380 [ 779.160124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.165668] ? copy_mount_options+0x285/0x380 [ 779.170178] ksys_mount+0x12d/0x140 [ 779.173814] __x64_sys_mount+0xbe/0x150 [ 779.177798] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 779.182827] do_syscall_64+0x1b1/0x800 [ 779.186726] ? finish_task_switch+0x1ca/0x840 [ 779.191231] ? syscall_return_slowpath+0x5c0/0x5c0 [ 779.196287] ? syscall_return_slowpath+0x30f/0x5c0 [ 779.201320] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 779.206694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.211549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.216740] RIP: 0033:0x455a09 [ 779.219925] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 779.227992] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 779.235303] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 779.242590] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 779.249890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2033/05/18 03:42:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xfffffffb]}}]}, 0x60}, 0x1}, 0x0) [ 779.257167] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 779.264754] kobject_add_internal failed for 0:42 (error: -12 parent: bdi) [ 779.287478] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 779.302612] gfs2: not a GFS2 filesystem [ 779.326684] IPVS: Unknown mcast interface: rose0 [ 779.340883] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0xa, 0xfffffffffffffffc, 0x0, @loopback={0xff00000000000000, 0x1}, 0x1ffffff}, 0x1c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000000c0)=0x36) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x3ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x9, 0x81, 0x5ac, 0x8, 0x3, 0x5, 0x7, {r2, @in6={{0xa, 0x4e22, 0xda, @empty, 0x2}}, 0x8, 0x3, 0x2, 0x8}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000002c0)=[@in={0x2, 0x4e24}, @in6={0xa, 0x4e20, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x100000001}, @in={0x2, 0x4e23, @rand_addr=0x3}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x17}, 0x12}, @in6={0xa, 0x4e22, 0xb0b, @mcast2={0xff, 0x2, [], 0x1}}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0x9}, @in6={0xa, 0x4e23, 0x6, @loopback={0x0, 0x1}, 0x40}, @in6={0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}, 0x800}], 0xc8) 2033/05/18 03:42:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x51fa94183d]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:30 executing program 6 (fault-call:3 fault-nth:53): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x500}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022ba7", 0x4012}) 2033/05/18 03:42:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x710de96e12, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 779.796386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 779.828564] IPVS: Unknown mcast interface: rose0 [ 779.839691] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x34000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xdd08}}, 0x20}, 0x1}, 0x0) [ 779.912770] FAULT_INJECTION: forcing a failure. [ 779.912770] name failslab, interval 1, probability 0, space 0, times 0 [ 779.924067] CPU: 0 PID: 17298 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 779.931345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.940711] Call Trace: [ 779.943328] dump_stack+0x1b9/0x294 [ 779.946974] ? dump_stack_print_info.cold.2+0x52/0x52 [ 779.952192] ? mutex_trylock+0x2a0/0x2a0 [ 779.956418] should_fail.cold.4+0xa/0x1a [ 779.960606] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 779.965748] ? graph_lock+0x170/0x170 [ 779.969558] ? find_held_lock+0x36/0x1c0 [ 779.973629] ? find_held_lock+0x36/0x1c0 [ 779.977726] ? __lock_is_held+0xb5/0x140 [ 779.981812] ? check_same_owner+0x320/0x320 [ 779.986138] ? graph_lock+0x170/0x170 [ 779.989952] ? rcu_note_context_switch+0x710/0x710 [ 779.994889] ? kasan_check_write+0x14/0x20 [ 779.999129] __should_failslab+0x124/0x180 [ 780.003374] should_failslab+0x9/0x14 [ 780.007182] kmem_cache_alloc+0x2af/0x760 [ 780.011341] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 780.016362] __kernfs_new_node+0xe7/0x580 [ 780.020517] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 780.025285] ? lock_downgrade+0x8e0/0x8e0 [ 780.029440] ? kasan_check_read+0x11/0x20 [ 780.033589] ? do_raw_spin_unlock+0x9e/0x2e0 [ 780.038013] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 780.042620] kernfs_new_node+0x80/0xf0 [ 780.046520] kernfs_create_link+0x33/0x180 [ 780.050767] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 780.056056] sysfs_create_link+0x65/0xc0 [ 780.060129] device_add+0x481/0x16d0 [ 780.063854] ? device_private_init+0x230/0x230 [ 780.068440] ? kfree+0x1e9/0x260 [ 780.071814] ? kfree_const+0x5e/0x70 [ 780.075537] device_create_groups_vargs+0x1ff/0x270 [ 780.080565] device_create_vargs+0x46/0x60 [ 780.084809] bdi_register_va.part.10+0xbb/0x9b0 [ 780.089481] ? cgwb_kill+0x630/0x630 [ 780.093197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.098735] ? bdi_init+0x416/0x510 [ 780.102365] ? wb_init+0x9e0/0x9e0 [ 780.105911] ? bdi_alloc_node+0x67/0xe0 [ 780.109886] ? bdi_alloc_node+0x67/0xe0 [ 780.113864] ? rcu_read_lock_sched_held+0x108/0x120 [ 780.118885] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 780.124166] ? _raw_spin_unlock+0x22/0x30 [ 780.128319] bdi_register_va+0x68/0x80 [ 780.132208] super_setup_bdi_name+0x123/0x220 [ 780.136712] ? kill_block_super+0x100/0x100 [ 780.141034] ? kmem_cache_alloc_trace+0x616/0x780 [ 780.145881] ? match_wildcard+0x3c0/0x3c0 [ 780.150032] ? trace_hardirqs_on+0xd/0x10 [ 780.154189] fuse_fill_super+0xe6e/0x1e20 [ 780.158346] ? fuse_get_root_inode+0x190/0x190 [ 780.162935] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 780.167960] ? kasan_check_read+0x11/0x20 [ 780.172114] ? cap_capable+0x1f9/0x260 [ 780.176011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.181557] ? security_capable+0x99/0xc0 [ 780.185713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.191252] ? ns_capable_common+0x13f/0x170 [ 780.195665] ? get_anon_bdev+0x2f0/0x2f0 [ 780.199733] ? sget+0x113/0x150 [ 780.203789] ? fuse_get_root_inode+0x190/0x190 [ 780.208501] mount_nodev+0x6b/0x110 [ 780.212134] fuse_mount+0x2c/0x40 [ 780.215602] mount_fs+0xae/0x328 [ 780.218980] vfs_kern_mount.part.34+0xd4/0x4d0 [ 780.223568] ? may_umount+0xb0/0xb0 [ 780.227199] ? _raw_read_unlock+0x22/0x30 [ 780.231351] ? __get_fs_type+0x97/0xc0 [ 780.235244] do_mount+0x564/0x3070 [ 780.238787] ? do_raw_spin_unlock+0x9e/0x2e0 [ 780.243198] ? copy_mount_string+0x40/0x40 [ 780.247436] ? rcu_pm_notify+0xc0/0xc0 [ 780.251331] ? copy_mount_options+0x5f/0x380 [ 780.255743] ? rcu_read_lock_sched_held+0x108/0x120 [ 780.260766] ? kmem_cache_alloc_trace+0x616/0x780 [ 780.265617] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 780.271166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.276715] ? copy_mount_options+0x285/0x380 [ 780.281482] ksys_mount+0x12d/0x140 [ 780.285136] __x64_sys_mount+0xbe/0x150 [ 780.289115] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 780.294154] do_syscall_64+0x1b1/0x800 [ 780.298054] ? syscall_return_slowpath+0x5c0/0x5c0 [ 780.302991] ? syscall_return_slowpath+0x30f/0x5c0 [ 780.307930] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 780.313302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.318162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.323371] RIP: 0033:0x455a09 [ 780.326562] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 780.334539] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 780.341823] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 780.349099] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 780.356373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 780.363646] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 780.379170] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 780.410160] gfs2: not a GFS2 filesystem 2033/05/18 03:42:31 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/76) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000080)=0x80000000002, 0x4) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240)={0x303, 0x33}, 0x4) sendto$inet(r0, &(0x7f0000000100)="81", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f00000033c0), 0x122, &(0x7f0000000000)}, 0x8}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) recvfrom$inet(r0, &(0x7f0000000780)=""/240, 0x6e, 0x2, &(0x7f00000001c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x930000) 2033/05/18 03:42:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x100000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x126ee90d71000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bae00", 0x4012}) 2033/05/18 03:42:31 executing program 6 (fault-call:3 fault-nth:54): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x300}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xfbffffff00000000]}}]}, 0x60}, 0x1}, 0x0) [ 780.507998] IPVS: Unknown mcast interface: rose0 [ 780.513415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000000000000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:31 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x135001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x21, 0x7e66}) r2 = dup3(r0, r1, 0x80000) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000180)=""/189, &(0x7f0000000100)=0xbd) ioctl$KVM_ENABLE_CAP(r1, 0xc208ae62, &(0x7f0000000000)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) [ 780.568804] IPVS: Unknown mcast interface: rose0 [ 780.715702] FAULT_INJECTION: forcing a failure. [ 780.715702] name failslab, interval 1, probability 0, space 0, times 0 [ 780.727057] CPU: 1 PID: 17335 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 780.734449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.743889] Call Trace: [ 780.746587] dump_stack+0x1b9/0x294 [ 780.750223] ? dump_stack_print_info.cold.2+0x52/0x52 [ 780.755433] ? mutex_trylock+0x2a0/0x2a0 [ 780.759505] should_fail.cold.4+0xa/0x1a [ 780.763576] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 780.768693] ? graph_lock+0x170/0x170 [ 780.772506] ? find_held_lock+0x36/0x1c0 [ 780.776572] ? find_held_lock+0x36/0x1c0 [ 780.780642] ? __lock_is_held+0xb5/0x140 [ 780.784716] ? check_same_owner+0x320/0x320 [ 780.789042] ? graph_lock+0x170/0x170 [ 780.792846] ? rcu_note_context_switch+0x710/0x710 [ 780.797780] ? kasan_check_write+0x14/0x20 [ 780.802020] __should_failslab+0x124/0x180 [ 780.806259] should_failslab+0x9/0x14 [ 780.810063] kmem_cache_alloc+0x2af/0x760 [ 780.814226] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 780.819249] __kernfs_new_node+0xe7/0x580 [ 780.823407] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 780.828176] ? lock_downgrade+0x8e0/0x8e0 [ 780.832335] ? kasan_check_read+0x11/0x20 [ 780.836486] ? do_raw_spin_unlock+0x9e/0x2e0 [ 780.840917] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 780.845508] kernfs_new_node+0x80/0xf0 [ 780.849420] kernfs_create_link+0x33/0x180 [ 780.853661] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 780.858940] sysfs_create_link+0x65/0xc0 [ 780.863007] device_add+0x481/0x16d0 [ 780.866730] ? device_private_init+0x230/0x230 [ 780.871323] ? kfree+0x1e9/0x260 [ 780.874731] ? kfree_const+0x5e/0x70 [ 780.878455] device_create_groups_vargs+0x1ff/0x270 [ 780.883479] device_create_vargs+0x46/0x60 [ 780.887722] bdi_register_va.part.10+0xbb/0x9b0 [ 780.892413] ? cgwb_kill+0x630/0x630 [ 780.896142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.901688] ? bdi_init+0x416/0x510 [ 780.905312] ? wb_init+0x9e0/0x9e0 [ 780.908853] ? bdi_alloc_node+0x67/0xe0 [ 780.912831] ? bdi_alloc_node+0x67/0xe0 [ 780.916822] ? rcu_read_lock_sched_held+0x108/0x120 [ 780.922473] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 780.927933] ? _raw_spin_unlock+0x22/0x30 [ 780.932183] bdi_register_va+0x68/0x80 [ 780.936078] super_setup_bdi_name+0x123/0x220 [ 780.940582] ? kill_block_super+0x100/0x100 [ 780.944909] ? kmem_cache_alloc_trace+0x616/0x780 [ 780.949753] ? match_wildcard+0x3c0/0x3c0 [ 780.953903] ? trace_hardirqs_on+0xd/0x10 [ 780.958148] fuse_fill_super+0xe6e/0x1e20 [ 780.962306] ? fuse_get_root_inode+0x190/0x190 [ 780.966983] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 780.972098] ? kasan_check_read+0x11/0x20 [ 780.976254] ? cap_capable+0x1f9/0x260 [ 780.980153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.985865] ? security_capable+0x99/0xc0 [ 780.990020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.995561] ? ns_capable_common+0x13f/0x170 [ 781.000005] ? get_anon_bdev+0x2f0/0x2f0 [ 781.004084] ? sget+0x113/0x150 [ 781.007375] ? fuse_get_root_inode+0x190/0x190 [ 781.011981] mount_nodev+0x6b/0x110 [ 781.015609] fuse_mount+0x2c/0x40 [ 781.019064] mount_fs+0xae/0x328 [ 781.022441] vfs_kern_mount.part.34+0xd4/0x4d0 [ 781.027027] ? may_umount+0xb0/0xb0 [ 781.030654] ? _raw_read_unlock+0x22/0x30 [ 781.034813] ? __get_fs_type+0x97/0xc0 [ 781.038816] do_mount+0x564/0x3070 [ 781.042378] ? copy_mount_string+0x40/0x40 [ 781.046723] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 781.051833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 781.056597] ? retint_kernel+0x10/0x10 [ 781.060497] ? copy_mount_options+0x1f0/0x380 [ 781.064996] ? copy_mount_options+0x1fa/0x380 [ 781.069589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.075214] ? copy_mount_options+0x285/0x380 [ 781.079715] ksys_mount+0x12d/0x140 [ 781.083351] __x64_sys_mount+0xbe/0x150 [ 781.087325] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 781.092375] do_syscall_64+0x1b1/0x800 [ 781.096285] ? finish_task_switch+0x1ca/0x840 [ 781.100784] ? syscall_return_slowpath+0x5c0/0x5c0 [ 781.105718] ? syscall_return_slowpath+0x30f/0x5c0 [ 781.110655] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 781.116981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.121845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.127044] RIP: 0033:0x455a09 [ 781.130237] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 781.137953] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 781.145221] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 781.152664] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 781.160109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 781.167382] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 781.185862] gfs2: not a GFS2 filesystem 2033/05/18 03:42:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b02e200", 0x4012}) 2033/05/18 03:42:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x4c}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000343c400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:32 executing program 7: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00') 2033/05/18 03:42:32 executing program 6 (fault-call:3 fault-nth:55): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x400000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x200000000000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 781.262587] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 781.306070] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:32 executing program 7: 2033/05/18 03:42:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x1000000, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xe0000001]}}]}, 0x60}, 0x1}, 0x0) [ 781.331068] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xffffffc0}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000002", 0x4012}) 2033/05/18 03:42:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000cac00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:32 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x3ff, 0x10000000000009, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)="7e770d23e6bc8354883fe00291d1ecb590486881f9749352cc8c3e393f88fbd64c9de98818d3bd3f79a3b4760c782e7c6a2d023025d805fa00e6013005f8b8d83cd61df149475261ee3baf25698f35720dc89e0716e8a8bdb3354884dd136ea068b38f171f8c5bdb2a00ec20a026c3186ccb80d19fc1451bc9196e"}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000100), &(0x7f0000000140), 0x3}, 0x20) 2033/05/18 03:42:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 781.450266] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 781.483710] IPVS: Unknown mcast interface: rose0 [ 781.518544] IPVS: Unknown mcast interface: rose0 [ 781.551570] FAULT_INJECTION: forcing a failure. [ 781.551570] name failslab, interval 1, probability 0, space 0, times 0 [ 781.562916] CPU: 1 PID: 17365 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 781.570200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.579558] Call Trace: [ 781.582156] dump_stack+0x1b9/0x294 [ 781.585795] ? dump_stack_print_info.cold.2+0x52/0x52 [ 781.591005] should_fail.cold.4+0xa/0x1a [ 781.595078] ? __kmalloc_track_caller+0x14a/0x760 [ 781.599922] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 781.605030] ? device_create_groups_vargs+0x1ff/0x270 [ 781.610223] ? device_create_vargs+0x46/0x60 [ 781.614635] ? bdi_register_va.part.10+0xbb/0x9b0 [ 781.619475] ? bdi_register_va+0x68/0x80 [ 781.623535] ? super_setup_bdi_name+0x123/0x220 [ 781.628206] ? fuse_fill_super+0xe6e/0x1e20 [ 781.632524] ? mount_nodev+0x6b/0x110 [ 781.636327] ? graph_lock+0x170/0x170 [ 781.640123] ? ksys_mount+0x12d/0x140 [ 781.643919] ? __x64_sys_mount+0xbe/0x150 [ 781.648069] ? do_syscall_64+0x1b1/0x800 [ 781.652130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.657494] ? find_held_lock+0x36/0x1c0 [ 781.661557] ? __lock_is_held+0xb5/0x140 [ 781.665632] ? check_same_owner+0x320/0x320 [ 781.669957] ? rcu_note_context_switch+0x710/0x710 [ 781.674889] ? rcu_read_lock_sched_held+0x108/0x120 [ 781.679914] __should_failslab+0x124/0x180 [ 781.684155] should_failslab+0x9/0x14 [ 781.687960] kmem_cache_alloc+0x2af/0x760 [ 781.692201] ? memcpy+0x45/0x50 [ 781.695490] ? kstrdup+0x59/0x70 [ 781.698884] __kernfs_new_node+0xe7/0x580 [ 781.703035] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 781.707803] ? lock_downgrade+0x8e0/0x8e0 [ 781.711979] ? kasan_check_read+0x11/0x20 [ 781.716225] ? do_raw_spin_unlock+0x9e/0x2e0 [ 781.720738] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 781.725339] kernfs_new_node+0x80/0xf0 [ 781.729232] kernfs_create_link+0x33/0x180 [ 781.733473] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 781.738759] sysfs_create_link+0x65/0xc0 [ 781.742824] device_add+0x7a0/0x16d0 [ 781.746549] ? device_private_init+0x230/0x230 [ 781.751129] ? kfree+0x1e9/0x260 [ 781.754512] ? kfree_const+0x5e/0x70 [ 781.758331] device_create_groups_vargs+0x1ff/0x270 [ 781.763350] device_create_vargs+0x46/0x60 [ 781.767590] bdi_register_va.part.10+0xbb/0x9b0 [ 781.772267] ? cgwb_kill+0x630/0x630 [ 781.775988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.781543] ? bdi_init+0x416/0x510 [ 781.785180] ? wb_init+0x9e0/0x9e0 [ 781.788724] ? bdi_alloc_node+0x67/0xe0 [ 781.792883] ? bdi_alloc_node+0x67/0xe0 [ 781.796859] ? rcu_read_lock_sched_held+0x108/0x120 [ 781.801878] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 781.807162] ? _raw_spin_unlock+0x22/0x30 [ 781.811333] bdi_register_va+0x68/0x80 [ 781.815224] super_setup_bdi_name+0x123/0x220 [ 781.819717] ? kill_block_super+0x100/0x100 [ 781.824047] ? kmem_cache_alloc_trace+0x616/0x780 [ 781.828891] ? match_wildcard+0x3c0/0x3c0 [ 781.833066] ? trace_hardirqs_on+0xd/0x10 [ 781.837231] fuse_fill_super+0xe6e/0x1e20 [ 781.841473] ? fuse_get_root_inode+0x190/0x190 [ 781.846238] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 781.851262] ? kasan_check_read+0x11/0x20 [ 781.855414] ? cap_capable+0x1f9/0x260 [ 781.859398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.864956] ? security_capable+0x99/0xc0 [ 781.869266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.874808] ? ns_capable_common+0x13f/0x170 [ 781.879228] ? get_anon_bdev+0x2f0/0x2f0 [ 781.883292] ? sget+0x113/0x150 [ 781.886588] ? fuse_get_root_inode+0x190/0x190 [ 781.891178] mount_nodev+0x6b/0x110 [ 781.894930] fuse_mount+0x2c/0x40 [ 781.898386] mount_fs+0xae/0x328 [ 781.901761] vfs_kern_mount.part.34+0xd4/0x4d0 [ 781.906364] ? may_umount+0xb0/0xb0 [ 781.910008] ? _raw_read_unlock+0x22/0x30 [ 781.914163] ? __get_fs_type+0x97/0xc0 [ 781.918291] do_mount+0x564/0x3070 [ 781.921839] ? do_raw_spin_unlock+0x9e/0x2e0 [ 781.926254] ? copy_mount_string+0x40/0x40 [ 781.930506] ? rcu_pm_notify+0xc0/0xc0 [ 781.934417] ? copy_mount_options+0x5f/0x380 [ 781.938827] ? rcu_read_lock_sched_held+0x108/0x120 [ 781.943848] ? kmem_cache_alloc_trace+0x616/0x780 [ 781.948712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 781.954350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.959940] ? copy_mount_options+0x285/0x380 [ 781.966730] ksys_mount+0x12d/0x140 [ 781.970372] __x64_sys_mount+0xbe/0x150 [ 781.974346] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 781.979372] do_syscall_64+0x1b1/0x800 [ 781.983262] ? finish_task_switch+0x1ca/0x840 [ 781.987796] ? syscall_return_slowpath+0x5c0/0x5c0 [ 781.992729] ? syscall_return_slowpath+0x30f/0x5c0 [ 781.997665] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 782.003047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.007905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.013094] RIP: 0033:0x455a09 [ 782.016310] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 782.024114] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 782.031389] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 782.038664] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 782.046194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2033/05/18 03:42:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x400300]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xffffff9e}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 7: r0 = socket(0xa, 0x2000000001, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000fff)={0x10000}) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x0, 0x53, &(0x7f0000001000)=""/8, &(0x7f0000000ffc)=0x8) close(r1) 2033/05/18 03:42:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00000000ffffffe4", 0x4012}) 2033/05/18 03:42:33 executing program 6 (fault-call:3 fault-nth:56): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 782.053478] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 782.086901] gfs2: not a GFS2 filesystem 2033/05/18 03:42:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 782.153715] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 782.165727] IPVS: Unknown mcast interface: rose0 [ 782.186440] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000024a00", 0x4012}) 2033/05/18 03:42:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x2000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x3f00000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:33 executing program 7: r0 = socket(0x10, 0x4000000000000002, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x3, 0x1}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) 2033/05/18 03:42:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000cad00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 782.307942] FAULT_INJECTION: forcing a failure. [ 782.307942] name failslab, interval 1, probability 0, space 0, times 0 [ 782.319264] CPU: 0 PID: 17407 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 782.326571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.335933] Call Trace: [ 782.338540] dump_stack+0x1b9/0x294 [ 782.342193] ? dump_stack_print_info.cold.2+0x52/0x52 [ 782.347398] ? lock_release+0xa10/0xa10 [ 782.351416] ? check_same_owner+0x320/0x320 [ 782.355761] should_fail.cold.4+0xa/0x1a [ 782.358517] IPVS: Unknown mcast interface: rose0 [ 782.359832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 782.359855] ? kasan_check_write+0x14/0x20 [ 782.359873] ? __mutex_lock+0x7d9/0x17f0 [ 782.359897] ? graph_lock+0x170/0x170 [ 782.381850] ? find_held_lock+0x36/0x1c0 [ 782.385936] ? __lock_is_held+0xb5/0x140 [ 782.390030] ? check_same_owner+0x320/0x320 [ 782.394457] ? find_held_lock+0x36/0x1c0 [ 782.398549] ? rcu_note_context_switch+0x710/0x710 [ 782.403506] __should_failslab+0x124/0x180 [ 782.407774] should_failslab+0x9/0x14 [ 782.411585] kmem_cache_alloc+0x2af/0x760 [ 782.415748] ? kasan_check_write+0x14/0x20 [ 782.419994] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 782.425017] ? lock_downgrade+0x8e0/0x8e0 [ 782.429178] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 782.434210] __kernfs_new_node+0xe7/0x580 [ 782.438372] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 782.443141] ? kasan_check_write+0x14/0x20 [ 782.447391] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 782.452335] ? __lock_is_held+0xb5/0x140 [ 782.456407] ? wait_for_completion+0x870/0x870 [ 782.461017] kernfs_new_node+0x80/0xf0 [ 782.464918] __kernfs_create_file+0x4d/0x330 [ 782.469338] sysfs_add_file_mode_ns+0x21a/0x560 [ 782.474022] internal_create_group+0x282/0x970 [ 782.478717] sysfs_create_groups+0x9b/0x150 [ 782.483134] device_add+0x84d/0x16d0 [ 782.486874] ? device_private_init+0x230/0x230 [ 782.491486] ? kfree+0x1e9/0x260 [ 782.494867] ? kfree_const+0x5e/0x70 [ 782.498590] device_create_groups_vargs+0x1ff/0x270 [ 782.503616] device_create_vargs+0x46/0x60 [ 782.507864] bdi_register_va.part.10+0xbb/0x9b0 [ 782.512545] ? cgwb_kill+0x630/0x630 [ 782.516353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.521891] ? bdi_init+0x416/0x510 [ 782.525527] ? wb_init+0x9e0/0x9e0 [ 782.529163] ? bdi_alloc_node+0x67/0xe0 [ 782.533141] ? bdi_alloc_node+0x67/0xe0 [ 782.537125] ? rcu_read_lock_sched_held+0x108/0x120 [ 782.542154] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 782.547444] ? _raw_spin_unlock+0x22/0x30 [ 782.551693] bdi_register_va+0x68/0x80 [ 782.555594] super_setup_bdi_name+0x123/0x220 [ 782.560101] ? kill_block_super+0x100/0x100 [ 782.564521] ? kmem_cache_alloc_trace+0x616/0x780 [ 782.569373] ? match_wildcard+0x3c0/0x3c0 [ 782.573536] ? trace_hardirqs_on+0xd/0x10 [ 782.577718] fuse_fill_super+0xe6e/0x1e20 [ 782.581884] ? fuse_get_root_inode+0x190/0x190 [ 782.586486] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 782.591519] ? kasan_check_read+0x11/0x20 [ 782.595680] ? cap_capable+0x1f9/0x260 [ 782.599600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.605151] ? security_capable+0x99/0xc0 [ 782.609310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.614944] ? ns_capable_common+0x13f/0x170 [ 782.619538] ? get_anon_bdev+0x2f0/0x2f0 [ 782.623606] ? sget+0x113/0x150 [ 782.626902] ? fuse_get_root_inode+0x190/0x190 [ 782.631500] mount_nodev+0x6b/0x110 [ 782.635230] fuse_mount+0x2c/0x40 [ 782.638691] mount_fs+0xae/0x328 [ 782.642066] vfs_kern_mount.part.34+0xd4/0x4d0 [ 782.646655] ? may_umount+0xb0/0xb0 [ 782.650317] ? _raw_read_unlock+0x22/0x30 [ 782.654474] ? __get_fs_type+0x97/0xc0 [ 782.658371] do_mount+0x564/0x3070 [ 782.661922] ? copy_mount_string+0x40/0x40 [ 782.666160] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 782.671183] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.675952] ? retint_kernel+0x10/0x10 [ 782.679854] ? copy_mount_options+0x1f0/0x380 [ 782.684355] ? copy_mount_options+0x1f6/0x380 [ 782.688858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.694398] ? copy_mount_options+0x285/0x380 [ 782.698903] ksys_mount+0x12d/0x140 [ 782.702542] __x64_sys_mount+0xbe/0x150 [ 782.706524] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 782.711569] do_syscall_64+0x1b1/0x800 [ 782.715471] ? finish_task_switch+0x1ca/0x840 [ 782.719974] ? syscall_return_slowpath+0x5c0/0x5c0 [ 782.724915] ? syscall_return_slowpath+0x30f/0x5c0 [ 782.729942] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 782.735316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.740171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.745364] RIP: 0033:0x455a09 [ 782.748552] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 782.756281] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 782.763564] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 782.771016] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 782.778289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 782.785568] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 782.806978] IPVS: Unknown mcast interface: rose0 [ 782.812289] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 782.843513] gfs2: not a GFS2 filesystem 2033/05/18 03:42:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x710de96e12, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070020500000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xffffff7f}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178be92b0200", 0x4012}) 2033/05/18 03:42:34 executing program 7: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = dup(r0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000001c0)=""/196) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_getparam(r3, &(0x7f0000000100)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'team0\x00', 0x100}) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000040)) ioctl(r0, 0x4004af0b, &(0x7f0000001340)='g') 2033/05/18 03:42:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x10000e0]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 6 (fault-call:3 fault-nth:57): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000100"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x20000000}}, 0x20}, 0x1}, 0x0) [ 782.944453] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x4]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="000100000008000081000000c9030000f4000204000000000000000000000000002000000020000000010000000000016e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@resuid={'resuid', 0x3d, [0x37]}, 0x2c}]}) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8, 0x200000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x101, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000180)={r2, 0x3}) 2033/05/18 03:42:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bc400", 0x4012}) [ 782.991187] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x40030000000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 783.069711] FAULT_INJECTION: forcing a failure. [ 783.069711] name failslab, interval 1, probability 0, space 0, times 0 [ 783.081066] CPU: 1 PID: 17451 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 783.088348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.097715] Call Trace: [ 783.100350] dump_stack+0x1b9/0x294 [ 783.104170] ? dump_stack_print_info.cold.2+0x52/0x52 [ 783.109373] ? __mutex_lock+0x7d9/0x17f0 [ 783.113460] should_fail.cold.4+0xa/0x1a [ 783.117540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 783.122667] ? kasan_kmalloc+0xc4/0xe0 [ 783.126572] ? graph_lock+0x170/0x170 [ 783.130387] ? find_held_lock+0x36/0x1c0 [ 783.134468] ? __lock_is_held+0xb5/0x140 [ 783.138557] ? check_same_owner+0x320/0x320 [ 783.142889] ? kasan_check_write+0x14/0x20 [ 783.147144] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 783.152191] ? rcu_note_context_switch+0x710/0x710 [ 783.157143] __should_failslab+0x124/0x180 [ 783.161392] should_failslab+0x9/0x14 [ 783.165215] kmem_cache_alloc+0x2af/0x760 [ 783.169376] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 783.174314] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 783.179343] __kernfs_new_node+0xe7/0x580 [ 783.183510] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 783.188271] ? mutex_unlock+0xd/0x10 [ 783.191987] ? kernfs_activate+0x20e/0x2a0 [ 783.196235] ? kernfs_walk_and_get_ns+0x320/0x320 [ 783.201449] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.207111] ? kernfs_link_sibling+0x1d2/0x3b0 [ 783.211799] kernfs_new_node+0x80/0xf0 [ 783.215700] __kernfs_create_file+0x4d/0x330 [ 783.220121] sysfs_add_file_mode_ns+0x21a/0x560 [ 783.224810] internal_create_group+0x282/0x970 [ 783.229409] sysfs_create_groups+0x9b/0x150 [ 783.233737] device_add+0x84d/0x16d0 [ 783.237459] ? device_private_init+0x230/0x230 [ 783.242047] ? kfree+0x1e9/0x260 [ 783.245420] ? kfree_const+0x5e/0x70 [ 783.249143] device_create_groups_vargs+0x1ff/0x270 [ 783.254189] device_create_vargs+0x46/0x60 [ 783.258437] bdi_register_va.part.10+0xbb/0x9b0 [ 783.263119] ? cgwb_kill+0x630/0x630 [ 783.266844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.272389] ? bdi_init+0x416/0x510 [ 783.276028] ? wb_init+0x9e0/0x9e0 [ 783.279575] ? bdi_alloc_node+0x67/0xe0 [ 783.283638] ? bdi_alloc_node+0x67/0xe0 [ 783.287627] ? rcu_read_lock_sched_held+0x108/0x120 [ 783.292740] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 783.298036] ? _raw_spin_unlock+0x22/0x30 [ 783.302303] bdi_register_va+0x68/0x80 [ 783.306238] super_setup_bdi_name+0x123/0x220 [ 783.310829] ? kill_block_super+0x100/0x100 [ 783.315188] ? kmem_cache_alloc_trace+0x616/0x780 [ 783.320033] ? match_wildcard+0x3c0/0x3c0 [ 783.324185] ? trace_hardirqs_on+0xd/0x10 [ 783.328343] fuse_fill_super+0xe6e/0x1e20 [ 783.332524] ? fuse_get_root_inode+0x190/0x190 [ 783.337206] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 783.342236] ? kasan_check_read+0x11/0x20 [ 783.346492] ? cap_capable+0x1f9/0x260 [ 783.350395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.355944] ? security_capable+0x99/0xc0 [ 783.360546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.366092] ? ns_capable_common+0x13f/0x170 [ 783.370619] ? get_anon_bdev+0x2f0/0x2f0 [ 783.374681] ? sget+0x113/0x150 [ 783.377967] ? fuse_get_root_inode+0x190/0x190 [ 783.382553] mount_nodev+0x6b/0x110 [ 783.386183] fuse_mount+0x2c/0x40 [ 783.389640] mount_fs+0xae/0x328 [ 783.393033] vfs_kern_mount.part.34+0xd4/0x4d0 [ 783.397640] ? may_umount+0xb0/0xb0 [ 783.401272] ? _raw_read_unlock+0x22/0x30 [ 783.405439] ? __get_fs_type+0x97/0xc0 [ 783.409375] do_mount+0x564/0x3070 [ 783.413025] ? do_raw_spin_unlock+0x9e/0x2e0 [ 783.417440] ? interrupt_entry+0xb1/0xf0 [ 783.421510] ? copy_mount_string+0x40/0x40 [ 783.425837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 783.430603] ? retint_kernel+0x10/0x10 [ 783.434588] ? copy_mount_options+0x1e3/0x380 [ 783.439096] ? write_comp_data+0x6d/0x70 [ 783.443165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.449768] ? copy_mount_options+0x285/0x380 [ 783.454274] ksys_mount+0x12d/0x140 [ 783.457921] __x64_sys_mount+0xbe/0x150 [ 783.461905] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 783.466937] do_syscall_64+0x1b1/0x800 [ 783.470846] ? syscall_return_slowpath+0x5c0/0x5c0 [ 783.475781] ? syscall_return_slowpath+0x30f/0x5c0 [ 783.480718] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 783.486191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.491043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.496230] RIP: 0033:0x455a09 [ 783.499419] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 783.507133] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 783.514408] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 783.521775] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 783.529135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 783.536411] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 783.577216] gfs2: not a GFS2 filesystem 2033/05/18 03:42:34 executing program 7: r0 = socket$inet(0x2, 0x805, 0x0) sendmmsg(r0, &(0x7f0000008c80)=[{{&(0x7f0000000140)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)='G', 0x6c}], 0x1, &(0x7f00000005c0)}}, {{&(0x7f0000003500)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x20}, 0x80, &(0x7f0000003740)=[{&(0x7f0000003580)="3cfdd86515e48fd307fd04f9d2d734574e6552581fdf62566bcdd18394f3e1fb748d2db5ea2028e93ad9da92e4c97f6f369b8d31580fcfb852ae60d348328149605e974a52a56d77181ee67f1e4a7b1f247cfdc09957e258692e7bd89e9e19f17aa687981dc32401403d5b8ca6efc01a8dc726db2a41d00c4b342f977f52ae167cc88fa28414aa8f7a979398ea539d50b8c45cbddb746fa365eaf44b58822640001986cc92a05782253900f1b594315f51392851de2398172a3ad1f987dcedc9defb3db2c98cd881e17762e8399701af35dcda13e9a943", 0xd7}], 0x1, &(0x7f0000003780)=[{0xe8, 0x11f, 0x7e40, "413bbfb4382551a5901177a4530460eda222fb8182789c656dec109a98a691bc30a2a71c52d61e8fce9f5d49e29f7a67e8623e53b8d6c2dd639c44053f636212e18324a05b3d97340e7537126b122fb69fdf78ba7ffea2b468fc0e28f51606c250b9f8d49ada4f06e35f354c33cbf1401c2ba9ac7dc6d4d2d98f9c909304e977c5f67cb19df136c2589a47305403e3eff98430e1122cf472b84d7e093729fdc388007c8849e576de86da2fa0925c500e23a7e53eb040532d26c3341bf9f15ebbcd36542873070eed2c0cb5180383133f54b733a706b5c9"}], 0xe8, 0x41}, 0x7}, {{&(0x7f0000003880)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000003900)="37a4c49cd4cda3626ad20100000000000000ab693a8dd6c36a970bb7fe3c71c785eee35f570d28675d7ffab33775c2e861c87cd6d6b3d229cda54a68eceb66b425f662f9d2eba32a602e1c60a0c31ad8d2b5476e18ebb3bfbe750e8ebddefdb28639c51979ab3593d314ba363679d4399fda7af3c9ce22b73cd0c25b72fffd58c9c2fda20c94b65dd6820e6c77a37dad2dad80294d439516204fcf3495473dd04855a7bb71a90381ab7b13935217c397241e3a737891c94ace780ab24c3bb6562b793b713624e0ed294444e429ad09c8ec6fe4f0185addbcb7d68f4585340d0ee627941b93eb59b44f53", 0xea}], 0x1, 0x0, 0x0, 0x50}, 0x1}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000004a40)="54cd114270c1ba0540583bc18eb5e1a85f40340dc6ece73afdc1eef9aa9f9b39440487bf8d6b7b8499d7151c9fe67eef0bd45c68fc0f08349b571bccae563a754172d9fb65ce5c273bb6c6ffe6ae6eb4bb51ba6480d51cea920ed5f1804f92239be99e8f9c48100b6f14e133ee9125bb636bd93a79c76e25546bbb748232ee7e6737910e7a0169a61e", 0x89}, {&(0x7f0000000000)="df2370750bfafcbaee8b1daeb6e73ad2c0986b514323f3d515fc0acc91f502cc1bdc44a335f0901ae4f1de9c3a5243bfefaadeac2ff2d0c536c6d12f8a849a831c35321465fd8969c615c4553cca4bba22ec422c360000000000000000", 0x5d}, {&(0x7f0000004d40)="f7e237b8b07a175856837316c51f2bdfae2d0a3e5401a6fc1ea2e3e0e95872c9a1fe376872f711528c2b065c56cad90109ae6afba571de93dd608581", 0x3c}], 0x3, &(0x7f0000004e00)=[{0x100, 0x110, 0x6, "ffaeea296b2029601edc87a3efa1f87650f7b7e9eb47d521ad1344acde6da8c747b0bbac40afaf9313f3fffe3aa7eca6f0d25104991ec906f84e4e2f3a4f03a234a1891ed40305081aefb1eb92586552ee23a5b2c70adbc9af4469122a34ea9dffe2297aa7fb5deffcfb8e462c2d980607cb80519474983340a8f1fe8c31ab1a8f101983a19d105f1d07c25ece834e24f4b32de47994108f6b209263880097e55116ed36719258ffb6e9966e2af65f8f613c6543c7b4f2a3b614d21f507555f3b6a527b41468e46f013a1470e59e3b4c20a2b1f808562ef227e1019b04e1ad554ca9875cd6623d46077d2e8328d751"}], 0x100, 0x40000}, 0x2}, {{&(0x7f0000007980)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x80, &(0x7f0000008b80)=[{&(0x7f0000007a00)="36c9c17bd74b1c05572cd74c54183785b0afb0e0a4ac660aed4306314cac052fa79881fc93c135c74328c575d9444419b08fcc677d19278278fc8a8fb8da0c72b0521b7cb16648b4c935957368028687d5ec342586ff2ecf819fdc6ee20c1934c45b40541aef81a2b2931f0aee8209af11073fa596fe20c77cdf0da9", 0x7c}, {&(0x7f0000007b40)="ba57f81823869c8da02a3be801a1818ed5152aba9dda534510048ed447adf763b64d1d608a", 0x25}], 0x2, &(0x7f0000008bc0)=[{0xb0, 0x10f, 0xffff, "2c3bdc7b10fd319f6aeb8e43bda68b03eb24f62830d00590a34312cb72d7b34521b0504d32303682cadebea2d7e47d8090e67a1e92154b96c2e12bf3171a47068dedff2b036dd90a2a23df20407bfebe579e34cdeb59d4bba5d3626d16070b19f9921c51162356e924397db556fd79902f2d996d7182da9c7d0b9e77a5910818d24cea2dc05ebf327988a8ebcbea0c14727c74ef02dca1644b793f8eba7f58e3"}], 0xb0, 0x40000}, 0xffffffffffffffff}], 0x5, 0x4) 2033/05/18 03:42:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000000000000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xfcffffff}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000fffffff000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x2000000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00000300", 0x4012}) 2033/05/18 03:42:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:34 executing program 6 (fault-call:3 fault-nth:58): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 783.871551] nla_parse: 2 callbacks suppressed [ 783.871560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:35 executing program 7: r0 = socket(0x1e, 0x804, 0x0) r1 = socket(0x1e, 0x805, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000180)=@req={0x1, 0x800, 0x6547}, 0x6ba) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80004000}, 0x1c) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r2, 0x20, 0xffffffffffffffff, "3347ae4bd568e3dcab7482a70bec1171f6e2a30e7bd202fdfd76a55e4ea624d20fd229de22dbff8a6eacb000671ece9590d676d7781a819cab6a64f5d9c12e66383eecba0942969b0b1084300bc8969a35cc8cc871314e788567f4118b1c7f20774b2a66b1b25f7487c18595f2"}) close(r0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) r3 = dup3(r0, r1, 0x80000) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x3, 0x4}) 2033/05/18 03:42:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xffffff7f00000000]}}]}, 0x60}, 0x1}, 0x0) [ 783.918180] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf0ffffff}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xffffff7f, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 783.962957] IPVS: Unknown mcast interface: rose0 [ 784.004133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 784.041798] FAULT_INJECTION: forcing a failure. [ 784.041798] name failslab, interval 1, probability 0, space 0, times 0 [ 784.053118] CPU: 0 PID: 17484 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 784.060403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.069939] Call Trace: [ 784.072552] dump_stack+0x1b9/0x294 [ 784.076206] ? dump_stack_print_info.cold.2+0x52/0x52 [ 784.081575] ? __mutex_lock+0x7d9/0x17f0 [ 784.085667] should_fail.cold.4+0xa/0x1a [ 784.089749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 784.094904] ? kasan_kmalloc+0xc4/0xe0 [ 784.098858] ? graph_lock+0x170/0x170 [ 784.102676] ? find_held_lock+0x36/0x1c0 [ 784.106755] ? __lock_is_held+0xb5/0x140 [ 784.110838] ? check_same_owner+0x320/0x320 [ 784.115175] ? kasan_check_write+0x14/0x20 [ 784.119421] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 784.124422] ? rcu_note_context_switch+0x710/0x710 [ 784.129491] __should_failslab+0x124/0x180 [ 784.133758] should_failslab+0x9/0x14 [ 784.137576] kmem_cache_alloc+0x2af/0x760 [ 784.141811] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 784.146783] ? __sanitizer_cov_trace_cmp8+0x18/0x20 2033/05/18 03:42:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6c}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 784.151825] __kernfs_new_node+0xe7/0x580 [ 784.156077] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 784.160848] ? mutex_unlock+0xd/0x10 [ 784.164573] ? kernfs_activate+0x20e/0x2a0 [ 784.168820] ? kernfs_walk_and_get_ns+0x320/0x320 [ 784.173674] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 784.179225] ? kernfs_link_sibling+0x1d2/0x3b0 [ 784.183824] kernfs_new_node+0x80/0xf0 [ 784.187785] __kernfs_create_file+0x4d/0x330 [ 784.192486] sysfs_add_file_mode_ns+0x21a/0x560 [ 784.197199] internal_create_group+0x282/0x970 2033/05/18 03:42:35 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000023000)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x14}, 0x1}, 0xfffffffffffffffc) [ 784.201827] sysfs_create_groups+0x9b/0x150 [ 784.206621] device_add+0x84d/0x16d0 [ 784.210364] ? device_private_init+0x230/0x230 [ 784.215427] ? kfree+0x1e9/0x260 [ 784.218892] ? kfree_const+0x5e/0x70 [ 784.222663] device_create_groups_vargs+0x1ff/0x270 [ 784.227697] device_create_vargs+0x46/0x60 [ 784.232042] bdi_register_va.part.10+0xbb/0x9b0 [ 784.236735] ? cgwb_kill+0x630/0x630 [ 784.240471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.246022] ? bdi_init+0x416/0x510 [ 784.249674] ? wb_init+0x9e0/0x9e0 [ 784.253219] ? bdi_alloc_node+0x67/0xe0 [ 784.257197] ? bdi_alloc_node+0x67/0xe0 [ 784.261176] ? rcu_read_lock_sched_held+0x108/0x120 [ 784.266202] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 784.271508] ? _raw_spin_unlock+0x22/0x30 [ 784.275669] bdi_register_va+0x68/0x80 [ 784.279569] super_setup_bdi_name+0x123/0x220 [ 784.284076] ? kill_block_super+0x100/0x100 [ 784.288411] ? kmem_cache_alloc_trace+0x616/0x780 [ 784.293263] ? match_wildcard+0x3c0/0x3c0 [ 784.297592] ? trace_hardirqs_on+0xd/0x10 [ 784.301760] fuse_fill_super+0xe6e/0x1e20 [ 784.306011] ? fuse_get_root_inode+0x190/0x190 [ 784.310606] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 784.315649] ? kasan_check_read+0x11/0x20 [ 784.319822] ? cap_capable+0x1f9/0x260 [ 784.324268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.329815] ? security_capable+0x99/0xc0 [ 784.333981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.339530] ? ns_capable_common+0x13f/0x170 [ 784.344038] ? get_anon_bdev+0x2f0/0x2f0 [ 784.348109] ? sget+0x113/0x150 [ 784.351428] ? fuse_get_root_inode+0x190/0x190 [ 784.356061] mount_nodev+0x6b/0x110 [ 784.359725] fuse_mount+0x2c/0x40 [ 784.363213] mount_fs+0xae/0x328 [ 784.366620] vfs_kern_mount.part.34+0xd4/0x4d0 [ 784.371318] ? may_umount+0xb0/0xb0 [ 784.374954] ? _raw_read_unlock+0x22/0x30 [ 784.379130] ? __get_fs_type+0x97/0xc0 [ 784.383038] do_mount+0x564/0x3070 [ 784.386624] ? copy_mount_string+0x40/0x40 [ 784.390896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 784.395675] ? retint_kernel+0x10/0x10 [ 784.399588] ? copy_mount_options+0x213/0x380 [ 784.404101] ? write_comp_data+0x70/0x70 [ 784.408172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.413720] ? copy_mount_options+0x285/0x380 [ 784.418405] ksys_mount+0x12d/0x140 [ 784.422041] __x64_sys_mount+0xbe/0x150 [ 784.426019] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 784.431136] do_syscall_64+0x1b1/0x800 [ 784.435028] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 784.439881] ? syscall_return_slowpath+0x5c0/0x5c0 [ 784.445008] ? syscall_return_slowpath+0x30f/0x5c0 [ 784.449961] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 784.455341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.460194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.465384] RIP: 0033:0x455a09 [ 784.468576] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 784.476294] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 784.483577] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 784.490938] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 784.498212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 2033/05/18 03:42:35 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(cipher_null-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000003c0)=[{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000001c0)=[@iv={0x98, 0x117, 0x2, 0x80, "da14a709f52f193c8e973b4b5ff97d09d1f5aa271b4e1d7e082ebc746342c6f489114111b153b5aec76a0e24e1fb77dd21a8c3afdca9bac83c0659359861da6b4732685f99f2d93c141b9f689312f2dafc68e1605ce704921a47c7eb3005ba7a0e6c611996aca100489041013f7b627ea0bf08aeb3a59716eb6dbbe74c00f7a4"}], 0x98}], 0x1, 0x0) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001140)=""/78, 0xfffffe06}], 0x1}, 0x0) 2033/05/18 03:42:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000332", 0x4012}) 2033/05/18 03:42:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070020000001f00008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x3d1894fa51000000]}}]}, 0x60}, 0x1}, 0x0) [ 784.505488] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 784.516368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 784.526556] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x1000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 784.551761] IPVS: Unknown mcast interface: rose0 [ 784.556818] gfs2: not a GFS2 filesystem 2033/05/18 03:42:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x7a}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x1000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 6 (fault-call:3 fault-nth:59): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:35 executing program 7: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) 2033/05/18 03:42:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x34000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bbf2b0200", 0x4012}) [ 784.760172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 784.779441] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:35 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0x0, 0x8001}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2033/05/18 03:42:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x20000000]}}]}, 0x60}, 0x1}, 0x0) [ 784.831257] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x4000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 784.906489] FAULT_INJECTION: forcing a failure. [ 784.906489] name failslab, interval 1, probability 0, space 0, times 0 [ 784.918137] CPU: 0 PID: 17537 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 784.925768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.935155] Call Trace: [ 784.937760] dump_stack+0x1b9/0x294 [ 784.941423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 784.946625] should_fail.cold.4+0xa/0x1a [ 784.950693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 784.955818] ? lock_release+0xa10/0xa10 [ 784.959810] ? check_same_owner+0x320/0x320 [ 784.964148] ? graph_lock+0x170/0x170 [ 784.968097] ? rcu_note_context_switch+0x710/0x710 [ 784.973041] ? find_held_lock+0x36/0x1c0 [ 784.977129] ? find_held_lock+0x36/0x1c0 [ 784.980158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 784.981208] ? __lock_is_held+0xb5/0x140 [ 784.981239] ? check_same_owner+0x320/0x320 [ 784.981287] ? rcu_note_context_switch+0x710/0x710 [ 785.003065] __should_failslab+0x124/0x180 [ 785.007313] should_failslab+0x9/0x14 [ 785.011130] kmem_cache_alloc+0x2af/0x760 [ 785.015415] ? kasan_check_write+0x14/0x20 [ 785.019687] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 785.024719] __kernfs_new_node+0xe7/0x580 [ 785.028879] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 785.033646] ? kasan_check_write+0x14/0x20 [ 785.037890] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 785.042832] ? graph_lock+0x170/0x170 [ 785.046647] ? wait_for_completion+0x870/0x870 [ 785.051246] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 785.056813] kernfs_new_node+0x80/0xf0 [ 785.060721] __kernfs_create_file+0x4d/0x330 [ 785.065152] sysfs_add_file_mode_ns+0x21a/0x560 [ 785.069835] sysfs_add_file+0x4e/0x60 [ 785.073647] sysfs_merge_group+0xfa/0x230 [ 785.077818] dpm_sysfs_add+0x161/0x210 [ 785.081725] device_add+0xa11/0x16d0 [ 785.085463] ? device_private_init+0x230/0x230 [ 785.091032] ? kfree+0x1e9/0x260 [ 785.094409] ? kfree_const+0x5e/0x70 [ 785.098137] device_create_groups_vargs+0x1ff/0x270 [ 785.103165] device_create_vargs+0x46/0x60 [ 785.107411] bdi_register_va.part.10+0xbb/0x9b0 [ 785.112087] ? cgwb_kill+0x630/0x630 [ 785.115811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.121357] ? bdi_init+0x416/0x510 [ 785.124990] ? wb_init+0x9e0/0x9e0 [ 785.128537] ? bdi_alloc_node+0x67/0xe0 [ 785.132517] ? bdi_alloc_node+0x67/0xe0 [ 785.136499] ? rcu_read_lock_sched_held+0x108/0x120 [ 785.141525] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 785.146824] ? _raw_spin_unlock+0x22/0x30 [ 785.150991] bdi_register_va+0x68/0x80 [ 785.154895] super_setup_bdi_name+0x123/0x220 [ 785.159396] ? kill_block_super+0x100/0x100 [ 785.163738] ? kmem_cache_alloc_trace+0x616/0x780 [ 785.168605] ? match_wildcard+0x3c0/0x3c0 [ 785.172769] ? trace_hardirqs_on+0xd/0x10 [ 785.176942] fuse_fill_super+0xe6e/0x1e20 [ 785.181117] ? fuse_get_root_inode+0x190/0x190 [ 785.185711] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 785.190739] ? kasan_check_read+0x11/0x20 [ 785.194898] ? cap_capable+0x1f9/0x260 [ 785.198891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.205609] ? security_capable+0x99/0xc0 [ 785.210165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.215738] ? ns_capable_common+0x13f/0x170 [ 785.220167] ? get_anon_bdev+0x2f0/0x2f0 [ 785.224251] ? sget+0x113/0x150 [ 785.227756] ? fuse_get_root_inode+0x190/0x190 [ 785.232368] mount_nodev+0x6b/0x110 [ 785.236097] fuse_mount+0x2c/0x40 [ 785.239619] mount_fs+0xae/0x328 [ 785.242999] vfs_kern_mount.part.34+0xd4/0x4d0 [ 785.247594] ? may_umount+0xb0/0xb0 [ 785.251229] ? _raw_read_unlock+0x22/0x30 [ 785.255401] ? __get_fs_type+0x97/0xc0 [ 785.259312] do_mount+0x564/0x3070 [ 785.262888] ? copy_mount_string+0x40/0x40 [ 785.267128] ? rcu_pm_notify+0xc0/0xc0 [ 785.271040] ? copy_mount_options+0x5f/0x380 [ 785.275480] ? rcu_read_lock_sched_held+0x108/0x120 [ 785.280537] ? kmem_cache_alloc_trace+0x616/0x780 [ 785.285512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 785.291062] ? _copy_from_user+0xdf/0x150 [ 785.295221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.300775] ? copy_mount_options+0x285/0x380 [ 785.305280] ksys_mount+0x12d/0x140 [ 785.308928] __x64_sys_mount+0xbe/0x150 [ 785.312908] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 785.317946] do_syscall_64+0x1b1/0x800 [ 785.321844] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 785.326697] ? syscall_return_slowpath+0x5c0/0x5c0 [ 785.331631] ? syscall_return_slowpath+0x30f/0x5c0 [ 785.336579] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 785.341971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.346941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.352171] RIP: 0033:0x455a09 [ 785.355389] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 785.363129] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 785.370419] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 785.377787] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 785.385063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 785.392336] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 785.409320] gfs2: not a GFS2 filesystem 2033/05/18 03:42:36 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x400) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0xdf) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa000003fe, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2033/05/18 03:42:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xef7f}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000500"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bbb2b0200", 0x4012}) 2033/05/18 03:42:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x200000000000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070021400000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:36 executing program 6 (fault-call:3 fault-nth:60): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x2]}}]}, 0x60}, 0x1}, 0x0) [ 785.598145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 785.628592] xprt_adjust_timeout: rq_timeout = 0! [ 785.630285] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xe000000100000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x126ee90d71000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6000000000000000}}, 0x20}, 0x1}, 0x0) [ 785.663338] xprt_adjust_timeout: rq_timeout = 0! [ 785.703295] IPVS: Unknown mcast interface: rose0 [ 785.728556] FAULT_INJECTION: forcing a failure. [ 785.728556] name failslab, interval 1, probability 0, space 0, times 0 [ 785.739850] CPU: 0 PID: 17570 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 785.747157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.757241] Call Trace: [ 785.759851] dump_stack+0x1b9/0x294 [ 785.763502] ? dump_stack_print_info.cold.2+0x52/0x52 [ 785.768719] should_fail.cold.4+0xa/0x1a [ 785.772797] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:42:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000000cac00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 785.777925] ? graph_lock+0x170/0x170 [ 785.781747] ? lock_downgrade+0x8e0/0x8e0 [ 785.785918] ? find_held_lock+0x36/0x1c0 [ 785.790004] ? __lock_is_held+0xb5/0x140 [ 785.794100] ? check_same_owner+0x320/0x320 [ 785.798525] ? wait_for_completion+0x870/0x870 [ 785.803128] ? rcu_note_context_switch+0x710/0x710 [ 785.808076] ? graph_lock+0x170/0x170 [ 785.811904] __should_failslab+0x124/0x180 [ 785.816247] should_failslab+0x9/0x14 [ 785.820059] kmem_cache_alloc+0x2af/0x760 [ 785.824231] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 785.829262] __kernfs_new_node+0xe7/0x580 [ 785.833424] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 785.838198] ? kernfs_walk_and_get_ns+0x320/0x320 [ 785.843145] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 785.848799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 785.854352] ? kernfs_put+0x493/0x750 [ 785.858210] ? kernfs_add_one+0x129/0x4d0 [ 785.862456] ? kernfs_get+0x30/0x30 [ 785.866111] kernfs_new_node+0x80/0xf0 [ 785.870025] kernfs_create_dir_ns+0x3d/0x140 [ 785.874542] internal_create_group+0x110/0x970 [ 785.879147] ? internal_create_group+0x347/0x970 [ 785.884107] sysfs_create_group+0x1f/0x30 [ 785.888276] dpm_sysfs_add+0x26/0x210 [ 785.892299] device_add+0xa11/0x16d0 [ 785.896041] ? device_private_init+0x230/0x230 [ 785.900646] ? kfree+0x1e9/0x260 [ 785.904436] ? kfree_const+0x5e/0x70 [ 785.908262] device_create_groups_vargs+0x1ff/0x270 [ 785.913651] device_create_vargs+0x46/0x60 [ 785.917932] bdi_register_va.part.10+0xbb/0x9b0 [ 785.922608] ? cgwb_kill+0x630/0x630 2033/05/18 03:42:37 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) syz_open_procfs(r3, &(0x7f00000000c0)='net/igmp6\x00') sync_file_range(r1, 0x8, 0x9, 0x1) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000)=0x2, 0x73e0) [ 785.926360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.932252] ? bdi_init+0x416/0x510 [ 785.935893] ? wb_init+0x9e0/0x9e0 [ 785.939546] ? bdi_alloc_node+0x67/0xe0 [ 785.943546] ? bdi_alloc_node+0x67/0xe0 [ 785.947537] ? rcu_read_lock_sched_held+0x108/0x120 [ 785.952578] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 785.957888] ? _raw_spin_unlock+0x22/0x30 [ 785.962088] bdi_register_va+0x68/0x80 [ 785.966006] super_setup_bdi_name+0x123/0x220 [ 785.970516] ? kill_block_super+0x100/0x100 [ 785.974865] ? kmem_cache_alloc_trace+0x616/0x780 [ 785.979754] ? match_wildcard+0x3c0/0x3c0 [ 785.984003] ? trace_hardirqs_on+0xd/0x10 [ 785.988171] fuse_fill_super+0xe6e/0x1e20 [ 785.992339] ? fuse_get_root_inode+0x190/0x190 [ 785.997028] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 786.002057] ? kasan_check_read+0x11/0x20 [ 786.006226] ? cap_capable+0x1f9/0x260 [ 786.010145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.015694] ? security_capable+0x99/0xc0 [ 786.019857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.025405] ? ns_capable_common+0x13f/0x170 [ 786.029918] ? get_anon_bdev+0x2f0/0x2f0 [ 786.033987] ? sget+0x113/0x150 [ 786.037277] ? fuse_get_root_inode+0x190/0x190 [ 786.041866] mount_nodev+0x6b/0x110 [ 786.045500] fuse_mount+0x2c/0x40 [ 786.048989] mount_fs+0xae/0x328 [ 786.052366] vfs_kern_mount.part.34+0xd4/0x4d0 [ 786.056955] ? may_umount+0xb0/0xb0 [ 786.060585] ? _raw_read_unlock+0x22/0x30 [ 786.064738] ? __get_fs_type+0x97/0xc0 [ 786.068636] do_mount+0x564/0x3070 [ 786.072210] ? copy_mount_string+0x40/0x40 [ 786.076452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 786.081216] ? retint_kernel+0x10/0x10 [ 786.085110] ? copy_mount_options+0x213/0x380 [ 786.089619] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 786.094482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.100050] ? copy_mount_options+0x285/0x380 [ 786.104565] ksys_mount+0x12d/0x140 [ 786.108206] __x64_sys_mount+0xbe/0x150 [ 786.112201] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 786.117230] do_syscall_64+0x1b1/0x800 [ 786.121125] ? finish_task_switch+0x1ca/0x840 [ 786.125632] ? syscall_return_slowpath+0x5c0/0x5c0 [ 786.130567] ? syscall_return_slowpath+0x30f/0x5c0 [ 786.135508] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 786.140970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.145827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.151125] RIP: 0033:0x455a09 [ 786.154325] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 786.162133] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 786.169434] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178ba62b0200", 0x4012}) 2033/05/18 03:42:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x200000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x200000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 786.176707] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 786.183982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 786.191260] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 786.203242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 786.224508] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 786.233068] gfs2: not a GFS2 filesystem [ 786.243960] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x3000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 7: msgget$private(0x0, 0x330) r0 = msgget(0x0, 0x40) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYRES16], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000180)={0x0, ""/62}, 0x46, 0x3, 0x2000) 2033/05/18 03:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000100"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 6 (fault-call:3 fault-nth:61): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x40030000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x400300, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6800}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bd600", 0x4012}) 2033/05/18 03:42:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x3fffa, 0x0) fallocate(r0, 0x0, 0x0, 0x8004) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "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"}, 0xffd) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 786.357532] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 786.438477] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000000000343c400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 786.463190] IPVS: Unknown mcast interface: rose0 [ 786.470198] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x4000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020400000000000300060000f71bf58312d9f729ec36b2870ff9970000c236e7489045985ceecc6aba05b60002000000e00000010000000000000000020001000000000000000000000000001e0005fa00"], 0x50}, 0x1}, 0x0) clock_gettime(0x6, &(0x7f0000000080)) 2033/05/18 03:42:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 786.575730] FAULT_INJECTION: forcing a failure. [ 786.575730] name failslab, interval 1, probability 0, space 0, times 0 [ 786.581318] IPVS: Unknown mcast interface: rose0 [ 786.587107] CPU: 0 PID: 17610 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 786.587125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.608618] Call Trace: [ 786.611220] dump_stack+0x1b9/0x294 [ 786.615469] ? dump_stack_print_info.cold.2+0x52/0x52 [ 786.620673] ? __mutex_lock+0x12e1/0x17f0 [ 786.624871] should_fail.cold.4+0xa/0x1a [ 786.628706] IPVS: Unknown mcast interface: rose0 [ 786.628944] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 786.638813] ? kasan_kmalloc+0xc4/0xe0 [ 786.642716] ? graph_lock+0x170/0x170 [ 786.646541] ? find_held_lock+0x36/0x1c0 [ 786.650637] ? __lock_is_held+0xb5/0x140 [ 786.654712] ? complete_current_workload+0xa30/0x1720 [ 786.659923] ? check_same_owner+0x320/0x320 [ 786.664275] ? kasan_check_write+0x14/0x20 [ 786.668655] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 786.673598] ? rcu_note_context_switch+0x710/0x710 [ 786.678538] __should_failslab+0x124/0x180 [ 786.682782] should_failslab+0x9/0x14 [ 786.686591] kmem_cache_alloc+0x2af/0x760 [ 786.690760] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 786.696420] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 786.701443] __kernfs_new_node+0xe7/0x580 [ 786.705598] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 786.710367] ? mutex_unlock+0xd/0x10 [ 786.714262] ? kernfs_activate+0x20e/0x2a0 [ 786.718501] ? kernfs_walk_and_get_ns+0x320/0x320 [ 786.723356] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.728922] ? kernfs_link_sibling+0x1d2/0x3b0 [ 786.733550] kernfs_new_node+0x80/0xf0 [ 786.737530] __kernfs_create_file+0x4d/0x330 [ 786.741940] sysfs_add_file_mode_ns+0x21a/0x560 [ 786.746628] internal_create_group+0x282/0x970 [ 786.751216] sysfs_create_groups+0x9b/0x150 [ 786.755543] device_add+0x84d/0x16d0 [ 786.759286] ? device_private_init+0x230/0x230 [ 786.763862] ? kfree+0x1e9/0x260 [ 786.767236] ? kfree_const+0x5e/0x70 [ 786.770963] device_create_groups_vargs+0x1ff/0x270 [ 786.775981] device_create_vargs+0x46/0x60 [ 786.780224] bdi_register_va.part.10+0xbb/0x9b0 [ 786.784883] ? cgwb_kill+0x630/0x630 [ 786.788591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.794205] ? bdi_init+0x416/0x510 [ 786.797823] ? wb_init+0x9e0/0x9e0 [ 786.801357] ? bdi_alloc_node+0x67/0xe0 [ 786.805332] ? bdi_alloc_node+0x67/0xe0 [ 786.809750] ? rcu_read_lock_sched_held+0x108/0x120 [ 786.814757] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 786.820034] ? _raw_spin_unlock+0x22/0x30 [ 786.824194] bdi_register_va+0x68/0x80 [ 786.828080] super_setup_bdi_name+0x123/0x220 [ 786.832572] ? kill_block_super+0x100/0x100 [ 786.836895] ? kmem_cache_alloc_trace+0x616/0x780 [ 786.841738] ? match_wildcard+0x3c0/0x3c0 [ 786.845894] ? trace_hardirqs_on+0xd/0x10 [ 786.850051] fuse_fill_super+0xe6e/0x1e20 [ 786.854206] ? fuse_get_root_inode+0x190/0x190 [ 786.858783] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 786.863793] ? kasan_check_read+0x11/0x20 [ 786.867950] ? cap_capable+0x1f9/0x260 [ 786.871848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.877482] ? security_capable+0x99/0xc0 [ 786.881635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.887184] ? ns_capable_common+0x13f/0x170 [ 786.891587] ? get_anon_bdev+0x2f0/0x2f0 [ 786.895648] ? sget+0x113/0x150 [ 786.898919] ? fuse_get_root_inode+0x190/0x190 [ 786.903502] mount_nodev+0x6b/0x110 [ 786.907121] fuse_mount+0x2c/0x40 [ 786.910573] mount_fs+0xae/0x328 [ 786.913937] vfs_kern_mount.part.34+0xd4/0x4d0 [ 786.918513] ? may_umount+0xb0/0xb0 [ 786.922157] ? _raw_read_unlock+0x22/0x30 [ 786.926297] ? __get_fs_type+0x97/0xc0 [ 786.930189] do_mount+0x564/0x3070 [ 786.933938] ? do_raw_spin_unlock+0x9e/0x2e0 [ 786.938357] ? copy_mount_string+0x40/0x40 [ 786.942697] ? rcu_pm_notify+0xc0/0xc0 [ 786.946595] ? copy_mount_options+0x5f/0x380 [ 786.951098] ? rcu_read_lock_sched_held+0x108/0x120 [ 786.956121] ? kmem_cache_alloc_trace+0x616/0x780 [ 786.960984] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.966789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.972321] ? copy_mount_options+0x285/0x380 [ 786.976822] ksys_mount+0x12d/0x140 [ 786.980451] __x64_sys_mount+0xbe/0x150 [ 786.984413] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 786.989422] do_syscall_64+0x1b1/0x800 [ 786.993386] ? finish_task_switch+0x1ca/0x840 [ 786.997883] ? syscall_return_slowpath+0x5c0/0x5c0 [ 787.002815] ? syscall_return_slowpath+0x30f/0x5c0 [ 787.007742] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 787.013128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.017995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.023184] RIP: 0033:0x455a09 [ 787.026361] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 787.034165] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 787.041438] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 787.048699] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 787.055965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 787.063311] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 787.106425] gfs2: not a GFS2 filesystem 2033/05/18 03:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000000000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x2000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0600", 0x4012}) 2033/05/18 03:42:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b8306000400000000000100007002000c000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x20000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") socket$alg(0x26, 0x5, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f0000000000)=0x4, 0xffb8) fcntl$addseals(r1, 0x409, 0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000200)={0x5, 0x8000, 0x3, 0x1, 0x3}) r2 = syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0xe002, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x5, 0x80000) socket$l2tp(0x18, 0x1, 0x1) mmap(&(0x7f0000470000/0x2000)=nil, 0x2000, 0x5, 0x32, r2, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000400)=0x101) fsetxattr(r2, &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000002c0)='/dev/net/tun\x00', 0xd, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0xfffffffffffffff8, 0x30}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r4, 0x181, 0x100}, &(0x7f00000003c0)=0x8) fcntl$setownex(r2, 0xf, &(0x7f0000000180)={0x2, r3}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x30d, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0x1c) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x4e23, 0x407, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x8000000000001001}, 0x1c) r6 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r6, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e21, @multicast2=0xe0000002}, 0x4, 0x0, 0x2}}, 0x2e) 2033/05/18 03:42:38 executing program 6 (fault-call:3 fault-nth:62): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 787.267737] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xfbffffff, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x200000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0xffffff7f]}}]}, 0x60}, 0x1}, 0x0) [ 787.308932] IPVS: Unknown mcast interface: rose0 [ 787.329092] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bcb2b0200", 0x4012}) 2033/05/18 03:42:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000200"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 7: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x17, 0x410000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r1, 0x8}, &(0x7f0000000140)=0x8) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) setsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000180)={@loopback=0x7f000001, @broadcast=0xffffffff, @rand_addr=0x5793}, 0xc) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r2, 0x0) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xb) clone(0x0, &(0x7f00006cc000), &(0x7f0000a25ffc), &(0x7f0000001180), &(0x7f0000001140)) 2033/05/18 03:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 787.472139] IPVS: Unknown mcast interface: rose0 [ 787.531429] IPVS: Unknown mcast interface: rose0 [ 787.549829] FAULT_INJECTION: forcing a failure. [ 787.549829] name failslab, interval 1, probability 0, space 0, times 0 [ 787.561301] CPU: 1 PID: 17660 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 787.568589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.577973] Call Trace: [ 787.580607] dump_stack+0x1b9/0x294 [ 787.584260] ? dump_stack_print_info.cold.2+0x52/0x52 [ 787.589519] should_fail.cold.4+0xa/0x1a [ 787.593613] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 787.598734] ? graph_lock+0x170/0x170 [ 787.602548] ? lock_downgrade+0x8e0/0x8e0 [ 787.606711] ? find_held_lock+0x36/0x1c0 [ 787.610787] ? __lock_is_held+0xb5/0x140 [ 787.614867] ? check_same_owner+0x320/0x320 [ 787.619377] ? wait_for_completion+0x870/0x870 [ 787.623975] ? rcu_note_context_switch+0x710/0x710 [ 787.628916] ? graph_lock+0x170/0x170 [ 787.632734] __should_failslab+0x124/0x180 [ 787.636983] should_failslab+0x9/0x14 [ 787.640795] kmem_cache_alloc+0x2af/0x760 [ 787.644967] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 787.649997] __kernfs_new_node+0xe7/0x580 [ 787.654263] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 787.659035] ? kernfs_walk_and_get_ns+0x320/0x320 [ 787.663977] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 787.669509] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 787.675049] ? kernfs_put+0x493/0x750 [ 787.678844] ? kernfs_add_one+0x129/0x4d0 [ 787.682996] ? kernfs_get+0x30/0x30 [ 787.686622] kernfs_new_node+0x80/0xf0 [ 787.690507] kernfs_create_dir_ns+0x3d/0x140 [ 787.694916] internal_create_group+0x110/0x970 [ 787.699489] ? internal_create_group+0x347/0x970 [ 787.704243] sysfs_create_group+0x1f/0x30 [ 787.708396] dpm_sysfs_add+0x26/0x210 [ 787.712191] device_add+0xa11/0x16d0 [ 787.715918] ? device_private_init+0x230/0x230 [ 787.720507] ? kfree+0x1e9/0x260 [ 787.723882] ? kfree_const+0x5e/0x70 [ 787.727589] device_create_groups_vargs+0x1ff/0x270 [ 787.732693] device_create_vargs+0x46/0x60 [ 787.736936] bdi_register_va.part.10+0xbb/0x9b0 [ 787.741607] ? cgwb_kill+0x630/0x630 [ 787.745328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.750864] ? bdi_init+0x416/0x510 [ 787.754490] ? wb_init+0x9e0/0x9e0 [ 787.758039] ? bdi_alloc_node+0x67/0xe0 [ 787.762003] ? bdi_alloc_node+0x67/0xe0 [ 787.765977] ? rcu_read_lock_sched_held+0x108/0x120 [ 787.770995] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 787.776269] ? _raw_spin_unlock+0x22/0x30 [ 787.780526] bdi_register_va+0x68/0x80 [ 787.784417] super_setup_bdi_name+0x123/0x220 [ 787.788912] ? kill_block_super+0x100/0x100 [ 787.793223] ? kmem_cache_alloc_trace+0x616/0x780 [ 787.798054] ? match_wildcard+0x3c0/0x3c0 [ 787.802193] ? trace_hardirqs_on+0xd/0x10 [ 787.806344] fuse_fill_super+0xe6e/0x1e20 [ 787.810574] ? fuse_get_root_inode+0x190/0x190 [ 787.815152] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 787.820161] ? kasan_check_read+0x11/0x20 [ 787.824302] ? cap_capable+0x1f9/0x260 [ 787.828186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.833720] ? security_capable+0x99/0xc0 [ 787.837868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.843405] ? ns_capable_common+0x13f/0x170 [ 787.847807] ? get_anon_bdev+0x2f0/0x2f0 [ 787.851863] ? sget+0x113/0x150 [ 787.855162] ? fuse_get_root_inode+0x190/0x190 [ 787.859746] mount_nodev+0x6b/0x110 [ 787.863365] fuse_mount+0x2c/0x40 [ 787.866819] mount_fs+0xae/0x328 [ 787.870182] vfs_kern_mount.part.34+0xd4/0x4d0 [ 787.874756] ? may_umount+0xb0/0xb0 [ 787.878374] ? _raw_read_unlock+0x22/0x30 [ 787.882518] ? __get_fs_type+0x97/0xc0 [ 787.886402] do_mount+0x564/0x3070 [ 787.889955] ? copy_mount_string+0x40/0x40 [ 787.894192] ? rcu_pm_notify+0xc0/0xc0 [ 787.898087] ? copy_mount_options+0x5f/0x380 [ 787.905616] ? rcu_read_lock_sched_held+0x108/0x120 [ 787.910628] ? kmem_cache_alloc_trace+0x616/0x780 [ 787.915559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 787.921089] ? _copy_from_user+0xdf/0x150 [ 787.925233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.930763] ? copy_mount_options+0x285/0x380 [ 787.935253] ksys_mount+0x12d/0x140 [ 787.938875] __x64_sys_mount+0xbe/0x150 [ 787.942847] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 787.947942] do_syscall_64+0x1b1/0x800 [ 787.951831] ? syscall_return_slowpath+0x5c0/0x5c0 [ 787.956752] ? syscall_return_slowpath+0x30f/0x5c0 [ 787.961695] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 787.967056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.971898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.977077] RIP: 0033:0x455a09 [ 787.980266] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 787.987966] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 787.995227] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 788.002485] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 788.009750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 788.017024] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xfbffffff00000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000004800", 0x4012}) 2033/05/18 03:42:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff0000008020253b12e933f5cf404821146ac7e62540a23a0bdd560239d631b68f6aae3d14fcfa4086dcb75472740f30878cb24a6b1f1e42fc"], 0x39) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000240), &(0x7f0000000280)}, 0x18) 2033/05/18 03:42:39 executing program 6 (fault-call:3 fault-nth:63): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x100000000000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 788.065560] gfs2: not a GFS2 filesystem [ 788.133357] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x2000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x1000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xe0000001, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b1000", 0x4012}) [ 788.171228] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000000600"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf00}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x32, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40000) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x6, 0x400000) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000300)=""/201, &(0x7f0000000040)=0xc9) [ 788.314537] FAULT_INJECTION: forcing a failure. [ 788.314537] name failslab, interval 1, probability 0, space 0, times 0 [ 788.325868] CPU: 1 PID: 17707 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 788.333157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.342526] Call Trace: [ 788.345140] dump_stack+0x1b9/0x294 [ 788.348794] ? dump_stack_print_info.cold.2+0x52/0x52 [ 788.354105] ? __mutex_lock+0x7d9/0x17f0 [ 788.358280] should_fail.cold.4+0xa/0x1a [ 788.362373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 788.367686] ? kasan_kmalloc+0xc4/0xe0 [ 788.371620] ? graph_lock+0x170/0x170 [ 788.375429] ? find_held_lock+0x36/0x1c0 [ 788.379514] ? __lock_is_held+0xb5/0x140 [ 788.383627] ? check_same_owner+0x320/0x320 [ 788.387969] ? kasan_check_write+0x14/0x20 [ 788.392210] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 788.397150] ? rcu_note_context_switch+0x710/0x710 [ 788.402081] __should_failslab+0x124/0x180 [ 788.406316] should_failslab+0x9/0x14 [ 788.410211] kmem_cache_alloc+0x2af/0x760 [ 788.414361] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 788.419299] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 788.424318] __kernfs_new_node+0xe7/0x580 [ 788.428472] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 788.433228] ? mutex_unlock+0xd/0x10 [ 788.436951] ? kernfs_activate+0x20e/0x2a0 [ 788.441192] ? kernfs_walk_and_get_ns+0x320/0x320 [ 788.446051] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 788.451596] ? kernfs_link_sibling+0x1d2/0x3b0 [ 788.456218] kernfs_new_node+0x80/0xf0 [ 788.460136] __kernfs_create_file+0x4d/0x330 [ 788.464566] sysfs_add_file_mode_ns+0x21a/0x560 [ 788.469262] sysfs_add_file+0x4e/0x60 [ 788.473075] sysfs_merge_group+0xfa/0x230 [ 788.477255] dpm_sysfs_add+0x161/0x210 [ 788.481147] device_add+0xa11/0x16d0 [ 788.484869] ? device_private_init+0x230/0x230 [ 788.489445] ? kfree+0x1e9/0x260 [ 788.492829] ? kfree_const+0x5e/0x70 [ 788.496551] device_create_groups_vargs+0x1ff/0x270 [ 788.501585] device_create_vargs+0x46/0x60 [ 788.505826] bdi_register_va.part.10+0xbb/0x9b0 [ 788.510498] ? cgwb_kill+0x630/0x630 [ 788.514235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.519800] ? bdi_init+0x416/0x510 [ 788.523429] ? wb_init+0x9e0/0x9e0 [ 788.526984] ? bdi_alloc_node+0x67/0xe0 [ 788.530976] ? bdi_alloc_node+0x67/0xe0 [ 788.534954] ? rcu_read_lock_sched_held+0x108/0x120 [ 788.539977] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 788.545268] ? _raw_spin_unlock+0x22/0x30 [ 788.549423] bdi_register_va+0x68/0x80 [ 788.553308] super_setup_bdi_name+0x123/0x220 [ 788.557795] ? kill_block_super+0x100/0x100 [ 788.562115] ? kmem_cache_alloc_trace+0x616/0x780 [ 788.566961] ? match_wildcard+0x3c0/0x3c0 [ 788.571120] ? trace_hardirqs_on+0xd/0x10 [ 788.575305] fuse_fill_super+0xe6e/0x1e20 [ 788.579463] ? fuse_get_root_inode+0x190/0x190 [ 788.584070] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 788.589098] ? kasan_check_read+0x11/0x20 [ 788.593260] ? cap_capable+0x1f9/0x260 [ 788.597143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.602675] ? security_capable+0x99/0xc0 [ 788.606867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.612408] ? ns_capable_common+0x13f/0x170 [ 788.616824] ? get_anon_bdev+0x2f0/0x2f0 [ 788.620897] ? sget+0x113/0x150 [ 788.624212] ? fuse_get_root_inode+0x190/0x190 [ 788.628807] mount_nodev+0x6b/0x110 [ 788.632471] fuse_mount+0x2c/0x40 [ 788.635933] mount_fs+0xae/0x328 [ 788.639321] vfs_kern_mount.part.34+0xd4/0x4d0 [ 788.643937] ? may_umount+0xb0/0xb0 [ 788.647583] ? _raw_read_unlock+0x22/0x30 [ 788.651728] ? __get_fs_type+0x97/0xc0 [ 788.655632] do_mount+0x564/0x3070 [ 788.659194] ? do_raw_spin_unlock+0x9e/0x2e0 [ 788.663603] ? copy_mount_string+0x40/0x40 [ 788.668033] ? rcu_pm_notify+0xc0/0xc0 [ 788.671924] ? copy_mount_options+0x5f/0x380 [ 788.676331] ? rcu_read_lock_sched_held+0x108/0x120 [ 788.681351] ? kmem_cache_alloc_trace+0x616/0x780 [ 788.686187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 788.691723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.697258] ? copy_mount_options+0x285/0x380 [ 788.701761] ksys_mount+0x12d/0x140 [ 788.705418] __x64_sys_mount+0xbe/0x150 [ 788.709410] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 788.714467] do_syscall_64+0x1b1/0x800 [ 788.718380] ? finish_task_switch+0x1ca/0x840 [ 788.722902] ? syscall_return_slowpath+0x5c0/0x5c0 [ 788.727843] ? syscall_return_slowpath+0x30f/0x5c0 [ 788.732796] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 788.738254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 788.743120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.748492] RIP: 0033:0x455a09 [ 788.751680] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 788.759437] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 788.766715] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 788.773998] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 788.781363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 788.788639] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 788.820459] IPVS: Unknown mcast interface: rose0 [ 788.844115] IPVS: Unknown mcast interface: rose0 [ 788.869376] gfs2: not a GFS2 filesystem 2033/05/18 03:42:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x10000e0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x2000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bb2", 0x4012}) 2033/05/18 03:42:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x700}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 7: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaabb002d70d5d895e204ad7c000000000008004500001c0000000000329078e0000001ac1414bb0000000000089078"], 0x0) socket$pptp(0x18, 0x1, 0x2) 2033/05/18 03:42:40 executing program 6 (fault-call:3 fault-nth:64): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 788.960311] nla_parse: 6 callbacks suppressed [ 788.960321] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x400300]}}]}, 0x60}, 0x1}, 0x0) [ 789.019401] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:40 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000280)={0x0, 0x0, 0x1}) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000680)=""/9, &(0x7f00000006c0)=0x9) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x800}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000380)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', r4}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000300)={r1, r2}) fanotify_init(0x1, 0x2) r5 = openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x8) r6 = syz_open_procfs(r3, &(0x7f0000000600)='net/icmp\x00') ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000640)=r6) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000180), &(0x7f0000000240)=0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100)={0x303, 0x33}, 0x28) recvmsg(r0, &(0x7f0000002700)={&(0x7f00000001c0)=@pptp={0x0, 0x0, {0x0, @multicast2}}, 0x80, &(0x7f0000002640), 0x0, &(0x7f00000026c0)=""/28, 0x1c}, 0x2123) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000400)=0x14) [ 789.041079] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf0}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bd000", 0x4012}) 2033/05/18 03:42:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x10000e0]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x400000000000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000400300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 789.149353] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 789.233410] FAULT_INJECTION: forcing a failure. [ 789.233410] name failslab, interval 1, probability 0, space 0, times 0 [ 789.244722] CPU: 0 PID: 17758 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 789.252018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.261487] Call Trace: [ 789.264196] dump_stack+0x1b9/0x294 [ 789.267855] ? dump_stack_print_info.cold.2+0x52/0x52 [ 789.273073] ? __mutex_lock+0x7d9/0x17f0 [ 789.277155] should_fail.cold.4+0xa/0x1a [ 789.281228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 789.286347] ? kasan_kmalloc+0xc4/0xe0 [ 789.290243] ? graph_lock+0x170/0x170 [ 789.294052] ? find_held_lock+0x36/0x1c0 [ 789.298122] ? __lock_is_held+0xb5/0x140 [ 789.302213] ? check_same_owner+0x320/0x320 [ 789.306543] ? kasan_check_write+0x14/0x20 [ 789.310809] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 789.315854] ? rcu_note_context_switch+0x710/0x710 [ 789.320805] __should_failslab+0x124/0x180 [ 789.325059] should_failslab+0x9/0x14 [ 789.328874] kmem_cache_alloc+0x2af/0x760 [ 789.333054] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 789.337998] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 789.343028] __kernfs_new_node+0xe7/0x580 [ 789.347387] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 789.352156] ? mutex_unlock+0xd/0x10 [ 789.355884] ? kernfs_activate+0x20e/0x2a0 [ 789.360150] ? kernfs_walk_and_get_ns+0x320/0x320 [ 789.365075] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 789.370810] ? kernfs_link_sibling+0x1d2/0x3b0 [ 789.375959] kernfs_new_node+0x80/0xf0 [ 789.380237] __kernfs_create_file+0x4d/0x330 [ 789.384795] sysfs_add_file_mode_ns+0x21a/0x560 [ 789.389623] sysfs_add_file+0x4e/0x60 [ 789.393455] sysfs_merge_group+0xfa/0x230 [ 789.397641] dpm_sysfs_add+0x161/0x210 [ 789.401554] device_add+0xa11/0x16d0 [ 789.405308] ? device_private_init+0x230/0x230 [ 789.409913] ? kfree+0x1e9/0x260 [ 789.413294] ? kfree_const+0x5e/0x70 [ 789.417017] device_create_groups_vargs+0x1ff/0x270 [ 789.422047] device_create_vargs+0x46/0x60 [ 789.426294] bdi_register_va.part.10+0xbb/0x9b0 [ 789.430970] ? cgwb_kill+0x630/0x630 [ 789.434694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.440242] ? bdi_init+0x416/0x510 [ 789.443881] ? wb_init+0x9e0/0x9e0 [ 789.447428] ? bdi_alloc_node+0x67/0xe0 [ 789.451408] ? bdi_alloc_node+0x67/0xe0 [ 789.455400] ? rcu_read_lock_sched_held+0x108/0x120 [ 789.460424] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 789.465732] ? _raw_spin_unlock+0x22/0x30 [ 789.469899] bdi_register_va+0x68/0x80 [ 789.473810] super_setup_bdi_name+0x123/0x220 [ 789.478309] ? kill_block_super+0x100/0x100 [ 789.482636] ? kmem_cache_alloc_trace+0x616/0x780 [ 789.487484] ? match_wildcard+0x3c0/0x3c0 [ 789.491638] ? trace_hardirqs_on+0xd/0x10 [ 789.495795] fuse_fill_super+0xe6e/0x1e20 [ 789.499953] ? fuse_get_root_inode+0x190/0x190 [ 789.504552] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 789.509591] ? kasan_check_read+0x11/0x20 [ 789.513746] ? cap_capable+0x1f9/0x260 [ 789.517646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.523201] ? security_capable+0x99/0xc0 [ 789.527373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.532926] ? ns_capable_common+0x13f/0x170 [ 789.537343] ? get_anon_bdev+0x2f0/0x2f0 [ 789.541432] ? sget+0x113/0x150 [ 789.544718] ? fuse_get_root_inode+0x190/0x190 [ 789.549306] mount_nodev+0x6b/0x110 [ 789.552969] fuse_mount+0x2c/0x40 [ 789.556429] mount_fs+0xae/0x328 [ 789.559979] vfs_kern_mount.part.34+0xd4/0x4d0 [ 789.564568] ? may_umount+0xb0/0xb0 [ 789.568211] ? _raw_read_unlock+0x22/0x30 [ 789.572451] ? __get_fs_type+0x97/0xc0 [ 789.576347] do_mount+0x564/0x3070 [ 789.579922] ? do_raw_spin_unlock+0x9e/0x2e0 [ 789.584338] ? copy_mount_string+0x40/0x40 [ 789.588575] ? rcu_pm_notify+0xc0/0xc0 [ 789.592485] ? copy_mount_options+0x5f/0x380 [ 789.596901] ? rcu_read_lock_sched_held+0x108/0x120 [ 789.601921] ? kmem_cache_alloc_trace+0x616/0x780 [ 789.606777] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 789.612328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.617877] ? copy_mount_options+0x285/0x380 [ 789.622378] ksys_mount+0x12d/0x140 [ 789.626038] __x64_sys_mount+0xbe/0x150 [ 789.630014] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 789.635137] do_syscall_64+0x1b1/0x800 [ 789.639058] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 789.643924] ? syscall_return_slowpath+0x5c0/0x5c0 [ 789.648949] ? syscall_return_slowpath+0x30f/0x5c0 [ 789.653888] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 789.659280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.664145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.669356] RIP: 0033:0x455a09 [ 789.672637] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 789.680355] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 789.687620] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 789.694892] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 789.702164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 789.709542] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 789.723652] IPVS: Unknown mcast interface: rose0 [ 789.726109] gfs2: not a GFS2 filesystem 2033/05/18 03:42:40 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r1 = dup2(r0, r0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010}, 0xc, &(0x7f0000000740)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x4) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000080)=0x4) dup2(r1, r1) 2033/05/18 03:42:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xfbffffff00000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x68}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x200000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000000094", 0x4012}) 2033/05/18 03:42:40 executing program 6 (fault-call:3 fault-nth:65): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 789.738617] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000ffffff9e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 789.810519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 789.860913] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x2000000000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xe000000100000000, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 789.885621] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:41 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x1263) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x402000, 0x98) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)) 2033/05/18 03:42:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x1000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b530900", 0x4012}) 2033/05/18 03:42:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00`\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 790.006663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 790.010974] FAULT_INJECTION: forcing a failure. [ 790.010974] name failslab, interval 1, probability 0, space 0, times 0 [ 790.026470] CPU: 0 PID: 17798 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 790.033752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.043123] Call Trace: [ 790.045750] dump_stack+0x1b9/0x294 [ 790.049392] ? dump_stack_print_info.cold.2+0x52/0x52 2033/05/18 03:42:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xfcffffff00000000}}, 0x20}, 0x1}, 0x0) [ 790.054628] should_fail.cold.4+0xa/0x1a [ 790.058706] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.063889] ? lock_release+0xa10/0xa10 [ 790.067888] ? check_same_owner+0x320/0x320 [ 790.072226] ? graph_lock+0x170/0x170 [ 790.076044] ? rcu_note_context_switch+0x710/0x710 [ 790.080993] ? find_held_lock+0x36/0x1c0 [ 790.085165] ? find_held_lock+0x36/0x1c0 [ 790.089252] ? __lock_is_held+0xb5/0x140 [ 790.093353] ? check_same_owner+0x320/0x320 [ 790.097704] ? rcu_note_context_switch+0x710/0x710 [ 790.102674] __should_failslab+0x124/0x180 [ 790.107017] should_failslab+0x9/0x14 [ 790.110855] kmem_cache_alloc+0x2af/0x760 [ 790.111453] IPVS: Unknown mcast interface: rose0 [ 790.115045] ? kasan_check_write+0x14/0x20 [ 790.115069] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 790.115089] __kernfs_new_node+0xe7/0x580 [ 790.115107] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 790.115123] ? kasan_check_write+0x14/0x20 [ 790.115153] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 790.139757] IPVS: Unknown mcast interface: rose0 [ 790.142241] ? graph_lock+0x170/0x170 2033/05/18 03:42:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 790.142265] ? wait_for_completion+0x870/0x870 [ 790.142287] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 790.142306] kernfs_new_node+0x80/0xf0 [ 790.142326] __kernfs_create_file+0x4d/0x330 [ 790.174266] sysfs_add_file_mode_ns+0x21a/0x560 [ 790.178952] sysfs_add_file+0x4e/0x60 [ 790.182771] sysfs_merge_group+0xfa/0x230 [ 790.186946] dpm_sysfs_add+0x161/0x210 [ 790.190843] device_add+0xa11/0x16d0 [ 790.194567] ? device_private_init+0x230/0x230 [ 790.199155] ? kfree+0x1e9/0x260 [ 790.202887] ? kfree_const+0x5e/0x70 2033/05/18 03:42:41 executing program 7: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) seccomp(0x400000000000002, 0x0, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000000)='-\\}+vboxnet0self!*\x00', 0x3) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$TIOCCBRK(r1, 0x5428) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) [ 790.206609] device_create_groups_vargs+0x1ff/0x270 [ 790.211636] device_create_vargs+0x46/0x60 [ 790.215882] bdi_register_va.part.10+0xbb/0x9b0 [ 790.220976] ? cgwb_kill+0x630/0x630 [ 790.224712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.230614] ? bdi_init+0x416/0x510 [ 790.234269] ? wb_init+0x9e0/0x9e0 [ 790.237818] ? bdi_alloc_node+0x67/0xe0 [ 790.241790] ? bdi_alloc_node+0x67/0xe0 [ 790.245778] ? rcu_read_lock_sched_held+0x108/0x120 [ 790.250881] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 790.256172] ? _raw_spin_unlock+0x22/0x30 [ 790.260344] bdi_register_va+0x68/0x80 [ 790.264280] super_setup_bdi_name+0x123/0x220 [ 790.268834] ? kill_block_super+0x100/0x100 [ 790.273259] ? kmem_cache_alloc_trace+0x616/0x780 [ 790.278130] ? match_wildcard+0x3c0/0x3c0 [ 790.282301] ? trace_hardirqs_on+0xd/0x10 [ 790.286555] fuse_fill_super+0xe6e/0x1e20 [ 790.290727] ? fuse_get_root_inode+0x190/0x190 [ 790.295320] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 790.300345] ? kasan_check_read+0x11/0x20 [ 790.304500] ? cap_capable+0x1f9/0x260 [ 790.308399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.313942] ? security_capable+0x99/0xc0 [ 790.318133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.323679] ? ns_capable_common+0x13f/0x170 [ 790.328097] ? get_anon_bdev+0x2f0/0x2f0 [ 790.332165] ? sget+0x113/0x150 [ 790.335451] ? fuse_get_root_inode+0x190/0x190 [ 790.340042] mount_nodev+0x6b/0x110 [ 790.343682] fuse_mount+0x2c/0x40 [ 790.347146] mount_fs+0xae/0x328 [ 790.350524] vfs_kern_mount.part.34+0xd4/0x4d0 [ 790.355121] ? may_umount+0xb0/0xb0 [ 790.358755] ? _raw_read_unlock+0x22/0x30 [ 790.362916] ? __get_fs_type+0x97/0xc0 [ 790.366821] do_mount+0x564/0x3070 [ 790.370540] ? do_raw_spin_unlock+0x9e/0x2e0 [ 790.374960] ? copy_mount_string+0x40/0x40 [ 790.379206] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 790.384237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 790.389008] ? retint_kernel+0x10/0x10 [ 790.392914] ? copy_mount_options+0x1a1/0x380 [ 790.397412] ? copy_mount_options+0x1c0/0x380 [ 790.401928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.407573] ? copy_mount_options+0x285/0x380 [ 790.412078] ksys_mount+0x12d/0x140 [ 790.415843] __x64_sys_mount+0xbe/0x150 [ 790.419840] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 790.424867] do_syscall_64+0x1b1/0x800 [ 790.428850] ? finish_task_switch+0x1ca/0x840 [ 790.433357] ? syscall_return_slowpath+0x5c0/0x5c0 [ 790.438485] ? syscall_return_slowpath+0x30f/0x5c0 [ 790.443429] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 790.448817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.453684] entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:42:41 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f00000003c0)="0047fc2f07d82c99240970") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000180)) setsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000080)="1a30e7f1dbf851b5cd4545b0c632225d69d11cb08c7c276fbffa624e908f410323f429383d990950cec95680d1d18058e3720637342f9585be7b9bc1692679468f7f1cf99deb98ed26aa05448fae246da79db70f810bd4ac889fb3e31f372ef620098080710ecaffa6f73f8d0932e31e5950d17a583b7cd644904a2449aad0054b3ccb64f7494a09cc9e84e936c4d54be969c50271db80b931437fc45b006617e079944d50f8205ac1cc87aedcbde817242c34818cd2c84a38b675ef85f06de5", 0xc0) 2033/05/18 03:42:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x34000]}}]}, 0x60}, 0x1}, 0x0) [ 790.458877] RIP: 0033:0x455a09 [ 790.462156] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 790.469882] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 790.477339] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 790.484618] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 790.491891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 790.499170] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 790.521753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 790.525402] gfs2: not a GFS2 filesystem [ 790.538101] IPVS: Unknown mcast interface: rose0 [ 790.565585] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2000000000000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bc5", 0x4012}) 2033/05/18 03:42:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:41 executing program 6 (fault-call:3 fault-nth:66): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:41 executing program 7: r0 = socket(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x2000c810) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x8001}}, 0x5491, 0x2, 0x6, 0x1}, &(0x7f0000000000)=0x98) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x100) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x63) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e22, 0x7, @loopback={0x0, 0x1}, 0x5}}, 0x2, 0xce8}, &(0x7f0000000040)=0x90) 2033/05/18 03:42:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x4000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xe0000001]}}]}, 0x60}, 0x1}, 0x0) [ 790.650623] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 790.691506] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x7400}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:41 executing program 7: r0 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)="18ecaeae0b15fe146ed8961aed299fee7b7fa1810118c28e3c3663a3cca2b2feb07c429168433be77d1b6c18b1606ea73d1112778bae505a38f3f5f02bdf8f4a9de30591f44d1519a711258a444c802128d61fa163e52ee5184b71c5823a119f29745d7688f86f3e4533c965ee72b21e50099b896e392484d73e85b0e0df36b68935836ed198c51aa7b0eefe28b07569640c3ad572971adc263193f0abd0bc971f9868d73c25e31e42a03866780a1ffcbc45e240ec3c77d68e045cb3eecc", 0xbe, 0xfffffffffffffffa) keyctl$describe(0x6, r0, &(0x7f0000000300)=""/4096, 0x1000) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000001400)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000001440)=0x60000000) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000001300)='dctcp\x00', 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000013c0)={r2, 0x50, &(0x7f0000001340)}, 0x10) keyctl$read(0xb, r1, &(0x7f0000000140)=""/193, 0xc1) [ 790.726363] IPVS: Unknown mcast interface: rose0 [ 790.757529] FAULT_INJECTION: forcing a failure. [ 790.757529] name failslab, interval 1, probability 0, space 0, times 0 [ 790.768928] CPU: 1 PID: 17843 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 790.776300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.785767] Call Trace: [ 790.788377] dump_stack+0x1b9/0x294 [ 790.792031] ? dump_stack_print_info.cold.2+0x52/0x52 [ 790.797266] ? __mutex_lock+0x7d9/0x17f0 [ 790.801349] should_fail.cold.4+0xa/0x1a [ 790.805436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.810558] ? kasan_kmalloc+0xc4/0xe0 [ 790.814460] ? graph_lock+0x170/0x170 [ 790.818292] ? find_held_lock+0x36/0x1c0 [ 790.822388] ? __lock_is_held+0xb5/0x140 [ 790.826565] ? check_same_owner+0x320/0x320 [ 790.830899] ? kasan_check_write+0x14/0x20 [ 790.835231] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 790.840305] ? rcu_note_context_switch+0x710/0x710 [ 790.845252] __should_failslab+0x124/0x180 [ 790.849528] should_failslab+0x9/0x14 [ 790.853435] kmem_cache_alloc+0x2af/0x760 [ 790.857697] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 790.862639] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 790.867670] __kernfs_new_node+0xe7/0x580 [ 790.872031] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 790.876803] ? mutex_unlock+0xd/0x10 [ 790.880527] ? kernfs_activate+0x20e/0x2a0 [ 790.884776] ? kernfs_walk_and_get_ns+0x320/0x320 [ 790.889629] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 790.895171] ? kernfs_link_sibling+0x1d2/0x3b0 [ 790.899774] kernfs_new_node+0x80/0xf0 [ 790.903669] __kernfs_create_file+0x4d/0x330 [ 790.908084] sysfs_add_file_mode_ns+0x21a/0x560 [ 790.912763] sysfs_add_file+0x4e/0x60 [ 790.916573] sysfs_merge_group+0xfa/0x230 [ 790.921559] dpm_sysfs_add+0x161/0x210 [ 790.925473] device_add+0xa11/0x16d0 [ 790.929196] ? device_private_init+0x230/0x230 [ 790.933773] ? kfree+0x1e9/0x260 [ 790.937230] ? kfree_const+0x5e/0x70 [ 790.940965] device_create_groups_vargs+0x1ff/0x270 [ 790.945985] device_create_vargs+0x46/0x60 [ 790.950230] bdi_register_va.part.10+0xbb/0x9b0 [ 790.955013] ? cgwb_kill+0x630/0x630 [ 790.958735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.964275] ? bdi_init+0x416/0x510 [ 790.967905] ? wb_init+0x9e0/0x9e0 [ 790.971449] ? bdi_alloc_node+0x67/0xe0 [ 790.975423] ? bdi_alloc_node+0x67/0xe0 [ 790.979423] ? rcu_read_lock_sched_held+0x108/0x120 [ 790.984457] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 790.989748] ? _raw_spin_unlock+0x22/0x30 [ 790.993907] bdi_register_va+0x68/0x80 [ 790.997802] super_setup_bdi_name+0x123/0x220 [ 791.002303] ? kill_block_super+0x100/0x100 [ 791.006751] ? kmem_cache_alloc_trace+0x616/0x780 [ 791.011608] ? match_wildcard+0x3c0/0x3c0 [ 791.015752] ? trace_hardirqs_on+0xd/0x10 [ 791.019908] fuse_fill_super+0xe6e/0x1e20 [ 791.024246] ? fuse_get_root_inode+0x190/0x190 [ 791.029097] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 791.034117] ? kasan_check_read+0x11/0x20 [ 791.038269] ? cap_capable+0x1f9/0x260 [ 791.042164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.047704] ? security_capable+0x99/0xc0 [ 791.051858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.057414] ? ns_capable_common+0x13f/0x170 [ 791.061916] ? get_anon_bdev+0x2f0/0x2f0 [ 791.066164] ? sget+0x113/0x150 [ 791.069451] ? fuse_get_root_inode+0x190/0x190 [ 791.074063] mount_nodev+0x6b/0x110 [ 791.077693] fuse_mount+0x2c/0x40 [ 791.081151] mount_fs+0xae/0x328 [ 791.084528] vfs_kern_mount.part.34+0xd4/0x4d0 [ 791.089138] ? may_umount+0xb0/0xb0 [ 791.092791] ? _raw_read_unlock+0x22/0x30 [ 791.096942] ? __get_fs_type+0x97/0xc0 [ 791.100840] do_mount+0x564/0x3070 [ 791.104411] ? copy_mount_string+0x40/0x40 [ 791.108651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 791.113513] ? retint_kernel+0x10/0x10 [ 791.117506] ? copy_mount_options+0x213/0x380 [ 791.122097] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 791.127650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.133192] ? copy_mount_options+0x285/0x380 [ 791.137709] ksys_mount+0x12d/0x140 [ 791.141341] __x64_sys_mount+0xbe/0x150 [ 791.145324] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 791.150345] do_syscall_64+0x1b1/0x800 [ 791.154239] ? finish_task_switch+0x1ca/0x840 [ 791.158739] ? syscall_return_slowpath+0x5c0/0x5c0 [ 791.163672] ? syscall_return_slowpath+0x30f/0x5c0 [ 791.168794] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 791.174259] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.179131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.184319] RIP: 0033:0x455a09 [ 791.187510] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 791.195311] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:42:42 executing program 7: r0 = socket$unix(0x1, 0x3, 0x0) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000280)=@ipx={0x4, 0x8, 0xffffffffffffff7f, "a654a3a9a194", 0x400}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000300)}, {&(0x7f0000000340)="7c7436f3beefeab400e4d37706c309c17449852bc99f7c8ba65fee8aca09996c0cee644090eefdb15d33f5cc59e664d40d51d8c2f5e8cba1243aa0875e9994322528d35d612dc57d1ea56f05bb98024a4cbac5a79d38da22eadac7d41f99933f1ec6542f1146002f42", 0x69}, {&(0x7f00000003c0)="0367bb8c9d920cdaf25f0edff1783da51e4657897ecd7da9f9a24eab474560cac00e7eb56462d00c4f8f38fbfe8855d8ec76ae6a215d6ad5597f0d4d6212899abc230a1f901363e6a3a84578252140f6c8991c187d2244821acf05bb0fb1618e28e10db3dcb8c37e646e8a19b935201193153e04e09fc66883579f19b05b712664b6448d62a51f865929e80a432a4a472ef1c85c884921455ba045deb33635dc2e45bb1bf5812ed4a49afb00fc2b8c9324d23eb6feb1a029", 0xb8}, {&(0x7f0000000480)="6683821d9bad04a3721abff7503ae561b8c51d53c01824b27132d599908ce9621f5d2918ad330fc5a3cc5d98149b857cb13761078ddf948a92d687fb2c9afc5e266d5e90bc738deec749813d4776ca9876523b04b4fbd2e08eec1f8d3edc968a7ea747c8b463883c89f8c2e54587c8f65e948d8831", 0x75}], 0x4, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x1198, 0x20000000}, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x248000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000240)={0x8, 0x81, 0xffffffffffffffc0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'irlan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r2, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1d}}, 0x10) sendmsg(r0, &(0x7f0000000680)={&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}, 0x1) [ 791.202585] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 791.210033] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 791.217306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 791.224575] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:42 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x20000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xe000000100000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bc000", 0x4012}) 2033/05/18 03:42:42 executing program 6 (fault-call:3 fault-nth:67): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") clock_adjtime(0x0, &(0x7f0000000080)={0x49f}) 2033/05/18 03:42:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x600}}, 0x20}, 0x1}, 0x0) [ 791.274874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 791.298301] gfs2: not a GFS2 filesystem [ 791.380457] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:42 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x40101) write$sndseq(r0, &(0x7f0000000080), 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x10}, {r0, 0x4}], 0x2, &(0x7f0000000100)={r1, r2+10000000}, &(0x7f0000000180), 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x80, 0x7d}) 2033/05/18 03:42:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 791.414922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:42 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x4000000]}}]}, 0x60}, 0x1}, 0x0) [ 791.460358] IPVS: Unknown mcast interface: rose0 [ 791.498434] FAULT_INJECTION: forcing a failure. [ 791.498434] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 791.510465] CPU: 1 PID: 17886 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 791.517751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.527115] Call Trace: [ 791.529729] dump_stack+0x1b9/0x294 [ 791.533472] ? dump_stack_print_info.cold.2+0x52/0x52 [ 791.538685] ? kasan_check_write+0x14/0x20 [ 791.542949] should_fail.cold.4+0xa/0x1a [ 791.547034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 791.552166] ? debug_check_no_locks_freed+0x310/0x310 [ 791.557381] ? find_held_lock+0x36/0x1c0 [ 791.561467] ? rcu_note_context_switch+0x710/0x710 [ 791.566422] ? __might_sleep+0x95/0x190 [ 791.570419] ? kasan_check_write+0x14/0x20 [ 791.574672] ? __mutex_lock+0x7d9/0x17f0 [ 791.578747] ? find_held_lock+0x36/0x1c0 [ 791.582838] ? mutex_trylock+0x2a0/0x2a0 [ 791.586915] ? lock_downgrade+0x8e0/0x8e0 [ 791.591091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.596651] ? should_fail+0x21b/0xbcd [ 791.600559] __alloc_pages_nodemask+0x34e/0xd70 [ 791.605244] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 791.610266] ? lock_downgrade+0x8e0/0x8e0 [ 791.614424] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 791.619386] ? find_held_lock+0x36/0x1c0 [ 791.623464] ? __lock_is_held+0xb5/0x140 [ 791.627552] ? check_same_owner+0x320/0x320 [ 791.631889] cache_grow_begin+0x6e/0x6c0 [ 791.635967] kmem_cache_alloc_trace+0x6a5/0x780 [ 791.640657] ? device_create_file+0x1e0/0x1e0 [ 791.645189] kobject_uevent_env+0x20f/0xea0 [ 791.649520] ? device_pm_add+0x221/0x340 [ 791.653600] kobject_uevent+0x1f/0x30 [ 791.657410] device_add+0xb01/0x16d0 [ 791.661140] ? device_private_init+0x230/0x230 [ 791.665730] ? kfree+0x1e9/0x260 [ 791.669105] ? kfree_const+0x5e/0x70 [ 791.672829] device_create_groups_vargs+0x1ff/0x270 [ 791.677856] device_create_vargs+0x46/0x60 [ 791.682102] bdi_register_va.part.10+0xbb/0x9b0 [ 791.686779] ? cgwb_kill+0x630/0x630 [ 791.690501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.696039] ? bdi_init+0x416/0x510 [ 791.699668] ? wb_init+0x9e0/0x9e0 [ 791.703211] ? bdi_alloc_node+0x67/0xe0 [ 791.707192] ? bdi_alloc_node+0x67/0xe0 [ 791.711175] ? rcu_read_lock_sched_held+0x108/0x120 [ 791.716203] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 791.721487] ? _raw_spin_unlock+0x22/0x30 [ 791.725645] bdi_register_va+0x68/0x80 [ 791.729542] super_setup_bdi_name+0x123/0x220 [ 791.734040] ? kill_block_super+0x100/0x100 [ 791.738369] ? kmem_cache_alloc_trace+0x616/0x780 [ 791.743225] ? match_wildcard+0x3c0/0x3c0 [ 791.747391] fuse_fill_super+0xe6e/0x1e20 [ 791.751564] ? fuse_get_root_inode+0x190/0x190 [ 791.756174] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 791.761210] ? kasan_check_read+0x11/0x20 [ 791.765466] ? cap_capable+0x1f9/0x260 [ 791.769390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.775033] ? security_capable+0x99/0xc0 [ 791.779198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.784744] ? ns_capable_common+0x13f/0x170 [ 791.789160] ? get_anon_bdev+0x2f0/0x2f0 [ 791.793251] ? sget+0x113/0x150 [ 791.796543] ? fuse_get_root_inode+0x190/0x190 [ 791.801220] mount_nodev+0x6b/0x110 [ 791.804861] fuse_mount+0x2c/0x40 [ 791.808325] mount_fs+0xae/0x328 [ 791.811706] vfs_kern_mount.part.34+0xd4/0x4d0 [ 791.816301] ? may_umount+0xb0/0xb0 [ 791.820125] ? _raw_read_unlock+0x22/0x30 [ 791.824286] ? __get_fs_type+0x97/0xc0 [ 791.828200] do_mount+0x564/0x3070 [ 791.831746] ? do_raw_spin_unlock+0x9e/0x2e0 [ 791.836181] ? copy_mount_string+0x40/0x40 [ 791.840432] ? rcu_pm_notify+0xc0/0xc0 [ 791.844331] ? copy_mount_options+0x5f/0x380 [ 791.848843] ? rcu_read_lock_sched_held+0x108/0x120 [ 791.853884] ? kmem_cache_alloc_trace+0x616/0x780 [ 791.858738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.864899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.870619] ? copy_mount_options+0x285/0x380 [ 791.875125] ksys_mount+0x12d/0x140 [ 791.878774] __x64_sys_mount+0xbe/0x150 [ 791.882755] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 791.887797] do_syscall_64+0x1b1/0x800 [ 791.891784] ? finish_task_switch+0x1ca/0x840 [ 791.896285] ? syscall_return_slowpath+0x5c0/0x5c0 [ 791.901235] ? syscall_return_slowpath+0x30f/0x5c0 [ 791.906199] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 791.911571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.916430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.921620] RIP: 0033:0x455a09 [ 791.924808] RSP: 002b:00007f850e02c808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 791.932532] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 791.939820] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 2033/05/18 03:42:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000041b00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070020015000000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:42:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000300", 0x4012}) [ 791.947185] RBP: 0000000000000000 R08: 00007f850e02c820 R09: 0000000000000000 [ 791.954457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 791.961816] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 791.987222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 791.995766] IPVS: Unknown mcast interface: rose0 [ 792.016476] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x710de96e12, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0x7}, 0x4) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '/dev/ion\x00'}, {0x20}, {0x20, 'em1!'}, {0x20}, {0x20, ':ppp0,'}, {0x20, '/dev/ion\x00'}, {0x20}], 0xa, "bd34144d3d6a77536f546579ee57e00bdc482238896127bf21773bc9706155357f363dce495e5d4b91f0890bac0097409cef4a19ab807ef67e21ad93e898a78b9db725f5f6b87f54cd"}, 0x77) ioctl(r0, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x8004, 0x5}) dup3(r1, r1, 0x0) 2033/05/18 03:42:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xfffffffb]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000000000f00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xffffff7f00000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bea2b0200", 0x4012}) 2033/05/18 03:42:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:43 executing program 6 (fault-call:3 fault-nth:68): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 792.642191] IPVS: Unknown mcast interface: rose0 [ 792.656595] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x400000000000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x2]}}]}, 0x60}, 0x1}, 0x0) [ 792.691098] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x68000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000000c0)={0x25, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000200)={{}, 0x1}) close(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1000000, 0x0) 2033/05/18 03:42:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000002000", 0x4012}) 2033/05/18 03:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000f000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x20000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x100000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 792.913244] device bridge_slave_1 left promiscuous mode [ 792.918826] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.954866] device bridge_slave_0 left promiscuous mode [ 792.960500] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.057661] team0 (unregistering): Port device team_slave_1 removed [ 793.082511] team0 (unregistering): Port device team_slave_0 removed [ 793.109203] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 793.132840] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 793.196936] bond0 (unregistering): Released all slaves [ 793.232104] IPVS: Unknown mcast interface: rose0 [ 793.249464] IPVS: Unknown mcast interface: rose0 [ 794.473439] IPVS: ftp: loaded support on port[0] = 21 [ 795.159576] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.166061] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.173865] device bridge_slave_0 entered promiscuous mode [ 795.214157] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.220597] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.228415] device bridge_slave_1 entered promiscuous mode [ 795.268006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 795.306651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 795.418479] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 795.462396] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 795.637528] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 795.644972] team0: Port device team_slave_0 added [ 795.683092] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 795.690982] team0: Port device team_slave_1 added [ 795.729110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 795.770790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 795.812784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 795.819994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 795.828571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 795.868600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 795.875798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 795.891557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 796.270945] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.277386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.284076] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.290469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.298143] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 796.304579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 797.709384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 797.840680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 797.971965] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 797.978197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 797.987698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 798.118326] 8021q: adding VLAN 0 to HW filter on device team0 [ 799.034793] FAULT_INJECTION: forcing a failure. [ 799.034793] name failslab, interval 1, probability 0, space 0, times 0 [ 799.046594] CPU: 0 PID: 18207 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 799.053875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 799.063222] Call Trace: [ 799.065818] dump_stack+0x1b9/0x294 [ 799.069451] ? dump_stack_print_info.cold.2+0x52/0x52 [ 799.074642] ? lock_downgrade+0x8e0/0x8e0 [ 799.078858] should_fail.cold.4+0xa/0x1a [ 799.082926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 799.089092] ? graph_lock+0x170/0x170 [ 799.092903] ? kernel_text_address+0x79/0xf0 [ 799.097313] ? __unwind_start+0x166/0x330 [ 799.101460] ? __kernel_text_address+0xd/0x40 [ 799.105958] ? find_held_lock+0x36/0x1c0 [ 799.110029] ? __lock_is_held+0xb5/0x140 [ 799.114102] ? check_same_owner+0x320/0x320 [ 799.118422] ? device_create_groups_vargs+0x1ff/0x270 [ 799.123611] ? device_create_vargs+0x46/0x60 [ 799.128020] ? bdi_register_va.part.10+0xbb/0x9b0 [ 799.132872] ? rcu_note_context_switch+0x710/0x710 [ 799.137805] ? mount_nodev+0x6b/0x110 [ 799.141605] ? fuse_mount+0x2c/0x40 [ 799.145231] ? mount_fs+0xae/0x328 [ 799.148782] __should_failslab+0x124/0x180 [ 799.153029] should_failslab+0x9/0x14 [ 799.156837] kmem_cache_alloc+0x2af/0x760 [ 799.160998] skb_clone+0x1ed/0x4f0 [ 799.164542] ? refcount_add_not_zero+0x250/0x320 [ 799.169303] ? skb_split+0x11d0/0x11d0 [ 799.173195] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 799.178212] ? netlink_trim+0x1b2/0x370 [ 799.182190] ? netlink_skb_destructor+0x210/0x210 [ 799.187039] ? cleanup_uevent_env+0x40/0x40 [ 799.191368] netlink_broadcast_filtered+0x1024/0x1580 [ 799.196569] ? __netlink_sendskb+0xd0/0xd0 [ 799.200821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.206908] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 799.211692] ? refcount_add_not_zero+0x320/0x320 [ 799.216462] ? cleanup_uevent_env+0x40/0x40 [ 799.220790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 799.225816] kobject_uevent_env+0x6e4/0xea0 [ 799.230143] ? device_pm_add+0x221/0x340 [ 799.234216] kobject_uevent+0x1f/0x30 [ 799.238067] device_add+0xb01/0x16d0 [ 799.241793] ? device_private_init+0x230/0x230 [ 799.246381] ? kfree+0x1e9/0x260 [ 799.249750] ? kfree_const+0x5e/0x70 [ 799.253493] device_create_groups_vargs+0x1ff/0x270 [ 799.258514] device_create_vargs+0x46/0x60 [ 799.262759] bdi_register_va.part.10+0xbb/0x9b0 [ 799.267430] ? cgwb_kill+0x630/0x630 [ 799.271146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.276679] ? bdi_init+0x416/0x510 [ 799.280303] ? wb_init+0x9e0/0x9e0 [ 799.283842] ? bdi_alloc_node+0x67/0xe0 [ 799.287818] ? bdi_alloc_node+0x67/0xe0 [ 799.291796] ? rcu_read_lock_sched_held+0x108/0x120 [ 799.296813] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 799.302113] ? _raw_spin_unlock+0x22/0x30 [ 799.306264] bdi_register_va+0x68/0x80 [ 799.310151] super_setup_bdi_name+0x123/0x220 [ 799.314647] ? kill_block_super+0x100/0x100 [ 799.318970] ? kmem_cache_alloc_trace+0x616/0x780 [ 799.323816] ? match_wildcard+0x3c0/0x3c0 [ 799.327964] ? trace_hardirqs_on+0xd/0x10 [ 799.332117] fuse_fill_super+0xe6e/0x1e20 [ 799.336272] ? fuse_get_root_inode+0x190/0x190 [ 799.340857] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 799.345875] ? kasan_check_read+0x11/0x20 [ 799.350025] ? cap_capable+0x1f9/0x260 [ 799.353917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.359798] ? security_capable+0x99/0xc0 [ 799.363946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.369481] ? ns_capable_common+0x13f/0x170 [ 799.373905] ? get_anon_bdev+0x2f0/0x2f0 [ 799.377968] ? sget+0x113/0x150 [ 799.381251] ? fuse_get_root_inode+0x190/0x190 [ 799.385838] mount_nodev+0x6b/0x110 [ 799.389464] fuse_mount+0x2c/0x40 [ 799.392920] mount_fs+0xae/0x328 [ 799.396292] vfs_kern_mount.part.34+0xd4/0x4d0 [ 799.400874] ? may_umount+0xb0/0xb0 [ 799.404500] ? _raw_read_unlock+0x22/0x30 [ 799.408642] ? __get_fs_type+0x97/0xc0 [ 799.412532] do_mount+0x564/0x3070 [ 799.416100] ? copy_mount_string+0x40/0x40 [ 799.420339] ? rcu_pm_notify+0xc0/0xc0 [ 799.424235] ? copy_mount_options+0x5f/0x380 [ 799.428648] ? rcu_read_lock_sched_held+0x108/0x120 [ 799.433683] ? kmem_cache_alloc_trace+0x616/0x780 [ 799.438536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 799.444094] ? _copy_from_user+0xdf/0x150 [ 799.448337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 799.453875] ? copy_mount_options+0x285/0x380 [ 799.458376] ksys_mount+0x12d/0x140 [ 799.462035] __x64_sys_mount+0xbe/0x150 [ 799.466024] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 799.471045] do_syscall_64+0x1b1/0x800 [ 799.474936] ? finish_task_switch+0x1ca/0x840 [ 799.479434] ? syscall_return_slowpath+0x5c0/0x5c0 [ 799.484366] ? syscall_return_slowpath+0x30f/0x5c0 [ 799.489305] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 799.494676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 799.499525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.504719] RIP: 0033:0x455a09 [ 799.507901] RSP: 002b:00007f754b5ef808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 799.515619] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 799.522886] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 799.530151] RBP: 0000000000000000 R08: 00007f754b5ef820 R09: 0000000000000000 [ 799.537415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 799.544679] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xe0000001, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf00000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xe000000100000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000005e00110700000000000000942d3e3fafd96390597656829200000000002bd6b18d47bad3c040efa43a8ccc89ba624f6a3999fea64ce5c8514ecdb9f60a2542dc4930b04a2ae5d7661f600021f2beb933cea919422bae8186a3e43fdb0d830f410ce50edf4b5c3006471decaf7a3b7172605d72d159713770ac41986bd5", @ANYRES32=0x0, @ANYBLOB='\a\x00\x00\x00'], 0x1c}, 0x1}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x900) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000240)) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000200)=r3) r4 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={"6966623000faffffffffffffff00", 0x5001}) recvmmsg(r1, &(0x7f0000006140)=[{{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000006000), 0x0, &(0x7f0000006040)=""/193, 0xc1}}], 0x1, 0x0, &(0x7f0000006240)) 2033/05/18 03:42:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178bd52b0200", 0x4012}) 2033/05/18 03:42:51 executing program 6 (fault-call:3 fault-nth:69): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000f0ffffff00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 799.973521] nla_parse: 2 callbacks suppressed [ 799.973529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x400000000000000]}}]}, 0x60}, 0x1}, 0x0) [ 800.019208] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x60000000}}, 0x20}, 0x1}, 0x0) [ 800.047127] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:51 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0042fc2f07d82c99240970") bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="89b51218424843d500"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x2}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 2033/05/18 03:42:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bc1", 0x4012}) 2033/05/18 03:42:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530001b0400"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 800.142684] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 800.218900] IPVS: Unknown mcast interface: rose0 [ 800.243269] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x40030000000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffb, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:51 executing program 6 (fault-call:3 fault-nth:70): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:51 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x4000000000}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f000069b000/0x1000)=nil, 0x1000}) 2033/05/18 03:42:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x8100000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000cad00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bb9", 0x4012}) [ 800.323237] device bridge_slave_1 left promiscuous mode [ 800.328868] bridge0: port 2(bridge_slave_1) entered disabled state 2033/05/18 03:42:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x400300, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:51 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ffefa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-camellia-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb9", 0x30) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x40200) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) sendmmsg$alg(r1, &(0x7f0000001240)=[{0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmmsg$alg(r1, &(0x7f0000004900)=[{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000002280)="d946f56c00aa888d236ff571175d375a90f63af9aa971a6cd448ea033ae69bec0fdaa1ea43c14c6cf28da529bdbc7f62", 0x30}], 0x1}], 0x1, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xc02, 0x10000) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000040)=0x1, 0x4) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/81, 0x51}], 0x1}, 0x0) 2033/05/18 03:42:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x3d1894fa51000000]}}]}, 0x60}, 0x1}, 0x0) [ 800.372139] device bridge_slave_0 left promiscuous mode [ 800.377801] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:42:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xffffff7f, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 800.515890] team0 (unregistering): Port device team_slave_1 removed [ 800.542563] team0 (unregistering): Port device team_slave_0 removed [ 800.543441] IPVS: ftp: loaded support on port[0] = 21 [ 800.564842] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 800.593740] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 800.637572] bond0 (unregistering): Released all slaves [ 800.724586] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 800.753586] IPVS: Unknown mcast interface: rose0 [ 800.791786] IPVS: Unknown mcast interface: rose0 [ 801.873231] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.879655] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.903985] device bridge_slave_0 entered promiscuous mode [ 801.981072] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.987575] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.995793] device bridge_slave_1 entered promiscuous mode [ 802.033827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 802.092823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 802.256898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 802.336795] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 802.596749] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 802.604416] team0: Port device team_slave_0 added [ 802.642683] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 802.650204] team0: Port device team_slave_1 added [ 802.687673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 802.730218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 802.784294] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 802.791496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 802.803630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 802.877135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 802.884342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 802.894310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 803.287793] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.294225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.300890] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.307289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.316194] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 804.129166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 804.742277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 804.877803] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 805.015679] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 805.021947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 805.030186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 805.167122] 8021q: adding VLAN 0 to HW filter on device team0 [ 806.053659] FAULT_INJECTION: forcing a failure. [ 806.053659] name failslab, interval 1, probability 0, space 0, times 0 [ 806.065548] CPU: 0 PID: 18539 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 806.072828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.082197] Call Trace: [ 806.084799] dump_stack+0x1b9/0x294 [ 806.088541] ? dump_stack_print_info.cold.2+0x52/0x52 [ 806.093732] ? kernel_text_address+0x79/0xf0 [ 806.098143] ? __unwind_start+0x166/0x330 [ 806.102308] ? __kernel_text_address+0xd/0x40 [ 806.106821] should_fail.cold.4+0xa/0x1a [ 806.110889] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 806.116005] ? __lock_acquire+0x7f5/0x5140 [ 806.120245] ? __lock_acquire+0x7f5/0x5140 [ 806.124483] ? save_stack+0xa9/0xd0 [ 806.128122] ? graph_lock+0x170/0x170 [ 806.131932] ? kasan_kmalloc+0xc4/0xe0 [ 806.135833] ? kasan_slab_alloc+0x12/0x20 [ 806.140803] ? find_held_lock+0x36/0x1c0 [ 806.144872] ? __lock_is_held+0xb5/0x140 [ 806.148965] ? check_same_owner+0x320/0x320 [ 806.153289] ? __lock_acquire+0x7f5/0x5140 [ 806.157527] ? rcu_note_context_switch+0x710/0x710 [ 806.162460] __should_failslab+0x124/0x180 [ 806.166701] should_failslab+0x9/0x14 [ 806.170590] kmem_cache_alloc+0x2af/0x760 [ 806.174739] ? debug_check_no_locks_freed+0x310/0x310 [ 806.179935] __d_alloc+0xc0/0xd30 [ 806.183392] ? __lock_acquire+0x7f5/0x5140 [ 806.187633] ? shrink_dcache_for_umount+0x290/0x290 [ 806.192650] ? print_usage_bug+0xc0/0xc0 [ 806.196722] ? debug_check_no_locks_freed+0x310/0x310 [ 806.201914] ? print_usage_bug+0xc0/0xc0 [ 806.205974] ? __lock_acquire+0x7f5/0x5140 [ 806.210225] d_alloc+0x8e/0x370 [ 806.213515] ? __d_alloc+0xd30/0xd30 [ 806.217242] d_alloc_parallel+0x152/0x1e80 [ 806.221483] ? graph_lock+0x170/0x170 [ 806.225299] ? __lock_acquire+0x7f5/0x5140 [ 806.229536] ? debug_check_no_locks_freed+0x310/0x310 [ 806.234745] ? __d_lookup_rcu+0xa80/0xa80 [ 806.238894] ? print_usage_bug+0xc0/0xc0 [ 806.242961] ? find_held_lock+0x36/0x1c0 [ 806.247036] ? lock_downgrade+0x8e0/0x8e0 [ 806.251189] ? __kernel_text_address+0xd/0x40 [ 806.255692] ? mark_held_locks+0xc9/0x160 [ 806.259845] ? __raw_spin_lock_init+0x1c/0x100 [ 806.269908] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 806.274924] ? __lockdep_init_map+0x105/0x590 [ 806.279425] ? __lockdep_init_map+0x105/0x590 [ 806.283918] ? lockdep_init_map+0x9/0x10 [ 806.287979] ? __init_waitqueue_head+0x96/0x140 [ 806.292647] ? init_wait_entry+0x1b0/0x1b0 [ 806.296880] ? d_alloc_parallel+0x1e80/0x1e80 [ 806.301384] ? lock_release+0xa10/0xa10 [ 806.305393] __lookup_slow+0x1e6/0x540 [ 806.309290] ? vfs_unlink+0x510/0x510 [ 806.313108] ? d_lookup+0x219/0x330 [ 806.316753] lookup_one_len+0x1c7/0x210 [ 806.320743] ? lookup_one_len_unlocked+0xf0/0xf0 [ 806.325499] ? down_write+0x87/0x120 [ 806.329216] ? start_creating+0xb1/0x200 [ 806.333277] ? down_read+0x1b0/0x1b0 [ 806.336989] ? mntput+0x74/0xa0 [ 806.340269] ? simple_pin_fs+0xa4/0x190 [ 806.344248] start_creating+0xc6/0x200 [ 806.348761] __debugfs_create_file+0x63/0x400 [ 806.353262] debugfs_create_file+0x57/0x70 [ 806.357500] bdi_register_va.part.10+0x365/0x9b0 [ 806.362255] ? cgwb_kill+0x630/0x630 [ 806.365972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.371513] ? bdi_init+0x416/0x510 [ 806.375143] ? wb_init+0x9e0/0x9e0 [ 806.378682] ? bdi_alloc_node+0x67/0xe0 [ 806.382691] ? bdi_alloc_node+0x67/0xe0 [ 806.386672] ? rcu_read_lock_sched_held+0x108/0x120 [ 806.391690] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 806.396968] ? _raw_spin_unlock+0x22/0x30 [ 806.401119] bdi_register_va+0x68/0x80 [ 806.405011] super_setup_bdi_name+0x123/0x220 [ 806.409505] ? kill_block_super+0x100/0x100 [ 806.413837] ? kmem_cache_alloc_trace+0x616/0x780 [ 806.418680] ? match_wildcard+0x3c0/0x3c0 [ 806.422829] ? trace_hardirqs_on+0xd/0x10 [ 806.426982] fuse_fill_super+0xe6e/0x1e20 [ 806.431138] ? fuse_get_root_inode+0x190/0x190 [ 806.435727] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 806.440835] ? kasan_check_read+0x11/0x20 [ 806.444986] ? cap_capable+0x1f9/0x260 [ 806.448883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.454426] ? security_capable+0x99/0xc0 [ 806.458581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.464135] ? ns_capable_common+0x13f/0x170 [ 806.468569] ? get_anon_bdev+0x2f0/0x2f0 [ 806.472629] ? sget+0x113/0x150 [ 806.476009] ? fuse_get_root_inode+0x190/0x190 [ 806.480590] mount_nodev+0x6b/0x110 [ 806.484218] fuse_mount+0x2c/0x40 [ 806.487674] mount_fs+0xae/0x328 [ 806.491044] vfs_kern_mount.part.34+0xd4/0x4d0 [ 806.495635] ? may_umount+0xb0/0xb0 [ 806.499264] ? _raw_read_unlock+0x22/0x30 [ 806.503412] ? __get_fs_type+0x97/0xc0 [ 806.507304] do_mount+0x564/0x3070 [ 806.510849] ? copy_mount_string+0x40/0x40 [ 806.515080] ? rcu_pm_notify+0xc0/0xc0 [ 806.518979] ? copy_mount_options+0x5f/0x380 [ 806.523390] ? rcu_read_lock_sched_held+0x108/0x120 [ 806.528438] ? kmem_cache_alloc_trace+0x616/0x780 [ 806.533307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 806.538845] ? _copy_from_user+0xdf/0x150 [ 806.542998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.548535] ? copy_mount_options+0x285/0x380 [ 806.553034] ksys_mount+0x12d/0x140 [ 806.556663] __x64_sys_mount+0xbe/0x150 [ 806.560640] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 806.565666] do_syscall_64+0x1b1/0x800 [ 806.569556] ? finish_task_switch+0x1ca/0x840 [ 806.574053] ? syscall_return_slowpath+0x5c0/0x5c0 [ 806.578983] ? syscall_return_slowpath+0x30f/0x5c0 [ 806.583916] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 806.589295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 806.594157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.599345] RIP: 0033:0x455a09 [ 806.602538] RSP: 002b:00007f0ff3862808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 806.610248] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 806.617513] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 806.624802] RBP: 0000000000000000 R08: 00007f0ff3862820 R09: 0000000000000000 [ 806.632082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 806.639348] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:42:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xfbffffff]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x200000000000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 7: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x10, 0x1a, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x0) recvmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000001440)=""/191, 0xbf}, {&(0x7f0000001500)=""/191, 0xbf}, {&(0x7f0000000100)=""/133, 0x85}], 0x4}}, {{&(0x7f0000004180)=@can, 0x80, &(0x7f00000042c0)}}], 0x2, 0x0, &(0x7f00000044c0)={0x0, 0x1c9c380}) 2033/05/18 03:42:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xf0ffff}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b0000000000022bed", 0x4012}) 2033/05/18 03:42:58 executing program 6 (fault-call:3 fault-nth:71): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000034000"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 806.987970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 806.997360] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x4]}}]}, 0x60}, 0x1}, 0x0) [ 807.032933] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x200000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x6c00}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:42:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f7365300000000cad00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x51fa94183d]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b000001bc00", 0x4012}) [ 807.153460] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:42:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x1000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 807.199858] IPVS: Unknown mcast interface: rose0 2033/05/18 03:42:58 executing program 6 (fault-call:3 fault-nth:72): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:42:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 807.252766] IPVS: Unknown mcast interface: rose0 [ 807.342440] device bridge_slave_1 left promiscuous mode [ 807.348131] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.373954] device bridge_slave_0 left promiscuous mode [ 807.379655] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.451494] team0 (unregistering): Port device team_slave_1 removed [ 807.454973] IPVS: ftp: loaded support on port[0] = 21 [ 807.472233] team0 (unregistering): Port device team_slave_0 removed [ 807.483911] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 807.513837] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 807.555162] bond0 (unregistering): Released all slaves [ 808.697463] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.704110] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.712929] device bridge_slave_0 entered promiscuous mode [ 808.764006] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.770717] bridge0: port 2(bridge_slave_1) entered disabled state [ 808.796938] device bridge_slave_1 entered promiscuous mode [ 808.870969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 808.950784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 809.190636] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 809.239819] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 809.311313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 809.318280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 809.359589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 809.366502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 809.509107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 809.517081] team0: Port device team_slave_0 added [ 809.554793] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 809.562799] team0: Port device team_slave_1 added [ 809.601895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 809.644250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 809.683998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 809.691381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 809.700127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 809.738376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 809.745685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 809.758690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 810.143571] bridge0: port 2(bridge_slave_1) entered blocking state [ 810.149995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 810.156680] bridge0: port 1(bridge_slave_0) entered blocking state [ 810.163087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 810.170960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 811.167152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 811.601596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 811.737715] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 811.873353] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 811.879625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 811.895482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 812.025556] 8021q: adding VLAN 0 to HW filter on device team0 [ 812.985581] FAULT_INJECTION: forcing a failure. [ 812.985581] name failslab, interval 1, probability 0, space 0, times 0 [ 812.996906] CPU: 1 PID: 18845 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 813.004179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.013529] Call Trace: [ 813.016126] dump_stack+0x1b9/0x294 [ 813.019758] ? dump_stack_print_info.cold.2+0x52/0x52 [ 813.024946] ? d_add+0x605/0xa10 [ 813.028317] ? lock_downgrade+0x8e0/0x8e0 [ 813.032464] ? __kernel_text_address+0xd/0x40 [ 813.036963] should_fail.cold.4+0xa/0x1a [ 813.041025] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 813.046136] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 813.051157] ? graph_lock+0x170/0x170 [ 813.054956] ? __lockdep_init_map+0x105/0x590 [ 813.059459] ? find_held_lock+0x36/0x1c0 [ 813.063526] ? __lock_is_held+0xb5/0x140 [ 813.067605] ? check_same_owner+0x320/0x320 [ 813.071930] ? rcu_note_context_switch+0x710/0x710 [ 813.076858] __should_failslab+0x124/0x180 [ 813.081096] should_failslab+0x9/0x14 [ 813.084902] kmem_cache_alloc+0x2af/0x760 [ 813.089069] alloc_inode+0xb2/0x190 [ 813.092704] new_inode_pseudo+0x69/0x1a0 [ 813.096766] ? prune_icache_sb+0x1a0/0x1a0 [ 813.101000] ? down_read+0x1b0/0x1b0 [ 813.104712] ? mntput+0x74/0xa0 [ 813.108001] new_inode+0x1c/0x40 [ 813.111370] debugfs_get_inode+0x19/0x120 [ 813.115527] __debugfs_create_file+0xb5/0x400 [ 813.120080] debugfs_create_file+0x57/0x70 [ 813.124448] bdi_register_va.part.10+0x365/0x9b0 [ 813.129206] ? cgwb_kill+0x630/0x630 [ 813.132929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.138464] ? bdi_init+0x416/0x510 [ 813.142155] ? wb_init+0x9e0/0x9e0 [ 813.145746] ? bdi_alloc_node+0x67/0xe0 [ 813.149721] ? bdi_alloc_node+0x67/0xe0 [ 813.153697] ? rcu_read_lock_sched_held+0x108/0x120 [ 813.158714] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 813.163999] ? _raw_spin_unlock+0x22/0x30 [ 813.168153] bdi_register_va+0x68/0x80 [ 813.172047] super_setup_bdi_name+0x123/0x220 [ 813.176542] ? kill_block_super+0x100/0x100 [ 813.180867] ? kmem_cache_alloc_trace+0x616/0x780 [ 813.185713] ? match_wildcard+0x3c0/0x3c0 [ 813.189865] ? trace_hardirqs_on+0xd/0x10 [ 813.194018] fuse_fill_super+0xe6e/0x1e20 [ 813.198172] ? fuse_get_root_inode+0x190/0x190 [ 813.202760] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 813.207780] ? kasan_check_read+0x11/0x20 [ 813.211933] ? cap_capable+0x1f9/0x260 [ 813.215832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.221373] ? security_capable+0x99/0xc0 [ 813.225526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.231073] ? ns_capable_common+0x13f/0x170 [ 813.235488] ? get_anon_bdev+0x2f0/0x2f0 [ 813.239818] ? sget+0x113/0x150 [ 813.243102] ? fuse_get_root_inode+0x190/0x190 [ 813.247714] mount_nodev+0x6b/0x110 [ 813.251346] fuse_mount+0x2c/0x40 [ 813.254835] mount_fs+0xae/0x328 [ 813.258300] vfs_kern_mount.part.34+0xd4/0x4d0 [ 813.262896] ? may_umount+0xb0/0xb0 [ 813.266527] ? _raw_read_unlock+0x22/0x30 [ 813.270679] ? __get_fs_type+0x97/0xc0 [ 813.274573] do_mount+0x564/0x3070 [ 813.278120] ? copy_mount_string+0x40/0x40 [ 813.282361] ? rcu_pm_notify+0xc0/0xc0 [ 813.286259] ? copy_mount_options+0x5f/0x380 [ 813.290674] ? rcu_read_lock_sched_held+0x108/0x120 [ 813.295690] ? kmem_cache_alloc_trace+0x616/0x780 [ 813.300559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 813.306094] ? copy_mount_options+0x285/0x380 [ 813.310593] ksys_mount+0x12d/0x140 [ 813.314224] __x64_sys_mount+0xbe/0x150 [ 813.318200] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 813.323218] do_syscall_64+0x1b1/0x800 [ 813.327105] ? finish_task_switch+0x1ca/0x840 [ 813.331603] ? syscall_return_slowpath+0x5c0/0x5c0 [ 813.336533] ? syscall_return_slowpath+0x30f/0x5c0 [ 813.341464] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 813.346832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 813.351680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.356865] RIP: 0033:0x455a09 [ 813.360049] RSP: 002b:00007f1fe5e8f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 813.367760] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 813.375024] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 813.382395] RBP: 0000000000000000 R08: 00007f1fe5e8f820 R09: 0000000000000000 [ 813.389675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 813.396955] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:43:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022be700", 0x4012}) 2033/05/18 03:43:05 executing program 6 (fault-call:3 fault-nth:73): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:43:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20800, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f00000000c0)={0xf000, 0x100000}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x7, &(0x7f0000000180)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r3}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000000080)='GPL\x00', 0x8, 0xdd, &(0x7f0000000240)=""/221}, 0x48) 2033/05/18 03:43:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xfffffffffffff000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x34000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xffffff7f00000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000038e00"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 813.864175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 813.912946] IPVS: Unknown mcast interface: rose0 2033/05/18 03:43:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x7fef}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0xffffff7f]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:43:05 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0xab12}, 0xb) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0xffffffffffffff84) clock_gettime(0x0, &(0x7f00000020c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001fc0)=[{{&(0x7f0000000980)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c00)=""/81, 0x51}], 0x1}}, {{0x0, 0x0, &(0x7f0000001f00), 0x0, &(0x7f0000001f40)=""/96, 0x60}}], 0x2, 0x40, &(0x7f0000002100)={0x0, r2+10000000}) 2033/05/18 03:43:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bb700", 0x4012}) [ 813.953785] IPVS: Unknown mcast interface: rose0 2033/05/18 03:43:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:43:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f73653000c4430300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) [ 814.037503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:43:05 executing program 7: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x10001, 0x0, {0xffffffffffffffff, 0x0, 0x8f, 0x3, 0x80}}) keyctl$set_reqkey_keyring(0xe, 0x0) sendto$unix(r0, &(0x7f0000000300)="ebb1d39c30480af4d630b513f2b314436dbee234e2384409496b5ac71a9b86e94c4d978da1222cbdb2c26862fc2f19bc369fc0977eaed9c6375352c20907f32f38162d73bc0aa37bf6c3c477295d06aaa91f3ce76f782dc19a088003b6bd6d9086c3969a9db10d7882dc4fef590785f7fa15b5b9fb2c77a058ac52d497fe1b8d472ebe26b312d44cb2a54d60b335bddf4ac20bd5aa0d2cc0bbb19cb4a114f75127420e6f81e9f95f325e8e01b3b288e3675b6f2bb917d284e0ba909ef590df015e59d78cd81108d47227518bed1152400c939f61a04dd8f3cb54b05ef812a52284039f6e5dc97960c157389a37082d8b7ec165610c88e7b22f516eb1236a77204fbc08a5afc9b76fbb874f0a60ee7c64e68e9513773ecc1a36e316c3f33d0f444ab4dccee45d74b57caac8cc99730dbd5af98f2ff9760e636abed250a59b24ec8ee6175e7398ef3d774ca885c5c14b459aa558a12856b43263f4d86a9b61fac4f6d81a84372f05640614e4b2124d9b66c29a7662e64f8787bfac4e1de1561bae7bc923023e8de495b54c6dfb6a7ca64031af3ec832ee6ba8c610232ae86860bb6e9e49eb5bdf0a7d1cc971a1a1ddccf331da66c1f5c787a4f15340631720107cddd88e2b34784e4d8aa661259027c015bb3a1017d60d7a840d65c33b1d99a845ba4b486f57a2ffc3d1e6cd623f21f6f0be4ae3bbaa4fa29010f91e4337bee7ce9ba5b4b8caaed7a6b9ced1577aeb94a2cf2f4d848045fc2fe7e2e308e74a787da63fcce5bf95589282da086828261dd857eb88ebe5f5b49254183b85145ca08055030f0ef168c915a16b9611e1ee84c0943374ee572920a8e3686a6b53a92236f66e4289ea334a8b631808cb1eafa56782d90cfcbc7c384ecf60dcff4e9837e8b459281785130d3a4a270e4b4cfa12524d3c60a1b118531be8080f77025dabde575f22fad2d66a626b8a874d88ee1309dbaa86b96488a1a4859dcc285f0f6e53b6c775037202400a804143996a9d180a9192928958ac19a6fadd7af824acb407447960c429aa5a2d2a5ac67771da78f308c520f27c8362bb756d9b6e7737721e33cdb964a5a4afd4ef9efbd2f5c0a24e290bd06dd09d32b761496dc7e859edf2fca6bb259689196e56386ed0193a8b841145a06d33978823e73338007acd49a1dbf759e6b55f5575e98db2728d41e71f41ba651c97d81bf9660f1dba7c590fd47c9cd924b70f99db2f3373cb5acf0d09c58c81b9c7b64d806f7adcfb082ef3ef1c5ea8f05a3031b5f8982d75735b5691e14489218e937778f81c77b4e670e7a139659ad43aa055cb67918ed5384da24683b0004b508609cd5644f523af82b30ae1f52ebee869eca8b96a4fde75fb7631ed2d295c53f98affb6cf5e24f0864b93d4b495d0163c41cef367d8e475caece6b7824293b39553203d4d84afdfd196e69252b07bd287007e84e70f3d4c442aa4f9998eae2c2d48a1282f0213f3053c8027b73605e51febbd5dc26ffeeea86fa82d0cbd9133100e26d419748b69c27f45cf59b4f70f325b5a0ab496782171bd07ecbeb3043657ef666f08d0e931741082c4f5732fca6f7ed4c8376797a510fcde03c9215a69b43e80be133b5a16d34db4489272404e2049d05a77e2042126064bdba44a8ee50ec286cd341d41d114dbac95f0527a8a58a818e38f2e59a36b307bd4ae53f2fe5b483833d2fce17e5b8499b5c639eb7e9b126de65e0f14d254e935e3eef2eb3a21b8bc0895699e77ace32a8b1545ae6f6133d427c51bab1f03d899cf355646e86a572ad702dedb4221a94445d97d146a1df7beaac59a0c9ef2db7190180b1504742c861b51106f4cbb97e16b6e9c00b16c37c9e26cc86cb00b10ce13b9408eb1fec5e59ad8bb93aaa3b0b3228ed0e73c8d3e38809b90e566e2b5880bf04c317b72eed1c7a5230daf948ff0d4a52259a8e52cdf056adbc5aad4c3398d956244cdfd26e01e36fe50f19303f885bfefb7e3822295b92de35594a1585ef9e9ffa5d8d744300493775dd16bc8e143358bffed3b84ac147fa6ab83b8331c66fa0dea52a5520f280049abb3b23fad18aed20b019737786ba69d57b18b654a25367f01a1cc1b81e7c25a1842c64405948cde4c1c6cd6b155360bdcfacd3ec46e1436d341e6d92cf19f7a021b07a411fe6a0990e73d35bfbb65d71729e4682df44625cd9b74eb4e03a0e84a8e51fdbc66bfd6f47ff11ce5f06b30856ac2ec840e95caf0f93c6cee994091b9f3fc9fe483a88a57caf3cdb84c73bc305e978967356421847d8fad7b85054a70b7fcc948dabc6c1fb97cf172b8d7e26f51da38888a63544e86f187550e077dcecbe654ebf0c39a4863b8ba84a28d34edf8603b3005435022c8f1a8f7ae2db94d1714e728b8aee10fd833314ee59a0b99ce8f73b4a0f73ac257dda2f3b5e469d820933bf812da2ad759d1791a479098efbbaf9143763a083bbf3f18f58ba600b42bff3faedd9777ce21eb9c76f8cac77c3e491220aade1ac45bdef3a3e57277dcf1d579d3b5c18fc12beaffbcbc20f91d6d4c8279bf525c08eb2f766992b8475573ae7e1df32e31a369ade1d1ac12b4bb9e7887e0aa58aa111537ad257b5a0aa8324dec779953443a512d1194b4b4ebb0bccc956f19d9ef73c2221ea5ba2b4eff5207dbce41b2798ca1744e58412012e963926e5960e6d17093e5020dc4c8472e2ae8bba4f7266305bbbebb69c1d7742edadcb567a531524c47289e545d5d21df90a9135ebed52b8db0062929923f131f30cd9cf21805e05d81c604f9f408a8bb2d5e80485ac250e3a884bca75d90a913ace3cdc88d741ef7d480b1975146e08982bfa7170266f2ebbde2d4d1236ffc9555835e3997dd3d4fa5651ca109702799e7062b555536de08ffdf8b07238c1efb9524f2e0cdc2ace2667efa27bd05cbaccfadf99b27915d5d9f22a8e20f3010f9e1d8f8a353722fd370842ec894072af781e37e1b6d89a5c67debe8035b8637047571125b8bd02786212b5a02342eb607b760dd94d92369d6b1f7e2da0a924377e3ba34d015668014008cc251f82a6aa03b604ed41937da5062afcbf278f54eb1f1176dca39c1175d4228ad54aa5290672a7ac138102f891d4014e1ebc71a8e8076191049c3e05aa81d5e82af2eddafca1cf91577ae852499d97339bdd0d678f99566e70aabae11d6d52fd9cbafdb5f75fa00cebd8c28bd82b08e0553258534d8eabeefac5a5388badd65d983ffdcbd14a93cab16e779ec1683d7b3013b1509f6295abacb4c90f835e6a1d241eb8c643e8ed11c05bbf79906b3df9942b756f5875b61f070d62fcc1d9db818338910e43bf82186d63bcb4150be0cfb26935c836940930328fa884d00a5708fce75d26328daef44c71d1a91537120e716232d4c24543ada9de6362c55062860749352e8b62662d727ff460ae9c1e25e6f64ade50919c241f92dc348ef880fd4464d839d80ffde8e061e7efc688b53bc610896034c33c0e9db11ffa34b405eb99c161619e08752e852fc3c6dfb1c6cb6c4d040c7125c8a52765d7ff6b77fdb80fe861705a3e2510ade310eb4cc9590989ba2230a3a51af6873efdf7504ab4ee362b14665c482fd1cae8286e039c1078e6cc312fcede1462ec31cc8d66edd88d0a70ae3d13655a9a3158e9c73a0b9a34930d295a010225b99aa79daef6e876577ea8997e078460378f2d6c81b8aff72893ba385a539be565b1eb3791ae7b5dbae0496baf56b706ce9595fd8914de03177b25a94cdf94dcdd0128acafdf8d16b48a51cefda1bd14dd6012f4493cc78ae0a70a4a34cc98f1f062b9a2e197a6ef0aaf2768fa467ed97deae83d28ac6db71132fcd848713f2113a19d745041d93e556f08fbf9dbbac1155c3ff7bd654422238c42e5a8efd9abc23fdb87c506d88dfbdafee3be10273ab5f6cad37d058674acef9f3d4c9f6ba4f1b44a0486cf6f442e443ed328b35b412e879a378fcb5188c39ab7d3fc6dbde9347e08edc2efe9743b7bd4a72dc18e6f7bddc494061b0e11745a17e82dd679d3cb44ec3a07348cf926ef80c310a9b11f11926d3375c9ffc8cb99c70bd70ca3636afd3455f83f9efd9f6891760994f76696d4298a0909ebe69dce91aa0b11ec62a3735e9570d77efb272633fbed25cca6ad28b0a24d0b1d86aaefffc1176367cc1beac31fc61318490e2948089df44eb15f541f6db7fd88769173e4efaf8e4fbf0c0d836d0d32f366a3f890230ad610236d957346998753e7bfb791edbe3f1f687ae3bf92bd1dc7da397cb171611b45f71e42243c366124fe64e215cd444fbc4b4a48c2ff62658683b901c7c9055c8d4485639c29cb1f749b1a3edd9f17ebef69eedf97947c43c13d22850c1961f4e2dc6e5431cfbd84b6a4d0787fe118539a3396e1a5c3ff8e08b6115cbb98425bfb8a81be55c786d09d8682e101c176c5b4b7a650905483b07eee0ef6be3d582f2c853e43259269844007e45b99b144d7b96a52d8a0b6e0e6d268e11e6cdebd706c86940c6d25df8c71b39e344f8e0cff5b864144c65f99257164f543797dc89bd39f5b394744c8660a40ecc851926c29d9b4634a9bb11c335b4356eaef944666851e44a20b1c71eb360ae1d991dd02afa2ed349632132626ae186211869f9f7b43fcc88de808df7498b87133c6f63e0a0d3659c7e515d3dd503fad9c5b0003b3192a362275fb9bc01c97b6b5ea003a347da0f622d7fc7b945dca0a233ad76ac2bd04b62ec75509c075f4c9757aa4f93b90a51c49ec06d69602b28fcf6c2df13f9e402a51c512c975f2b5a5b09a0827ae00ed4edbb2ec86e624bbdab1b43a74c216e33f4098201fd5494288b6daaa9b060850f33730e87242f88b73c8f2c782c3373538176cb6c1ef0846b2f9069aa5374437cb7036646a5c75a8931ef76027be1e6d18ae883c1998fe4d0ecc5f407a7c0f3e9c8f9f4f84676399a97e4e5b37639070989cc494baf819e901f894eaa632d93881a3377bf3f0e66d3125c58f02df464015e5487f2e33ad48f851d29e02f7476fe78badae1bf7bda6d1b94c54ea7ccb5c9a7935ad036c43f1a3828c0a9e53622537b98f832e9f36c08046e8f4d65a67eb3669797173cf7c1d81ac10f9068a2b27f875c17462c19aaf717ae6ebb04f22bee7308612780b9467a4959ca07dad8ad898fd5127885ff9bbc76d799f54b4f28640eaf57e0c0b813efab840dc26643c05b2c6d50463e1126bd784c03caf8de276b52506fe6d38f7d8f3f3aa0b2b2d06ce16edeb5c34daa529a37e9148f6a0b1c5e61147bd3507e30889a4d07e35ec65b4cda9030bec9886fd43bcf9a76fa6f14d71b211f8c3c46f57f5333f8322e0cde3593943a58b8d50fb077ec7525b12b96d34fed916f865a4749170a3c27e5e559784dc44e1a49f98a29c61cfab39d69692a93ed076042638aa6f335bb88ec4313ea7262a41d05eafaaec9326c2711361b6c732d6017e64aa289a2213eb9489479c81688c9f9821d7ee3f083ba0745a86f3b5d07ea0f8fb8a1be3387114f5cd858c86dc4659ffc83b42040fa5905396d7b0fb0ee8ecf7a4e7a071a17db3d3d255e8b928d7710259c58b62358fbb9ed368e2248a1bdec4d9e5dbe14239c97830330eb0912bdd847feb77a850219b4ab96d312fec00a4c237805ada3d86b8f6f78e0091990ddea369b3cdba4ddf45304ccf950555c922e125db0fb41e5794bd77f7e474a2aa944bcc4fe310e80ac2566a2605fac5e0159483d413f41e197c89af4a74ed7b6343637e0e479398e0db708ccb6e361d0", 0x1000, 0x0, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e) write$rdma_cm(r1, &(0x7f0000000240)=@bind={0x14, 0x88, 0xfa00, {0xffffffff, 0x0, 0xdadc, @in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x29d) r2 = gettid() setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x400, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, @in6={0xa, 0x4e21, 0x3}, @in6={0xa, 0x4e22, 0x43e, @mcast1={0xff, 0x1, [], 0x1}, 0x10001}], 0x74) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r2) 2033/05/18 03:43:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x10000e0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 814.100363] IPVS: Unknown mcast interface: rose0 2033/05/18 03:43:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x2000]}}]}, 0x60}, 0x1}, 0x0) [ 814.148426] IPVS: Unknown mcast interface: rose0 2033/05/18 03:43:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4601046d04020000000000000003000700a928000073020000380000009d010000810000000700200002008b83060004000000000001000070020000030000008000000400000009000000fdffffff0000000007000000010000000600000002000000080000001f0000000300000001000000ef40cbda6c3e279592f5c10a7b876be70fcba53a27c1c5e8b55b0f5840848ec3b0fdbaef1090985dd0e8a7b7f7b28c9abf06f584013ecf2a1eb501009bd16f00243903a51f37250684dda639f43e391754dbca32055a64a3eb000000000000000000000000000000000000000000000000000000000000000000000000000000c10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x165) 2033/05/18 03:43:05 executing program 6 (fault-call:3 fault-nth:74): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) [ 814.253994] device bridge_slave_1 left promiscuous mode [ 814.259640] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.298103] device bridge_slave_0 left promiscuous mode [ 814.303846] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.339355] IPVS: ftp: loaded support on port[0] = 21 [ 814.368070] team0 (unregistering): Port device team_slave_1 removed [ 814.380049] team0 (unregistering): Port device team_slave_0 removed [ 814.393660] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 814.448338] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 814.516772] bond0 (unregistering): Released all slaves [ 815.494944] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.501378] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.526924] device bridge_slave_0 entered promiscuous mode [ 815.603956] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.611097] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.619490] device bridge_slave_1 entered promiscuous mode [ 815.659379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 815.698130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 815.927825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 816.011513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 816.091287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 816.098484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 816.140461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 816.147611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 816.344151] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 816.360758] team0: Port device team_slave_0 added [ 816.419213] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 816.427165] team0: Port device team_slave_1 added [ 816.501092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 816.553438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 816.594575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 816.601907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.618269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 816.651293] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 816.658502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 816.666652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 817.058440] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.064887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.071558] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.077952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.086660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 818.081696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 818.498086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 818.634855] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 818.770164] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 818.776472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 818.784486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 818.923816] 8021q: adding VLAN 0 to HW filter on device team0 [ 819.758368] FAULT_INJECTION: forcing a failure. [ 819.758368] name failslab, interval 1, probability 0, space 0, times 0 [ 819.770219] CPU: 0 PID: 19152 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 819.777515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.786868] Call Trace: [ 819.789465] dump_stack+0x1b9/0x294 [ 819.793101] ? dump_stack_print_info.cold.2+0x52/0x52 [ 819.798289] ? __lock_acquire+0x7f5/0x5140 [ 819.802536] ? __lock_acquire+0x7f5/0x5140 [ 819.806777] should_fail.cold.4+0xa/0x1a [ 819.810846] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 819.815952] ? debug_check_no_locks_freed+0x310/0x310 [ 819.821147] ? kasan_check_write+0x14/0x20 [ 819.825381] ? __init_rwsem+0x1c4/0x290 [ 819.829355] ? graph_lock+0x170/0x170 [ 819.833154] ? find_held_lock+0x36/0x1c0 [ 819.837226] ? find_held_lock+0x36/0x1c0 [ 819.841291] ? __lock_is_held+0xb5/0x140 [ 819.845363] ? check_same_owner+0x320/0x320 [ 819.849682] ? graph_lock+0x170/0x170 [ 819.853485] ? rcu_note_context_switch+0x710/0x710 [ 819.858419] __should_failslab+0x124/0x180 [ 819.862655] should_failslab+0x9/0x14 [ 819.866463] kmem_cache_alloc+0x2af/0x760 [ 819.870625] ? find_held_lock+0x36/0x1c0 [ 819.874706] fuse_alloc_inode+0x96/0x4f0 [ 819.878868] ? fuse_dev_alloc+0x4e0/0x4e0 [ 819.883015] ? lock_downgrade+0x8e0/0x8e0 [ 819.887170] ? kasan_check_read+0x11/0x20 [ 819.891316] ? do_raw_spin_unlock+0x9e/0x2e0 [ 819.895724] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 819.900311] ? kasan_check_write+0x14/0x20 [ 819.904548] ? find_inode.isra.19+0xc3/0x1d0 [ 819.908956] ? fuse_dev_alloc+0x4e0/0x4e0 [ 819.913104] alloc_inode+0x63/0x190 [ 819.916731] iget5_locked+0x20e/0x570 [ 819.920531] ? fuse_inode_eq+0x80/0x80 [ 819.924415] ? fuse_init_file_inode+0x70/0x70 [ 819.928934] ? inode_lru_isolate+0x580/0x580 [ 819.933343] ? cgwb_kill+0x630/0x630 [ 819.937064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.942602] ? print_usage_bug+0xc0/0xc0 [ 819.946668] fuse_iget+0x1cc/0x820 [ 819.950222] ? fuse_change_attributes+0x810/0x810 [ 819.955078] ? _raw_spin_unlock+0x22/0x30 [ 819.959236] fuse_get_root_inode+0x121/0x190 [ 819.963646] ? fuse_iget+0x820/0x820 [ 819.967376] ? _raw_spin_unlock_bh+0x30/0x40 [ 819.971798] ? bdi_set_max_ratio+0x112/0x150 [ 819.976222] fuse_fill_super+0x11e0/0x1e20 [ 819.980461] ? fuse_get_root_inode+0x190/0x190 [ 819.985053] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 819.990073] ? kasan_check_read+0x11/0x20 [ 819.994248] ? cap_capable+0x1f9/0x260 [ 819.998144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.003680] ? security_capable+0x99/0xc0 [ 820.007830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.013365] ? ns_capable_common+0x13f/0x170 [ 820.017776] ? get_anon_bdev+0x2f0/0x2f0 [ 820.021836] ? sget+0x113/0x150 [ 820.025116] ? fuse_get_root_inode+0x190/0x190 [ 820.029704] mount_nodev+0x6b/0x110 [ 820.033328] fuse_mount+0x2c/0x40 [ 820.036807] mount_fs+0xae/0x328 [ 820.040194] vfs_kern_mount.part.34+0xd4/0x4d0 [ 820.044779] ? may_umount+0xb0/0xb0 [ 820.048405] ? _raw_read_unlock+0x22/0x30 [ 820.052563] ? __get_fs_type+0x97/0xc0 [ 820.056455] do_mount+0x564/0x3070 [ 820.060001] ? copy_mount_string+0x40/0x40 [ 820.064237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.068999] ? retint_kernel+0x10/0x10 [ 820.072892] ? copy_mount_options+0x1a1/0x380 [ 820.077388] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 820.082235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.087770] ? copy_mount_options+0x285/0x380 [ 820.092269] ksys_mount+0x12d/0x140 [ 820.095896] __x64_sys_mount+0xbe/0x150 [ 820.099868] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 820.104887] do_syscall_64+0x1b1/0x800 [ 820.108776] ? finish_task_switch+0x1ca/0x840 [ 820.113272] ? syscall_return_slowpath+0x5c0/0x5c0 [ 820.118234] ? syscall_return_slowpath+0x30f/0x5c0 [ 820.123168] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 820.128538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.133391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.138594] RIP: 0033:0x455a09 [ 820.141781] RSP: 002b:00007fee67091808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 820.149487] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 820.156750] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 820.164016] RBP: 0000000000000000 R08: 00007fee67091820 R09: 0000000000000000 [ 820.171280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 820.178543] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 820.197176] gfs2: not a GFS2 filesystem 2033/05/18 03:43:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00022bb000", 0x4012}) 2033/05/18 03:43:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0x4800000000000000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x7b, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x0, {{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x3}, 0x11) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="a6000000b6c9fc7ed23b78e2785f68590a36c146aeb8fb2d5544620768d05076dfb2dec6c64e94607a0bdc3d236f7b3081963afbffae405b6b8d9125e771c87b92f06f9cf72f4ce4dc33745aeaf4e45592587b8bb3d93f8564ddf4c9e5828f48af46c70a487c5194e4df79b4c06d99413dc01ff2440d5cbb94763978b46eee06bfa1ad201444ebbfd5099e8fd0b398fc87d0e692fd09d101a972b99fffd53f334a5ca46bee96d411596a"], &(0x7f00000002c0)=0xae) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000400)={r3, 0x81}, &(0x7f0000000440)=0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x1000000200007, &(0x7f0000000040)=0x1000000000004, 0x4) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000480)={r3, 0x8000, 0x0, 0x2, 0x20, 0x1}, 0x14) sendto$inet6(r0, &(0x7f0000000300)='6', 0x1, 0x200418cf, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f00000004c0)=@hopopts={0xff, 0xa, [], [@calipso={0x7, 0x48, {0xfffffffffffffff9, 0x10, 0x1, 0x0, [0x1000, 0x100000001, 0x3, 0x41, 0x10001, 0x8, 0x81, 0x80000001]}}, @jumbo={0xc2, 0x4, 0x100}]}, 0x58) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x10001}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000180)={r5, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xa252, 0x7, 0x6, 0x0, 0x44}, 0x98) 2033/05/18 03:43:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r2, 0x401, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, "726f736530000300"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x3c}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x100000000000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x3d1894fa51000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 6 (fault-call:3 fault-nth:75): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002740)='GPL{*!\x00') r1 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x35) umount2(&(0x7f00000015c0)='./file0\x00', 0x0) 2033/05/18 03:43:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) [ 820.278170] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 820.307698] IPVS: Unknown mcast interface: rose0 [ 820.316572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 2033/05/18 03:43:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x1000000]}}]}, 0x60}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x126ee90d71000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 820.340771] IPVS: Unknown mcast interface: rose0 [ 820.424008] FAULT_INJECTION: forcing a failure. [ 820.424008] name failslab, interval 1, probability 0, space 0, times 0 [ 820.435349] CPU: 0 PID: 19174 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 820.442628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.451982] Call Trace: [ 820.454589] dump_stack+0x1b9/0x294 [ 820.458234] ? dump_stack_print_info.cold.2+0x52/0x52 [ 820.463440] ? unwind_get_return_address+0x61/0xa0 [ 820.468382] should_fail.cold.4+0xa/0x1a [ 820.472448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 820.477553] ? save_stack+0xa9/0xd0 [ 820.481185] ? save_stack+0x43/0xd0 [ 820.484814] ? kasan_kmalloc+0xc4/0xe0 [ 820.488701] ? kasan_slab_alloc+0x12/0x20 [ 820.492851] ? graph_lock+0x170/0x170 [ 820.496652] ? mount_nodev+0x6b/0x110 [ 820.500452] ? fuse_mount+0x2c/0x40 [ 820.504078] ? mount_fs+0xae/0x328 [ 820.507623] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 820.512377] ? do_mount+0x564/0x3070 [ 820.516095] ? ksys_mount+0x12d/0x140 [ 820.519905] ? find_held_lock+0x36/0x1c0 [ 820.523978] ? __lock_is_held+0xb5/0x140 [ 820.528060] ? check_same_owner+0x320/0x320 [ 820.532392] ? rcu_note_context_switch+0x710/0x710 [ 820.537330] __should_failslab+0x124/0x180 [ 820.541573] should_failslab+0x9/0x14 [ 820.545376] kmem_cache_alloc_trace+0x2cb/0x780 [ 820.550071] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 820.555095] ? __lockdep_init_map+0x105/0x590 [ 820.559601] fuse_dentry_init+0x45/0xa0 [ 820.563669] ? fuse_create+0x30/0x30 [ 820.567386] __d_alloc+0x6f8/0xd30 [ 820.570939] ? shrink_dcache_for_umount+0x290/0x290 [ 820.575985] ? fuse_change_attributes+0x810/0x810 [ 820.580835] ? _raw_spin_unlock+0x22/0x30 [ 820.585010] ? fuse_get_root_inode+0x121/0x190 [ 820.589597] ? fuse_iget+0x820/0x820 [ 820.593331] d_make_root+0x42/0x90 [ 820.596877] fuse_fill_super+0x120e/0x1e20 [ 820.601121] ? fuse_get_root_inode+0x190/0x190 [ 820.605712] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 820.610734] ? kasan_check_read+0x11/0x20 [ 820.614898] ? cap_capable+0x1f9/0x260 [ 820.618795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.624337] ? security_capable+0x99/0xc0 [ 820.628492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.634032] ? ns_capable_common+0x13f/0x170 [ 820.638455] ? get_anon_bdev+0x2f0/0x2f0 [ 820.642518] ? sget+0x113/0x150 [ 820.645925] ? fuse_get_root_inode+0x190/0x190 [ 820.650515] mount_nodev+0x6b/0x110 [ 820.654176] fuse_mount+0x2c/0x40 [ 820.657724] mount_fs+0xae/0x328 [ 820.661101] vfs_kern_mount.part.34+0xd4/0x4d0 [ 820.665690] ? may_umount+0xb0/0xb0 [ 820.669319] ? _raw_read_unlock+0x22/0x30 [ 820.673468] ? __get_fs_type+0x97/0xc0 [ 820.677363] do_mount+0x564/0x3070 [ 820.680911] ? copy_mount_string+0x40/0x40 [ 820.685176] ? rcu_pm_notify+0xc0/0xc0 [ 820.689076] ? copy_mount_options+0x5f/0x380 [ 820.693495] ? rcu_read_lock_sched_held+0x108/0x120 [ 820.698515] ? kmem_cache_alloc_trace+0x616/0x780 [ 820.703391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.708954] ? copy_mount_options+0x285/0x380 [ 820.713464] ksys_mount+0x12d/0x140 [ 820.717185] __x64_sys_mount+0xbe/0x150 [ 820.721189] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 820.726226] do_syscall_64+0x1b1/0x800 [ 820.730128] ? finish_task_switch+0x1ca/0x840 [ 820.734632] ? syscall_return_slowpath+0x5c0/0x5c0 [ 820.739571] ? syscall_return_slowpath+0x30f/0x5c0 [ 820.744507] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 820.749881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.754732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.759922] RIP: 0033:0x455a09 [ 820.763124] RSP: 002b:00007fee67091808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:43:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x165) 2033/05/18 03:43:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x2, 0xfffff000}}, 0x20}, 0x1}, 0x0) 2033/05/18 03:43:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x50}, 0x1}, 0x0) [ 820.770844] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 820.778114] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 820.785388] RBP: 0000000000000000 R08: 00007fee67091820 R09: 0000000000000000 [ 820.792672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 820.799945] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 820.833261] ================================================================== [ 820.840681] BUG: KASAN: use-after-free in __lock_acquire+0x3888/0x5140 [ 820.847347] Read of size 8 at addr ffff8801be328bc8 by task syz-executor6/19174 [ 820.854780] [ 820.856402] CPU: 0 PID: 19174 Comm: syz-executor6 Not tainted 4.17.0-rc7+ #76 [ 820.863652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.875238] Call Trace: [ 820.877823] dump_stack+0x1b9/0x294 [ 820.881435] ? dump_stack_print_info.cold.2+0x52/0x52 [ 820.886610] ? printk+0x9e/0xba [ 820.889873] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 820.894613] ? kasan_check_write+0x14/0x20 [ 820.898828] print_address_description+0x6c/0x20b [ 820.903651] ? __lock_acquire+0x3888/0x5140 [ 820.907953] kasan_report.cold.7+0x242/0x2fe [ 820.912343] __asan_report_load8_noabort+0x14/0x20 [ 820.917280] __lock_acquire+0x3888/0x5140 [ 820.921410] ? lock_downgrade+0x8e0/0x8e0 [ 820.925541] ? rcu_is_watching+0x85/0x140 [ 820.929670] ? debug_check_no_locks_freed+0x310/0x310 [ 820.934843] ? is_bpf_text_address+0xd7/0x170 [ 820.939320] ? kernel_text_address+0x79/0xf0 [ 820.943708] ? __unwind_start+0x166/0x330 [ 820.947836] ? __kernel_text_address+0xd/0x40 [ 820.952311] ? unwind_get_return_address+0x61/0xa0 [ 820.957223] ? __save_stack_trace+0x7e/0xd0 [ 820.961532] ? save_stack+0xa9/0xd0 [ 820.965146] ? save_stack+0x43/0xd0 [ 820.968757] ? __kasan_slab_free+0x11a/0x170 [ 820.973163] ? kasan_slab_free+0xe/0x10 [ 820.977118] ? kfree+0xd9/0x260 [ 820.980384] ? unregister_shrinker+0x216/0x3a0 [ 820.984946] ? deactivate_locked_super+0x70/0x100 [ 820.989770] ? mount_nodev+0xfa/0x110 [ 820.993555] ? fuse_mount+0x2c/0x40 [ 820.997175] ? mount_fs+0xae/0x328 [ 821.000697] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 821.005434] ? do_mount+0x564/0x3070 [ 821.009131] ? ksys_mount+0x12d/0x140 [ 821.012912] ? graph_lock+0x170/0x170 [ 821.016693] ? kasan_check_read+0x11/0x20 [ 821.020823] ? do_raw_spin_unlock+0x9e/0x2e0 [ 821.025215] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 821.029776] ? print_usage_bug+0xc0/0xc0 [ 821.033821] ? kasan_check_write+0x14/0x20 [ 821.038043] ? do_raw_spin_lock+0xc1/0x200 [ 821.042261] lock_acquire+0x1dc/0x520 [ 821.046046] ? fuse_kill_sb_anon+0x50/0xb0 [ 821.050262] ? lock_release+0xa10/0xa10 [ 821.054229] ? check_same_owner+0x320/0x320 [ 821.058534] ? quarantine_put+0xeb/0x190 [ 821.062579] ? rcu_note_context_switch+0x710/0x710 [ 821.067490] ? __might_sleep+0x95/0x190 [ 821.071447] down_write+0x87/0x120 [ 821.075057] ? fuse_kill_sb_anon+0x50/0xb0 [ 821.079276] ? down_read+0x1b0/0x1b0 [ 821.082973] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 821.089538] fuse_kill_sb_anon+0x50/0xb0 [ 821.093587] deactivate_locked_super+0x97/0x100 [ 821.098238] ? fuse_get_root_inode+0x190/0x190 [ 821.102803] mount_nodev+0xfa/0x110 [ 821.106411] fuse_mount+0x2c/0x40 [ 821.109849] mount_fs+0xae/0x328 [ 821.113198] vfs_kern_mount.part.34+0xd4/0x4d0 [ 821.117763] ? may_umount+0xb0/0xb0 [ 821.121372] ? _raw_read_unlock+0x22/0x30 [ 821.125505] ? __get_fs_type+0x97/0xc0 [ 821.129376] do_mount+0x564/0x3070 [ 821.132910] ? copy_mount_string+0x40/0x40 [ 821.137136] ? rcu_pm_notify+0xc0/0xc0 [ 821.141025] ? copy_mount_options+0x5f/0x380 [ 821.145429] ? rcu_read_lock_sched_held+0x108/0x120 [ 821.150430] ? kmem_cache_alloc_trace+0x616/0x780 [ 821.155260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.160779] ? copy_mount_options+0x285/0x380 [ 821.165268] ksys_mount+0x12d/0x140 [ 821.168879] __x64_sys_mount+0xbe/0x150 [ 821.172837] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 821.177847] do_syscall_64+0x1b1/0x800 [ 821.181716] ? finish_task_switch+0x1ca/0x840 [ 821.186193] ? syscall_return_slowpath+0x5c0/0x5c0 [ 821.191122] ? syscall_return_slowpath+0x30f/0x5c0 [ 821.196037] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 821.201385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.206220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.211731] RIP: 0033:0x455a09 [ 821.214903] RSP: 002b:00007fee67091808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 821.222595] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 821.229848] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 821.237128] RBP: 0000000000000000 R08: 00007fee67091820 R09: 0000000000000000 [ 821.244467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 821.251803] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 821.259053] [ 821.260660] Allocated by task 19174: [ 821.264360] save_stack+0x43/0xd0 [ 821.267795] kasan_kmalloc+0xc4/0xe0 [ 821.271501] kmem_cache_alloc_trace+0x152/0x780 [ 821.276153] fuse_fill_super+0xc92/0x1e20 [ 821.280281] mount_nodev+0x6b/0x110 [ 821.283889] fuse_mount+0x2c/0x40 [ 821.287325] mount_fs+0xae/0x328 [ 821.290674] vfs_kern_mount.part.34+0xd4/0x4d0 [ 821.295244] do_mount+0x564/0x3070 [ 821.298763] ksys_mount+0x12d/0x140 [ 821.302377] __x64_sys_mount+0xbe/0x150 [ 821.306346] do_syscall_64+0x1b1/0x800 [ 821.310219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.315384] [ 821.317003] Freed by task 23234: [ 821.320370] save_stack+0x43/0xd0 [ 821.323805] __kasan_slab_free+0x11a/0x170 [ 821.328036] kasan_slab_free+0xe/0x10 [ 821.331817] kfree+0xd9/0x260 [ 821.334905] rcu_process_callbacks+0xa69/0x15f0 [ 821.339566] __do_softirq+0x2e0/0xaf5 [ 821.343433] [ 821.345043] The buggy address belongs to the object at ffff8801be328900 [ 821.345043] which belongs to the cache kmalloc-1024 of size 1024 [ 821.357865] The buggy address is located 712 bytes inside of [ 821.357865] 1024-byte region [ffff8801be328900, ffff8801be328d00) [ 821.369814] The buggy address belongs to the page: [ 821.374731] page:ffffea0006f8ca00 count:1 mapcount:0 mapping:ffff8801be328000 index:0x0 compound_mapcount: 0 [ 821.384679] flags: 0x2fffc0000008100(slab|head) [ 821.389335] raw: 02fffc0000008100 ffff8801be328000 0000000000000000 0000000100000007 [ 821.397200] raw: ffffea00060c2ca0 ffffea000608fca0 ffff8801da800ac0 0000000000000000 [ 821.405067] page dumped because: kasan: bad access detected [ 821.410761] [ 821.412368] Memory state around the buggy address: [ 821.417277] ffff8801be328a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.424616] ffff8801be328b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.431989] >ffff8801be328b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.439325] ^ [ 821.445019] ffff8801be328c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.452364] ffff8801be328c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 821.459910] ================================================================== [ 821.467255] Disabling lock debugging due to kernel taint [ 821.472770] Kernel panic - not syncing: panic_on_warn set ... [ 821.472770] [ 821.480121] CPU: 0 PID: 19174 Comm: syz-executor6 Tainted: G B 4.17.0-rc7+ #76 [ 821.488761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.498099] Call Trace: [ 821.500694] dump_stack+0x1b9/0x294 [ 821.504327] ? dump_stack_print_info.cold.2+0x52/0x52 [ 821.509596] ? lock_downgrade+0x8e0/0x8e0 [ 821.513726] ? vprintk_default+0x28/0x30 [ 821.517769] ? __lock_acquire+0x3870/0x5140 [ 821.522072] panic+0x22f/0x4de [ 821.525264] ? add_taint.cold.5+0x16/0x16 [ 821.529413] ? add_taint.cold.5+0x5/0x16 [ 821.533457] ? do_raw_spin_unlock+0x9e/0x2e0 [ 821.537849] ? __lock_acquire+0x3888/0x5140 [ 821.542152] kasan_end_report+0x47/0x4f [ 821.546108] kasan_report.cold.7+0x76/0x2fe [ 821.550424] __asan_report_load8_noabort+0x14/0x20 [ 821.555344] __lock_acquire+0x3888/0x5140 [ 821.559473] ? lock_downgrade+0x8e0/0x8e0 [ 821.563608] ? rcu_is_watching+0x85/0x140 [ 821.567738] ? debug_check_no_locks_freed+0x310/0x310 [ 821.572924] ? is_bpf_text_address+0xd7/0x170 [ 821.577405] ? kernel_text_address+0x79/0xf0 [ 821.581808] ? __unwind_start+0x166/0x330 [ 821.585937] ? __kernel_text_address+0xd/0x40 [ 821.590417] ? unwind_get_return_address+0x61/0xa0 [ 821.595330] ? __save_stack_trace+0x7e/0xd0 [ 821.599639] ? save_stack+0xa9/0xd0 [ 821.603247] ? save_stack+0x43/0xd0 [ 821.606856] ? __kasan_slab_free+0x11a/0x170 [ 821.611245] ? kasan_slab_free+0xe/0x10 [ 821.615209] ? kfree+0xd9/0x260 [ 821.618469] ? unregister_shrinker+0x216/0x3a0 [ 821.623036] ? deactivate_locked_super+0x70/0x100 [ 821.627860] ? mount_nodev+0xfa/0x110 [ 821.631646] ? fuse_mount+0x2c/0x40 [ 821.635261] ? mount_fs+0xae/0x328 [ 821.638786] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 821.643524] ? do_mount+0x564/0x3070 [ 821.647218] ? ksys_mount+0x12d/0x140 [ 821.650999] ? graph_lock+0x170/0x170 [ 821.654793] ? kasan_check_read+0x11/0x20 [ 821.658937] ? do_raw_spin_unlock+0x9e/0x2e0 [ 821.663331] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 821.667897] ? print_usage_bug+0xc0/0xc0 [ 821.671942] ? kasan_check_write+0x14/0x20 [ 821.676161] ? do_raw_spin_lock+0xc1/0x200 [ 821.680388] lock_acquire+0x1dc/0x520 [ 821.684181] ? fuse_kill_sb_anon+0x50/0xb0 [ 821.688399] ? lock_release+0xa10/0xa10 [ 821.692366] ? check_same_owner+0x320/0x320 [ 821.696670] ? quarantine_put+0xeb/0x190 [ 821.700718] ? rcu_note_context_switch+0x710/0x710 [ 821.705630] ? __might_sleep+0x95/0x190 [ 821.709590] down_write+0x87/0x120 [ 821.713216] ? fuse_kill_sb_anon+0x50/0xb0 [ 821.717432] ? down_read+0x1b0/0x1b0 [ 821.721147] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 821.726667] fuse_kill_sb_anon+0x50/0xb0 [ 821.730719] deactivate_locked_super+0x97/0x100 [ 821.735371] ? fuse_get_root_inode+0x190/0x190 [ 821.739935] mount_nodev+0xfa/0x110 [ 821.743545] fuse_mount+0x2c/0x40 [ 821.746993] mount_fs+0xae/0x328 [ 821.750355] vfs_kern_mount.part.34+0xd4/0x4d0 [ 821.754920] ? may_umount+0xb0/0xb0 [ 821.758537] ? _raw_read_unlock+0x22/0x30 [ 821.762668] ? __get_fs_type+0x97/0xc0 [ 821.766540] do_mount+0x564/0x3070 [ 821.770067] ? copy_mount_string+0x40/0x40 [ 821.774283] ? rcu_pm_notify+0xc0/0xc0 [ 821.778152] ? copy_mount_options+0x5f/0x380 [ 821.782541] ? rcu_read_lock_sched_held+0x108/0x120 [ 821.787542] ? kmem_cache_alloc_trace+0x616/0x780 [ 821.792372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.797934] ? copy_mount_options+0x285/0x380 [ 821.802411] ksys_mount+0x12d/0x140 [ 821.806022] __x64_sys_mount+0xbe/0x150 [ 821.809989] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 821.814990] do_syscall_64+0x1b1/0x800 [ 821.818862] ? finish_task_switch+0x1ca/0x840 [ 821.823349] ? syscall_return_slowpath+0x5c0/0x5c0 [ 821.828357] ? syscall_return_slowpath+0x30f/0x5c0 [ 821.833273] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 821.838619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.843442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.848614] RIP: 0033:0x455a09 [ 821.851794] RSP: 002b:00007fee67091808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 821.859481] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 821.866740] RDX: 00000000004c2279 RSI: 0000000020000340 RDI: 00000000004de485 [ 821.873990] RBP: 0000000000000000 R08: 00007fee67091820 R09: 0000000000000000 [ 821.881243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 821.888493] R13: 0000000020000340 R14: 0000000000000000 R15: 0000000000000000 [ 821.896242] Dumping ftrace buffer: [ 821.899769] (ftrace buffer empty) [ 821.903455] Kernel Offset: disabled [ 821.907145] Rebooting in 86400 seconds..